Auto-Update: 2025-03-11T17:00:19.839888+00:00

This commit is contained in:
cad-safe-bot 2025-03-11 17:03:48 +00:00
parent 505a797c64
commit b939703fb5
99 changed files with 5129 additions and 482 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-34910",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-27T13:15:10.267",
"lastModified": "2024-11-21T07:10:25.027",
"lastModified": "2025-03-11T16:15:12.233",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-312"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-312"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-46704",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:12.747",
"lastModified": "2024-11-21T07:30:56.810",
"lastModified": "2025-03-11T15:15:36.577",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22747",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:12.427",
"lastModified": "2024-11-21T07:45:20.813",
"lastModified": "2025-03-11T15:15:37.513",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22766",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.700",
"lastModified": "2024-11-21T07:45:23.100",
"lastModified": "2025-03-11T15:15:37.670",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22767",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-03-01T08:15:13.767",
"lastModified": "2024-11-21T07:45:23.220",
"lastModified": "2025-03-11T15:15:37.823",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23507",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.880",
"lastModified": "2024-11-21T07:46:19.440",
"lastModified": "2025-03-11T16:15:12.787",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23508",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:13.940",
"lastModified": "2024-11-21T07:46:19.553",
"lastModified": "2025-03-11T16:15:12.953",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23510",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:14.010",
"lastModified": "2024-11-21T07:46:19.670",
"lastModified": "2025-03-11T16:15:13.123",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23514",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:14.263",
"lastModified": "2024-11-21T07:46:20.207",
"lastModified": "2025-03-11T16:15:13.297",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-416"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23517",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:14.320",
"lastModified": "2024-11-21T07:46:20.443",
"lastModified": "2025-03-11T16:15:13.490",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23518",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:14.387",
"lastModified": "2024-11-21T07:46:20.560",
"lastModified": "2025-03-11T16:15:13.680",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-23519",
"sourceIdentifier": "product-security@apple.com",
"published": "2023-02-27T20:15:14.453",
"lastModified": "2024-11-21T07:46:20.680",
"lastModified": "2025-03-11T16:15:13.880",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-787"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26102",
"sourceIdentifier": "report@snyk.io",
"published": "2023-02-24T05:15:15.140",
"lastModified": "2024-11-21T07:50:46.753",
"lastModified": "2025-03-11T16:15:14.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26103",
"sourceIdentifier": "report@snyk.io",
"published": "2023-02-25T05:15:12.343",
"lastModified": "2024-11-21T07:50:46.877",
"lastModified": "2025-03-11T16:15:14.263",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-1333"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1333"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26104",
"sourceIdentifier": "report@snyk.io",
"published": "2023-02-25T05:15:12.487",
"lastModified": "2024-11-21T07:50:47.000",
"lastModified": "2025-03-11T16:15:14.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-400"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-400"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26105",
"sourceIdentifier": "report@snyk.io",
"published": "2023-02-28T05:15:13.053",
"lastModified": "2024-11-21T07:50:47.137",
"lastModified": "2025-03-11T15:15:37.983",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -75,6 +75,16 @@
"value": "CWE-1321"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1321"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27372",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-02-28T20:15:10.243",
"lastModified": "2024-11-21T07:52:46.640",
"lastModified": "2025-03-11T15:15:38.177",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
@ -181,6 +211,14 @@
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://packetstorm.news/files/id/171921",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
},
{
"url": "https://packetstorm.news/files/id/173044",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2985",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-01T01:15:17.970",
"lastModified": "2024-11-21T07:59:42.080",
"lastModified": "2025-03-11T16:15:14.727",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3022",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-19T18:15:09.870",
"lastModified": "2024-11-21T08:16:15.790",
"lastModified": "2025-03-11T15:15:38.650",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3141",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-09T20:15:10.327",
"lastModified": "2024-11-21T08:16:32.843",
"lastModified": "2025-03-11T15:15:38.867",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3161",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-12T20:15:12.910",
"lastModified": "2024-11-21T08:16:35.683",
"lastModified": "2025-03-11T15:15:39.120",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3220",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-20T20:15:09.737",
"lastModified": "2024-11-21T08:16:43.633",
"lastModified": "2025-03-11T15:15:39.357",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-3268",
"sourceIdentifier": "secalert@redhat.com",
"published": "2023-06-16T19:15:14.707",
"lastModified": "2024-11-21T08:16:51.880",
"lastModified": "2025-03-11T15:15:39.587",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-34256",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-31T20:15:10.817",
"lastModified": "2024-11-21T08:06:52.333",
"lastModified": "2025-03-11T16:15:14.927",
"vulnStatus": "Modified",
"cveTags": [
{
@ -43,6 +43,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -56,6 +76,16 @@
"value": "CWE-125"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-37933",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:38.480",
"lastModified": "2025-03-11T15:15:38.480",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiADC GUI version 7.4.0, 7.2.0 through 7.2.1\tand before 7.1.3 allows an authenticated attacker to perform an XSS attack via crafted HTTP or HTTPs requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-216",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-40723",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:39.843",
"lastModified": "2025-03-11T15:15:39.843",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-117",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42509",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-03-07T14:15:46.187",
"lastModified": "2024-11-21T08:22:41.853",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:57:11.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.7,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -51,14 +71,39 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionStartIncluding": "7.17.4",
"versionEndExcluding": "7.77.0",
"matchCriteriaId": "0EF75986-23DD-4848-AE25-51DBCF95AA8F"
}
]
}
]
}
],
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "reefs@jfrog.com"
"source": "reefs@jfrog.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42661",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-03-07T14:15:46.403",
"lastModified": "2024-11-21T08:22:54.567",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:57:02.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,50 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionEndExcluding": "7.76.2",
"matchCriteriaId": "78788BDF-0671-4B64-8CCE-0F50D2ABDDE4"
}
]
}
]
}
],
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "reefs@jfrog.com"
"source": "reefs@jfrog.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42662",
"sourceIdentifier": "reefs@jfrog.com",
"published": "2024-03-07T09:15:38.290",
"lastModified": "2024-11-21T08:22:54.683",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:40:52.237",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.8
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,14 +71,60 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionStartIncluding": "7.59.0",
"versionEndExcluding": "7.59.18",
"matchCriteriaId": "C24F3D9E-9364-4570-96ED-433AFFE5144C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionStartIncluding": "7.63.5",
"versionEndExcluding": "7.63.18",
"matchCriteriaId": "A8B53DA3-129E-4030-AAEA-13DE15E2D99C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionStartIncluding": "7.68.7",
"versionEndExcluding": "7.68.19",
"matchCriteriaId": "17B54888-01AA-45AC-BCA6-2AECBFE28CE2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
"versionStartIncluding": "7.71.2",
"versionEndExcluding": "7.71.8",
"matchCriteriaId": "D8B7666E-8012-403A-8D42-75BD4D82F16E"
}
]
}
]
}
],
"references": [
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "reefs@jfrog.com"
"source": "reefs@jfrog.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-42784",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:40.033",
"lastModified": "2025-03-11T15:15:40.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper handling of syntactically invalid structure in Fortinet FortiWeb at least verions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-228"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-115",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46169",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-07T21:15:06.740",
"lastModified": "2024-11-21T08:28:00.727",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:55:36.417",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,24 +69,90 @@
"value": "CWE-41"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:ds8900f:-*:*:*:*:*:*:*:*",
"matchCriteriaId": "2F29B39F-F848-409A-B972-CBA36239B221"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269406",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269406",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46170",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-07T21:15:06.970",
"lastModified": "2024-11-21T08:28:00.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:55:27.780",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,20 +49,83 @@
"value": "CWE-204"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269407",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46171",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-07T21:15:07.170",
"lastModified": "2024-11-21T08:28:00.963",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:55:19.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -51,22 +71,78 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269408",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269408",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-46172",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-03-07T21:15:07.393",
"lastModified": "2024-11-21T08:28:01.080",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:54:26.763",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,24 +69,90 @@
"value": "CWE-287"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
}
]
}
]
}
],
"references": [
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269409",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269409",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.ibm.com/support/pages/node/7130084",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48725",
"sourceIdentifier": "talos-cna@cisco.com",
"published": "2024-03-07T15:15:07.733",
"lastModified": "2024-11-21T08:32:20.120",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:56:47.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,24 +69,82 @@
"value": "CWE-121"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:*",
"matchCriteriaId": "35241D58-4702-4740-A97B-DB45F6247D0E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:*",
"matchCriteriaId": "5D6603C7-5166-4D62-AF8B-01FA9BE2730B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
}
]
}
]
}
],
"references": [
{
"url": "https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
"source": "talos-cna@cisco.com"
"source": "talos-cna@cisco.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2023-48790",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:40.227",
"lastModified": "2025-03-11T15:15:40.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross site request forgery vulnerability [CWE-352] in Fortinet FortiNDR version 7.4.0, 7.2.0 through 7.2.1 and 7.1.0 through 7.1.1 and before 7.0.5 may allow a remote unauthenticated attacker to execute unauthorized actions via crafted HTTP GET requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-353",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0368",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:10.623",
"lastModified": "2024-11-21T08:46:25.077",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:51:23.420",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,46 +39,106 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmudev:hustle:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "7.8.4",
"matchCriteriaId": "6DBE5624-1C28-43A2-AB06-3FA907954887"
}
]
}
]
}
],
"references": [
{
"url": "https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://developers.hubspot.com/docs/api/webhooks#scopes",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://developers.hubspot.com/docs/api/webhooks#scopes",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0369",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:10.837",
"lastModified": "2024-11-21T08:46:25.280",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:38:55.427",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pawaryogesh1989:bulk_edit_post_titles:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "5.0.0",
"matchCriteriaId": "1A3A7527-3904-4D5D-A195-69AACCCA1540"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bulk-edit-post-titles/trunk/classes/class.bulk.titles.php#L130",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cad19306-6eef-4f80-9442-e7b314b3a873?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bulk-edit-post-titles/trunk/classes/class.bulk.titles.php#L130",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cad19306-6eef-4f80-9442-e7b314b3a873?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0447",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.483",
"lastModified": "2024-11-21T08:46:36.667",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:38:17.530",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artibot:artibot:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.7",
"matchCriteriaId": "B11B1A00-E9F9-409C-B1C6-0D2FA22818B7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L60",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/848f36de-c62a-45ee-b259-46dab73e4439?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L60",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/848f36de-c62a-45ee-b259-46dab73e4439?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0449",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:11.707",
"lastModified": "2024-11-21T08:46:36.907",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:37:53.670",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 1.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:artibot:artibot:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.7",
"matchCriteriaId": "B11B1A00-E9F9-409C-B1C6-0D2FA22818B7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L52",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/450d0748-93d6-448a-97a2-06fc2f8065b3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L52",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/450d0748-93d6-448a-97a2-06fc2f8065b3?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0592",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-13T16:15:12.147",
"lastModified": "2024-11-21T08:46:57.690",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:36:50.407",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.2.2",
"matchCriteriaId": "CB18009F-1593-4219-8074-05BE7E889E26"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/related-posts-for-wp/trunk/classes/hooks/class-hook-link-related-screen.php#L70",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3049719/related-posts-for-wp/tags/2.2.2/classes/hooks/class-hook-link-related-screen.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d21aad7-dbee-4204-afbd-0a5fdeaca50e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/related-posts-for-wp/trunk/classes/hooks/class-hook-link-related-screen.php#L70",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3049719/related-posts-for-wp/tags/2.2.2/classes/hooks/class-hook-link-related-screen.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d21aad7-dbee-4204-afbd-0a5fdeaca50e?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0825",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-05T02:15:25.653",
"lastModified": "2024-11-21T08:47:27.350",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:45:26.630",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:davekiss:vimeography:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3.3",
"matchCriteriaId": "C67FF114-4540-4D02-ADEB-B13725C32F56"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/vimeography/trunk/lib/api/galleries.php#L816",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853516b2-ec50-4937-89d3-d16042a6f71c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/vimeography/trunk/lib/api/galleries.php#L816",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853516b2-ec50-4937-89d3-d16042a6f71c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1088",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-05T02:15:25.813",
"lastModified": "2024-11-21T08:49:46.240",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:45:03.303",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rajkakadiya:password_protected_store_for_woocommerce:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "5030931C-A4FF-4651-A7B8-B3AA7055FDB6"
}
]
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/password-protected-woo-store/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1e8fd-4d1b-4590-a141-f93d6347c0f2?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://wordpress.org/plugins/password-protected-woo-store/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1e8fd-4d1b-4590-a141-f93d6347c0f2?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1120",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-01T10:15:07.173",
"lastModified": "2024-11-21T08:49:50.663",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:46:21.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,84 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xlplugins:finale:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "2.18.0",
"matchCriteriaId": "0DD93867-4B69-4D2F-825B-FEAC2DD4A29E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xlplugins:nextmove:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "2.18.1",
"matchCriteriaId": "C496ECE9-B570-4E79-A3F1-F79976B9040B"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/finale-woocommerce-sales-countdown-timer-discount/trunk/includes/wcct-xl-support.php#L710",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042127%40finale-woocommerce-sales-countdown-timer-discount&new=3042127%40finale-woocommerce-sales-countdown-timer-discount&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/finale-woocommerce-sales-countdown-timer-discount/trunk/includes/wcct-xl-support.php#L710",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042127%40finale-woocommerce-sales-countdown-timer-discount&new=3042127%40finale-woocommerce-sales-countdown-timer-discount&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1288",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T01:43:46.980",
"lastModified": "2024-11-21T08:50:14.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:49:51.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,77 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:magazine3:schema_\\&_structured_data_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*",
"matchCriteriaId": "1235FBF0-3C01-42A2-9FEF-E6496CAE1E42"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/schema-and-structured-data-for-wp/trunk/modules/reviews/reviews_form.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac13f402-8a36-448f-87d4-48179a9699c6?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.svn.wordpress.org/schema-and-structured-data-for-wp/trunk/modules/reviews/reviews_form.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac13f402-8a36-448f-87d4-48179a9699c6?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13574",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:25.680",
"lastModified": "2025-03-11T06:15:25.680",
"lastModified": "2025-03-11T15:15:40.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XV Random Quotes WordPress plugin through 1.40 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
},
{
"lang": "es",
"value": "El complemento XV Random Quotes WordPress hasta la versi\u00f3n 1.40 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/7eb9ef20-5d34-425e-b7fc-38a769d0a822/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/7eb9ef20-5d34-425e-b7fc-38a769d0a822/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13580",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:25.813",
"lastModified": "2025-03-11T06:15:25.813",
"lastModified": "2025-03-11T15:15:40.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XV Random Quotes WordPress plugin through 1.40 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack"
},
{
"lang": "es",
"value": "El complemento XV Random Quotes WordPress hasta la versi\u00f3n 1.40 no tiene la verificaci\u00f3n CSRF activada al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los restablezca a trav\u00e9s de un ataque CSRF."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/48cffe03-adcf-4da2-a331-464ae511a805/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/48cffe03-adcf-4da2-a331-464ae511a805/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13615",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:25.920",
"lastModified": "2025-03-11T06:15:25.920",
"lastModified": "2025-03-11T15:15:40.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Social Share Buttons, Social Sharing Icons, Click to Tweet \u2014 Social Media Plugin by Social Snap WordPress plugin through 1.3.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
},
{
"lang": "es",
"value": "El complemento Social Share Buttons, Social Sharing Icons, Click to Tweet \u2014 Social Media por Social Snap WordPress en su versi\u00f3n 1.3.6 no depuran ni escapan a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/e8401973-f4c2-4ccf-a6ad-507dde8d2259/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/e8401973-f4c2-4ccf-a6ad-507dde8d2259/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13734",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T10:15:09.980",
"lastModified": "2025-02-27T10:15:09.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T15:55:48.603",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:techeshta:card_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.7",
"matchCriteriaId": "C8A25827-5E64-4843-92A8-2160F62C53A6"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3244795/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://wordpress.org/plugins/card-elements-for-elementor/#developers",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.techeshta.com/docs/card-elements-for-elementor/element-settings/profile-card/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7134bb24-11a1-41f9-ad34-b4527c22463c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13836",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.070",
"lastModified": "2025-03-11T06:15:26.070",
"lastModified": "2025-03-11T15:15:41.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Login Control WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
},
{
"lang": "es",
"value": "El complemento WP Login Control de WordPress hasta la versi\u00f3n 2.0.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/26c2026a-1490-4a0f-9d1d-54ee43c69f22/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/26c2026a-1490-4a0f-9d1d-54ee43c69f22/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,51 @@
"id": "CVE-2024-13862",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-03-11T06:15:26.303",
"lastModified": "2025-03-11T06:15:26.303",
"lastModified": "2025-03-11T15:15:41.180",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The S3Bubble Media Streaming (AWS|Elementor|YouTube|Vimeo Functionality) WordPress plugin through 8.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
},
{
"lang": "es",
"value": "El complemento S3Bubble Media Streaming (AWS|Elementor|YouTube|Vimeo Functionality) de WordPress hasta la versi\u00f3n 8.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como administradores."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/7692b768-a33f-45a2-90f1-1f4258493979/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/7692b768-a33f-45a2-90f1-1f4258493979/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13907",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T07:15:33.543",
"lastModified": "2025-02-27T07:15:33.543",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:26:05.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
@ -51,18 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:boldgrid:total_upkeep:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.16.9",
"matchCriteriaId": "59088A9C-DC21-4E96-9C89-7B3C647CE39C"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/boldgrid-backup/trunk/includes/class-boldgrid-backup-archive-fetcher.php#L141",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3246655/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21da92d2-c38d-4a12-b850-bd0b580aaa54?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1351",
"sourceIdentifier": "cna@mongodb.com",
"published": "2024-03-07T17:15:12.740",
"lastModified": "2025-02-13T18:16:24.043",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:56:35.430",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,56 +69,166 @@
"value": "CWE-295"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "4.4.0",
"versionEndExcluding": "4.4.29",
"matchCriteriaId": "6BEEC634-F69A-404A-A867-F38A31137F31"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "5.0.0",
"versionEndExcluding": "5.0.25",
"matchCriteriaId": "C4D47D83-31AE-459D-B0EC-3F5184EF1912"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.14",
"matchCriteriaId": "AB3D23E4-41F4-4AAF-8B09-401BF735740E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.6",
"matchCriteriaId": "3D7A1437-1CC0-4ECC-AE42-9F32E84282A5"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*",
"matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F"
}
]
}
]
}
],
"references": [
{
"url": "https://jira.mongodb.org/browse/SERVER-72839",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Patch",
"Vendor Advisory",
"Issue Tracking"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240524-0010/",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
"source": "cna@mongodb.com"
"source": "cna@mongodb.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://jira.mongodb.org/browse/SERVER-72839",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory",
"Issue Tracking"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20240524-0010/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
},
{
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1442",
"sourceIdentifier": "security@grafana.com",
"published": "2024-03-07T18:15:46.590",
"lastModified": "2024-11-22T12:15:18.137",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:56:13.943",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -49,20 +69,86 @@
"value": "CWE-269"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.5.0",
"versionEndExcluding": "9.5.7",
"matchCriteriaId": "256F06F9-C861-48F9-8317-A0F0133C0FBE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.0.0",
"versionEndExcluding": "10.0.12",
"matchCriteriaId": "768ED1D5-DD09-4D2B-AD74-F5D1A03DF8D7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.1.0",
"versionEndExcluding": "10.1.8",
"matchCriteriaId": "642B089C-E5B7-4AD4-B477-2579A8A1AB23"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.2.0",
"versionEndExcluding": "10.2.5",
"matchCriteriaId": "FF474EF5-B4C2-4CEF-86AD-55A116C9E15F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.3.0",
"versionEndExcluding": "10.3.4",
"matchCriteriaId": "E4854C70-56B3-49ED-BF70-28673BD4E2D7"
}
]
}
]
}
],
"references": [
{
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
"source": "security@grafana.com"
"source": "security@grafana.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://security.netapp.com/advisory/ntap-20241122-0007/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1725",
"sourceIdentifier": "secalert@redhat.com",
"published": "2024-03-07T20:15:50.690",
"lastModified": "2024-11-21T08:51:10.290",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:55:54.263",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -49,48 +69,175 @@
"value": "CWE-501"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1FFF1D51-ABA8-4E54-B81C-A88C8A5E4842"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "486B3F69-1551-4F8B-B25B-A5864248811B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4716808D-67EB-4E14-9910-B248A500FAFA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "226AD7DB-D8CB-45A3-97AE-3FE79774133E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "1B361729-2847-4FE1-9503-BF9FA81307C5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "FA5959A2-F48B-449B-89AD-ECDE9E5418E6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "08B9C7A4-4D65-4771-B92D-914C9C9A6C4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "99ADC66F-3B19-4767-B876-67BA1C8D195B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "E4F24706-3DF4-49D0-870D-39D4FC02CF4A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "BDD2E6ED-9BDE-404B-AD0D-F78D69B13B34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "065C13FF-588E-42F5-B3C9-3302082E6524"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C1E0DF9A-C358-48A0-911F-0A17E1982E4B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF27781-22D9-4283-959D-951C76429EF5"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "F68F84F5-7671-4778-AE48-5CF243B62D88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "33D2A2D4-A006-422D-AA0C-8E764FB104C5"
}
]
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/errata/RHSA-2024:1559",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1891",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1725",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265398",
"source": "secalert@redhat.com"
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1559",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:1891",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://access.redhat.com/security/cve/CVE-2024-1725",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265398",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1771",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-06T06:15:50.293",
"lastModified": "2024-11-21T08:51:16.577",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:42:28.580",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:hashthemes:total:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.1.60",
"matchCriteriaId": "7AA0BA4F-6566-4ACC-A249-8A78364F82EE"
}
]
}
]
}
],
"references": [
{
"url": "https://themes.trac.wordpress.org/browser/total/2.1.59/inc/customizer/customizer-functions.php#L112",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=219020%40total%2F2.1.60&old=216973%40total%2F2.1.59",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26b64ae3-5839-47d5-9c65-7c595bb18e6c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://themes.trac.wordpress.org/browser/total/2.1.59/inc/customizer/customizer-functions.php#L112",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=219020%40total%2F2.1.60&old=216973%40total%2F2.1.59",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26b64ae3-5839-47d5-9c65-7c595bb18e6c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1976",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-02-29T06:15:46.767",
"lastModified": "2024-11-21T08:51:43.140",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:47:09.213",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:marketingoptimizer:marketing_optimizer:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "20200925",
"matchCriteriaId": "F36E320F-6064-420B-9E61-6EAAA6856085"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/marketing-optimizer/trunk/admin/main-settings-page.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b537637b-32c0-405e-94fa-c7c2d0c80658?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/marketing-optimizer/trunk/admin/main-settings-page.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b537637b-32c0-405e-94fa-c7c2d0c80658?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1986",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-07T21:15:08.013",
"lastModified": "2024-11-21T08:51:44.357",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:40:10.820",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,62 +39,134 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*",
"versionEndExcluding": "7.1.8",
"matchCriteriaId": "CD5BE9FC-7F83-40B9-8893-7AC08BDE8995"
}
]
}
]
}
],
"references": [
{
"url": "https://booster.io/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L132",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L138",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L322",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L333",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/plugins/woocommerce-jetpack/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c2fb7f-a05b-4852-97eb-7befe880d703?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://booster.io/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L132",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L138",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L322",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L333",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://wordpress.org/plugins/woocommerce-jetpack/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c2fb7f-a05b-4852-97eb-7befe880d703?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1989",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-06T06:15:50.467",
"lastModified": "2024-11-21T08:51:44.773",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:41:12.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,57 +36,143 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.59",
"matchCriteriaId": "B4A62408-E103-455E-AA1D-C5E33BEC8CD6"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-sharing-networks.php#L65",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L228",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L308",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/public/class-sassy-social-share-public.php#L513",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044857%40sassy-social-share%2Ftrunk&old=3038976%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file6",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdceb07a-87d2-4708-b76b-5a8fcfff0818?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-sharing-networks.php#L65",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L228",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L308",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/public/class-sassy-social-share-public.php#L513",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044857%40sassy-social-share%2Ftrunk&old=3038976%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdceb07a-87d2-4708-b76b-5a8fcfff0818?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2264",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-07T21:15:08.950",
"lastModified": "2024-11-21T09:09:22.863",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:54:11.227",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,65 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256034",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256034",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256034",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256034",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2265",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-07T22:15:58.220",
"lastModified": "2024-11-21T09:09:23.013",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:53:59.010",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -74,32 +94,79 @@
"value": "CWE-540"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256035",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256035",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256035",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2266",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-07T22:15:58.473",
"lastModified": "2024-11-21T09:09:23.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:53:46.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,30 +96,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:secret-coder-php-project:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "62FF8FEA-455E-4A4B-96A4-184B4BCC19A1"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20%5BSecret-Coder-PHP-Project%20XSS%5D%20on%20login.php%20via%20arbitrary%20cookies.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256036",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256036",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20%5BSecret-Coder-PHP-Project%20XSS%5D%20on%20login.php%20via%20arbitrary%20cookies.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.256036",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256036",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2267",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-07T22:15:58.720",
"lastModified": "2024-11-21T09:09:23.303",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:53:27.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
],
"cvssMetricV2": [
@ -74,32 +94,77 @@
"value": "CWE-840"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:keerti1924:online_bookstore_website:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "99075D71-3DA6-4FBC-A56B-CDC931BF5FA6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256037",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256037",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://vuldb.com/?ctiid.256037",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.256037",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-32123",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:41.353",
"lastModified": "2025-03-11T15:15:41.353",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2\r\n7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 and 5.6.0 through 5.6.11 and 5.4.0 through 5.4.7 and 5.2.0 through 5.2.10 and 5.0.0 through 5.0.12 and 4.3.4 through 4.3.8 allows attacker to execute unauthorized code or commands via crafted CLI requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-24-124",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-33501",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:41.550",
"lastModified": "2025-03-11T15:15:41.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Two improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5, FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker\u00a0to execute unauthorized code or commands via specifically crafted CLI requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-130",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45324",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:41.743",
"lastModified": "2025-03-11T15:15:41.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-134"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-325",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-45328",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:41.963",
"lastModified": "2025-03-11T15:15:41.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-261",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-46663",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:42.130",
"lastModified": "2025-03-11T15:15:42.130",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail CLI version 7.6.0 through 7.6.1 and before 7.4.3 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-331",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51319",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T15:15:42.313",
"lastModified": "2025-03-11T15:15:42.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A local file include vulnerability in the /servlet/Report of Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution by uploading a jsp web/reverse shell through /jsp/zimg_upload.jsp."
}
],
"metrics": {},
"references": [
{
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51320",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T15:15:42.447",
"lastModified": "2025-03-11T15:15:42.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /servlet/gsdm_fsave_htmltmp, /servlet/gsdm_btlk_openfile components"
}
],
"metrics": {},
"references": [
{
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51321",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T15:15:42.570",
"lastModified": "2025-03-11T15:15:42.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In Zucchetti Ad Hoc Infinity 2.4, an improper check on the m_cURL parameter allows an attacker to redirect the victim to an attacker-controlled website after the authentication."
}
],
"metrics": {},
"references": [
{
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-51322",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T15:15:42.700",
"lastModified": "2025-03-11T15:15:42.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /jsp/home.jsp, /jsp/gsfr_feditorHTML.jsp, /servlet/SPVisualZoom, /jsp/gsmd_container.jsp components"
}
],
"metrics": {},
"references": [
{
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52960",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:42.813",
"lastModified": "2025-03-11T15:15:42.813",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A client-side enforcement of server-side security vulnerability [CWE-602]\u00a0in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-602"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-305",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-52961",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:42.960",
"lastModified": "2025-03-11T15:15:42.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.7, 4.2.0 through 4.2.7 and before 4.0.5 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-306",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54018",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:43.113",
"lastModified": "2025-03-11T15:15:43.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple\u00a0improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-110",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-54026",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:43.307",
"lastModified": "2025-03-11T15:15:43.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox Cloud version 23.4, FortiSandbox at least 4.4.0 through 4.4.6 and 4.2.0 through 4.2.7 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-353",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54139",
"sourceIdentifier": "security-advisories@github.com",
"published": "2024-12-13T16:15:26.210",
"lastModified": "2024-12-13T16:15:26.210",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T16:44:20.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
@ -53,12 +73,75 @@
"value": "CWE-352"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.7.11",
"matchCriteriaId": "1BF82095-AA7D-454F-9228-78EC4D8CD5CE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.0.0",
"versionEndExcluding": "3.1.2",
"matchCriteriaId": "91456038-80B6-479B-BBDF-9376B9D2F100"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:alpha1:*:*:*:*:*:*",
"matchCriteriaId": "C62AC350-F938-43A2-B066-3CEF23B03C0C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:beta1:*:*:*:*:*:*",
"matchCriteriaId": "B2E2A04B-A0E6-4906-BD91-91DAC92CC067"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "24D309D2-E86C-4222-B258-C09BEEF42CD2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "6613DB9B-E3F9-44CC-B46A-77739060B641"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc3:*:*:*:*:*:*",
"matchCriteriaId": "5C86A4B5-375A-4761-A853-AB0EED54A540"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-jmv2-wfh5-h5wg",
"source": "security-advisories@github.com"
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55590",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:43.650",
"lastModified": "2025-03-11T15:15:43.650",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-178",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55592",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:43.823",
"lastModified": "2025-03-11T15:15:43.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 3.8,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-377",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-55597",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-03-11T15:15:44.010",
"lastModified": "2025-03-11T15:15:44.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiWeb versions 7.0.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted requests."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@fortinet.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-439",
"source": "psirt@fortinet.com"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-56191",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-03-10T21:15:39.880",
"lastModified": "2025-03-10T21:15:39.880",
"lastModified": "2025-03-11T16:15:16.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En dhd_process_full_gscan_result de dhd_pno.c, existe un posible fin de ejecuci\u00f3n debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-56192",
"sourceIdentifier": "dsap-vuln-management@google.com",
"published": "2025-03-10T21:15:40.007",
"lastModified": "2025-03-10T21:15:40.007",
"lastModified": "2025-03-11T16:15:16.900",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
},
{
"lang": "es",
"value": "En wl_notify_gscan_event de wl_cfgscan.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-281"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-6261",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T06:15:21.790",
"lastModified": "2025-02-27T06:15:21.790",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:32:04.440",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,20 +69,57 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:machothemes:image_photo_gallery_final_tiles_grid:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.6.1",
"matchCriteriaId": "432F6A08-5410-481C-9FB1-EE0F100D2703"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/final-tiles-grid-gallery-lite/trunk/lightbox/lightbox2/js/script.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3123808/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8d945c4b-3eb1-4bab-b355-117b7fd06553?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-9195",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-28T09:15:11.633",
"lastModified": "2025-02-28T09:15:11.633",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-03-11T15:49:13.197",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,65 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "4.3",
"matchCriteriaId": "720FE2DF-B865-4A01-AA36-5D9B07EE271E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev1:*:*:*:wordpress:*:*",
"matchCriteriaId": "36877172-A164-4EBF-A7F4-ADBFCBE1D67F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev2:*:*:*:wordpress:*:*",
"matchCriteriaId": "47A156C8-5FA2-4901-B8FE-FEA21F9C58CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev3:*:*:*:wordpress:*:*",
"matchCriteriaId": "9555E050-59B7-4AD6-AFD9-489246949BC2"
}
]
}
]
}
],
"references": [
{
"url": "https://codecanyon.net/item/whmcs-client-area-whmpress-addon/11218646",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8af0c5c-3d7b-416d-9d10-6867fcf909a5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1282",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T09:15:10.160",
"lastModified": "2025-02-27T09:15:10.160",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:08:00.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -49,16 +49,50 @@
"value": "CWE-22"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thememakers:car_dealer_automotive:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.4",
"matchCriteriaId": "F90D141E-7327-438B-B191-463209F2DA30"
}
]
}
]
}
],
"references": [
{
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708?s_rank=7",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf4b588-8b67-425a-b0e1-d4382cb88dd1?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1450",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T10:15:10.677",
"lastModified": "2025-02-27T10:15:10.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T15:46:05.180",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,24 +69,64 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:premio:floating_chat_widget:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.3.6",
"matchCriteriaId": "6A0EEEF6-6533-4E3C-B7E1-6200F4554AF2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.4/js/cht-front-script.js#L389",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.5/js/cht-front-script.min.js",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3246336/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a87d0966-3fd4-46f8-acd5-1cf0cb18af42?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1689",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T07:15:35.400",
"lastModified": "2025-02-27T07:15:35.400",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:19:41.870",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,20 +69,57 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thememakers:paypal_checkout:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.2.0",
"matchCriteriaId": "659C896B-FB55-4D17-9A0C-FB1E96F71BFF"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ThemeMakers/tmm_paypal_checkout/commit/d6d3b1877ed705ac171cf7e74a6e866fc135ba22",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6390dba6-423b-48be-b5f0-1018d94f4a32?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1690",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T09:15:10.697",
"lastModified": "2025-02-27T09:15:10.697",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T15:59:35.800",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -49,20 +69,57 @@
"value": "CWE-79"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:thememakers:stripe_checkout:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.0.2",
"matchCriteriaId": "AD3C87FA-58C4-40BC-B8F6-273464CC2F92"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/ThemeMakers/tmm_stripe_checkout/compare/v1.0.1...v1.0.2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd040ff7-7f30-4097-9492-743a9821589e?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-1717",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-02-27T08:15:31.130",
"lastModified": "2025-02-27T08:15:31.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-03-11T16:12:42.783",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,6 +19,26 @@
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -49,16 +69,50 @@
"value": "CWE-288"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pluginly:login_me_now:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.7.2",
"matchCriteriaId": "B33D8036-17F4-4D22-AF3A-C0FD0C95A9C4"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-2196",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-03-11T14:15:28.123",
"lastModified": "2025-03-11T14:15:28.123",
"lastModified": "2025-03-11T15:15:45.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.511735",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/IceFoxH/VULN/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-22454",
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"published": "2025-03-11T15:15:44.737",
"lastModified": "2025-03-11T15:15:44.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-732"
}
]
}
],
"references": [
{
"url": "https://forums.ivanti.com/s/article/March-Security-Advisory-Ivanti-Secure-Access-Client-ISAC-CVE-2025-22454",
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25680",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T16:15:17.413",
"lastModified": "2025-03-11T16:15:17.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LSC Smart Connect LSC Indoor PTZ Camera 7.6.32 is contains a RCE vulnerability in the tuya_ipc_direct_connect function of the anyka_ipc process. The vulnerability allows arbitrary code execution through the Wi-Fi configuration process when a specially crafted QR code is presented to the camera."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Yasha-ops/LSC_Indoor_PTZ_Camera-RCE",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/Yasha-ops/vulnerability-research/tree/master/CVE-2025-25680",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-25747",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-03-11T16:15:17.547",
"lastModified": "2025-03-11T16:15:17.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint"
}
],
"metrics": {},
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/79.html",
"source": "cve@mitre.org"
},
{
"url": "https://www.huyvo.net/post/cve-2025-25747-reflected-xss-vulnerability-in-hoteldruid-3-0-7",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-27403",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-11T15:15:45.570",
"lastModified": "2025-03-11T15:15:45.570",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify\u2019s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of the image reference."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "LOW",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"references": [
{
"url": "https://github.com/ratify-project/ratify/commit/0ec0c08490e3d672ae64b1a220c90d5484f1c93f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ratify-project/ratify/commit/84c7c48fa76bb9a1c9583635d1e90bc25b1a546c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ratify-project/ratify/security/advisories/GHSA-44f7-5fj5-h4px",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-27601",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-11T16:15:17.943",
"lastModified": "2025-03-11T16:15:17.943",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco is a free and open source .NET content management system. An improper API access control issue has been identified Umbraco's API management package prior to versions 15.2.3 and 14.3.3, allowing low-privilege, authenticated users to create and update data type information that should be restricted to users with access to the settings section. The issue is patched in versions 15.2.3 and 14.3.3. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/d9fb6df16e9adf8656181cac8497fc5ba23321cd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/ebb6a580dc1da2c772a99838dc7b4660bf77eb9c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6ffg-mjg7-585x",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-27602",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-11T16:15:18.100",
"lastModified": "2025-03-11T16:15:18.100",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Umbraco is a free and open source .NET content management system. In versions of Umbraco's web backoffice program prior to versions 10.8.9 and 13.7.1, via manipulation of backoffice API URLs, it's possible for authenticated backoffice users to retrieve or delete content or media held within folders the editor does not have access to. The issue is patched in versions 10.8.9 and 13.7.1. No known workarounds are available."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
},
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/5b54bed406682ceff57903bf7d3c57814eef31a7",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/commit/7888b9a4ce5ae7f9bda7ff3bb705b8fcd2f1675d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wx5h-wqfq-v698",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-27617",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-03-11T16:15:18.310",
"lastModified": "2025-03-11T16:15:18.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Pimcore is an open source data and experience management platform. Prior to version 11.5.4, authenticated users can craft a filter string used to cause a SQL injection. Version 11.5.4 fixes the issue."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "UNREPORTED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Extension/RelationFilterConditionParser.php#L29-L47",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Multiselect.php#L332-L347",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/commit/19a8520895484e68fd254773e32476565d91deea",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh",
"source": "security-advisories@github.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-03-11T15:00:20.452422+00:00
2025-03-11T17:00:19.839888+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-03-11T14:57:13.920000+00:00
2025-03-11T16:57:11.073000+00:00
```
### Last Data Feed Release
@ -33,58 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
284765
284792
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `27`
- [CVE-2024-12546](CVE-2024/CVE-2024-125xx/CVE-2024-12546.json) (`2025-03-11T14:15:20.210`)
- [CVE-2024-54084](CVE-2024/CVE-2024-540xx/CVE-2024-54084.json) (`2025-03-11T14:15:22.730`)
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-03-11T14:15:22.893`)
- [CVE-2025-2192](CVE-2025/CVE-2025-21xx/CVE-2025-2192.json) (`2025-03-11T13:15:43.780`)
- [CVE-2025-2193](CVE-2025/CVE-2025-21xx/CVE-2025-2193.json) (`2025-03-11T13:15:43.997`)
- [CVE-2025-2194](CVE-2025/CVE-2025-21xx/CVE-2025-2194.json) (`2025-03-11T14:15:27.753`)
- [CVE-2025-2195](CVE-2025/CVE-2025-21xx/CVE-2025-2195.json) (`2025-03-11T14:15:27.937`)
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T14:15:28.123`)
- [CVE-2025-22366](CVE-2025/CVE-2025-223xx/CVE-2025-22366.json) (`2025-03-11T14:15:24.313`)
- [CVE-2025-22367](CVE-2025/CVE-2025-223xx/CVE-2025-22367.json) (`2025-03-11T14:15:24.480`)
- [CVE-2025-22368](CVE-2025/CVE-2025-223xx/CVE-2025-22368.json) (`2025-03-11T14:15:24.627`)
- [CVE-2025-22369](CVE-2025/CVE-2025-223xx/CVE-2025-22369.json) (`2025-03-11T14:15:24.767`)
- [CVE-2025-22370](CVE-2025/CVE-2025-223xx/CVE-2025-22370.json) (`2025-03-11T14:15:24.917`)
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-11T14:15:25.427`)
- [CVE-2023-42784](CVE-2023/CVE-2023-427xx/CVE-2023-42784.json) (`2025-03-11T15:15:40.033`)
- [CVE-2023-48790](CVE-2023/CVE-2023-487xx/CVE-2023-48790.json) (`2025-03-11T15:15:40.227`)
- [CVE-2024-32123](CVE-2024/CVE-2024-321xx/CVE-2024-32123.json) (`2025-03-11T15:15:41.353`)
- [CVE-2024-33501](CVE-2024/CVE-2024-335xx/CVE-2024-33501.json) (`2025-03-11T15:15:41.550`)
- [CVE-2024-45324](CVE-2024/CVE-2024-453xx/CVE-2024-45324.json) (`2025-03-11T15:15:41.743`)
- [CVE-2024-45328](CVE-2024/CVE-2024-453xx/CVE-2024-45328.json) (`2025-03-11T15:15:41.963`)
- [CVE-2024-46663](CVE-2024/CVE-2024-466xx/CVE-2024-46663.json) (`2025-03-11T15:15:42.130`)
- [CVE-2024-51319](CVE-2024/CVE-2024-513xx/CVE-2024-51319.json) (`2025-03-11T15:15:42.313`)
- [CVE-2024-51320](CVE-2024/CVE-2024-513xx/CVE-2024-51320.json) (`2025-03-11T15:15:42.447`)
- [CVE-2024-51321](CVE-2024/CVE-2024-513xx/CVE-2024-51321.json) (`2025-03-11T15:15:42.570`)
- [CVE-2024-51322](CVE-2024/CVE-2024-513xx/CVE-2024-51322.json) (`2025-03-11T15:15:42.700`)
- [CVE-2024-52960](CVE-2024/CVE-2024-529xx/CVE-2024-52960.json) (`2025-03-11T15:15:42.813`)
- [CVE-2024-52961](CVE-2024/CVE-2024-529xx/CVE-2024-52961.json) (`2025-03-11T15:15:42.960`)
- [CVE-2024-54018](CVE-2024/CVE-2024-540xx/CVE-2024-54018.json) (`2025-03-11T15:15:43.113`)
- [CVE-2024-54026](CVE-2024/CVE-2024-540xx/CVE-2024-54026.json) (`2025-03-11T15:15:43.307`)
- [CVE-2024-55590](CVE-2024/CVE-2024-555xx/CVE-2024-55590.json) (`2025-03-11T15:15:43.650`)
- [CVE-2024-55592](CVE-2024/CVE-2024-555xx/CVE-2024-55592.json) (`2025-03-11T15:15:43.823`)
- [CVE-2024-55597](CVE-2024/CVE-2024-555xx/CVE-2024-55597.json) (`2025-03-11T15:15:44.010`)
- [CVE-2025-22454](CVE-2025/CVE-2025-224xx/CVE-2025-22454.json) (`2025-03-11T15:15:44.737`)
- [CVE-2025-25680](CVE-2025/CVE-2025-256xx/CVE-2025-25680.json) (`2025-03-11T16:15:17.413`)
- [CVE-2025-25747](CVE-2025/CVE-2025-257xx/CVE-2025-25747.json) (`2025-03-11T16:15:17.547`)
- [CVE-2025-27403](CVE-2025/CVE-2025-274xx/CVE-2025-27403.json) (`2025-03-11T15:15:45.570`)
- [CVE-2025-27601](CVE-2025/CVE-2025-276xx/CVE-2025-27601.json) (`2025-03-11T16:15:17.943`)
- [CVE-2025-27602](CVE-2025/CVE-2025-276xx/CVE-2025-27602.json) (`2025-03-11T16:15:18.100`)
- [CVE-2025-27617](CVE-2025/CVE-2025-276xx/CVE-2025-27617.json) (`2025-03-11T16:15:18.310`)
### CVEs modified in the last Commit
Recently modified CVEs: `47`
Recently modified CVEs: `70`
- [CVE-2024-1158](CVE-2024/CVE-2024-11xx/CVE-2024-1158.json) (`2025-03-11T13:18:18.670`)
- [CVE-2024-13853](CVE-2024/CVE-2024-138xx/CVE-2024-13853.json) (`2025-03-11T14:15:20.417`)
- [CVE-2024-13864](CVE-2024/CVE-2024-138xx/CVE-2024-13864.json) (`2025-03-11T14:15:20.570`)
- [CVE-2024-13873](CVE-2024/CVE-2024-138xx/CVE-2024-13873.json) (`2025-03-11T13:32:22.040`)
- [CVE-2024-13899](CVE-2024/CVE-2024-138xx/CVE-2024-13899.json) (`2025-03-11T13:26:57.550`)
- [CVE-2024-1889](CVE-2024/CVE-2024-18xx/CVE-2024-1889.json) (`2025-03-11T14:51:56.797`)
- [CVE-2024-1890](CVE-2024/CVE-2024-18xx/CVE-2024-1890.json) (`2025-03-11T14:51:33.223`)
- [CVE-2024-2546](CVE-2024/CVE-2024-25xx/CVE-2024-2546.json) (`2025-03-11T14:07:31.350`)
- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-03-11T14:57:13.920`)
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-11T14:15:22.503`)
- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-03-11T14:06:18.787`)
- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-03-11T14:02:39.433`)
- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-03-11T14:51:01.153`)
- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-03-11T13:55:21.797`)
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-03-11T14:37:00.743`)
- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-03-11T13:45:47.917`)
- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-03-11T14:19:11.780`)
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-11T14:15:23.030`)
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-11T14:15:23.210`)
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-11T14:15:23.417`)
- [CVE-2025-0629](CVE-2025/CVE-2025-06xx/CVE-2025-0629.json) (`2025-03-11T14:15:24.090`)
- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-11T14:15:26.553`)
- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-11T14:15:26.737`)
- [CVE-2025-2190](CVE-2025/CVE-2025-21xx/CVE-2025-2190.json) (`2025-03-11T14:15:27.163`)
- [CVE-2025-27893](CVE-2025/CVE-2025-278xx/CVE-2025-27893.json) (`2025-03-11T14:15:26.033`)
- [CVE-2024-13734](CVE-2024/CVE-2024-137xx/CVE-2024-13734.json) (`2025-03-11T15:55:48.603`)
- [CVE-2024-13836](CVE-2024/CVE-2024-138xx/CVE-2024-13836.json) (`2025-03-11T15:15:41.010`)
- [CVE-2024-13862](CVE-2024/CVE-2024-138xx/CVE-2024-13862.json) (`2025-03-11T15:15:41.180`)
- [CVE-2024-13907](CVE-2024/CVE-2024-139xx/CVE-2024-13907.json) (`2025-03-11T16:26:05.363`)
- [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2025-03-11T16:56:13.943`)
- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2025-03-11T16:55:54.263`)
- [CVE-2024-1771](CVE-2024/CVE-2024-17xx/CVE-2024-1771.json) (`2025-03-11T16:42:28.580`)
- [CVE-2024-1976](CVE-2024/CVE-2024-19xx/CVE-2024-1976.json) (`2025-03-11T16:47:09.213`)
- [CVE-2024-1986](CVE-2024/CVE-2024-19xx/CVE-2024-1986.json) (`2025-03-11T16:40:10.820`)
- [CVE-2024-1989](CVE-2024/CVE-2024-19xx/CVE-2024-1989.json) (`2025-03-11T16:41:12.650`)
- [CVE-2024-2264](CVE-2024/CVE-2024-22xx/CVE-2024-2264.json) (`2025-03-11T16:54:11.227`)
- [CVE-2024-2265](CVE-2024/CVE-2024-22xx/CVE-2024-2265.json) (`2025-03-11T16:53:59.010`)
- [CVE-2024-2266](CVE-2024/CVE-2024-22xx/CVE-2024-2266.json) (`2025-03-11T16:53:46.840`)
- [CVE-2024-2267](CVE-2024/CVE-2024-22xx/CVE-2024-2267.json) (`2025-03-11T16:53:27.713`)
- [CVE-2024-54139](CVE-2024/CVE-2024-541xx/CVE-2024-54139.json) (`2025-03-11T16:44:20.720`)
- [CVE-2024-56191](CVE-2024/CVE-2024-561xx/CVE-2024-56191.json) (`2025-03-11T16:15:16.743`)
- [CVE-2024-56192](CVE-2024/CVE-2024-561xx/CVE-2024-56192.json) (`2025-03-11T16:15:16.900`)
- [CVE-2024-6261](CVE-2024/CVE-2024-62xx/CVE-2024-6261.json) (`2025-03-11T16:32:04.440`)
- [CVE-2024-9195](CVE-2024/CVE-2024-91xx/CVE-2024-9195.json) (`2025-03-11T15:49:13.197`)
- [CVE-2025-1282](CVE-2025/CVE-2025-12xx/CVE-2025-1282.json) (`2025-03-11T16:08:00.790`)
- [CVE-2025-1450](CVE-2025/CVE-2025-14xx/CVE-2025-1450.json) (`2025-03-11T15:46:05.180`)
- [CVE-2025-1689](CVE-2025/CVE-2025-16xx/CVE-2025-1689.json) (`2025-03-11T16:19:41.870`)
- [CVE-2025-1690](CVE-2025/CVE-2025-16xx/CVE-2025-1690.json) (`2025-03-11T15:59:35.800`)
- [CVE-2025-1717](CVE-2025/CVE-2025-17xx/CVE-2025-1717.json) (`2025-03-11T16:12:42.783`)
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T15:15:45.820`)
## Download and Usage

View File

@ -202493,7 +202493,7 @@ CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749
CVE-2022-34908,0,0,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000
CVE-2022-34909,0,0,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000
CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000
CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000
CVE-2022-34910,0,1,60355a0db03afcd899eedab219757e24e71bc4b6bb17aee00642140161ac1181,2025-03-11T16:15:12.233000
CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000
CVE-2022-34912,0,0,200b319614bdd4fe3c1f5384e95db571df01480151ac89135c51127ae36b8681,2024-11-21T07:10:25.360000
CVE-2022-34913,0,0,62ab2c4e006489b07b4436975ef0e656f018df27ce4430641f274dba2d9aa2ea,2024-11-21T07:10:25.510000
@ -211438,7 +211438,7 @@ CVE-2022-46700,0,0,36797f64e657de5395ad1216e7e3556e8f934cf529bfb10adaccfeca2d42a
CVE-2022-46701,0,0,bc01da063681d8e153c6af9d916b0a0c6c163c7cb1cf60c541c7765beeb0c569,2024-11-21T07:30:56.397000
CVE-2022-46702,0,0,715f8ef202458fce1a4ee114ac6507bab6110c673777b7b272b5e7ba8bca4c18,2024-11-21T07:30:56.543000
CVE-2022-46703,0,0,6e7d646c387dfe63a92526293a779ad9233e1eb1081be5cd544a1920d87ba5c5,2025-02-11T18:15:20.717000
CVE-2022-46704,0,0,f49ce5bb4e9ce6edacbfe11772c68c876d65b62e4619c376ac1c5d2525c390d4,2024-11-21T07:30:56.810000
CVE-2022-46704,0,1,94925b0e12166f5e30e8d5e3fac54f85129786a4fae17c6f579976226430665c,2025-03-11T15:15:36.577000
CVE-2022-46705,0,0,04fb95df26acfe46c0fb0f021e7c2af393d1ae9c3ce5f44bb0a0f4a892bba5dc,2024-11-21T07:30:56.947000
CVE-2022-46706,0,0,7e26910e7d25410ca2efadb873737d22cd7e3e3675aa7329c79a0b0d6669f2e0,2024-11-21T07:30:57.100000
CVE-2022-46707,0,0,0ee54ee776499b11d97e6d033dd279ca45d4cd2d256c6e53c9fa48ebcf0fd335,2023-11-07T03:55:50.110000
@ -211457,7 +211457,7 @@ CVE-2022-4672,0,0,3da0ab4af959d0d56059ed0a777501b4f92187b9acb6980457fef52c63560f
CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000
CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000
CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000
CVE-2022-46723,0,1,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
CVE-2022-46723,0,0,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000
CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000
CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000
@ -218075,7 +218075,7 @@ CVE-2023-22488,0,0,0aaf54ba6aaa396e5eeed906e25dc3eb9cf8d78bd4004aaf6fe7cfeb792ac
CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000
CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000
CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000
CVE-2023-22491,0,1,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
CVE-2023-22491,0,0,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000
CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000
CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000
@ -218290,14 +218290,14 @@ CVE-2023-22742,0,0,d90bdbc84b8393173d0a0ccae26c3defed698996cfdfebb29c26d789eb4f6
CVE-2023-22743,0,0,2ff8322509bb13e890c5c0eb2a499728af4f4057e9b2317582e809625e1cd652,2024-11-21T07:45:20.403000
CVE-2023-22745,0,0,b717510f294e275cbb5de0d9417c53f21cfa8afdf89bcd8b1e640db8d8040e24,2024-11-21T07:45:20.543000
CVE-2023-22746,0,0,fcb6bccbce47be6c3814548b6771799369259b832db8e6ca53b330061fc2444b,2024-11-21T07:45:20.677000
CVE-2023-22747,0,0,27f89841be4fa1f0e869cd9c1ba2efc1fcc5806bdeb74d3652c6f8b0de40b502,2024-11-21T07:45:20.813000
CVE-2023-22747,0,1,7d14c0f9c36b58e3f7dfbf09d6476a3ca86b2daa88cae61d13fee474b4a1b805,2025-03-11T15:15:37.513000
CVE-2023-22748,0,0,f1a9d61004b5b3f89b84381c153273d1571ddec3b3c17748d7413ef56a2689d6,2025-03-07T21:15:13.447000
CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5abb,2025-03-07T21:15:13.610000
CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000
CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000
CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000
CVE-2023-22752,0,1,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
CVE-2023-22753,0,1,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
CVE-2023-22752,0,0,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
CVE-2023-22753,0,0,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000
CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000
CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000
@ -218308,11 +218308,11 @@ CVE-2023-2276,0,0,2a89d36eee46d6c101100028368db05883bc5be65d5b25d57a5e3d361c3f71
CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000
CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000
CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000
CVE-2023-22763,0,1,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
CVE-2023-22764,0,1,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
CVE-2023-22765,0,1,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000
CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000
CVE-2023-22763,0,0,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
CVE-2023-22764,0,0,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
CVE-2023-22765,0,0,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
CVE-2023-22766,0,1,e790961e01345060a9d9bc6c1c754a0a20620ba6c764ed8bc78f902e32979683,2025-03-11T15:15:37.670000
CVE-2023-22767,0,1,863d748c02dc86a3b4c2478bfa511c20d4f93f399f57c1bb4b03baf546914842,2025-03-11T15:15:37.823000
CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000
CVE-2023-22769,0,0,6ae8ba3e8b583057bd2353e73c1aac8e8f3a88643b244eb3a95e62d9b9fffa6e,2024-11-21T07:45:23.453000
CVE-2023-2277,0,0,29cdfaaa84fe50e25679d6125383565035f51b2f574d33150a7ed90888999f0f,2024-11-21T07:58:17.637000
@ -218774,30 +218774,30 @@ CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43
CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000
CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000
CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000
CVE-2023-23496,0,1,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
CVE-2023-23497,0,1,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
CVE-2023-23496,0,0,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
CVE-2023-23497,0,0,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000
CVE-2023-23499,0,1,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
CVE-2023-23499,0,0,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000
CVE-2023-23500,0,1,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
CVE-2023-23500,0,0,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000
CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000
CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000
CVE-2023-23504,0,0,16f525c9fb31ae2392fa3352f00ddf27c59d4f9f21280300ce93bd30558fc946,2024-11-21T07:46:19.080000
CVE-2023-23505,0,0,072758557cc09200da79298cbbfd017afc9b7f6e37d9447137a53abfd05f5114,2024-11-21T07:46:19.213000
CVE-2023-23506,0,0,bc279d4adf6dfb4944d9d2fe762b5ab8cc5aebf1c3e0f81c91b173a23f951512,2024-11-21T07:46:19.337000
CVE-2023-23507,0,0,0e671d252b1530d81e62fb1a72978a3ce7e376bcdb1a691cda96306a8a02e4fe,2024-11-21T07:46:19.440000
CVE-2023-23508,0,0,22ca610a47800f4e53008571c1f7d3e3efef0aff85fd5bbdac3583f465614325,2024-11-21T07:46:19.553000
CVE-2023-23507,0,1,8ff1328a51733f51927312db00477f36b9441cfc094699a00c8979dbf02afd25,2025-03-11T16:15:12.787000
CVE-2023-23508,0,1,3e55147c7662204c8744adf9587c1c3968a615ab80d0092919319a20d650a836,2025-03-11T16:15:12.953000
CVE-2023-2351,0,0,3a82f210ae18463b28fb54c6272265e375b61557202f70072719d8e76667f500,2024-11-21T07:58:26.390000
CVE-2023-23510,0,0,a048f499883454a8531384714691524e2244fef480d3696bc91072aa63bc437e,2024-11-21T07:46:19.670000
CVE-2023-23510,0,1,aab24986700db7f904d33c17be3e699a289ff3e482876ffab3ec417a71cccf18,2025-03-11T16:15:13.123000
CVE-2023-23511,0,0,79be774f2aec712d95f9d4909cdb05723f704493f639854978b6713057ca5803,2025-03-11T04:15:20.983000
CVE-2023-23512,0,0,4e2ff213db2e8b1c5edf97f8499254120d2881ff4802f92e3a5a52458f10572f,2024-11-21T07:46:19.900000
CVE-2023-23513,0,0,09bcbdc6eb54ad0ea39978f5767d4a0e9af96b65c2ea1f28367e4b3aae576c5f,2024-11-21T07:46:20.017000
CVE-2023-23514,0,0,316c0b5d15a623d1e0da5898db1b60d85cba18fe65fdb76b85221a04fd8edbab,2024-11-21T07:46:20.207000
CVE-2023-23514,0,1,245758ee40226c775ff17d539a5960b47000250d9f1ab16e116ce1823a48a751,2025-03-11T16:15:13.297000
CVE-2023-23516,0,0,642fb93fd27c63e523bbbbd8ec697d800beb99b36c421b23b39ea2a2701fa5db,2024-12-05T18:15:20.327000
CVE-2023-23517,0,0,6a1148e661422f5e410162fc2fdbed9643d5f1e579c62f3516f611a9d8d6ddd0,2024-11-21T07:46:20.443000
CVE-2023-23518,0,0,6c6ea72d1d5fa166b16795cd07cdb95d0f04cad27cf2fa1c29491076e8a261dc,2024-11-21T07:46:20.560000
CVE-2023-23519,0,0,6ae079c73305079889dc6e2c39307dc9a5c80b6690e163d5d57d6da77db7d7bf,2024-11-21T07:46:20.680000
CVE-2023-23517,0,1,6c2b9556abb97d193dc34c362430f543f121bd5621c2f2756cdfc728f6364d91,2025-03-11T16:15:13.490000
CVE-2023-23518,0,1,28b7fec879e0537bd5e7400ae17c41c3763bde40e21714e0d41218421b7ad8c2,2025-03-11T16:15:13.680000
CVE-2023-23519,0,1,52b97f532c90beedd6a706dff1548312c12dd9772d21d5bcca8f5742bd2c8a7e,2025-03-11T16:15:13.880000
CVE-2023-2352,0,0,f2b57b0bbfa316225559cd4e96ca98c890ce4e800269f7fdc72b0f4686c5a062,2024-11-21T07:58:26.520000
CVE-2023-23520,0,0,8777bc89c4d7c677913b2ac7598bb4c26e2ad1a798c78f0b2cfea451cbf6f5c4,2024-11-21T07:46:20.787000
CVE-2023-23522,0,0,bbd0640742c9d2795d413f296659352eddbb371a6c698d12a46f59e02e337e80,2024-11-21T07:46:20.903000
@ -221008,10 +221008,10 @@ CVE-2023-26099,0,0,daef45a4a5079e3664281482bb5aed531859143d74f266889fdf4d70272bd
CVE-2023-2610,0,0,09b4faf2015566c48d195c0564ba2eaa8f67a730801f03b898ad9fb8b6160753,2024-11-29T12:15:05.820000
CVE-2023-26100,0,0,d594c19d8868f03c4d54d9d2f43f87203b1428ae199cf215eeef544fc3b5c47d,2025-02-05T20:15:36.030000
CVE-2023-26101,0,0,b5f97f93f6104ea87af9962b64069465926b1f82322929f11609f64ca3ccf2cb,2025-02-05T15:15:16.947000
CVE-2023-26102,0,0,ad48db17daa5813c2c603727ba9c9458d6a541fdeff41ece33be20080052bdc5,2024-11-21T07:50:46.753000
CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4fc1,2024-11-21T07:50:46.877000
CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47
CVE-2023-26105,0,0,7cc2762bb92da835a09938bd30ea450932cc3a111ca4007596fe1bf509cfbdd5,2024-11-21T07:50:47.137000
CVE-2023-26102,0,1,a15bc38ea5f1545e6e11ae97b9beb00ed2d2296dcc09cd9f1128815226a4b150,2025-03-11T16:15:14.070000
CVE-2023-26103,0,1,0acc07eca1658e88ca7d4629323a059a43e754af5e7d3cb0c3217cecf5a309a5,2025-03-11T16:15:14.263000
CVE-2023-26104,0,1,f549d5c4e0996a925d324892cf898b9b17daabd8f84a8d740d52d2f22e993662,2025-03-11T16:15:14.450000
CVE-2023-26105,0,1,0b83c6910cae3fa98c1561674557544349c02ac2c7da310412fc9c3bbbd91854,2025-03-11T15:15:37.983000
CVE-2023-26106,0,0,5aec010201382e2cd4ddda8f70104650c3355d4509e17262f2080cc54e5810ea,2025-03-05T21:15:17.863000
CVE-2023-26107,0,0,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000
@ -221920,7 +221920,7 @@ CVE-2023-27369,0,0,53ea492f4014f9a96dc283724b1330cd227c3403ebab1a750f9c76feb0488
CVE-2023-2737,0,0,2d58eab6403b8ec835f691292ee157b11d2132c361cab72cff399928ed237c60,2024-11-21T07:59:11.863000
CVE-2023-27370,0,0,2caa0c83c4c453d1353c995ebb950b7f0e81ef2851f9f0bf8ca09ec66f7d3849,2025-01-03T17:01:01.870000
CVE-2023-27371,0,0,2a3f97a58295ebda42a0c6cc169c64eef1379055af6286654e30c6197b78c7c5,2024-11-21T07:52:46.460000
CVE-2023-27372,0,0,21435a747a9696e416d2c3ef746764775f76705636523d17cbaf48daf348c5bd,2024-11-21T07:52:46.640000
CVE-2023-27372,0,1,2338d0880859c2218f2eeccb7298350babcb66e0d24999462c3506f048b6bd99,2025-03-11T15:15:38.177000
CVE-2023-27373,0,0,a45362998f49ad07ca276ad8910dd4e52f099f28ea8bb38aacf61103367c86d7,2025-03-07T20:15:36.693000
CVE-2023-27375,0,0,93b29bc90b77f869b8c8cecb54fb2193dda487043c0e4379efa49cf6c5b6689a,2024-11-21T07:52:46.940000
CVE-2023-27376,0,0,cb9f804b554841faa04bce12934a68c4432bf8ecf78215538f55219d32109908,2024-11-21T07:52:47.067000
@ -224085,7 +224085,7 @@ CVE-2023-29845,0,0,0d6601a8b19a56bb94196f82c15ebc3bb9a3355618b52f3161b02c947456d
CVE-2023-29847,0,0,cbd9ab3b3aea2e256972aca68ae61c4fb791ad8431f3332b4f90887044d0fcc8,2025-02-06T21:15:20.397000
CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda338,2025-02-04T17:15:14.370000
CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000
CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000
CVE-2023-2985,0,1,df478477f9fb1194e751690ecbcbe6a070a54d560ec708ee0634cb01bbc5c707,2025-03-11T16:15:14.727000
CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000
CVE-2023-29854,0,0,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000
@ -224258,7 +224258,7 @@ CVE-2023-30210,0,0,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6
CVE-2023-30211,0,0,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
CVE-2023-30212,0,0,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
CVE-2023-30216,0,0,5eb3072b936944b32199c9563ff2bd8df56a2dd5a23baf265c2a91655d2cc13b,2025-01-29T20:15:32.147000
CVE-2023-3022,0,0,5d7350e1404edf239160a82f8a65005daae022e5cfa515dad0d1b71dc1a576a1,2024-11-21T08:16:15.790000
CVE-2023-3022,0,1,30128331775488e13ecf386e82e48d5b539239191d58bbec9a979c50cb41db5a,2025-03-11T15:15:38.650000
CVE-2023-30222,0,0,311828e54dafd6d0db801e3d776df3fb7876dc84d7c76629b5a43b88dee46bb7,2024-11-21T07:59:55.240000
CVE-2023-30223,0,0,22603cb5f264912092468b6977407892d8678dbb3e405984b4437903070fd7ce,2024-11-21T07:59:55.393000
CVE-2023-30226,0,0,3d14aa7f77a3bea0cfd62c396d78bc88eb292fb0748e120a471dcdb46a7f274a,2024-11-21T07:59:55.540000
@ -225200,7 +225200,7 @@ CVE-2023-31406,0,0,6807e52300f654096b3444928537bbf5bd905dcdd7bdfadf4c54f763b8f84
CVE-2023-31407,0,0,5633b6d5b535b99fc860fde1ccb9a957615d718ab262ccefea2c67364128958f,2024-11-21T08:01:47.957000
CVE-2023-31408,0,0,59838602bd646a5aaf55c57b242b706a86e52780670e3b0fbf6129782d0ef2e4,2024-11-21T08:01:48.083000
CVE-2023-31409,0,0,b3edb6ee510cd2535ccfb9b32d08d3c89c1a62e297eb8ea145c7b2d52d0ed587,2024-11-21T08:01:48.250000
CVE-2023-3141,0,0,9b268333284028cbb03f8d9a4d768971994e84ad3b7e1bb606ae49dc70b4406c,2024-11-21T08:16:32.843000
CVE-2023-3141,0,1,50f99483e8be7221c37e4b5d285eea43bdd641ccca36cedf9a5d5400faea38c9,2025-03-11T15:15:38.867000
CVE-2023-31410,0,0,69a6c12625ba60cddfaa6f0d5b683c81178475ca41b7e5ddc6802612a82fca29,2024-11-21T08:01:48.377000
CVE-2023-31411,0,0,d7f07bb9e039c868f52e87fa75158cc828e7a1392c2dfc5e56e6fb6a1bab2bb8,2024-11-21T08:01:48.497000
CVE-2023-31412,0,0,777ecc7e8f06e06d0385607faa87da9fb6c635ee45b54bbed274e4bbf90f56c3,2024-11-21T08:01:48.617000
@ -225330,7 +225330,7 @@ CVE-2023-31606,0,0,566928f240e95aed16a3c3742b1ad454864df53f0c03b37939832a70716ca
CVE-2023-31607,0,0,7d3508d6e36307d736ffd554a5eb1b404a89842a52017b1a1adf8a9e40662c65,2025-01-23T19:15:09.613000
CVE-2023-31608,0,0,3f3db7a5e1c8311107b7f33f068938a9f5fd1a8c9b6f38e2c393e4d5fc2cf548,2025-01-23T19:15:09.780000
CVE-2023-31609,0,0,2005bfc3d2b97af7a1dec83b5fb91826b19eab5bef445d4fd6dbd5344a0dbbcb,2025-01-23T17:15:11.150000
CVE-2023-3161,0,0,d5fbf8881c99cc38acea4c62e7b256434b5924f14ca714597eea73ce4cf32125,2024-11-21T08:16:35.683000
CVE-2023-3161,0,1,2db2aa8c139374940eeca48c4793b67ccf430a88c192e53879178b3a2f4837bf,2025-03-11T15:15:39.120000
CVE-2023-31610,0,0,4635c8d6131c4b4c122038805363b2d666290afd290352c3b42f3a755aa19c61,2025-01-23T17:15:11.337000
CVE-2023-31611,0,0,7d49566bf2b65a83f8da17cf49d5899b27094e60dd447a97224d6c0c8c7656f7,2025-01-23T17:15:11.503000
CVE-2023-31612,0,0,776f8b729d141f0dbbf1994fdb1bf5856b52d64ad6cf8da4800ef2964c166227,2025-01-23T17:15:11.660000
@ -225748,7 +225748,7 @@ CVE-2023-32192,0,0,9ddad804b5e1f24517e731cf63fc7724b58e01e76819ef245be1681605b11
CVE-2023-32193,0,0,3fc0deec46f1f84bb86bb18144fefd8401960da10ffc30dbcb4b73bcaa487fa6,2024-10-16T16:38:14.557000
CVE-2023-32194,0,0,b026e294b9ee7e0ac795c3c964def03f8175fac7911f8283e7b5b212d9d71d5b,2024-10-16T16:38:14.557000
CVE-2023-32196,0,0,79159a2f6efc5cfee63b1c771d3ff38df7bebfb52936a9e17291c69b0f073c87,2024-10-16T16:38:14.557000
CVE-2023-3220,0,0,60dd783c3ead3cf222f72f3af6cb46e458ae1bec6174b63a99c735f758734ff6,2024-11-21T08:16:43.633000
CVE-2023-3220,0,1,091b3568d542ce7f8e9639994e311d2dd153be652f295bce2cf3036b33345197,2025-03-11T15:15:39.357000
CVE-2023-32200,0,0,bd3b707fd4f345c8c3028816f1e6552e40039230142d8b9e762e26d6d0380966,2024-11-21T08:02:53.243000
CVE-2023-32201,0,0,931662d2bb3c46b3ef8495876fa9a03301878dcf7cc2306d578f2b4f434d18a1,2024-12-23T22:15:06.950000
CVE-2023-32202,0,0,e2c24c84537688439264cd465b421a98fad6a5179b84fddeb05252e348ad893b,2024-11-21T08:02:53.537000
@ -226244,7 +226244,7 @@ CVE-2023-32676,0,0,5189b035440283ec39891623bbb2317368f5fd2359f30593287634d20e6e4
CVE-2023-32677,0,0,629ae0e2710ad52a1609f41917b9a6ed3d5583cf36fc8722876b9d9f6f6ebe2c,2024-11-21T08:03:49.880000
CVE-2023-32678,0,0,b28857343fdf0c940223c3ea13365bb170b828dfa0f85165e9cca87c49d995f5,2024-11-21T08:03:50.010000
CVE-2023-32679,0,0,959c8f4087976263071eb5ae8ceebda7e6a91e605405c9dbc581b01b066b12fd,2024-11-21T08:03:50.137000
CVE-2023-3268,0,0,7130fc6a01db180c7b9e9be087a2316e9d5313e5310c4b6344534d0afa80ba71,2024-11-21T08:16:51.880000
CVE-2023-3268,0,1,dc2fdffca5c79d7648c13f17d930188baddf7af174441440f084e1f062f83ddf,2025-03-11T15:15:39.587000
CVE-2023-32680,0,0,c937c5697c77e75a5d2f30ba7990452ef8555001c774a67e77a4947c8eca3a5a,2024-11-21T08:03:50.250000
CVE-2023-32681,0,0,f322bf0f963c1d07d2732145d26c55a4933344ebb8c80e2800f25e388a51d59d,2025-02-13T17:16:32.583000
CVE-2023-32682,0,0,f84e86997f01b9286bbf9252e4140b2a15469095ee23e7957c6eee04c12d0b60,2024-11-21T08:03:50.513000
@ -226676,7 +226676,7 @@ CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df627
CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000
CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000
CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000
CVE-2023-3317,0,1,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
CVE-2023-3317,0,0,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000
CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000
CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000
@ -227527,7 +227527,7 @@ CVE-2023-34252,0,0,740fef90fdaf696e3d5d9264aef39da208739f0be77ebb8fccb87ebdc2e6c
CVE-2023-34253,0,0,7fa9d9b4a8331571eaa196a0b4846212c60f701a59352f250ed22a6a06a79317,2024-11-21T08:06:52.047000
CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c10e,2024-11-21T08:06:52.180000
CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000
CVE-2023-34256,0,0,691415f2f013332d745607532da3b4ac21fbf0bcec117633be38405c94853d0c,2024-11-21T08:06:52.333000
CVE-2023-34256,0,1,2971f87b23a035bc12803f37d7531776c6e71a539301a445243e46e0254a045e,2025-03-11T16:15:14.927000
CVE-2023-34257,0,0,9f794a27940ab7963e721dba620365ce2ab3173ff58e0a8914d6146ac5d4b9cd,2025-01-10T15:15:14.193000
CVE-2023-34258,0,0,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000
CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000
@ -230164,6 +230164,7 @@ CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9
CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000
CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000
CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000
CVE-2023-37933,1,1,1913a6c697a48293d7b0ab243c8a71572abb462a408f81f874a365cc47c312ef,2025-03-11T15:15:38.480000
CVE-2023-37934,0,0,4e265b9ab5d64a68f77d4af970245395e5cadba01a90f14cccc92367afbeed0f,2024-11-21T08:12:29.930000
CVE-2023-37935,0,0,e2680834b672fa8ed2fa3700d283e20af31e71aaa863e0a1bb6357a666cbb04b,2024-11-21T08:12:30.057000
CVE-2023-37936,0,0,6c417e5254b6c599e5552cccb6a812920d0355b6d45b34bb4ff96b53d102f97d,2025-01-31T17:42:50.520000
@ -232561,6 +232562,7 @@ CVE-2023-40719,0,0,acb9404eafc431f6a2f22b63d83343ddbcd8d8fcb1d42ba190543035718d7
CVE-2023-4072,0,0,82174d2d178aaae9823279d7c94363a7d8d8c0249d0bb927556aae15a4ef631f,2024-11-21T08:34:20.930000
CVE-2023-40720,0,0,872f2e87477a3acf4f7037778bf724a33680287f443a76024cd4bafc9380b862,2024-11-21T08:20:01.767000
CVE-2023-40721,0,0,525320d4b38dbb063f7787a42abbae1dc2c7572ad404edfbb6a8dcb204805391,2025-02-11T17:15:21.403000
CVE-2023-40723,1,1,9c02e6e8349dda2a5d98dcf08ee228e3fa0acc74b0c12d1bfc484624bb4fbc2f,2025-03-11T15:15:39.843000
CVE-2023-40724,0,0,abe3d5cc194993fa95bdc99514308eaf93e09eb564e3440e22bb9515f2b2686b,2024-11-21T08:20:01.927000
CVE-2023-40725,0,0,adfd99195eeb3f34ccc5f2e7792fb5337ad270a7a45216e0d9397d56f8676724,2024-11-21T08:20:02.053000
CVE-2023-40726,0,0,97ba555b44aef4ac8cadb1249031b30ecd84032311ea02ae66df686bdd55cdfd,2024-11-21T08:20:02.183000
@ -233872,7 +233874,7 @@ CVE-2023-42505,0,0,9ab6dd7dfb0786f84b349b31afd50f70f2ea98f9beaf48099e6faa812df78
CVE-2023-42506,0,0,d508286d8d36552fe9e854515ba2d8ca9c53a4ad88c155e383c764e9361a1662,2024-11-21T08:22:41.463000
CVE-2023-42507,0,0,95f7a442861b72d1544ea11fd2f010b80be26f85fc4ee471e711ebf0c522461a,2024-11-21T08:22:41.587000
CVE-2023-42508,0,0,bbab358f9374ff4c93e4d5a1fa139f2b77986fa251894acc45ef49de283b22c4,2024-11-21T08:22:41.710000
CVE-2023-42509,0,0,a06e6070e17df137e856689b352041f63d0ec43c6d5afd289063ecab08fd8677,2024-11-21T08:22:41.853000
CVE-2023-42509,0,1,5e091343f47a78ed905bf6dc566855e28be9a2ac9ad6561eb6aaf809f9f7c4fe,2025-03-11T16:57:11.073000
CVE-2023-4251,0,0,034a7b92d2b37c92649fc5aca046c5ee579347dfc80fc8e43d0fbe60fc0e4888,2024-11-21T08:34:43.783000
CVE-2023-4252,0,0,241d0ed23bbed15be4caa83e96cb94794db8837cd6045145c5f3eeffcba80b19,2024-11-21T08:34:43.910000
CVE-2023-42520,0,0,0f7e649e5abe2bcf81466af32f0e75ed8e91444f7c9b03366f081f463c015076,2024-11-21T08:22:42
@ -233983,8 +233985,8 @@ CVE-2023-42657,0,0,ff9635b59e66a373b92dc5cc965f63411c6bad67160b336d54494d5984693
CVE-2023-42658,0,0,f85c83eea1f0b03149812b838b04c5ff6848374d7b1db3fa92a4b6c4f29ed17f,2024-11-21T08:22:54.187000
CVE-2023-42659,0,0,5723dd9c27186e966696178e04179c10e5ff1519d366a270811b6abc75f5c410,2024-11-21T08:22:54.320000
CVE-2023-42660,0,0,8471bb7980a27be272845426154246c7ef4e7660331ec2831f10ab8b5a6da968,2024-11-21T08:22:54.447000
CVE-2023-42661,0,0,23b4a4a921181fe76e480174f93b8f1e4fa2ad00ee4732cb9eae8de17a25aceb,2024-11-21T08:22:54.567000
CVE-2023-42662,0,0,4332ac0acd5998085bd448c6a9ddd34d7fbbaf26aa77b4def940aac3f2f1c49a,2024-11-21T08:22:54.683000
CVE-2023-42661,0,1,044518fa3c30714d849a15294b9c6cf4ecc5ca041c38a53f98eb6ed5719e406a,2025-03-11T16:57:02.150000
CVE-2023-42662,0,1,3c4ba6455e091ea46a4a1f4bd3bf293f07b07aa2a2bf89cb2a988e819313957a,2025-03-11T16:40:52.237000
CVE-2023-42663,0,0,7098afbcd944e4cb142bebdeb8bfa8201200547b7bdff1dd38937aae900d1d2c,2025-02-13T17:17:09.083000
CVE-2023-42664,0,0,047574b3680118a4fbf5c0bcc44f6fe2f32d580fa6b9141e2353affb0098ab4d,2024-11-21T08:22:54.940000
CVE-2023-42665,0,0,ac4ccacd7822c4c3b294a20315585c0819327c5044918b2c5b28e3a5361fa613,2024-02-14T18:15:46.030000
@ -234105,6 +234107,7 @@ CVE-2023-42780,0,0,cdd093383de8ac80b2dd603c4cd8b5fb12111fdfaea151dda39675c869053
CVE-2023-42781,0,0,e6266811e943f5b3219ef0407d2b4114a945fd77347810cc844cb61ed53dc644,2024-11-21T08:23:08.683000
CVE-2023-42782,0,0,da0c83cbed17a04613b39ce2336362e43c1e910e28a92e71a36daf2e58e858be,2024-11-21T08:23:08.817000
CVE-2023-42783,0,0,98b628fd4937ef156152a20479ae772c8ff5e58950f81df1627766b6fb5ac59b,2024-11-21T08:23:08.960000
CVE-2023-42784,1,1,ffd94a0fb16b6b6651efc867799a71f085dee63f239bf562c22b99d608c43473,2025-03-11T15:15:40.033000
CVE-2023-42785,0,0,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000
CVE-2023-42786,0,0,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000
CVE-2023-42787,0,0,9495dbf34a13c743d9a5e135b36546505b91d005fdd69c84cafbd04056c07414,2024-11-21T08:23:09.100000
@ -236367,11 +236370,11 @@ CVE-2023-46158,0,0,82a3b27a09f8b6d4af50535637f653dfbe6af9e09b53a66ace7d317ef15d7
CVE-2023-46159,0,0,a9a4381520ef89bf12666310cf5a0db135d670a0c49e8d35deb299a317d62286,2024-11-21T08:28:00.460000
CVE-2023-4616,0,0,f64fa3b90907518ea67902a05e6872124fd0726c90f62c0e26e73916a42979b6,2024-11-21T08:35:33.150000
CVE-2023-46167,0,0,afd529d982da16d18720d4c13388bd1183b6956c7d792ce9bc4a9ee4dd22bb23,2024-11-21T08:28:00.590000
CVE-2023-46169,0,0,c122dcedb7a3106bebafab755be081f5a7c1050dadce9a606ebf1c2b42582696,2024-11-21T08:28:00.727000
CVE-2023-46169,0,1,b85fd983b269c0a82ccba29bb108a177e2f752d7ee10f097b0a4c78f51f3d124,2025-03-11T16:55:36.417000
CVE-2023-4617,0,0,b03743ffbbfe7e3ed1460051a543b4b3a4b51beb915eb8de95f3b60d0ec8d639,2024-12-19T10:15:13.147000
CVE-2023-46170,0,0,02fbb345e6684ea3252480382fe917b2093cd91020cabb6e62386cbddcab9ae0,2024-11-21T08:28:00.837000
CVE-2023-46171,0,0,99246d3eb2c5af0979b770d4b460e6e7d5f8b424ca56568cf6c30f5c307fa2a1,2024-11-21T08:28:00.963000
CVE-2023-46172,0,0,e6d64572c481ef5111eb147fe1f8e056cf30f2bd98551cff315706b0e04dd94d,2024-11-21T08:28:01.080000
CVE-2023-46170,0,1,2f961787bf847094d884d27393834993346c8bb5c67f07436d86634c22693f19,2025-03-11T16:55:27.780000
CVE-2023-46171,0,1,3a5bdd1266cb78081d97ec808236ef46be575b58e8227032fc1682d4c1ebaae5,2025-03-11T16:55:19.027000
CVE-2023-46172,0,1,64d797d4dd2c4d65392b258eb4f8322c328f88c24d8edbe3404d4798be86dd6f,2025-03-11T16:54:26.763000
CVE-2023-46174,0,0,4cc9539c5fe9034dbae55b6f379ceef39504bfb484d49fbac34e60901ce64f91,2024-11-21T08:28:01.200000
CVE-2023-46175,0,0,26721f799191f5602a0142ae17cb7a4743c01c780bc2a9d312b7ffec491d9c22,2024-09-30T12:46:20.237000
CVE-2023-46176,0,0,026b76715c132f309c8fceb70e4a6fec5192b55c2ff94eabf1a439ef34a0e685,2024-11-21T08:28:01.400000
@ -238375,7 +238378,7 @@ CVE-2023-48721,0,0,a57495dfa76ee6e939f1f2b3381889b765b7c4b544073fd167f06af83cf20
CVE-2023-48722,0,0,b4bce794dbbf9b1d35759682688342e6b781296e0b85eb6427551aab9dea68c5,2024-11-21T08:32:19.843000
CVE-2023-48723,0,0,46bda205941385a606aeb420da268e3516d52a9631f8eb19fb287c1f54b86a50,2024-01-02T16:15:12.377000
CVE-2023-48724,0,0,e6ab0d9e64a2284fcdfff90e3a9f85a443cde662a0db6f09bf6b186bd198ead6,2024-11-21T08:32:19.990000
CVE-2023-48725,0,0,6e75b34e9b6f3f0fe7af03e50852b0309e2d1e2fe178308088a05d1a27c25dd3,2024-11-21T08:32:20.120000
CVE-2023-48725,0,1,c9d9d8856e0027f7c317bbfe0ee2e5abce4f5c7a5e1ebe942f758d2d523fcdcc,2025-03-11T16:56:47.143000
CVE-2023-48727,0,0,57081be578023f81a6e95f9fdd0d786ef87b8ace2b7257c8e6a92924f470be77,2024-11-21T08:32:20.260000
CVE-2023-48728,0,0,3d40f2cfee57843e3b1c2a05847e8926585ff2485f5aee916a2deecebd7bf716,2024-11-21T08:32:20.380000
CVE-2023-48729,0,0,6610f082f226d878b6889d68d8e386a1615e2b9519b2fcf4a41ca3546b7580e9,2024-02-14T18:15:46.243000
@ -238441,6 +238444,7 @@ CVE-2023-48784,0,0,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd62
CVE-2023-48788,0,0,2db98462fc8ef2fb921267e516a454b300a71aa8f3c35868beb3a33fd3cb277a,2025-01-27T20:56:34.083000
CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000
CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000
CVE-2023-48790,1,1,fc8925c21035cacf425395afeddf12b2570f3fbe5d9630a90a20fd5242f97b2e,2025-03-11T15:15:40.227000
CVE-2023-48791,0,0,31c96e4e1869546f12717fd141d38efd00e2ed04c54f4d96999394432c372674,2024-11-21T08:32:26.740000
CVE-2023-48792,0,0,de3a854106cd0cc670737f05a31c26ef1df7bbfc37a35ab06907ec52d7b8d166,2024-11-21T08:32:26.867000
CVE-2023-48793,0,0,d3e6293b1688749ef1b2a2f41972e932db866d779affe9d4c74e699cada6710c,2024-11-21T08:32:27.047000
@ -243671,8 +243675,8 @@ CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43f
CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000
CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000
CVE-2024-0367,0,0,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000
CVE-2024-0368,0,0,01599c55a91425e2ba7730abbc41f61a2e52bd19c0845871043d03d028cadb76,2024-11-21T08:46:25.077000
CVE-2024-0369,0,0,5ff93566d28a0ecc5b41044532b8462289ecee111c6146af9553d30292e58558,2024-11-21T08:46:25.280000
CVE-2024-0368,0,1,899a131a121911b9b59721868468591c2716da1a0d3a8fdfcc57bb32e8e39e49,2025-03-11T16:51:23.420000
CVE-2024-0369,0,1,cc21965cce3ae62979230688ecf1eb3bf3ef856bdbae3a57fefed343f23b6742,2025-03-11T16:38:55.427000
CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000
CVE-2024-0371,0,0,5c3d442f8ecd87f51d1c113b9afa4febd80318afc8cd2eb08f21826e97011962,2024-11-21T08:46:25.620000
CVE-2024-0372,0,0,cdefb651d58754406381dc11b785774bfb0c82915c9d61404379e3d0e8cdf370,2024-11-21T08:46:25.763000
@ -243745,9 +243749,9 @@ CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d477
CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000
CVE-2024-0445,0,0,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000
CVE-2024-0446,0,0,124de0675cc01e13555049891a9a6623c7dacc61fc8dd34a8640dbaebb1bf4be,2025-02-10T22:15:32.380000
CVE-2024-0447,0,0,7548d345fbc58c2a7dc6655a6b70a54701d5e8b807502de5f85fcff9a6f1eff6,2024-11-21T08:46:36.667000
CVE-2024-0447,0,1,7244dcb7cd7d54fe2e11983b8e31094feb40a99088e225fca1d7ac5c46622709,2025-03-11T16:38:17.530000
CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000
CVE-2024-0449,0,0,6d075a833530dc7bf5a3b691ee9e41b5afa9e0f8be26a593c77ea2c5a8a57e9d,2024-11-21T08:46:36.907000
CVE-2024-0449,0,1,d99e5d0a35181dd2a3d2d031655f5697c37a03e36f367816eeff2d8b2c43571a,2025-03-11T16:37:53.670000
CVE-2024-0450,0,0,a1b920c11dee63a8e3076083ddfa38e003146c3343c7cb62828f303698cddd99,2024-11-21T08:46:37.017000
CVE-2024-0451,0,0,5ae993f8fa6f67f9d1878c2219b82442c9f9c27de5c52f54d2bec468f56d2b20,2024-11-21T08:46:37.177000
CVE-2024-0452,0,0,e6fa2ac1a01ec8b171e192e303abcab51e8cb5be7741930dcf71a5f39de8743b,2024-11-21T08:46:37.307000
@ -243886,7 +243890,7 @@ CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b242
CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000
CVE-2024-0590,0,0,f481ef28d4575792e39f3242fc31f5dcf3d5ce08c797600680221de34f5472dd,2025-03-04T12:24:19.653000
CVE-2024-0591,0,0,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000
CVE-2024-0592,0,0,1a17724febf8153342670e1a2ae0c506c1f9d961e5fb4933bcc637f6677b5b7a,2024-11-21T08:46:57.690000
CVE-2024-0592,0,1,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000
CVE-2024-0593,0,0,f4e7a74601373b533789dea3664523c6cc99316255f76051d128ea0eea35276e,2025-01-31T16:36:29.673000
CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000
CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000
@ -243967,13 +243971,13 @@ CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ff
CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08
CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000
CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000
CVE-2024-0681,0,1,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
CVE-2024-0681,0,0,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000
CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000
CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000
CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000
CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000
CVE-2024-0687,0,1,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
CVE-2024-0687,0,0,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000
CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000
CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
@ -243986,7 +243990,7 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8
CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000
CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000
CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000
CVE-2024-0700,0,1,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
CVE-2024-0700,0,0,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000
CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000
CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000
@ -244107,12 +244111,12 @@ CVE-2024-0821,0,0,8d0f135a1bde00f8a9f6278553dfaf4cfb224409407e8fbdd3c58db9c4b996
CVE-2024-0822,0,0,ef76e16156f0ac7ca3043141b54dd9d9595137069497b8b98eaa4426b49c0d84,2024-11-21T08:47:26.913000
CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d0967,2024-11-21T08:47:27.097000
CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000
CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000
CVE-2024-0825,0,1,3eeadae267eb84632257a554ce3df82d1232b825b126727f8f5568c48e044933,2025-03-11T16:45:26.630000
CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000
CVE-2024-0827,0,1,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
CVE-2024-0828,0,1,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
CVE-2024-0829,0,1,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
CVE-2024-0830,0,1,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
CVE-2024-0827,0,0,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
CVE-2024-0828,0,0,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
CVE-2024-0829,0,0,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
CVE-2024-0830,0,0,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000
CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000
CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000
@ -244121,7 +244125,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
CVE-2024-0839,0,1,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
CVE-2024-0839,0,0,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000
CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000
@ -244171,7 +244175,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb
CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000
CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000
CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000
CVE-2024-0898,0,1,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
CVE-2024-0898,0,0,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000
CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000
CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000
@ -245016,7 +245020,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb
CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000
CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000
CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000
CVE-2024-1083,0,1,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
CVE-2024-1083,0,0,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000
CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000
CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000
@ -245060,7 +245064,7 @@ CVE-2024-10876,0,0,cd2a03b731b615444f96af44211cf410ba2fe90ff9f3789af363bf6a1ce52
CVE-2024-10877,0,0,7a3393b83a736557c04741e18efad94edf3c7ad0d4111e23694c36456b37491f,2024-11-19T15:52:44.487000
CVE-2024-10878,0,0,e935cc8c1a3c418e2fb468b6a5204c057f596013ccdff68d1c5f5fec79fa2c40,2024-11-26T18:15:18.827000
CVE-2024-10879,0,0,4fe7980fab4d2b80bcef2527765198187b03e9ced339a1403c07f82b84a559ea,2025-02-05T14:48:55.997000
CVE-2024-1088,0,0,1d96b4cc19606bd5aa5187289a2ea0d426fba6045c1c1468d34c2706c791c746,2024-11-21T08:49:46.240000
CVE-2024-1088,0,1,1911aaa4ea5cf2488027a06b8854fc8da49c7762b2ed23a42e3267c8f6452bc6,2025-03-11T16:45:03.303000
CVE-2024-10880,0,0,34e1f62004f258ec82211d7b06454c17d69af4db3b940dca81e8b8e6d3913832,2024-11-23T05:15:06.207000
CVE-2024-10881,0,0,2f3e22e11ad56ac6852044dc7782949b3df53870d23afcbba1c70c4b3722e551,2024-12-05T04:15:03.937000
CVE-2024-10882,0,0,6b794c8f9b9f9e6f0ac203482f6418bfe899c8f536064495a56268c4eadd94aa,2024-11-13T17:01:16.850000
@ -245336,7 +245340,7 @@ CVE-2024-11196,0,0,86073d672062faceb084c20cbe17a461a555aa7cdb4bc7856e7e10151f683
CVE-2024-11197,0,0,3740e434f528bbbd61234dede2b4a36fd46292349d79d4749d70c21ad64992c9,2024-11-21T13:57:24.187000
CVE-2024-11198,0,0,fc0b00a2733ca1e8fff2fe360f2e4cb1494fa8044fb680aa8d0f8cfd928aecc9,2024-11-19T21:57:32.967000
CVE-2024-11199,0,0,4da6055bcafe2b8bce3b600ee20c2f5f1bd34151af116c40502e83cef4f24d3d,2024-11-23T10:15:03.897000
CVE-2024-1120,0,0,117338e0693d1442b4d765711d1f59e5c219537f14e8d75a3d2c01086a02d944,2024-11-21T08:49:50.663000
CVE-2024-1120,0,1,e98a16b725b0fddf3aa12432b0f5808c93b7dcd8a0fc795507e0507696589e0e,2025-03-11T16:46:21.947000
CVE-2024-11200,0,0,7a5014fc24dac51453395d7130a599729868592263e54cecb121b499d8896404,2024-12-03T14:15:19.923000
CVE-2024-11201,0,0,95ced2cef5a51b7fa14517c64bac4bc07296789d71763b16f225669a1035af34,2024-12-06T06:15:22.533000
CVE-2024-11202,0,0,1c4fa16dc439f105ac28005f4d485fd2d81fcbfbfe746e38e05c1690388ba0cf,2024-11-26T08:15:03.710000
@ -245704,7 +245708,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7
CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000
CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000
CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000
CVE-2024-1158,0,1,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
CVE-2024-1158,0,0,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000
@ -246633,7 +246637,7 @@ CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
CVE-2024-12546,1,1,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
CVE-2024-12546,0,0,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
@ -246910,7 +246914,7 @@ CVE-2024-12876,0,0,1ffa30e052c61ab887510a276fef8ab27590dc6fb9dfd38d21f07749b3182
CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000
CVE-2024-12878,0,0,b64e1d2b2d1550ae633bcf2c37a6e44f5ae55d86c6146ff799e23d8870487b64,2025-02-26T16:15:14.863000
CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000
CVE-2024-1288,0,0,58e0de106533fbadfe91ccbe8498dc993b445ddb25044f1435a62ec63a4fb787,2024-11-21T08:50:14.440000
CVE-2024-1288,0,1,b16952ad0ec4325f74f86e8c0458f9c7f871b72b07bc8f5d805e0c9508272e88,2025-03-11T16:49:51.733000
CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000
CVE-2024-12883,0,0,fb17662563168c3886515b2425060e99b8383719947868b35de58ecbdd790200,2025-01-10T21:24:53.957000
CVE-2024-12884,0,0,9e0582801645aa8c79972d850a96750ed43f73125934e68ee05e8491bd848510,2025-01-10T21:22:48.413000
@ -247510,7 +247514,7 @@ CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90
CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000
CVE-2024-13508,0,0,5f4e00e5fdca87a538d7f485431f2011a0b7359585f9c44faeaf0151393de35d,2025-02-19T00:15:09.360000
CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000
CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000
CVE-2024-1351,0,1,3ce5565a1cf25a34ada057dcbec10019bc03a7a3b1fdc771d78627f87a05ddf7,2025-03-11T16:56:35.430000
CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000
CVE-2024-13511,0,0,8b315badaeb5a615c739271a3e79d1cb9a54c1aaf05d6bc1436615af32fdbe24,2025-02-05T18:22:40.217000
CVE-2024-13512,0,0,15b524ef140c14d839848665047eaf39bfa9911689193bf2e25f735ef0c619c4,2025-01-31T18:08:22.743000
@ -247576,14 +247580,14 @@ CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4e
CVE-2024-13571,0,0,ab309a8c78e09a2ce738fdc24b971e3cca9be1cecd7a9446e1d144bb91a81bc0,2025-02-26T16:15:15.210000
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
CVE-2024-13573,0,0,47f56a6be89a4bb63ceadbae078e78a73033980ecb24e71f52f10b691c304d4b,2025-02-24T15:40:57.757000
CVE-2024-13574,0,0,e8fa1ade73e9481fb704f93d82f5f17b8b9dc57044ddc9a22b20ba9880547d49,2025-03-11T06:15:25.680000
CVE-2024-13574,0,1,a3824c096da031a79efdd9d44aee6c98173057ab11d0ce2659de8d8300b52fe4,2025-03-11T15:15:40.527000
CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000
CVE-2024-13576,0,0,48cc32358acb541ca620ae43d659608cb24956f0ab7ef76dd6f13e11fb588a30,2025-02-24T15:42:32.780000
CVE-2024-13577,0,0,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000
CVE-2024-13578,0,0,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000
CVE-2024-13579,0,0,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
CVE-2024-13580,0,0,dcfc2143ca86c28f3f85eec6634510fbac0c94243c65d05c88a1ddf73ddb4731,2025-03-11T06:15:25.813000
CVE-2024-13580,0,1,f7f33894d4a344d61f919692cf3def7d7308c04f540a8cc7226ad66b9e0eddd9,2025-03-11T15:15:40.683000
CVE-2024-13581,0,0,23b802948fc1ec2e74b6a22e5bf61730cbf3169612c89a9c03c344016e0c5f8b,2025-02-21T18:31:11.640000
CVE-2024-13582,0,0,8d1bcfb1104599f11a579c3e54940cf5492586d1eaf9dd31aaec9254649458fc,2025-02-21T18:29:05.973000
CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
@ -247615,7 +247619,7 @@ CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40f
CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
CVE-2024-13615,0,0,97d9c0be1e6a98b89fbc09315ada2f3c74202fe6aea59044ac6e8414fe522c2c,2025-03-11T06:15:25.920000
CVE-2024-13615,0,1,2b3d7c20a4af237993378d11227e4d1fa24944b2308af01c8b5ff1225188d389,2025-03-11T15:15:40.840000
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
CVE-2024-13622,0,0,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
@ -247725,7 +247729,7 @@ CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac578
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000
CVE-2024-13734,0,0,c0c2c683f5b658fc14994e3be65481765f20d38b94a5d38a7b8c7ec0b131b1aa,2025-02-27T10:15:09.980000
CVE-2024-13734,0,1,fb13d30c5d3b7eac80b2a64e86d45d007134e68bd4fdca6d18f22cd1479a839b,2025-03-11T15:55:48.603000
CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000
CVE-2024-13736,0,0,e1c661a83958ba599f5e79cad01930aa57fce7dc9eb18a31a6e422469d19d5dd,2025-03-06T12:42:22.567000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
@ -247799,7 +247803,7 @@ CVE-2024-13832,0,0,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73
CVE-2024-13833,0,0,0880b5318dcbe63992d3f2badd6c78eb8ebd6b2e485dc13d406b59785dd947c4,2025-03-01T12:15:33.230000
CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000
CVE-2024-13835,0,0,bb466c42b5ac88f927aad0c176f7f2be8448370020dc544158a1fa7d8a0b9abf,2025-03-08T03:15:36.760000
CVE-2024-13836,0,0,023f13c3eadf78202b05c2c4394d8dd9c57ce5f1cf5df6629baae82707c3d4d3,2025-03-11T06:15:26.070000
CVE-2024-13836,0,1,db6e49418a661de0a1787c92b36ae426d3cce34cbe5b5b4aacb35b485e1eb235,2025-03-11T15:15:41.010000
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
CVE-2024-13839,0,0,271371a4da5d24a94b607140c89c40b4d635e3f04318c9eb7bb8dbeb5839bd6e,2025-03-05T10:15:18.443000
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
@ -247814,19 +247818,19 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
CVE-2024-13853,0,1,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
CVE-2024-13853,0,0,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000
CVE-2024-13864,0,1,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
CVE-2024-13862,0,1,22b36d42c637f4d3af4cb8a8a20990860c7cb0de0e7b0b6f4015a9938343536b,2025-03-11T15:15:41.180000
CVE-2024-13864,0,0,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000
CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
CVE-2024-13873,0,1,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
CVE-2024-13873,0,0,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000
@ -247839,7 +247843,7 @@ CVE-2024-13893,0,0,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b69588
CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000
CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000
CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000
CVE-2024-13899,0,1,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
CVE-2024-13899,0,0,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000
CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000
@ -247847,7 +247851,7 @@ CVE-2024-13902,0,0,2d798b0c40a1d59ba77da363cceb392cdd45de698d6466927a1240987fa60
CVE-2024-13904,0,0,4066bd52c81a7420cad2f813b88c8a82bd66a4addf44ebe17ec9b3f40af765e5,2025-03-07T09:15:15.817000
CVE-2024-13905,0,0,c66be7cfbd34a458bb74dba95d4e6476fcc9754cf0f34a578dc3aa455a41a709,2025-02-27T05:15:13.610000
CVE-2024-13906,0,0,49d3c886d6eb569e3be95840598d3644d2e3a759a922a1777a4a1a594b4b6b41,2025-03-07T08:15:37.467000
CVE-2024-13907,0,0,6fda522756c0eddffc3b4aa0f215f879fcfe6340ad02f1a9da7e38e20feb022c,2025-02-27T07:15:33.543000
CVE-2024-13907,0,1,3b0e87cf5752b8b0fccb0cb5069f80bf05370ddfb297c2e78ae1a11702604545,2025-03-11T16:26:05.363000
CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537b5a,2025-03-08T07:15:10.690000
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
@ -247904,7 +247908,7 @@ CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e25
CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000
CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000
CVE-2024-1441,0,0,8524643e4a58354b4c6d975cbc4efa93d311c9d367be16dec8b7308fac65f976,2024-11-21T08:50:35.540000
CVE-2024-1442,0,0,e603df77fc5b326a2e95105c33d6ffef2421f0c4884da42b043346435997aefc,2024-11-22T12:15:18.137000
CVE-2024-1442,0,1,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000
CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a7e,2024-11-21T08:50:35.827000
CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8dc,2024-02-16T17:15:08.710000
CVE-2024-1445,0,0,9033b90861f7285eae992be67e87fa2af5ca400c3f531050c841d15e90f13438,2025-02-27T22:03:40.670000
@ -248165,7 +248169,7 @@ CVE-2024-1721,0,0,d0c914e77af4545b0584eaf250ba5ee3ac40626828eb6c5198526b9da864dd
CVE-2024-1722,0,0,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000
CVE-2024-1723,0,0,11d3a45a60abd75514c9d5b662d454bbccfffc4644e8e6300f550c3165594abc,2024-11-21T08:51:09.993000
CVE-2024-1724,0,0,b6939c282714eb0a778dca5ac11d48814e19c1fa2e871297c9ec9803570c2103,2024-11-21T08:51:10.117000
CVE-2024-1725,0,0,89bb0cde0d54eebd135824ba7c6a8a694f36b81bce992a7be08e7883a75418ef,2024-11-21T08:51:10.290000
CVE-2024-1725,0,1,c49e15e382bfabd0a0cdb614647abc7293de465c4bc389c49725ead47acce1e9,2025-03-11T16:55:54.263000
CVE-2024-1726,0,0,5f254584205b82d10fa82259cc018f6a7e67209450947674089aa2a53b6163a7,2024-11-21T08:51:10.430000
CVE-2024-1727,0,0,835ea1a8de83b3427eca53b821927695e2fbfdeed0970e648bc2bbc24acad5f8,2024-11-21T08:51:10.560000
CVE-2024-1728,0,0,65ac5027c66230a900a5259c3b3bb10c527fa4ddae212a665be9e3b619bf334f,2024-11-21T08:51:10.707000
@ -248210,7 +248214,7 @@ CVE-2024-1767,0,0,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db0
CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f30,2024-11-21T08:51:16.190000
CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000
CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000
CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af4493302727,2024-11-21T08:51:16.577000
CVE-2024-1771,0,1,3ea2f5226776062012b591b88fae846979789fdefd15944d103f97583a853f0a,2025-03-11T16:42:28.580000
CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000
CVE-2024-1773,0,0,8c65223f5516c06a2296cf03b178bcc4f946b8107a149044c776ecc9d166fc1e,2025-02-07T19:25:53.603000
CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000
@ -248324,8 +248328,8 @@ CVE-2024-1885,0,0,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d
CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000
CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000
CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000
CVE-2024-1889,0,1,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
CVE-2024-1890,0,1,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
CVE-2024-1889,0,0,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
CVE-2024-1890,0,0,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
@ -248407,7 +248411,7 @@ CVE-2024-1972,0,0,0cc508917c2a729c9424480608443d75bc2e0685066a841069988bd5d702f9
CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf24538,2024-11-21T08:51:42.740000
CVE-2024-1974,0,0,eaa50a4b08004c31860f05e044d5035945cf42def5f73984f24e27883e4f1dd6,2025-01-22T17:28:42.213000
CVE-2024-1975,0,0,1ae0a6f555a0b739aa7c380171466dc1803a13ce978f8add5306445e96cc4399,2024-11-21T08:51:43
CVE-2024-1976,0,0,a3555dbbbe1be129a03f073ac3b859df5d9dc7ad39e5f16531bc3f78a64440d9,2024-11-21T08:51:43.140000
CVE-2024-1976,0,1,721a06b8c0569106f65a760df35d94dadd89ddf9ce5caee99bfdb33cc6bf531b,2025-03-11T16:47:09.213000
CVE-2024-1977,0,0,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000
CVE-2024-1978,0,0,f34d08f80c401194bafc483f71731efa7c10b199979cff06480c329f89074d9c,2025-01-16T19:01:27.267000
CVE-2024-1979,0,0,450c8bced69f6acee39bec8a0cbc5907a91ea6349c4a430e3400e611d5082a4e,2024-11-21T08:51:43.507000
@ -248417,10 +248421,10 @@ CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c65
CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000
CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000
CVE-2024-1985,0,0,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000
CVE-2024-1986,0,0,a7c84f282c3013ac88d7d83adb82846d5089dadc1a1375bf53f285962b881c3f,2024-11-21T08:51:44.357000
CVE-2024-1986,0,1,9b98c609bb8992e2b4aca6821d4dbd4522e2f2a7233df6ab200c59c164e306f3,2025-03-11T16:40:10.820000
CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000
CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000
CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000
CVE-2024-1989,0,1,fb90ba8d298433814d9991719c5f96161751eef3cf6f5242d4f23501e06d7ccc,2025-03-11T16:41:12.650000
CVE-2024-1990,0,0,269ecdaa26e7f72c4581113e86aecb027ddb59a00bb2be22c9f1e5fe0de2de0f,2025-01-17T19:30:21.120000
CVE-2024-1991,0,0,609f174783bfbfc114313c7a20f55f994a40d20e0ff7bf44be0d1102da2583fe,2025-01-31T01:32:27.643000
CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000
@ -250736,21 +250740,21 @@ CVE-2024-22636,0,0,1e4cdb2e19498454c9737dcc475529caca1b19ae7a7edc7a426850b53d2e4
CVE-2024-22637,0,0,039dade77fb191dfff09d08e405b542969a40a1d849914bee2191918ea512437,2024-11-21T08:56:30.870000
CVE-2024-22638,0,0,108c8d542114070b6bb19320dbaaed817ba8f9ac690df310bade69c7c6ad70ee,2024-11-21T08:56:31.130000
CVE-2024-22639,0,0,b53eee7dd80d478ea7b648e5833080319bd362dcf02e89daf46cd874e11917e4,2024-11-21T08:56:31.303000
CVE-2024-2264,0,0,5c90d9ae72cf2b98634ac4925a03d47873ed890489d6a7784be19b15868c29eb,2024-11-21T09:09:22.863000
CVE-2024-2264,0,1,232f67d48922124185b77f3f2d22dd07a1ecb262fe1a85256c747ae02d4e1317,2025-03-11T16:54:11.227000
CVE-2024-22640,0,0,36d03e2cc909d79303f2eb78528e93e4fa6104824792fe48795b4980eb53856d,2024-11-21T08:56:31.477000
CVE-2024-22641,0,0,856997cba980d31d366e37b94b0280a7e60234a998b80aca46f5f187c46c3c1f,2024-11-21T08:56:31.717000
CVE-2024-22643,0,0,7d4b7a061bc3ed794466e62486d751770d3631735470a24af5d97437931c0235,2024-11-21T08:56:31.947000
CVE-2024-22646,0,0,897269ea5a23769f1e114da4b7edb99d6a5804625943364785d03f7623433ad8,2024-11-21T08:56:32.110000
CVE-2024-22647,0,0,959369f80422c942be459d7a75ac3f8d8e95fde82ea38d6255b4ac420d054c40,2024-11-21T08:56:32.270000
CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000
CVE-2024-2265,0,0,04a54a701baf68779e4ce416559f6fcc353233fd426334a66f849695269d7d83,2024-11-21T09:09:23.013000
CVE-2024-2265,0,1,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
CVE-2024-2266,0,0,149e5cbf8240d257640179c28ee36c419b37e8ddb8178d9ecfb532d67af9f69b,2024-11-21T09:09:23.160000
CVE-2024-2266,0,1,62cdec52c3b043a305a2e8df6661c578fa55e3ccbfd1587b0dddb8b3d043f390,2025-03-11T16:53:46.840000
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000
CVE-2024-22663,0,0,6782a4082917ca38ebefef21e6f884aa140361fc8b102266ad8603a42c670e55,2024-11-21T08:56:33.187000
CVE-2024-22667,0,0,edadec3a89e6c904804bef3249f22b6ef314bb09dc1b9905e67b22ac9563e6a1,2025-02-05T17:29:53.050000
CVE-2024-2267,0,0,b0cf1527dec8e0daf9b4fcb54d90684de4aa09c8c3089d675830b60a2d36868a,2024-11-21T09:09:23.303000
CVE-2024-2267,0,1,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d2386f,2025-03-11T16:53:27.713000
CVE-2024-2268,0,0,6d4e388d01cad7696055cb5384a116da443134cd3dd3539603ce459631f4aee3,2024-11-21T09:09:23.440000
CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
CVE-2024-2269,0,0,b232691159734d72e16ba92082c60703628bf04e21c3699c7081fa618b278db0,2024-11-21T09:09:23.580000
@ -252696,7 +252700,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d
CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000
CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000
CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000
CVE-2024-2546,0,1,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
CVE-2024-2546,0,0,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
@ -257843,6 +257847,7 @@ CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27
CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000
CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000
CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000
CVE-2024-32123,1,1,2faf8987365127bdaafb0cb2ff51b70fb8608b065e7754f4c1a57ee6623eb5e0,2025-03-11T15:15:41.353000
CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000
CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000
CVE-2024-32127,0,0,dded2ba7f0afc7a4f66304fe4ecc3b2ff22d2370ed0fac28ea97950754f4c2c6,2024-11-21T09:14:30.743000
@ -258846,6 +258851,7 @@ CVE-2024-33498,0,0,1f30c91f4e1fa0f80d47e74558faedb6e33193f008defa74408da9a039105
CVE-2024-33499,0,0,7f116e8c4230ef1848187957908348d64a492aad49a5d13e6d4695a9da304020,2024-11-21T09:17:02.293000
CVE-2024-3350,0,0,e59786b43aa812e979d218752afde9eb031596b29f2efdc76a2915844b443c6f,2025-02-11T14:44:28.947000
CVE-2024-33500,0,0,e05afec9b3c6153d2fb5e689d4f464913d13afee88f2b1108d2e9de13f02b158,2024-11-21T09:17:02.433000
CVE-2024-33501,1,1,b22f5006f03b3bc1c907ca72d07467e05ec47af4bc9a19214a15fbdfc276e4c8,2025-03-11T15:15:41.550000
CVE-2024-33502,0,0,b03ad6bdb7d50af328d0ec93aa8c63cc9d0b53d31f47494a80e249bff05450e0,2025-01-21T21:03:02.247000
CVE-2024-33503,0,0,0c9f63716718c75aeaccba8cd0b99b5f4c042abe278d330de5d973c399a6c93e,2025-01-31T17:36:27.323000
CVE-2024-33504,0,0,4f7a7e539d3a7bb985456ceaf1379824ec92908fe83342e88d744ac81e0ced13,2025-02-11T17:15:22.110000
@ -266324,7 +266330,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216
CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
CVE-2024-43196,0,1,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
CVE-2024-43196,0,0,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000
CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000
@ -267313,7 +267319,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
CVE-2024-44192,0,1,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
CVE-2024-44192,0,0,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
@ -268008,8 +268014,10 @@ CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73
CVE-2024-45320,0,0,278f3e436c23697518810a78c3b9b78245686b4943dd896d4ed03278de6fb6ab,2025-02-18T06:15:12.060000
CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000
CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000
CVE-2024-45324,1,1,4133e76a2b4058cd57a414a0735ec625febe037e9b94067ea126f144c2293bdd,2025-03-11T15:15:41.743000
CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000
CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000
CVE-2024-45328,1,1,11f11b7289e12a876badbd8e94658387a6a3d463241f480366ea749a2022371c,2025-03-11T15:15:41.963000
CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000
CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000
CVE-2024-45331,0,0,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000
@ -268751,6 +268759,7 @@ CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2
CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000
CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000
CVE-2024-4666,0,0,b7505f51131c566a65a04c854bf3da56137a32df8f67317652113aca5c7be8be,2024-11-21T09:43:20.073000
CVE-2024-46663,1,1,02c9063bc1f46f6ec7418f43b4f986605256f7597000bf034817913025656f4e,2025-03-11T15:15:42.130000
CVE-2024-46664,0,0,f54dbed03769eeb78c38ac376a02143972104b9e7c971603cb26dcfe7d10522c,2025-01-31T16:37:48.283000
CVE-2024-46665,0,0,ef84340be5f24c6331b3c4cb8bb0c1f046ee2bbf6a690df5c86ed76a3b7f8a7a,2025-01-31T16:09:23.847000
CVE-2024-46666,0,0,8cb884f5e29fd5cfbec8babcd5171e651caec0625bb78127caef38457e72b5d9,2025-02-18T22:15:11.220000
@ -270757,19 +270766,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000
CVE-2024-49337,0,1,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
CVE-2024-49337,0,0,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49344,0,1,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
CVE-2024-49344,0,0,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000
CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
CVE-2024-49355,0,1,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
CVE-2024-49355,0,0,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
@ -271085,11 +271094,11 @@ CVE-2024-49775,0,0,80561302864ea58e0b8a0928ce56db4a412fa4e922f0595e7642f4c103198
CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
CVE-2024-49779,0,1,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
CVE-2024-49779,0,0,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000
CVE-2024-49780,0,1,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
CVE-2024-49781,0,1,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
CVE-2024-49782,0,1,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
CVE-2024-49780,0,0,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
CVE-2024-49781,0,0,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
CVE-2024-49782,0,0,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
@ -272246,7 +272255,11 @@ CVE-2024-51300,0,0,33bc9629d8540cbc2a733d31834d387baeb17f5f2187d5a5ac9dba848e387
CVE-2024-51301,0,0,b66b641e4139e8ebaacd5ea6b531eed897a4506f18dea4aecced28d30671fab9,2024-11-01T12:57:03.417000
CVE-2024-51304,0,0,1e110f5dd97c111e86ad4208bc6fd08aebd2d72d5bb280d26d0c29b8a309ef6b,2024-11-01T12:57:03.417000
CVE-2024-5131,0,0,da5e519e37c4c18d994f27345cf3977fa837f039bcfa4f9d0e1faf90c1e84ff4,2024-11-21T09:47:02.353000
CVE-2024-51319,1,1,2e10ad98f289bc32afe74a5132b79998845ade77f388d58a7300df2e3a60ac10,2025-03-11T15:15:42.313000
CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000
CVE-2024-51320,1,1,148a9b02d8313a38924d776ff31fd5c461323d8ed756be9f7a634f21c9e2ac8c,2025-03-11T15:15:42.447000
CVE-2024-51321,1,1,3694f3f7720c2bc27f120049121c7803418bcb2120cd7be5fe47551e76c383a6,2025-03-11T15:15:42.570000
CVE-2024-51322,1,1,f2b808cf5678dc485ab43515f10449914ab03abadd8400eebe996db1d2691758,2025-03-11T15:15:42.700000
CVE-2024-51324,0,0,eae5779c3dbd2366931d9bbf9284e8b16a0b71d3d019224bd3ee356a90e26f8b,2025-02-12T22:15:39.830000
CVE-2024-51326,0,0,32849095581e0af021d41eb6c3bbf891e7ba8499eb2382e7af07f008ba32d1d0,2024-11-06T15:02:12.403000
CVE-2024-51327,0,0,5850f25922ddeec5e8ef2cdf5d18bbd20c5c5a49e7b4e65d69d89cf904135f25,2024-11-06T15:02:55.710000
@ -273453,6 +273466,8 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50
CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
CVE-2024-52960,1,1,233636e10d8786909f484dfb9dcd5a910159cd5a09c9722d5ccf26e64c25bdee,2025-03-11T15:15:42.813000
CVE-2024-52961,1,1,8f690f3ac82316cb2ca972521b76bf71dc739ec9aa0a660930965a33c544d76c,2025-03-11T15:15:42.960000
CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000
CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000
CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000
@ -274222,8 +274237,10 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f
CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
CVE-2024-54015,0,0,15d5e1f3ec3d810c595ec1f32b64edabb37773d7fc12e946dfae697ba0178074,2025-03-11T10:15:15.450000
CVE-2024-54018,1,1,dc8039244849f098489d5e2d0a96dd0b014c4c4a2ca7cba777f8b01232f5b796,2025-03-11T15:15:43.113000
CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000
CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000
CVE-2024-54026,1,1,c81b5f16f7918a61df17870ba5998cee06532556ca31b9249a0a740899d5fa57,2025-03-11T15:15:43.307000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
@ -274252,8 +274269,8 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,1,1,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
CVE-2024-54085,1,1,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
CVE-2024-54084,0,0,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
CVE-2024-54085,0,0,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@ -274308,7 +274325,7 @@ CVE-2024-54135,0,0,77abd8154d8be3db4d7c9a03332ccd4782b63a6662a48190c38b32b12c923
CVE-2024-54136,0,0,80704e0566a081b20b8eab10be4518ccdfa42ef09f8212c54ca1e875893e5b3f,2024-12-06T16:15:22.500000
CVE-2024-54137,0,0,399d2df4e6b74eb8cfc8f334c4fdddeca2483bd8f66667dd2fd1dfb49e3c09f3,2024-12-06T16:15:22.637000
CVE-2024-54138,0,0,24479f8b306f3a947f6a1356e02b128912af7a0f233c0d8af6849988772fc0dd,2024-12-06T22:15:21.880000
CVE-2024-54139,0,0,b96fc31458bdf50652ad2210ef3e45c991013d239869ac415ba3a2488523964b,2024-12-13T16:15:26.210000
CVE-2024-54139,0,1,85f4ecc3d5596ad60d965730d70a86223263f918fe4ceea08e540d594e22e620,2025-03-11T16:44:20.720000
CVE-2024-5414,0,0,5121b02a6b535c7a985e876782b07c16fe258b67f2027b8e6e110fd30fd4eea8,2024-11-21T09:47:36.480000
CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f669,2024-12-05T22:15:20.400000
CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000
@ -274622,11 +274639,11 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
CVE-2024-54469,0,1,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
CVE-2024-54469,0,0,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
CVE-2024-54473,0,1,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
CVE-2024-54473,0,0,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
@ -274700,7 +274717,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
CVE-2024-54560,0,1,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
CVE-2024-54560,0,0,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
@ -275016,8 +275033,11 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
CVE-2024-55590,1,1,2314eaa7dec81b8bed45b970c8c49b68532c401ec78d9b49350e5348ba11fcd2,2025-03-11T15:15:43.650000
CVE-2024-55591,0,0,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000
CVE-2024-55592,1,1,fb226d1a840c3545d9fec57f603b2bc6540521c0208c0d286c3f12f6787fcb0e,2025-03-11T15:15:43.823000
CVE-2024-55593,0,0,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155600,2025-02-03T22:06:19.163000
CVE-2024-55597,1,1,69e67101b9cbc9c0c4538abf03d0ccea9cd7cc11d97b2f16830f06083c78931a,2025-03-11T15:15:44.010000
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
CVE-2024-55601,0,0,9b35d862d187fd3c6770804bae011b28b724e76b6c1dd4a3a89f0f4207a3e507,2024-12-09T22:15:23.100000
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
@ -275302,8 +275322,8 @@ CVE-2024-56186,0,0,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8
CVE-2024-56187,0,0,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000
CVE-2024-56188,0,0,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
CVE-2024-56191,0,0,6d6e439309f911cd89fe05c483aed2c6456da3b34def44a970c450b01f649a66,2025-03-10T21:15:39.880000
CVE-2024-56192,0,0,c70740ec10129faece240e224a1d2efd21b1913c8abf85f982388ad67961b19e,2025-03-10T21:15:40.007000
CVE-2024-56191,0,1,77d84834f877e83cc26c98877dcd83bef54eea22cda79a792579609d9f5e120c,2025-03-11T16:15:16.743000
CVE-2024-56192,0,1,e891313d3a3d881ff3fb16ff06f440a0adf6d5a24add6a642e38837e41b3d035,2025-03-11T16:15:16.900000
CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000
CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
@ -276966,7 +276986,7 @@ CVE-2024-6257,0,0,3c450049ad1a84e0b297a8d37be25b1d0e2549032909d0064d332ba84cab26
CVE-2024-6258,0,0,9f8fd150e46db75469fd7fc658db5aa120700d36ac5826497f097b978edd30a4,2024-09-19T01:40:32.813000
CVE-2024-6259,0,0,c6f96fdcb3ff3fff17080c8c4b550038410883f348096d5bc80a22f11eca4cfc,2024-09-19T01:33:36.477000
CVE-2024-6260,0,0,d4af7b4cfc44f08d8432811020e56f72bfcd7f1f60b9158bd5a407cfd9935f76,2024-11-22T20:15:12.013000
CVE-2024-6261,0,0,e7733b4af567c2826228022fdb349dc1cb9f5ab66144a859ecb4cb89a52a70ca,2025-02-27T06:15:21.790000
CVE-2024-6261,0,1,4b0ca53c793968c715a704527aa4216ee372b1d4251b03a5da1b268d5ce019b7,2025-03-11T16:32:04.440000
CVE-2024-6262,0,0,25f9bfdcc4aa7fbe45f36b65288775ce8759f234561b7e68f77257c5e457e984,2024-11-21T09:49:17.823000
CVE-2024-6263,0,0,64ac66a765d88001d3119809569f68e9e73208abe19a92eeb56f7a4ffa929880,2024-11-21T09:49:17.943000
CVE-2024-6264,0,0,02e86a9a4bf982b67050a877dc734ef40fad5667e32ddac6d7d5d04963214bed,2024-11-21T09:49:18.070000
@ -279527,7 +279547,7 @@ CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a
CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000
CVE-2024-9193,0,0,e9fcabeca8c2a679cb4268e62dc1a9ef8ec799fb5d366ccb5b675730020983a2,2025-02-28T09:15:11.437000
CVE-2024-9194,0,0,1077144cc77b6254f33936a25ffd1f7bfdaa1a60153ac4b35fb53e4c8f3eb6e6,2024-11-21T17:15:27.480000
CVE-2024-9195,0,0,29a3855b8bed692163705c71bc27ac9f489a5fe6ce73924e05c630425f69a304,2025-02-28T09:15:11.633000
CVE-2024-9195,0,1,fc36972059984bb59ac8e6b7f38a03aaaa1f1346862dca07117632e8f3cf8c55,2025-03-11T15:49:13.197000
CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000
CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000
CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000
@ -280579,7 +280599,7 @@ CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e4
CVE-2025-0624,0,0,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
CVE-2025-0629,0,1,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
CVE-2025-0629,0,0,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000
CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000
@ -280982,7 +281002,7 @@ CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9
CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
CVE-2025-1282,0,0,bcd550bc4b0f7b2c27f0f5e69aeba338cc0185c6a99805b296dc4f3134453366,2025-02-27T09:15:10.160000
CVE-2025-1282,0,1,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000
CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
@ -281068,7 +281088,7 @@ CVE-2025-1435,0,0,d840829e9adebbd2e05cc9e4789e2ef73a3bfba41e90989d315c56fa7ea84a
CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000
CVE-2025-1450,0,0,162c0b930672185bd108fa37bb3f44f1a62099d9e3d7e96e9e17908566b144b1,2025-02-27T10:15:10.677000
CVE-2025-1450,0,1,6ec73f6e6cf96ef1bc86e6c9120d538e032062f45d5e518108c7bc768f28c558,2025-03-11T15:46:05.180000
CVE-2025-1459,0,0,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000
CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000
CVE-2025-1463,0,0,66bff7e70ca672b5367a8323921deb52eeae1be259f6bf189f389bd789ca9f1c,2025-03-05T12:15:35.270000
@ -281180,8 +281200,8 @@ CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e10
CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000
CVE-2025-1686,0,0,aeb3e336ffe94b1c0a7e4872f92b31f7de132db0e69b60fe0611b8798ab6716d,2025-02-27T15:15:40.940000
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
CVE-2025-1689,0,0,27f88440d15cc4638b7de0e755f526794faf4f0384e03f795f8c0315bae674a7,2025-02-27T07:15:35.400000
CVE-2025-1690,0,0,27374a34521b8d136365bb94ee2f06ae3a84166302e0fd1fcbd44e96dfb04c6f,2025-02-27T09:15:10.697000
CVE-2025-1689,0,1,049ae4dee98f065b7f7f52ce04df5123177e15522ad59dafeab6f6ff67faccdb,2025-03-11T16:19:41.870000
CVE-2025-1690,0,1,c42b6345f56018d5d381c14a2d743b6ae6c7942dfe15639a3c3d47de6c96a0de,2025-03-11T15:59:35.800000
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
CVE-2025-1692,0,0,2e6d02e2120ba7cdd2d2dce988c300f2bd2785f615f13934cbd4bb5f104f2bf7,2025-02-27T13:15:11.413000
CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f50,2025-02-27T13:15:11.563000
@ -281190,7 +281210,7 @@ CVE-2025-1696,0,0,ce6275a845a1290c62e8c0fe3a0fcacdf1abe14eafe526218c3da3df65c4ed
CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000
CVE-2025-1714,0,0,61e824a1ccdf54ec33bae3dd88565effb2433516529becf60015224f7bb0775a,2025-03-07T05:15:16.233000
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
CVE-2025-1717,0,0,4eace37625fa94455212ed05fc0d7dccd597669fe610b1618145f4f97f30cd81,2025-02-27T08:15:31.130000
CVE-2025-1717,0,1,a3187f28d4c7b205f040a730275c0f286adbd6d6550e77331f01e3625795de14,2025-03-11T16:12:42.783000
CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
@ -281789,7 +281809,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000
CVE-2025-2136,0,1,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
CVE-2025-2136,0,0,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
@ -281800,7 +281820,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea
CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000
CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000
CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000
CVE-2025-2137,0,1,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
CVE-2025-2137,0,0,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
@ -282188,13 +282208,13 @@ CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d
CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000
CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000
CVE-2025-2189,0,0,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000
CVE-2025-2190,0,1,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
CVE-2025-2190,0,0,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
CVE-2025-2191,0,0,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000
CVE-2025-2192,1,1,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
CVE-2025-2193,1,1,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
CVE-2025-2194,1,1,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
CVE-2025-2195,1,1,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
CVE-2025-2196,1,1,59e5a21c779c1b597e73c1ddba8e0655dec15010418379179d66140aea5d4385,2025-03-11T14:15:28.123000
CVE-2025-2192,0,0,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
CVE-2025-2193,0,0,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
CVE-2025-2194,0,0,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
CVE-2025-2195,0,0,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
CVE-2025-2196,0,1,2e4abd9c4f34d1ee0490e793cc34c4f7350a86f2ca91a96b3d64b855f88f05ff,2025-03-11T15:15:45.820000
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
@ -282328,11 +282348,11 @@ CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf
CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000
CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000
CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000
CVE-2025-22366,1,1,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
CVE-2025-22367,1,1,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
CVE-2025-22368,1,1,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
CVE-2025-22369,1,1,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
CVE-2025-22370,1,1,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
CVE-2025-22366,0,0,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
CVE-2025-22367,0,0,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
CVE-2025-22368,0,0,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
CVE-2025-22369,0,0,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
CVE-2025-22370,0,0,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
@ -282351,6 +282371,7 @@ CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7
CVE-2025-22447,0,0,a09e9c6c341148275cdf7848d50c90872c1118351a20ee6b95f2dabdacf4dbd2,2025-03-06T04:15:25.377000
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
CVE-2025-22454,1,1,1046ed7645c2324b9db0513cc36c6430cb7f73bcf372319688f1d7839792ac01,2025-03-11T15:15:44.737000
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
@ -284118,6 +284139,7 @@ CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
CVE-2025-25680,1,1,8769235f7dfed6dab81aa90fd879cc3d4a3649aa255c188d45e8deb5967072c7,2025-03-11T16:15:17.413000
CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000
CVE-2025-25724,0,0,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000
CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000
@ -284133,6 +284155,7 @@ CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977
CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
CVE-2025-25747,1,1,a1c6ddcced5f18ec040d1d1e271930e310c5eb290a17db4d61127328dc681262,2025-03-11T16:15:17.547000
CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000
CVE-2025-25761,0,0,f248f6741f63a9a7aedabfe16b412988575b28956c4c9e9dd6d7c9dcf3c9c70f,2025-02-27T15:15:41.777000
@ -284619,7 +284642,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
CVE-2025-27363,1,1,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
CVE-2025-27363,0,0,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
@ -284634,6 +284657,7 @@ CVE-2025-27399,0,0,39035d656129062238f81ef47ca04f7a1e8421cb055350242877932e69dd8
CVE-2025-27400,0,0,09b6d518bf48aeab880dbe66e6bc2a5dd8752164e9bf158ed67c63f0b7ab8431,2025-02-28T16:15:40.237000
CVE-2025-27401,0,0,a0a9ff73f453a0c4b6de03870f141abd84f19622792f55cbc6c22475d44e32fa,2025-03-04T17:15:19.547000
CVE-2025-27402,0,0,920b5ec493a4fe20f3d86d2225a25091e0d3f71f7744b6da408c9c08d3dfbc7c,2025-03-04T17:15:19.703000
CVE-2025-27403,1,1,70337e0a3800c5c59ee3032fe8368851fa8455e67e280b02d352e4fa8ed0ce9f,2025-03-11T15:15:45.570000
CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000
CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000
CVE-2025-27411,0,0,3bb429b2a417984eb72d2c43dc11687835b7b048bd7b98fbb69cff47d115b00f,2025-03-05T16:15:40.310000
@ -284686,12 +284710,15 @@ CVE-2025-27590,0,0,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99
CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000
CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000
CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000
CVE-2025-27601,1,1,df52cc35c591bba27e95164eee6faf7b1153751f41839962728fd4c8e26597ca,2025-03-11T16:15:17.943000
CVE-2025-27602,1,1,b9bde515c15b535cbdce5201f55bcf595c4355929bcf374774ce8cbee47e8318,2025-03-11T16:15:18.100000
CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
CVE-2025-27610,0,0,c33d0784ac28efda70daeefbc9e57202288568b88569c58831907a224f199e9e,2025-03-10T23:15:35.073000
CVE-2025-27615,0,0,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000
CVE-2025-27616,0,0,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000
CVE-2025-27617,1,1,8fc9cf979b73fa6ba29c977f6cb88da60f3e6ce7e9df90300e90513f74a659ec,2025-03-11T16:15:18.310000
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
@ -284756,7 +284783,7 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
CVE-2025-27893,0,1,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
CVE-2025-27893,0,0,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000
CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000
CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000

Can't render this file because it is too large.