mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-05 18:30:48 +00:00
Auto-Update: 2025-03-11T17:00:19.839888+00:00
This commit is contained in:
parent
505a797c64
commit
b939703fb5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-34910",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-27T13:15:10.267",
|
||||
"lastModified": "2024-11-21T07:10:25.027",
|
||||
"lastModified": "2025-03-11T16:15:12.233",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-46704",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:12.747",
|
||||
"lastModified": "2024-11-21T07:30:56.810",
|
||||
"lastModified": "2025-03-11T15:15:36.577",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22747",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-01T08:15:12.427",
|
||||
"lastModified": "2024-11-21T07:45:20.813",
|
||||
"lastModified": "2025-03-11T15:15:37.513",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22766",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-01T08:15:13.700",
|
||||
"lastModified": "2024-11-21T07:45:23.100",
|
||||
"lastModified": "2025-03-11T15:15:37.670",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22767",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2023-03-01T08:15:13.767",
|
||||
"lastModified": "2024-11-21T07:45:23.220",
|
||||
"lastModified": "2025-03-11T15:15:37.823",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23507",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:13.880",
|
||||
"lastModified": "2024-11-21T07:46:19.440",
|
||||
"lastModified": "2025-03-11T16:15:12.787",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23508",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:13.940",
|
||||
"lastModified": "2024-11-21T07:46:19.553",
|
||||
"lastModified": "2025-03-11T16:15:12.953",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23510",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.010",
|
||||
"lastModified": "2024-11-21T07:46:19.670",
|
||||
"lastModified": "2025-03-11T16:15:13.123",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23514",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.263",
|
||||
"lastModified": "2024-11-21T07:46:20.207",
|
||||
"lastModified": "2025-03-11T16:15:13.297",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-416"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23517",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.320",
|
||||
"lastModified": "2024-11-21T07:46:20.443",
|
||||
"lastModified": "2025-03-11T16:15:13.490",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23518",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.387",
|
||||
"lastModified": "2024-11-21T07:46:20.560",
|
||||
"lastModified": "2025-03-11T16:15:13.680",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-23519",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2023-02-27T20:15:14.453",
|
||||
"lastModified": "2024-11-21T07:46:20.680",
|
||||
"lastModified": "2025-03-11T16:15:13.880",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26102",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-02-24T05:15:15.140",
|
||||
"lastModified": "2024-11-21T07:50:46.753",
|
||||
"lastModified": "2025-03-11T16:15:14.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26103",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-02-25T05:15:12.343",
|
||||
"lastModified": "2024-11-21T07:50:46.877",
|
||||
"lastModified": "2025-03-11T16:15:14.263",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1333"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26104",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-02-25T05:15:12.487",
|
||||
"lastModified": "2024-11-21T07:50:47.000",
|
||||
"lastModified": "2025-03-11T16:15:14.450",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26105",
|
||||
"sourceIdentifier": "report@snyk.io",
|
||||
"published": "2023-02-28T05:15:13.053",
|
||||
"lastModified": "2024-11-21T07:50:47.137",
|
||||
"lastModified": "2025-03-11T15:15:37.983",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,6 +75,16 @@
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1321"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27372",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-02-28T20:15:10.243",
|
||||
"lastModified": "2024-11-21T07:52:46.640",
|
||||
"lastModified": "2025-03-11T15:15:38.177",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -181,6 +211,14 @@
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/171921",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/173044",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2985",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-01T01:15:17.970",
|
||||
"lastModified": "2024-11-21T07:59:42.080",
|
||||
"lastModified": "2025-03-11T16:15:14.727",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3022",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-19T18:15:09.870",
|
||||
"lastModified": "2024-11-21T08:16:15.790",
|
||||
"lastModified": "2025-03-11T15:15:38.650",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3141",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-09T20:15:10.327",
|
||||
"lastModified": "2024-11-21T08:16:32.843",
|
||||
"lastModified": "2025-03-11T15:15:38.867",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3161",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-12T20:15:12.910",
|
||||
"lastModified": "2024-11-21T08:16:35.683",
|
||||
"lastModified": "2025-03-11T15:15:39.120",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3220",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-20T20:15:09.737",
|
||||
"lastModified": "2024-11-21T08:16:43.633",
|
||||
"lastModified": "2025-03-11T15:15:39.357",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3268",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2023-06-16T19:15:14.707",
|
||||
"lastModified": "2024-11-21T08:16:51.880",
|
||||
"lastModified": "2025-03-11T15:15:39.587",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-34256",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-31T20:15:10.817",
|
||||
"lastModified": "2024-11-21T08:06:52.333",
|
||||
"lastModified": "2025-03-11T16:15:14.927",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -43,6 +43,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -56,6 +76,16 @@
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
56
CVE-2023/CVE-2023-379xx/CVE-2023-37933.json
Normal file
56
CVE-2023/CVE-2023-379xx/CVE-2023-37933.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-37933",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:38.480",
|
||||
"lastModified": "2025-03-11T15:15:38.480",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of input during web page generation ('Cross-site Scripting') vulnerability [CWE-79] in FortiADC GUI version 7.4.0, 7.2.0 through 7.2.1\tand before 7.1.3 allows an authenticated attacker to perform an XSS attack via crafted HTTP or HTTPs requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-216",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-407xx/CVE-2023-40723.json
Normal file
56
CVE-2023/CVE-2023-407xx/CVE-2023-40723.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-40723",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:39.843",
|
||||
"lastModified": "2025-03-11T15:15:39.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An exposure of sensitive information to an unauthorized actor in Fortinet FortiSIEM version 6.7.0 through 6.7.4 and 6.6.0 through 6.6.3 and 6.5.0 through 6.5.1 and 6.4.0 through 6.4.2 and 6.3.0 through 6.3.3 and 6.2.0 through 6.2.1 and 6.1.0 through 6.1.2 and 5.4.0 and 5.3.0 through 5.3.3 and 5.2.5 through 5.2.8 and 5.2.1 through 5.2.2 and 5.1.0 through 5.1.3 allows attacker to execute unauthorized code or commands via api request."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-117",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42509",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2024-03-07T14:15:46.187",
|
||||
"lastModified": "2024-11-21T08:22:41.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:57:11.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionStartIncluding": "7.17.4",
|
||||
"versionEndExcluding": "7.77.0",
|
||||
"matchCriteriaId": "0EF75986-23DD-4848-AE25-51DBCF95AA8F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "reefs@jfrog.com"
|
||||
"source": "reefs@jfrog.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42661",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2024-03-07T14:15:46.403",
|
||||
"lastModified": "2024-11-21T08:22:54.567",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:57:02.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionEndExcluding": "7.76.2",
|
||||
"matchCriteriaId": "78788BDF-0671-4B64-8CCE-0F50D2ABDDE4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "reefs@jfrog.com"
|
||||
"source": "reefs@jfrog.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-42662",
|
||||
"sourceIdentifier": "reefs@jfrog.com",
|
||||
"published": "2024-03-07T09:15:38.290",
|
||||
"lastModified": "2024-11-21T08:22:54.683",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:40:52.237",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,60 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionStartIncluding": "7.59.0",
|
||||
"versionEndExcluding": "7.59.18",
|
||||
"matchCriteriaId": "C24F3D9E-9364-4570-96ED-433AFFE5144C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionStartIncluding": "7.63.5",
|
||||
"versionEndExcluding": "7.63.18",
|
||||
"matchCriteriaId": "A8B53DA3-129E-4030-AAEA-13DE15E2D99C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionStartIncluding": "7.68.7",
|
||||
"versionEndExcluding": "7.68.19",
|
||||
"matchCriteriaId": "17B54888-01AA-45AC-BCA6-2AECBFE28CE2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jfrog:artifactory:*:*:*:*:*:-:*:*",
|
||||
"versionStartIncluding": "7.71.2",
|
||||
"versionEndExcluding": "7.71.8",
|
||||
"matchCriteriaId": "D8B7666E-8012-403A-8D42-75BD4D82F16E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "reefs@jfrog.com"
|
||||
"source": "reefs@jfrog.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jfrog.com/help/r/jfrog-release-information/jfrog-security-advisories",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-427xx/CVE-2023-42784.json
Normal file
56
CVE-2023/CVE-2023-427xx/CVE-2023-42784.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-42784",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:40.033",
|
||||
"lastModified": "2025-03-11T15:15:40.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper handling of syntactically invalid structure in Fortinet FortiWeb at least verions 7.4.0 through 7.4.6 and 7.2.0 through 7.2.10 and 7.0.0 through 7.0.10 allows attacker to execute unauthorized code or commands via HTTP/S crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-228"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-115",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46169",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-07T21:15:06.740",
|
||||
"lastModified": "2024-11-21T08:28:00.727",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:55:36.417",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,90 @@
|
||||
"value": "CWE-41"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:ds8900f:-*:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2F29B39F-F848-409A-B972-CBA36239B221"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269406",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269406",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46170",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-07T21:15:06.970",
|
||||
"lastModified": "2024-11-21T08:28:00.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:55:27.780",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,20 +49,83 @@
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269407",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46171",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-07T21:15:07.170",
|
||||
"lastModified": "2024-11-21T08:28:00.963",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:55:19.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,22 +71,78 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269408",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269408",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-46172",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-03-07T21:15:07.393",
|
||||
"lastModified": "2024-11-21T08:28:01.080",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:54:26.763",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,90 @@
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.22.19.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A267414E-0859-4553-AD48-D2A64BE3A46B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.30.68.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9BE006ED-0B99-4246-8F7A-F29766B2972E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.32.40.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "02F52CB5-DFE0-490B-801A-714B46D03CDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:ibm:ds8900f_firmware:89.33.48.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6E55E128-B1F1-4E1D-BA57-85DCA7AADEAB"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:ibm:ds8900f:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "42263F4C-C8BB-4A78-AB6A-1458546961B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269409",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/269409",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7130084",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48725",
|
||||
"sourceIdentifier": "talos-cna@cisco.com",
|
||||
"published": "2024-03-07T15:15:07.733",
|
||||
"lastModified": "2024-11-21T08:32:20.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:56:47.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,82 @@
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netgear:rax30_firmware:1.0.7.78:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "35241D58-4702-4740-A97B-DB45F6247D0E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:netgear:rax30_firmware:1.0.11.96:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5D6603C7-5166-4D62-AF8B-01FA9BE2730B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160",
|
||||
"source": "talos-cna@cisco.com"
|
||||
"source": "talos-cna@cisco.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
|
||||
"source": "talos-cna@cisco.com"
|
||||
"source": "talos-cna@cisco.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://kb.netgear.com/000066037/Security-Advisory-for-Post-Authentication-Stack-Overflow-on-the-RAX30-PSV-2023-0160",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1887",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2023/CVE-2023-487xx/CVE-2023-48790.json
Normal file
56
CVE-2023/CVE-2023-487xx/CVE-2023-48790.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2023-48790",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:40.227",
|
||||
"lastModified": "2025-03-11T15:15:40.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross site request forgery vulnerability [CWE-352] in Fortinet FortiNDR version 7.4.0, 7.2.0 through 7.2.1 and 7.1.0 through 7.1.1 and before 7.0.5 may allow a remote unauthenticated attacker to execute unauthorized actions via crafted HTTP GET requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-23-353",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0368",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T16:15:10.623",
|
||||
"lastModified": "2024-11-21T08:46:25.077",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:51:23.420",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,46 +39,106 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpmudev:hustle:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "7.8.4",
|
||||
"matchCriteriaId": "6DBE5624-1C28-43A2-AB06-3FA907954887"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://developers.hubspot.com/docs/api/webhooks#scopes",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://developers.hubspot.com/docs/api/webhooks#manage-settings-via-api",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://developers.hubspot.com/docs/api/webhooks#scopes",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php#L13",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3047775/wordpress-popup/trunk/inc/providers/hubspot/hustle-hubspot-api.php?old=3025070&old_path=wordpress-popup/tags/7.8.3/inc/providers/hubspot/hustle-hubspot-api.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e6d40b41-540d-476d-afde-970845543933?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0369",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T16:15:10.837",
|
||||
"lastModified": "2024-11-21T08:46:25.280",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:38:55.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pawaryogesh1989:bulk_edit_post_titles:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "5.0.0",
|
||||
"matchCriteriaId": "1A3A7527-3904-4D5D-A195-69AACCCA1540"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bulk-edit-post-titles/trunk/classes/class.bulk.titles.php#L130",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cad19306-6eef-4f80-9442-e7b314b3a873?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bulk-edit-post-titles/trunk/classes/class.bulk.titles.php#L130",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cad19306-6eef-4f80-9442-e7b314b3a873?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0447",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T16:15:11.483",
|
||||
"lastModified": "2024-11-21T08:46:36.667",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:38:17.530",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:artibot:artibot:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.7",
|
||||
"matchCriteriaId": "B11B1A00-E9F9-409C-B1C6-0D2FA22818B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L60",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/848f36de-c62a-45ee-b259-46dab73e4439?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L60",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/848f36de-c62a-45ee-b259-46dab73e4439?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0449",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T16:15:11.707",
|
||||
"lastModified": "2024-11-21T08:46:36.907",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:37:53.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:artibot:artibot:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.7",
|
||||
"matchCriteriaId": "B11B1A00-E9F9-409C-B1C6-0D2FA22818B7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L52",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/450d0748-93d6-448a-97a2-06fc2f8065b3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/artibot/trunk/artibot.php#L52",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/450d0748-93d6-448a-97a2-06fc2f8065b3?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0592",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-13T16:15:12.147",
|
||||
"lastModified": "2024-11-21T08:46:57.690",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:36:50.407",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:never5:related_posts:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.2.2",
|
||||
"matchCriteriaId": "CB18009F-1593-4219-8074-05BE7E889E26"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/related-posts-for-wp/trunk/classes/hooks/class-hook-link-related-screen.php#L70",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3049719/related-posts-for-wp/tags/2.2.2/classes/hooks/class-hook-link-related-screen.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d21aad7-dbee-4204-afbd-0a5fdeaca50e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/related-posts-for-wp/trunk/classes/hooks/class-hook-link-related-screen.php#L70",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3049719/related-posts-for-wp/tags/2.2.2/classes/hooks/class-hook-link-related-screen.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5d21aad7-dbee-4204-afbd-0a5fdeaca50e?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0825",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-05T02:15:25.653",
|
||||
"lastModified": "2024-11-21T08:47:27.350",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:45:26.630",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:davekiss:vimeography:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3.3",
|
||||
"matchCriteriaId": "C67FF114-4540-4D02-ADEB-B13725C32F56"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vimeography/trunk/lib/api/galleries.php#L816",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853516b2-ec50-4937-89d3-d16042a6f71c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/vimeography/trunk/lib/api/galleries.php#L816",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/853516b2-ec50-4937-89d3-d16042a6f71c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1088",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-05T02:15:25.813",
|
||||
"lastModified": "2024-11-21T08:49:46.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:45:03.303",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rajkakadiya:password_protected_store_for_woocommerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.3",
|
||||
"matchCriteriaId": "5030931C-A4FF-4651-A7B8-B3AA7055FDB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/password-protected-woo-store/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1e8fd-4d1b-4590-a141-f93d6347c0f2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/password-protected-woo-store/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae1e8fd-4d1b-4590-a141-f93d6347c0f2?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1120",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-01T10:15:07.173",
|
||||
"lastModified": "2024-11-21T08:49:50.663",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:46:21.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,84 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xlplugins:finale:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "2.18.0",
|
||||
"matchCriteriaId": "0DD93867-4B69-4D2F-825B-FEAC2DD4A29E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:xlplugins:nextmove:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "2.18.1",
|
||||
"matchCriteriaId": "C496ECE9-B570-4E79-A3F1-F79976B9040B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/finale-woocommerce-sales-countdown-timer-discount/trunk/includes/wcct-xl-support.php#L710",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042127%40finale-woocommerce-sales-countdown-timer-discount&new=3042127%40finale-woocommerce-sales-countdown-timer-discount&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/finale-woocommerce-sales-countdown-timer-discount/trunk/includes/wcct-xl-support.php#L710",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042127%40finale-woocommerce-sales-countdown-timer-discount&new=3042127%40finale-woocommerce-sales-countdown-timer-discount&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3d9332be-2cf0-46cd-81e4-6436aeec0f83?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1288",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-29T01:43:46.980",
|
||||
"lastModified": "2024-11-21T08:50:14.440",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:49:51.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,77 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:magazine3:schema_\\&_structured_data_for_wp_\\&_amp:*:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "1235FBF0-3C01-42A2-9FEF-E6496CAE1E42"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/schema-and-structured-data-for-wp/trunk/modules/reviews/reviews_form.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac13f402-8a36-448f-87d4-48179a9699c6?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.svn.wordpress.org/schema-and-structured-data-for-wp/trunk/modules/reviews/reviews_form.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?old_path=/schema-and-structured-data-for-wp/tags/1.26&old=3038020&new_path=/schema-and-structured-data-for-wp/tags/1.27&new=3038020&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac13f402-8a36-448f-87d4-48179a9699c6?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13574",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-11T06:15:25.680",
|
||||
"lastModified": "2025-03-11T06:15:25.680",
|
||||
"lastModified": "2025-03-11T15:15:40.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The XV Random Quotes WordPress plugin through 1.40 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento XV Random Quotes WordPress hasta la versi\u00f3n 1.40 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con altos privilegios, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7eb9ef20-5d34-425e-b7fc-38a769d0a822/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7eb9ef20-5d34-425e-b7fc-38a769d0a822/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13580",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-11T06:15:25.813",
|
||||
"lastModified": "2025-03-11T06:15:25.813",
|
||||
"lastModified": "2025-03-11T15:15:40.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The XV Random Quotes WordPress plugin through 1.40 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin reset them via a CSRF attack"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento XV Random Quotes WordPress hasta la versi\u00f3n 1.40 no tiene la verificaci\u00f3n CSRF activada al actualizar su configuraci\u00f3n, lo que podr\u00eda permitir a los atacantes hacer que un administrador que haya iniciado sesi\u00f3n los restablezca a trav\u00e9s de un ataque CSRF."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/48cffe03-adcf-4da2-a331-464ae511a805/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/48cffe03-adcf-4da2-a331-464ae511a805/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13615",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-11T06:15:25.920",
|
||||
"lastModified": "2025-03-11T06:15:25.920",
|
||||
"lastModified": "2025-03-11T15:15:40.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Social Share Buttons, Social Sharing Icons, Click to Tweet \u2014 Social Media Plugin by Social Snap WordPress plugin through 1.3.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Social Share Buttons, Social Sharing Icons, Click to Tweet \u2014 Social Media por Social Snap WordPress en su versi\u00f3n 1.3.6 no depuran ni escapan a algunas de sus configuraciones, lo que podr\u00eda permitir que usuarios con privilegios elevados, como el administrador, realicen ataques de cross-site scripting almacenado incluso cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo, en una configuraci\u00f3n de varios sitios)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e8401973-f4c2-4ccf-a6ad-507dde8d2259/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e8401973-f4c2-4ccf-a6ad-507dde8d2259/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13734",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T10:15:09.980",
|
||||
"lastModified": "2025-02-27T10:15:09.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T15:55:48.603",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,64 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:techeshta:card_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.7",
|
||||
"matchCriteriaId": "C8A25827-5E64-4843-92A8-2160F62C53A6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3244795/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/card-elements-for-elementor/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.techeshta.com/docs/card-elements-for-elementor/element-settings/profile-card/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7134bb24-11a1-41f9-ad34-b4527c22463c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13836",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-11T06:15:26.070",
|
||||
"lastModified": "2025-03-11T06:15:26.070",
|
||||
"lastModified": "2025-03-11T15:15:41.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Login Control WordPress plugin through 2.0.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP Login Control de WordPress hasta la versi\u00f3n 2.0.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un error de Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios altos, como el administrador."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/26c2026a-1490-4a0f-9d1d-54ee43c69f22/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/26c2026a-1490-4a0f-9d1d-54ee43c69f22/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,51 @@
|
||||
"id": "CVE-2024-13862",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-03-11T06:15:26.303",
|
||||
"lastModified": "2025-03-11T06:15:26.303",
|
||||
"lastModified": "2025-03-11T15:15:41.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The S3Bubble Media Streaming (AWS|Elementor|YouTube|Vimeo Functionality) WordPress plugin through 8.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento S3Bubble Media Streaming (AWS|Elementor|YouTube|Vimeo Functionality) de WordPress hasta la versi\u00f3n 8.0 no depura ni escapa un par\u00e1metro antes de mostrarlo nuevamente en la p\u00e1gina, lo que genera un Cross-Site Scripting reflejado que podr\u00eda usarse contra usuarios con privilegios elevados, como administradores."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7692b768-a33f-45a2-90f1-1f4258493979/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7692b768-a33f-45a2-90f1-1f4258493979/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-13907",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T07:15:33.543",
|
||||
"lastModified": "2025-02-27T07:15:33.543",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:26:05.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,18 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:boldgrid:total_upkeep:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.16.9",
|
||||
"matchCriteriaId": "59088A9C-DC21-4E96-9C89-7B3C647CE39C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/boldgrid-backup/trunk/includes/class-boldgrid-backup-archive-fetcher.php#L141",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3246655/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/21da92d2-c38d-4a12-b850-bd0b580aaa54?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1351",
|
||||
"sourceIdentifier": "cna@mongodb.com",
|
||||
"published": "2024-03-07T17:15:12.740",
|
||||
"lastModified": "2025-02-13T18:16:24.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:56:35.430",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,56 +69,166 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "4.4.0",
|
||||
"versionEndExcluding": "4.4.29",
|
||||
"matchCriteriaId": "6BEEC634-F69A-404A-A867-F38A31137F31"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "5.0.0",
|
||||
"versionEndExcluding": "5.0.25",
|
||||
"matchCriteriaId": "C4D47D83-31AE-459D-B0EC-3F5184EF1912"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.14",
|
||||
"matchCriteriaId": "AB3D23E4-41F4-4AAF-8B09-401BF735740E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:mongodb:mongodb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.6",
|
||||
"matchCriteriaId": "3D7A1437-1CC0-4ECC-AE42-9F32E84282A5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:astra_control_center:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EC5EBD2A-32A3-46D5-B155-B44DCB7F6902"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*",
|
||||
"matchCriteriaId": "5333B745-F7A3-46CB-8437-8668DB08CD6F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-72839",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240524-0010/",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
|
||||
"source": "cna@mongodb.com"
|
||||
"source": "cna@mongodb.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://jira.mongodb.org/browse/SERVER-72839",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch",
|
||||
"Vendor Advisory",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20240524-0010/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/4.4/#4.4.29---february-28--2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/manual/release-notes/7.0/#7.0.6---feb-28--2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v5.0/release-notes/5.0/#5.0.25---february-28--2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.mongodb.com/docs/v6.0/release-notes/6.0/#6.0.14---feb-28--2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1442",
|
||||
"sourceIdentifier": "security@grafana.com",
|
||||
"published": "2024-03-07T18:15:46.590",
|
||||
"lastModified": "2024-11-22T12:15:18.137",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:56:13.943",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,86 @@
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.5.0",
|
||||
"versionEndExcluding": "9.5.7",
|
||||
"matchCriteriaId": "256F06F9-C861-48F9-8317-A0F0133C0FBE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.0.0",
|
||||
"versionEndExcluding": "10.0.12",
|
||||
"matchCriteriaId": "768ED1D5-DD09-4D2B-AD74-F5D1A03DF8D7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.1.0",
|
||||
"versionEndExcluding": "10.1.8",
|
||||
"matchCriteriaId": "642B089C-E5B7-4AD4-B477-2579A8A1AB23"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.2.0",
|
||||
"versionEndExcluding": "10.2.5",
|
||||
"matchCriteriaId": "FF474EF5-B4C2-4CEF-86AD-55A116C9E15F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.3.0",
|
||||
"versionEndExcluding": "10.3.4",
|
||||
"matchCriteriaId": "E4854C70-56B3-49ED-BF70-28673BD4E2D7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
|
||||
"source": "security@grafana.com"
|
||||
"source": "security@grafana.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2024-1442/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://security.netapp.com/advisory/ntap-20241122-0007/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1725",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-03-07T20:15:50.690",
|
||||
"lastModified": "2024-11-21T08:51:10.290",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:55:54.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,48 +69,175 @@
|
||||
"value": "CWE-501"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1FFF1D51-ABA8-4E54-B81C-A88C8A5E4842"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "486B3F69-1551-4F8B-B25B-A5864248811B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4716808D-67EB-4E14-9910-B248A500FAFA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "226AD7DB-D8CB-45A3-97AE-3FE79774133E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1B361729-2847-4FE1-9503-BF9FA81307C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA5959A2-F48B-449B-89AD-ECDE9E5418E6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08B9C7A4-4D65-4771-B92D-914C9C9A6C4A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99ADC66F-3B19-4767-B876-67BA1C8D195B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E4F24706-3DF4-49D0-870D-39D4FC02CF4A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BDD2E6ED-9BDE-404B-AD0D-F78D69B13B34"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "065C13FF-588E-42F5-B3C9-3302082E6524"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C1E0DF9A-C358-48A0-911F-0A17E1982E4B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.13:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8FF27781-22D9-4283-959D-951C76429EF5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.14:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F68F84F5-7671-4778-AE48-5CF243B62D88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.15:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "33D2A2D4-A006-422D-AA0C-8E764FB104C5"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1559",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1891",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1725",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265398",
|
||||
"source": "secalert@redhat.com"
|
||||
"source": "secalert@redhat.com",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1559",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:1891",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2024:2047",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-1725",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2265398",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1771",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-06T06:15:50.293",
|
||||
"lastModified": "2024-11-21T08:51:16.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:42:28.580",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:hashthemes:total:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.1.60",
|
||||
"matchCriteriaId": "7AA0BA4F-6566-4ACC-A249-8A78364F82EE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/total/2.1.59/inc/customizer/customizer-functions.php#L112",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=219020%40total%2F2.1.60&old=216973%40total%2F2.1.59",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26b64ae3-5839-47d5-9c65-7c595bb18e6c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/browser/total/2.1.59/inc/customizer/customizer-functions.php#L112",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=219020%40total%2F2.1.60&old=216973%40total%2F2.1.59",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/26b64ae3-5839-47d5-9c65-7c595bb18e6c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1976",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-02-29T06:15:46.767",
|
||||
"lastModified": "2024-11-21T08:51:43.140",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:47:09.213",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:marketingoptimizer:marketing_optimizer:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "20200925",
|
||||
"matchCriteriaId": "F36E320F-6064-420B-9E61-6EAAA6856085"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/marketing-optimizer/trunk/admin/main-settings-page.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b537637b-32c0-405e-94fa-c7c2d0c80658?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/marketing-optimizer/trunk/admin/main-settings-page.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b537637b-32c0-405e-94fa-c7c2d0c80658?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1986",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-07T21:15:08.013",
|
||||
"lastModified": "2024-11-21T08:51:44.357",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:40:10.820",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,62 +39,134 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:booster:booster_for_woocommerce:*:*:*:*:elite:wordpress:*:*",
|
||||
"versionEndExcluding": "7.1.8",
|
||||
"matchCriteriaId": "CD5BE9FC-7F83-40B9-8893-7AC08BDE8995"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://booster.io/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L132",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L138",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L322",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L333",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/woocommerce-jetpack/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c2fb7f-a05b-4852-97eb-7befe880d703?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://booster.io/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L132",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L138",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L322",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woocommerce-jetpack/trunk/includes/shortcodes/class-wcj-products-add-form-shortcodes.php#L333",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/woocommerce-jetpack/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9c2fb7f-a05b-4852-97eb-7befe880d703?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1989",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-06T06:15:50.467",
|
||||
"lastModified": "2024-11-21T08:51:44.773",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:41:12.650",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,57 +36,143 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:heateor:sassy_social_share:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.59",
|
||||
"matchCriteriaId": "B4A62408-E103-455E-AA1D-C5E33BEC8CD6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-sharing-networks.php#L65",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L228",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L308",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/public/class-sassy-social-share-public.php#L513",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044857%40sassy-social-share%2Ftrunk&old=3038976%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file6",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdceb07a-87d2-4708-b76b-5a8fcfff0818?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-sharing-networks.php#L65",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L228",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/includes/class-sassy-social-share-shortcodes.php#L308",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/sassy-social-share/trunk/public/class-sassy-social-share-public.php#L513",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3044857%40sassy-social-share%2Ftrunk&old=3038976%40sassy-social-share%2Ftrunk&sfp_email=&sfph_mail=#file6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bdceb07a-87d2-4708-b76b-5a8fcfff0818?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2264",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-07T21:15:08.950",
|
||||
"lastModified": "2024-11-21T09:09:22.863",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:54:11.227",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256034",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256034",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20PHP-MYSQL-User-Login-System/SQLI%20Auth.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256034",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256034",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2265",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-07T22:15:58.220",
|
||||
"lastModified": "2024-11-21T09:09:23.013",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:53:59.010",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,32 +94,79 @@
|
||||
"value": "CWE-540"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keerti1924:php_mysql_user_signup_login_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C400362C-F44F-4C21-ADA4-E1547FFAF327"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256035",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256035",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20publicly%20exposed%20password%20hashes.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256035",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256035",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2266",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-07T22:15:58.473",
|
||||
"lastModified": "2024-11-21T09:09:23.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:53:46.840",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keerti1924:secret-coder-php-project:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "62FF8FEA-455E-4A4B-96A4-184B4BCC19A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20%5BSecret-Coder-PHP-Project%20XSS%5D%20on%20login.php%20via%20arbitrary%20cookies.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256036",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256036",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/smurf-reigz/security/blob/main/proof-of-concepts/keerti1924%20%5BSecret-Coder-PHP-Project%20XSS%5D%20on%20login.php%20via%20arbitrary%20cookies.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256036",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256036",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2267",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-07T22:15:58.720",
|
||||
"lastModified": "2024-11-21T09:09:23.303",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:53:27.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,32 +94,77 @@
|
||||
"value": "CWE-840"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:keerti1924:online_bookstore_website:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "99075D71-3DA6-4FBC-A56B-CDC931BF5FA6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256037",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256037",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/keerti1924%20Online-Book-Store-Website/Business%20Logic/Business%20Logic%20shop.php%20.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.256037",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.256037",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-321xx/CVE-2024-32123.json
Normal file
56
CVE-2024/CVE-2024-321xx/CVE-2024-32123.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-32123",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:41.353",
|
||||
"lastModified": "2025-03-11T15:15:41.353",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple improper neutralization of special elements used in an os command ('os command injection') in Fortinet FortiManager, FortiAnalyzer versions 7.4.0 through 7.4.2\r\n7.2.0 through 7.2.5 and 7.0.0 through 7.0.12 and 6.4.0 through 6.4.14 and 6.2.0 through 6.2.12 and 6.0.0 through 6.0.12 and 5.6.0 through 5.6.11 and 5.4.0 through 5.4.7 and 5.2.0 through 5.2.10 and 5.0.0 through 5.0.12 and 4.3.4 through 4.3.8 allows attacker to execute unauthorized code or commands via crafted CLI requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-24-124",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-335xx/CVE-2024-33501.json
Normal file
56
CVE-2024/CVE-2024-335xx/CVE-2024-33501.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-33501",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:41.550",
|
||||
"lastModified": "2025-03-11T15:15:41.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Two improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability [CWE-89] in Fortinet FortiAnalyzer version 7.4.0 through 7.4.2 and before 7.2.5, FortiManager version 7.4.0 through 7.4.2 and before 7.2.5 and FortiAnalyzer-BigData version 7.4.0 and before 7.2.7 allows a privileged attacker\u00a0to execute unauthorized code or commands via specifically crafted CLI requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-130",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-453xx/CVE-2024-45324.json
Normal file
56
CVE-2024/CVE-2024-453xx/CVE-2024-45324.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45324",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:41.743",
|
||||
"lastModified": "2025-03-11T15:15:41.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A use of externally-controlled format string vulnerability [CWE-134] in FortiOS version 7.4.0 through 7.4.4, version 7.2.0 through 7.2.9, version 7.0.0 through 7.0.15 and before 6.4.15, FortiProxy version 7.4.0 through 7.4.6, version 7.2.0 through 7.2.12 and before 7.0.19, FortiPAM version 1.4.0 through 1.4.2 and before 1.3.1, FortiSRA version 1.4.0 through 1.4.2 and before 1.3.1 and FortiWeb version 7.4.0 through 7.4.5, version 7.2.0 through 7.2.10 and before 7.0.10 allows a privileged attacker to execute unauthorized code or commands via specially crafted HTTP or HTTPS commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-134"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-325",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-453xx/CVE-2024-45328.json
Normal file
56
CVE-2024/CVE-2024-453xx/CVE-2024-45328.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-45328",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:41.963",
|
||||
"lastModified": "2025-03-11T15:15:41.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect authorization vulnerability [CWE-863] in FortiSandbox 4.4.0 through 4.4.6 may allow a low priviledged administrator to execute elevated CLI commands via the GUI console menu."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-261",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-466xx/CVE-2024-46663.json
Normal file
56
CVE-2024/CVE-2024-466xx/CVE-2024-46663.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-46663",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:42.130",
|
||||
"lastModified": "2025-03-11T15:15:42.130",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stack-buffer overflow vulnerability [CWE-121] in Fortinet FortiMail CLI version 7.6.0 through 7.6.1 and before 7.4.3 allows a privileged attacker to execute arbitrary code or commands via specifically crafted CLI commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-331",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-513xx/CVE-2024-51319.json
Normal file
21
CVE-2024/CVE-2024-513xx/CVE-2024-51319.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51319",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T15:15:42.313",
|
||||
"lastModified": "2025-03-11T15:15:42.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A local file include vulnerability in the /servlet/Report of Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution by uploading a jsp web/reverse shell through /jsp/zimg_upload.jsp."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-513xx/CVE-2024-51320.json
Normal file
21
CVE-2024/CVE-2024-513xx/CVE-2024-51320.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T15:15:42.447",
|
||||
"lastModified": "2025-03-11T15:15:42.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /servlet/gsdm_fsave_htmltmp, /servlet/gsdm_btlk_openfile components"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-513xx/CVE-2024-51321.json
Normal file
21
CVE-2024/CVE-2024-513xx/CVE-2024-51321.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51321",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T15:15:42.570",
|
||||
"lastModified": "2025-03-11T15:15:42.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Zucchetti Ad Hoc Infinity 2.4, an improper check on the m_cURL parameter allows an attacker to redirect the victim to an attacker-controlled website after the authentication."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-513xx/CVE-2024-51322.json
Normal file
21
CVE-2024/CVE-2024-513xx/CVE-2024-51322.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-51322",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T15:15:42.700",
|
||||
"lastModified": "2025-03-11T15:15:42.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Zucchetti Ad Hoc Infinity 2.4 allows an authenticated attacker to achieve Remote Code Execution via the /jsp/home.jsp, /jsp/gsfr_feditorHTML.jsp, /servlet/SPVisualZoom, /jsp/gsmd_container.jsp components"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://members.backbox.org/zucchetti-ad-hoc-infinity-multiple-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-529xx/CVE-2024-52960.json
Normal file
56
CVE-2024/CVE-2024-529xx/CVE-2024-52960.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52960",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:42.813",
|
||||
"lastModified": "2025-03-11T15:15:42.813",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A client-side enforcement of server-side security vulnerability [CWE-602]\u00a0in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.6 and before 4.2.7 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-602"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-305",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-529xx/CVE-2024-52961.json
Normal file
56
CVE-2024/CVE-2024-529xx/CVE-2024-52961.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-52961",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:42.960",
|
||||
"lastModified": "2025-03-11T15:15:42.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of special elements used in an OS Command vulnerability [CWE-78] in Fortinet FortiSandbox version 5.0.0, 4.4.0 through 4.4.7, 4.2.0 through 4.2.7 and before 4.0.5 allows an authenticated attacker with at least read-only permission to execute unauthorized commands via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-306",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-540xx/CVE-2024-54018.json
Normal file
56
CVE-2024/CVE-2024-540xx/CVE-2024-54018.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-54018",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:43.113",
|
||||
"lastModified": "2025-03-11T15:15:43.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple\u00a0improper neutralization of special elements used in an OS Command vulnerabilities [CWE-78] in FortiSandbox before 4.4.5 allows a privileged attacker to execute unauthorized commands via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-110",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-540xx/CVE-2024-54026.json
Normal file
56
CVE-2024/CVE-2024-540xx/CVE-2024-54026.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-54026",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:43.307",
|
||||
"lastModified": "2025-03-11T15:15:43.307",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiSandbox Cloud version 23.4, FortiSandbox at least 4.4.0 through 4.4.6 and 4.2.0 through 4.2.7 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 allows attacker to execute unauthorized code or commands via specifically crafted HTTP requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-353",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54139",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-12-13T16:15:26.210",
|
||||
"lastModified": "2024-12-13T16:15:26.210",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T16:44:20.720",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -53,12 +73,75 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.7.11",
|
||||
"matchCriteriaId": "1BF82095-AA7D-454F-9228-78EC4D8CD5CE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "3.0.0",
|
||||
"versionEndExcluding": "3.1.2",
|
||||
"matchCriteriaId": "91456038-80B6-479B-BBDF-9376B9D2F100"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:alpha1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C62AC350-F938-43A2-B066-3CEF23B03C0C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:beta1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B2E2A04B-A0E6-4906-BD91-91DAC92CC067"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc1:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "24D309D2-E86C-4222-B258-C09BEEF42CD2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc2:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6613DB9B-E3F9-44CC-B46A-77739060B641"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:combodo:itop:3.2.0:rc3:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5C86A4B5-375A-4761-A853-AB0EED54A540"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Combodo/iTop/security/advisories/GHSA-jmv2-wfh5-h5wg",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-555xx/CVE-2024-55590.json
Normal file
56
CVE-2024/CVE-2024-555xx/CVE-2024-55590.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-55590",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:43.650",
|
||||
"lastModified": "2025-03-11T15:15:43.650",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerabilities [CWE-78] in Fortinet FortiIsolator version 2.4.0 through 2.4.5 allows an authenticated attacker with at least read-only admin permission and CLI access to execute unauthorized code via specifically crafted CLI commands."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-178",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-555xx/CVE-2024-55592.json
Normal file
56
CVE-2024/CVE-2024-555xx/CVE-2024-55592.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-55592",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:43.823",
|
||||
"lastModified": "2025-03-11T15:15:43.823",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An incorrect authorization vulnerability [CWE-863] in FortiSIEM 7.2 all versions, 7.1 all versions, 7.0 all versions, 6.7 all versions, 6.6 all versions, 6.5 all versions, 6.4 all versions, 6.3 all versions, 6.2 all versions, 6.1 all versions, 5.4 all versions, 5.3 all versions, may allow an authenticated attacker to perform unauthorized operations on incidents via crafted HTTP requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 3.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-377",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-555xx/CVE-2024-55597.json
Normal file
56
CVE-2024/CVE-2024-555xx/CVE-2024-55597.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-55597",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-03-11T15:15:44.010",
|
||||
"lastModified": "2025-03-11T15:15:44.010",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiWeb versions 7.0.0 through 7.6.0 allows attacker to execute unauthorized code or commands via crafted requests."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-439",
|
||||
"source": "psirt@fortinet.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-56191",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2025-03-10T21:15:39.880",
|
||||
"lastModified": "2025-03-10T21:15:39.880",
|
||||
"lastModified": "2025-03-11T16:15:16.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In dhd_process_full_gscan_result of dhd_pno.c, there is a possible EoP due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En dhd_process_full_gscan_result de dhd_pno.c, existe un posible fin de ejecuci\u00f3n debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-56192",
|
||||
"sourceIdentifier": "dsap-vuln-management@google.com",
|
||||
"published": "2025-03-10T21:15:40.007",
|
||||
"lastModified": "2025-03-10T21:15:40.007",
|
||||
"lastModified": "2025-03-11T16:15:16.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In wl_notify_gscan_event of wl_cfgscan.c, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En wl_notify_gscan_event de wl_cfgscan.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de permisos de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-281"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://source.android.com/docs/security/bulletin/pixel-watch/2025/2025-03-01",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6261",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T06:15:21.790",
|
||||
"lastModified": "2025-02-27T06:15:21.790",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:32:04.440",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,57 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:machothemes:image_photo_gallery_final_tiles_grid:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.6.1",
|
||||
"matchCriteriaId": "432F6A08-5410-481C-9FB1-EE0F100D2703"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/final-tiles-grid-gallery-lite/trunk/lightbox/lightbox2/js/script.js",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3123808/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8d945c4b-3eb1-4bab-b355-117b7fd06553?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-9195",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-28T09:15:11.633",
|
||||
"lastModified": "2025-02-28T09:15:11.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-03-11T15:49:13.197",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,65 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.3",
|
||||
"matchCriteriaId": "720FE2DF-B865-4A01-AA36-5D9B07EE271E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev1:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "36877172-A164-4EBF-A7F4-ADBFCBE1D67F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev2:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "47A156C8-5FA2-4901-B8FE-FEA21F9C58CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:whmpress:whmcs_client_area:4.3:rev3:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "9555E050-59B7-4AD6-AFD9-489246949BC2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codecanyon.net/item/whmcs-client-area-whmpress-addon/11218646",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8af0c5c-3d7b-416d-9d10-6867fcf909a5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1282",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T09:15:10.160",
|
||||
"lastModified": "2025-02-27T09:15:10.160",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:08:00.790",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -49,16 +49,50 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thememakers:car_dealer_automotive:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.4",
|
||||
"matchCriteriaId": "F90D141E-7327-438B-B191-463209F2DA30"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708?s_rank=7",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf4b588-8b67-425a-b0e1-d4382cb88dd1?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1450",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T10:15:10.677",
|
||||
"lastModified": "2025-02-27T10:15:10.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T15:46:05.180",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,64 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:premio:floating_chat_widget:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.3.6",
|
||||
"matchCriteriaId": "6A0EEEF6-6533-4E3C-B7E1-6200F4554AF2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.4/js/cht-front-script.js#L389",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.5/js/cht-front-script.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3246336/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a87d0966-3fd4-46f8-acd5-1cf0cb18af42?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1689",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T07:15:35.400",
|
||||
"lastModified": "2025-02-27T07:15:35.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:19:41.870",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,57 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thememakers:paypal_checkout:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.2.0",
|
||||
"matchCriteriaId": "659C896B-FB55-4D17-9A0C-FB1E96F71BFF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ThemeMakers/tmm_paypal_checkout/commit/d6d3b1877ed705ac171cf7e74a6e866fc135ba22",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6390dba6-423b-48be-b5f0-1018d94f4a32?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1690",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T09:15:10.697",
|
||||
"lastModified": "2025-02-27T09:15:10.697",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T15:59:35.800",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,20 +69,57 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:thememakers:stripe_checkout:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.0.2",
|
||||
"matchCriteriaId": "AD3C87FA-58C4-40BC-B8F6-273464CC2F92"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ThemeMakers/tmm_stripe_checkout/compare/v1.0.1...v1.0.2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd040ff7-7f30-4097-9492-743a9821589e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1717",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-02-27T08:15:31.130",
|
||||
"lastModified": "2025-02-27T08:15:31.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-03-11T16:12:42.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,6 +19,26 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -49,16 +69,50 @@
|
||||
"value": "CWE-288"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:pluginly:login_me_now:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.7.2",
|
||||
"matchCriteriaId": "B33D8036-17F4-4D22-AF3A-C0FD0C95A9C4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-2196",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-03-11T14:15:28.123",
|
||||
"lastModified": "2025-03-11T14:15:28.123",
|
||||
"lastModified": "2025-03-11T15:15:45.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -59,7 +59,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +107,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +136,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.511735",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/IceFoxH/VULN/issues/5",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-224xx/CVE-2025-22454.json
Normal file
56
CVE-2025/CVE-2025-224xx/CVE-2025-22454.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-22454",
|
||||
"sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"published": "2025-03-11T15:15:44.737",
|
||||
"lastModified": "2025-03-11T15:15:44.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Insufficiently restrictive permissions in Ivanti Secure Access Client before 22.7R4 allows a local authenticated attacker to escalate their privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-732"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://forums.ivanti.com/s/article/March-Security-Advisory-Ivanti-Secure-Access-Client-ISAC-CVE-2025-22454",
|
||||
"source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-256xx/CVE-2025-25680.json
Normal file
25
CVE-2025/CVE-2025-256xx/CVE-2025-25680.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25680",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T16:15:17.413",
|
||||
"lastModified": "2025-03-11T16:15:17.413",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "LSC Smart Connect LSC Indoor PTZ Camera 7.6.32 is contains a RCE vulnerability in the tuya_ipc_direct_connect function of the anyka_ipc process. The vulnerability allows arbitrary code execution through the Wi-Fi configuration process when a specially crafted QR code is presented to the camera."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Yasha-ops/LSC_Indoor_PTZ_Camera-RCE",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Yasha-ops/vulnerability-research/tree/master/CVE-2025-25680",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-257xx/CVE-2025-25747.json
Normal file
25
CVE-2025/CVE-2025-257xx/CVE-2025-25747.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25747",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-03-11T16:15:17.547",
|
||||
"lastModified": "2025-03-11T16:15:17.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in DigitalDruid HotelDruid v.3.0.7 allows an attacker to execute arbitrary code and obtain sensitive information via the ripristina_backup parameter in the crea_backup.php endpoint"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/79.html",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.huyvo.net/post/cve-2025-25747-reflected-xss-vulnerability-in-hoteldruid-3-0-7",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-274xx/CVE-2025-27403.json
Normal file
86
CVE-2025/CVE-2025-274xx/CVE-2025-27403.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-27403",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-11T15:15:45.570",
|
||||
"lastModified": "2025-03-11T15:15:45.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Ratify is a verification engine as a binary executable and on Kubernetes which enables verification of artifact security metadata and admits for deployment only those that comply with policies the user creates. In a Kubernetes environment, Ratify can be configured to authenticate to a private Azure Container Registry (ACR). The Azure workload identity and Azure managed identity authentication providers are configured in this setup. Users that configure a private ACR to be used with the Azure authentication providers may be impacted by a vulnerability that exists in versions prior to 1.2.3 and 1.3.2. Both Azure authentication providers attempt to exchange an Entra ID (EID) token for an ACR refresh token. However, Ratify\u2019s Azure authentication providers did not verify that the target registry is an ACR. This could have led to the EID token being presented to a non-ACR registry during token exchange. EID tokens with ACR access can potentially be extracted and abused if a user workload contains an image reference to a malicious registry. As of versions 1.2.3 and 1.3.2, the Azure workload identity and Azure managed identity authentication providers are updated to add new validation prior to EID token exchange. Validation relies upon registry domain validation against a pre-configured list of well-known ACR endpoints. EID token exchange will be executed only if at least one of the configured well-known domain suffixes (wildcard support included) matches the registry domain of the image reference."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:H/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "LOW",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ratify-project/ratify/commit/0ec0c08490e3d672ae64b1a220c90d5484f1c93f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ratify-project/ratify/commit/84c7c48fa76bb9a1c9583635d1e90bc25b1a546c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ratify-project/ratify/security/advisories/GHSA-44f7-5fj5-h4px",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-276xx/CVE-2025-27601.json
Normal file
68
CVE-2025/CVE-2025-276xx/CVE-2025-27601.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-27601",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-11T16:15:17.943",
|
||||
"lastModified": "2025-03-11T16:15:17.943",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco is a free and open source .NET content management system. An improper API access control issue has been identified Umbraco's API management package prior to versions 15.2.3 and 14.3.3, allowing low-privilege, authenticated users to create and update data type information that should be restricted to users with access to the settings section. The issue is patched in versions 15.2.3 and 14.3.3. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/commit/d9fb6df16e9adf8656181cac8497fc5ba23321cd",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/commit/ebb6a580dc1da2c772a99838dc7b4660bf77eb9c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-6ffg-mjg7-585x",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-276xx/CVE-2025-27602.json
Normal file
68
CVE-2025/CVE-2025-276xx/CVE-2025-27602.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-27602",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-11T16:15:18.100",
|
||||
"lastModified": "2025-03-11T16:15:18.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Umbraco is a free and open source .NET content management system. In versions of Umbraco's web backoffice program prior to versions 10.8.9 and 13.7.1, via manipulation of backoffice API URLs, it's possible for authenticated backoffice users to retrieve or delete content or media held within folders the editor does not have access to. The issue is patched in versions 10.8.9 and 13.7.1. No known workarounds are available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/commit/5b54bed406682ceff57903bf7d3c57814eef31a7",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/commit/7888b9a4ce5ae7f9bda7ff3bb705b8fcd2f1675d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wx5h-wqfq-v698",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-276xx/CVE-2025-27617.json
Normal file
90
CVE-2025/CVE-2025-276xx/CVE-2025-27617.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-27617",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-03-11T16:15:18.310",
|
||||
"lastModified": "2025-03-11T16:15:18.310",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Pimcore is an open source data and experience management platform. Prior to version 11.5.4, authenticated users can craft a filter string used to cause a SQL injection. Version 11.5.4 fixes the issue."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "UNREPORTED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Extension/RelationFilterConditionParser.php#L29-L47",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/blob/c721a42c23efffd4ca916511ddb969598d302396/models/DataObject/ClassDefinition/Data/Multiselect.php#L332-L347",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/commit/19a8520895484e68fd254773e32476565d91deea",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pimcore/pimcore/security/advisories/GHSA-qjpx-5m2p-5pgh",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
99
README.md
99
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-03-11T15:00:20.452422+00:00
|
||||
2025-03-11T17:00:19.839888+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-03-11T14:57:13.920000+00:00
|
||||
2025-03-11T16:57:11.073000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,58 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
284765
|
||||
284792
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `14`
|
||||
Recently added CVEs: `27`
|
||||
|
||||
- [CVE-2024-12546](CVE-2024/CVE-2024-125xx/CVE-2024-12546.json) (`2025-03-11T14:15:20.210`)
|
||||
- [CVE-2024-54084](CVE-2024/CVE-2024-540xx/CVE-2024-54084.json) (`2025-03-11T14:15:22.730`)
|
||||
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-03-11T14:15:22.893`)
|
||||
- [CVE-2025-2192](CVE-2025/CVE-2025-21xx/CVE-2025-2192.json) (`2025-03-11T13:15:43.780`)
|
||||
- [CVE-2025-2193](CVE-2025/CVE-2025-21xx/CVE-2025-2193.json) (`2025-03-11T13:15:43.997`)
|
||||
- [CVE-2025-2194](CVE-2025/CVE-2025-21xx/CVE-2025-2194.json) (`2025-03-11T14:15:27.753`)
|
||||
- [CVE-2025-2195](CVE-2025/CVE-2025-21xx/CVE-2025-2195.json) (`2025-03-11T14:15:27.937`)
|
||||
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T14:15:28.123`)
|
||||
- [CVE-2025-22366](CVE-2025/CVE-2025-223xx/CVE-2025-22366.json) (`2025-03-11T14:15:24.313`)
|
||||
- [CVE-2025-22367](CVE-2025/CVE-2025-223xx/CVE-2025-22367.json) (`2025-03-11T14:15:24.480`)
|
||||
- [CVE-2025-22368](CVE-2025/CVE-2025-223xx/CVE-2025-22368.json) (`2025-03-11T14:15:24.627`)
|
||||
- [CVE-2025-22369](CVE-2025/CVE-2025-223xx/CVE-2025-22369.json) (`2025-03-11T14:15:24.767`)
|
||||
- [CVE-2025-22370](CVE-2025/CVE-2025-223xx/CVE-2025-22370.json) (`2025-03-11T14:15:24.917`)
|
||||
- [CVE-2025-27363](CVE-2025/CVE-2025-273xx/CVE-2025-27363.json) (`2025-03-11T14:15:25.427`)
|
||||
- [CVE-2023-42784](CVE-2023/CVE-2023-427xx/CVE-2023-42784.json) (`2025-03-11T15:15:40.033`)
|
||||
- [CVE-2023-48790](CVE-2023/CVE-2023-487xx/CVE-2023-48790.json) (`2025-03-11T15:15:40.227`)
|
||||
- [CVE-2024-32123](CVE-2024/CVE-2024-321xx/CVE-2024-32123.json) (`2025-03-11T15:15:41.353`)
|
||||
- [CVE-2024-33501](CVE-2024/CVE-2024-335xx/CVE-2024-33501.json) (`2025-03-11T15:15:41.550`)
|
||||
- [CVE-2024-45324](CVE-2024/CVE-2024-453xx/CVE-2024-45324.json) (`2025-03-11T15:15:41.743`)
|
||||
- [CVE-2024-45328](CVE-2024/CVE-2024-453xx/CVE-2024-45328.json) (`2025-03-11T15:15:41.963`)
|
||||
- [CVE-2024-46663](CVE-2024/CVE-2024-466xx/CVE-2024-46663.json) (`2025-03-11T15:15:42.130`)
|
||||
- [CVE-2024-51319](CVE-2024/CVE-2024-513xx/CVE-2024-51319.json) (`2025-03-11T15:15:42.313`)
|
||||
- [CVE-2024-51320](CVE-2024/CVE-2024-513xx/CVE-2024-51320.json) (`2025-03-11T15:15:42.447`)
|
||||
- [CVE-2024-51321](CVE-2024/CVE-2024-513xx/CVE-2024-51321.json) (`2025-03-11T15:15:42.570`)
|
||||
- [CVE-2024-51322](CVE-2024/CVE-2024-513xx/CVE-2024-51322.json) (`2025-03-11T15:15:42.700`)
|
||||
- [CVE-2024-52960](CVE-2024/CVE-2024-529xx/CVE-2024-52960.json) (`2025-03-11T15:15:42.813`)
|
||||
- [CVE-2024-52961](CVE-2024/CVE-2024-529xx/CVE-2024-52961.json) (`2025-03-11T15:15:42.960`)
|
||||
- [CVE-2024-54018](CVE-2024/CVE-2024-540xx/CVE-2024-54018.json) (`2025-03-11T15:15:43.113`)
|
||||
- [CVE-2024-54026](CVE-2024/CVE-2024-540xx/CVE-2024-54026.json) (`2025-03-11T15:15:43.307`)
|
||||
- [CVE-2024-55590](CVE-2024/CVE-2024-555xx/CVE-2024-55590.json) (`2025-03-11T15:15:43.650`)
|
||||
- [CVE-2024-55592](CVE-2024/CVE-2024-555xx/CVE-2024-55592.json) (`2025-03-11T15:15:43.823`)
|
||||
- [CVE-2024-55597](CVE-2024/CVE-2024-555xx/CVE-2024-55597.json) (`2025-03-11T15:15:44.010`)
|
||||
- [CVE-2025-22454](CVE-2025/CVE-2025-224xx/CVE-2025-22454.json) (`2025-03-11T15:15:44.737`)
|
||||
- [CVE-2025-25680](CVE-2025/CVE-2025-256xx/CVE-2025-25680.json) (`2025-03-11T16:15:17.413`)
|
||||
- [CVE-2025-25747](CVE-2025/CVE-2025-257xx/CVE-2025-25747.json) (`2025-03-11T16:15:17.547`)
|
||||
- [CVE-2025-27403](CVE-2025/CVE-2025-274xx/CVE-2025-27403.json) (`2025-03-11T15:15:45.570`)
|
||||
- [CVE-2025-27601](CVE-2025/CVE-2025-276xx/CVE-2025-27601.json) (`2025-03-11T16:15:17.943`)
|
||||
- [CVE-2025-27602](CVE-2025/CVE-2025-276xx/CVE-2025-27602.json) (`2025-03-11T16:15:18.100`)
|
||||
- [CVE-2025-27617](CVE-2025/CVE-2025-276xx/CVE-2025-27617.json) (`2025-03-11T16:15:18.310`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `47`
|
||||
Recently modified CVEs: `70`
|
||||
|
||||
- [CVE-2024-1158](CVE-2024/CVE-2024-11xx/CVE-2024-1158.json) (`2025-03-11T13:18:18.670`)
|
||||
- [CVE-2024-13853](CVE-2024/CVE-2024-138xx/CVE-2024-13853.json) (`2025-03-11T14:15:20.417`)
|
||||
- [CVE-2024-13864](CVE-2024/CVE-2024-138xx/CVE-2024-13864.json) (`2025-03-11T14:15:20.570`)
|
||||
- [CVE-2024-13873](CVE-2024/CVE-2024-138xx/CVE-2024-13873.json) (`2025-03-11T13:32:22.040`)
|
||||
- [CVE-2024-13899](CVE-2024/CVE-2024-138xx/CVE-2024-13899.json) (`2025-03-11T13:26:57.550`)
|
||||
- [CVE-2024-1889](CVE-2024/CVE-2024-18xx/CVE-2024-1889.json) (`2025-03-11T14:51:56.797`)
|
||||
- [CVE-2024-1890](CVE-2024/CVE-2024-18xx/CVE-2024-1890.json) (`2025-03-11T14:51:33.223`)
|
||||
- [CVE-2024-2546](CVE-2024/CVE-2024-25xx/CVE-2024-2546.json) (`2025-03-11T14:07:31.350`)
|
||||
- [CVE-2024-43196](CVE-2024/CVE-2024-431xx/CVE-2024-43196.json) (`2025-03-11T14:57:13.920`)
|
||||
- [CVE-2024-44192](CVE-2024/CVE-2024-441xx/CVE-2024-44192.json) (`2025-03-11T14:15:22.503`)
|
||||
- [CVE-2024-49337](CVE-2024/CVE-2024-493xx/CVE-2024-49337.json) (`2025-03-11T14:06:18.787`)
|
||||
- [CVE-2024-49344](CVE-2024/CVE-2024-493xx/CVE-2024-49344.json) (`2025-03-11T14:02:39.433`)
|
||||
- [CVE-2024-49355](CVE-2024/CVE-2024-493xx/CVE-2024-49355.json) (`2025-03-11T14:51:01.153`)
|
||||
- [CVE-2024-49779](CVE-2024/CVE-2024-497xx/CVE-2024-49779.json) (`2025-03-11T13:55:21.797`)
|
||||
- [CVE-2024-49780](CVE-2024/CVE-2024-497xx/CVE-2024-49780.json) (`2025-03-11T14:37:00.743`)
|
||||
- [CVE-2024-49781](CVE-2024/CVE-2024-497xx/CVE-2024-49781.json) (`2025-03-11T13:45:47.917`)
|
||||
- [CVE-2024-49782](CVE-2024/CVE-2024-497xx/CVE-2024-49782.json) (`2025-03-11T14:19:11.780`)
|
||||
- [CVE-2024-54469](CVE-2024/CVE-2024-544xx/CVE-2024-54469.json) (`2025-03-11T14:15:23.030`)
|
||||
- [CVE-2024-54473](CVE-2024/CVE-2024-544xx/CVE-2024-54473.json) (`2025-03-11T14:15:23.210`)
|
||||
- [CVE-2024-54560](CVE-2024/CVE-2024-545xx/CVE-2024-54560.json) (`2025-03-11T14:15:23.417`)
|
||||
- [CVE-2025-0629](CVE-2025/CVE-2025-06xx/CVE-2025-0629.json) (`2025-03-11T14:15:24.090`)
|
||||
- [CVE-2025-2136](CVE-2025/CVE-2025-21xx/CVE-2025-2136.json) (`2025-03-11T14:15:26.553`)
|
||||
- [CVE-2025-2137](CVE-2025/CVE-2025-21xx/CVE-2025-2137.json) (`2025-03-11T14:15:26.737`)
|
||||
- [CVE-2025-2190](CVE-2025/CVE-2025-21xx/CVE-2025-2190.json) (`2025-03-11T14:15:27.163`)
|
||||
- [CVE-2025-27893](CVE-2025/CVE-2025-278xx/CVE-2025-27893.json) (`2025-03-11T14:15:26.033`)
|
||||
- [CVE-2024-13734](CVE-2024/CVE-2024-137xx/CVE-2024-13734.json) (`2025-03-11T15:55:48.603`)
|
||||
- [CVE-2024-13836](CVE-2024/CVE-2024-138xx/CVE-2024-13836.json) (`2025-03-11T15:15:41.010`)
|
||||
- [CVE-2024-13862](CVE-2024/CVE-2024-138xx/CVE-2024-13862.json) (`2025-03-11T15:15:41.180`)
|
||||
- [CVE-2024-13907](CVE-2024/CVE-2024-139xx/CVE-2024-13907.json) (`2025-03-11T16:26:05.363`)
|
||||
- [CVE-2024-1442](CVE-2024/CVE-2024-14xx/CVE-2024-1442.json) (`2025-03-11T16:56:13.943`)
|
||||
- [CVE-2024-1725](CVE-2024/CVE-2024-17xx/CVE-2024-1725.json) (`2025-03-11T16:55:54.263`)
|
||||
- [CVE-2024-1771](CVE-2024/CVE-2024-17xx/CVE-2024-1771.json) (`2025-03-11T16:42:28.580`)
|
||||
- [CVE-2024-1976](CVE-2024/CVE-2024-19xx/CVE-2024-1976.json) (`2025-03-11T16:47:09.213`)
|
||||
- [CVE-2024-1986](CVE-2024/CVE-2024-19xx/CVE-2024-1986.json) (`2025-03-11T16:40:10.820`)
|
||||
- [CVE-2024-1989](CVE-2024/CVE-2024-19xx/CVE-2024-1989.json) (`2025-03-11T16:41:12.650`)
|
||||
- [CVE-2024-2264](CVE-2024/CVE-2024-22xx/CVE-2024-2264.json) (`2025-03-11T16:54:11.227`)
|
||||
- [CVE-2024-2265](CVE-2024/CVE-2024-22xx/CVE-2024-2265.json) (`2025-03-11T16:53:59.010`)
|
||||
- [CVE-2024-2266](CVE-2024/CVE-2024-22xx/CVE-2024-2266.json) (`2025-03-11T16:53:46.840`)
|
||||
- [CVE-2024-2267](CVE-2024/CVE-2024-22xx/CVE-2024-2267.json) (`2025-03-11T16:53:27.713`)
|
||||
- [CVE-2024-54139](CVE-2024/CVE-2024-541xx/CVE-2024-54139.json) (`2025-03-11T16:44:20.720`)
|
||||
- [CVE-2024-56191](CVE-2024/CVE-2024-561xx/CVE-2024-56191.json) (`2025-03-11T16:15:16.743`)
|
||||
- [CVE-2024-56192](CVE-2024/CVE-2024-561xx/CVE-2024-56192.json) (`2025-03-11T16:15:16.900`)
|
||||
- [CVE-2024-6261](CVE-2024/CVE-2024-62xx/CVE-2024-6261.json) (`2025-03-11T16:32:04.440`)
|
||||
- [CVE-2024-9195](CVE-2024/CVE-2024-91xx/CVE-2024-9195.json) (`2025-03-11T15:49:13.197`)
|
||||
- [CVE-2025-1282](CVE-2025/CVE-2025-12xx/CVE-2025-1282.json) (`2025-03-11T16:08:00.790`)
|
||||
- [CVE-2025-1450](CVE-2025/CVE-2025-14xx/CVE-2025-1450.json) (`2025-03-11T15:46:05.180`)
|
||||
- [CVE-2025-1689](CVE-2025/CVE-2025-16xx/CVE-2025-1689.json) (`2025-03-11T16:19:41.870`)
|
||||
- [CVE-2025-1690](CVE-2025/CVE-2025-16xx/CVE-2025-1690.json) (`2025-03-11T15:59:35.800`)
|
||||
- [CVE-2025-1717](CVE-2025/CVE-2025-17xx/CVE-2025-1717.json) (`2025-03-11T16:12:42.783`)
|
||||
- [CVE-2025-2196](CVE-2025/CVE-2025-21xx/CVE-2025-2196.json) (`2025-03-11T15:15:45.820`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
287
_state.csv
287
_state.csv
@ -202493,7 +202493,7 @@ CVE-2022-34907,0,0,ceabaecfcd29722392613503a6dc95f58160d8752bb3f51814dd29617e749
|
||||
CVE-2022-34908,0,0,5e12ce36c963472956dbda6f8a97613083077e8cd92d84246e075c0932a14f9b,2025-03-10T20:15:12.223000
|
||||
CVE-2022-34909,0,0,5232a9c4826d42237b51a14d96442e54646e1c70d8c71434dfea40ea5952167c,2025-03-10T20:15:13.420000
|
||||
CVE-2022-3491,0,0,94e4facd715fec8aed12661acb3c825fedb5971a07254be24c86884a36fcdb15,2024-11-21T07:19:38.590000
|
||||
CVE-2022-34910,0,0,1717433a6fc9c9dbd5bb60b9aa780e013e52d2b13d36b4620a29b71e8ebf2385,2024-11-21T07:10:25.027000
|
||||
CVE-2022-34910,0,1,60355a0db03afcd899eedab219757e24e71bc4b6bb17aee00642140161ac1181,2025-03-11T16:15:12.233000
|
||||
CVE-2022-34911,0,0,2b8f360beec1e9ed0dc65bc72a6c470ab3baf20792ea009e579c965e20637f41,2024-11-21T07:10:25.193000
|
||||
CVE-2022-34912,0,0,200b319614bdd4fe3c1f5384e95db571df01480151ac89135c51127ae36b8681,2024-11-21T07:10:25.360000
|
||||
CVE-2022-34913,0,0,62ab2c4e006489b07b4436975ef0e656f018df27ce4430641f274dba2d9aa2ea,2024-11-21T07:10:25.510000
|
||||
@ -211438,7 +211438,7 @@ CVE-2022-46700,0,0,36797f64e657de5395ad1216e7e3556e8f934cf529bfb10adaccfeca2d42a
|
||||
CVE-2022-46701,0,0,bc01da063681d8e153c6af9d916b0a0c6c163c7cb1cf60c541c7765beeb0c569,2024-11-21T07:30:56.397000
|
||||
CVE-2022-46702,0,0,715f8ef202458fce1a4ee114ac6507bab6110c673777b7b272b5e7ba8bca4c18,2024-11-21T07:30:56.543000
|
||||
CVE-2022-46703,0,0,6e7d646c387dfe63a92526293a779ad9233e1eb1081be5cd544a1920d87ba5c5,2025-02-11T18:15:20.717000
|
||||
CVE-2022-46704,0,0,f49ce5bb4e9ce6edacbfe11772c68c876d65b62e4619c376ac1c5d2525c390d4,2024-11-21T07:30:56.810000
|
||||
CVE-2022-46704,0,1,94925b0e12166f5e30e8d5e3fac54f85129786a4fae17c6f579976226430665c,2025-03-11T15:15:36.577000
|
||||
CVE-2022-46705,0,0,04fb95df26acfe46c0fb0f021e7c2af393d1ae9c3ce5f44bb0a0f4a892bba5dc,2024-11-21T07:30:56.947000
|
||||
CVE-2022-46706,0,0,7e26910e7d25410ca2efadb873737d22cd7e3e3675aa7329c79a0b0d6669f2e0,2024-11-21T07:30:57.100000
|
||||
CVE-2022-46707,0,0,0ee54ee776499b11d97e6d033dd279ca45d4cd2d256c6e53c9fa48ebcf0fd335,2023-11-07T03:55:50.110000
|
||||
@ -211457,7 +211457,7 @@ CVE-2022-4672,0,0,3da0ab4af959d0d56059ed0a777501b4f92187b9acb6980457fef52c63560f
|
||||
CVE-2022-46720,0,0,1aff9e296be2c7360275923f63a9473ec9c4608eeb328da9f2e7b7a3179b8930,2025-01-29T17:15:21.870000
|
||||
CVE-2022-46721,0,0,8318128d0ba4bff58f94270f143b28f70980ff84aff2d4472f3b162624e6b8cf,2024-11-21T07:30:58.433000
|
||||
CVE-2022-46722,0,0,a591827a471ef172cdc7ea3213d24c36327e4324a3fcf908e339b4ed1ec02731,2024-11-21T07:30:58.570000
|
||||
CVE-2022-46723,0,1,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
|
||||
CVE-2022-46723,0,0,5854e10daf9c8ea09d765ccb9052b38f043b226c593a8f993ca66681f53a0780,2025-03-11T14:15:16.430000
|
||||
CVE-2022-46724,0,0,ca3545b43dee2aff601e6fadb2f37abbc6cbd50bafffa6af812c5d7997b2a9d9,2024-11-21T07:30:58.877000
|
||||
CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac1e0,2024-11-21T07:30:59.087000
|
||||
CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000
|
||||
@ -218075,7 +218075,7 @@ CVE-2023-22488,0,0,0aaf54ba6aaa396e5eeed906e25dc3eb9cf8d78bd4004aaf6fe7cfeb792ac
|
||||
CVE-2023-22489,0,0,9c9547fa170d053fbca3d7181cdbd1e0c3535f411cb57337b5b16f201aa554ac,2024-11-21T07:44:54.680000
|
||||
CVE-2023-2249,0,0,63a29d22605a00439eacb33c1c6b7d1746c04ead98096c136c7a6481a13c73ed,2024-11-21T07:58:14.220000
|
||||
CVE-2023-22490,0,0,ed5f2905d88eafeb26979ef7c749f6290e1eda0d44711c688d45aad06c77c872,2024-11-21T07:44:54.803000
|
||||
CVE-2023-22491,0,1,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
|
||||
CVE-2023-22491,0,0,7345e40cfe3db4db1eceb5e02fd4ef0cd8f1c29e41985d50fdc0a3a9eb32901b,2025-03-11T14:15:16.767000
|
||||
CVE-2023-22492,0,0,ae118f101a4fe1e807325ff70fedbcc3df7eea84abc7620e0c79a3ab014b1511,2024-11-21T07:44:55.083000
|
||||
CVE-2023-22493,0,0,39d2f9e6e1979b6b4b55cd726c6ef3a89c9dadb34d873b0dc61bd47123f2cdf2,2024-11-21T07:44:55.237000
|
||||
CVE-2023-22494,0,0,b40d286f3bc4e252b6afdfc190ddef7304795723952fc8afe944dab9c75f718c,2023-11-07T04:07:01.537000
|
||||
@ -218290,14 +218290,14 @@ CVE-2023-22742,0,0,d90bdbc84b8393173d0a0ccae26c3defed698996cfdfebb29c26d789eb4f6
|
||||
CVE-2023-22743,0,0,2ff8322509bb13e890c5c0eb2a499728af4f4057e9b2317582e809625e1cd652,2024-11-21T07:45:20.403000
|
||||
CVE-2023-22745,0,0,b717510f294e275cbb5de0d9417c53f21cfa8afdf89bcd8b1e640db8d8040e24,2024-11-21T07:45:20.543000
|
||||
CVE-2023-22746,0,0,fcb6bccbce47be6c3814548b6771799369259b832db8e6ca53b330061fc2444b,2024-11-21T07:45:20.677000
|
||||
CVE-2023-22747,0,0,27f89841be4fa1f0e869cd9c1ba2efc1fcc5806bdeb74d3652c6f8b0de40b502,2024-11-21T07:45:20.813000
|
||||
CVE-2023-22747,0,1,7d14c0f9c36b58e3f7dfbf09d6476a3ca86b2daa88cae61d13fee474b4a1b805,2025-03-11T15:15:37.513000
|
||||
CVE-2023-22748,0,0,f1a9d61004b5b3f89b84381c153273d1571ddec3b3c17748d7413ef56a2689d6,2025-03-07T21:15:13.447000
|
||||
CVE-2023-22749,0,0,9d960d5703beed2bf0592f7ac0dbb480b4ded3a968ccb41c8362a54de4de5abb,2025-03-07T21:15:13.610000
|
||||
CVE-2023-2275,0,0,56517d0348d7c740f69577e29159469d6fb152eb4ba3fc163164f0855a45527b,2024-11-21T07:58:17.400000
|
||||
CVE-2023-22750,0,0,d8383d1547ae1feceb6124db8362c373b05ed5c0420fd20a0897ed19801b6262,2025-03-07T21:15:13.743000
|
||||
CVE-2023-22751,0,0,f7e87665eeb2eb0a4dcf6e191ed8cdc98123add986fb6cc06fd44685fe64405d,2025-03-07T21:15:13.880000
|
||||
CVE-2023-22752,0,1,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
|
||||
CVE-2023-22753,0,1,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
|
||||
CVE-2023-22752,0,0,46046de35ca109be006d9c7177ae1e1c3a85fa9577cd24dde03d0231bdf17f40,2025-03-11T14:15:17.410000
|
||||
CVE-2023-22753,0,0,c77ba1d63415188a3342302c18382d1af48bbccf54b43597efc5ab59183d4e73,2025-03-11T14:15:17.590000
|
||||
CVE-2023-22754,0,0,d247d5cbce15ee17f89d7a1d2f020e8cd8c63d5271ea83bcac456d0585ace59d,2024-11-21T07:45:21.670000
|
||||
CVE-2023-22755,0,0,bb0164b8d65556ee8753b0c4fcb1b74aba62639cb1aa74a811209f73c27d7b58,2024-11-21T07:45:21.787000
|
||||
CVE-2023-22756,0,0,665db7f1d4f1e5b5058362b508c1d8d6ae02944bf6898c0f728e7fe8bdfcff45,2024-11-21T07:45:21.917000
|
||||
@ -218308,11 +218308,11 @@ CVE-2023-2276,0,0,2a89d36eee46d6c101100028368db05883bc5be65d5b25d57a5e3d361c3f71
|
||||
CVE-2023-22760,0,0,c20cbdcc3ca1f1e1d99a22f3a8e790bc215a4554f34f5525f1bd43f8a1fb8326,2024-11-21T07:45:22.380000
|
||||
CVE-2023-22761,0,0,88affdebebb6129d5a9f029f881b936f7b41c3f5b68e64709c61b1cf4201c69b,2024-11-21T07:45:22.497000
|
||||
CVE-2023-22762,0,0,b07dfc0b47a2408fcde297b1bc8a829eecd9afda96ba7c198bc41a94c20032e7,2024-11-21T07:45:22.603000
|
||||
CVE-2023-22763,0,1,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
|
||||
CVE-2023-22764,0,1,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
|
||||
CVE-2023-22765,0,1,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
|
||||
CVE-2023-22766,0,0,7e51c6cb7cb4c6561a8b5425f2ce81ac4a0018eacbd6b8d98d67c97f25044bb3,2024-11-21T07:45:23.100000
|
||||
CVE-2023-22767,0,0,eebde94414de0c875144de433fd8f130e403655d62c51870b1b620408665bbc3,2024-11-21T07:45:23.220000
|
||||
CVE-2023-22763,0,0,3a9891131fe9deb02cfa5915fb791e483d5a4fc43253be5a2e5a8bf996ca071e,2025-03-11T14:15:17.760000
|
||||
CVE-2023-22764,0,0,b6cc0016c0e44ba4a1810f02c6dc61ba95bd06368744149ef374f58f084c99bb,2025-03-11T14:15:17.920000
|
||||
CVE-2023-22765,0,0,81d730e3d36604067067fdd743d8a08de4193a93491f9e1416d01121f83678c4,2025-03-11T14:15:18.077000
|
||||
CVE-2023-22766,0,1,e790961e01345060a9d9bc6c1c754a0a20620ba6c764ed8bc78f902e32979683,2025-03-11T15:15:37.670000
|
||||
CVE-2023-22767,0,1,863d748c02dc86a3b4c2478bfa511c20d4f93f399f57c1bb4b03baf546914842,2025-03-11T15:15:37.823000
|
||||
CVE-2023-22768,0,0,20fba87f4a634593f7c18e62b486cef19fc32a3c2e2a4561295d283e0126cf30,2024-11-21T07:45:23.337000
|
||||
CVE-2023-22769,0,0,6ae8ba3e8b583057bd2353e73c1aac8e8f3a88643b244eb3a95e62d9b9fffa6e,2024-11-21T07:45:23.453000
|
||||
CVE-2023-2277,0,0,29cdfaaa84fe50e25679d6125383565035f51b2f574d33150a7ed90888999f0f,2024-11-21T07:58:17.637000
|
||||
@ -218774,30 +218774,30 @@ CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43
|
||||
CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000
|
||||
CVE-2023-23494,0,0,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000
|
||||
CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000
|
||||
CVE-2023-23496,0,1,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
|
||||
CVE-2023-23497,0,1,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
|
||||
CVE-2023-23496,0,0,7fa960b37bd9892fa2fae4ae5a9f035033c0d321a562af39000d72584f1ea99f,2025-03-11T14:15:18.513000
|
||||
CVE-2023-23497,0,0,2dbad634c3f00416275fc95939328c4541bd0fe1b81f9c7a8ddb93930c733799,2025-03-11T14:15:18.680000
|
||||
CVE-2023-23498,0,0,f442edc9784c104bfeadbb1509163412061ba508855f94680a31a05d88cad5d4,2024-11-21T07:46:18.397000
|
||||
CVE-2023-23499,0,1,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
|
||||
CVE-2023-23499,0,0,23d8093b12aff16a352f868b89ae7a61b0dd2c8d2a0735a48298aa05a8543033,2025-03-11T14:15:18.913000
|
||||
CVE-2023-2350,0,0,ab0224f444bfb05a0e5106420c128d54872f8e269cc5105af8f88e475b877f69,2024-11-21T07:58:26.260000
|
||||
CVE-2023-23500,0,1,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
|
||||
CVE-2023-23500,0,0,b38eacc8268db0bb21cd43991a81b9795834287efa37f0b4f1a1782ab3ccdf5f,2025-03-11T14:15:19.060000
|
||||
CVE-2023-23501,0,0,08283ed5e7e3035476dea06dba88443e0f4832d2487f02f048e6b7378eee7195,2024-11-21T07:46:18.740000
|
||||
CVE-2023-23502,0,0,c90d8a177146bffe329c2557cff3e63b8c00ec94d13a5803e018464a2b30c0ba,2024-11-21T07:46:18.847000
|
||||
CVE-2023-23503,0,0,2da9240a4403b00e4a15023cb8324d757463d3c79f96555e931dded2cb36fa1f,2024-11-21T07:46:18.963000
|
||||
CVE-2023-23504,0,0,16f525c9fb31ae2392fa3352f00ddf27c59d4f9f21280300ce93bd30558fc946,2024-11-21T07:46:19.080000
|
||||
CVE-2023-23505,0,0,072758557cc09200da79298cbbfd017afc9b7f6e37d9447137a53abfd05f5114,2024-11-21T07:46:19.213000
|
||||
CVE-2023-23506,0,0,bc279d4adf6dfb4944d9d2fe762b5ab8cc5aebf1c3e0f81c91b173a23f951512,2024-11-21T07:46:19.337000
|
||||
CVE-2023-23507,0,0,0e671d252b1530d81e62fb1a72978a3ce7e376bcdb1a691cda96306a8a02e4fe,2024-11-21T07:46:19.440000
|
||||
CVE-2023-23508,0,0,22ca610a47800f4e53008571c1f7d3e3efef0aff85fd5bbdac3583f465614325,2024-11-21T07:46:19.553000
|
||||
CVE-2023-23507,0,1,8ff1328a51733f51927312db00477f36b9441cfc094699a00c8979dbf02afd25,2025-03-11T16:15:12.787000
|
||||
CVE-2023-23508,0,1,3e55147c7662204c8744adf9587c1c3968a615ab80d0092919319a20d650a836,2025-03-11T16:15:12.953000
|
||||
CVE-2023-2351,0,0,3a82f210ae18463b28fb54c6272265e375b61557202f70072719d8e76667f500,2024-11-21T07:58:26.390000
|
||||
CVE-2023-23510,0,0,a048f499883454a8531384714691524e2244fef480d3696bc91072aa63bc437e,2024-11-21T07:46:19.670000
|
||||
CVE-2023-23510,0,1,aab24986700db7f904d33c17be3e699a289ff3e482876ffab3ec417a71cccf18,2025-03-11T16:15:13.123000
|
||||
CVE-2023-23511,0,0,79be774f2aec712d95f9d4909cdb05723f704493f639854978b6713057ca5803,2025-03-11T04:15:20.983000
|
||||
CVE-2023-23512,0,0,4e2ff213db2e8b1c5edf97f8499254120d2881ff4802f92e3a5a52458f10572f,2024-11-21T07:46:19.900000
|
||||
CVE-2023-23513,0,0,09bcbdc6eb54ad0ea39978f5767d4a0e9af96b65c2ea1f28367e4b3aae576c5f,2024-11-21T07:46:20.017000
|
||||
CVE-2023-23514,0,0,316c0b5d15a623d1e0da5898db1b60d85cba18fe65fdb76b85221a04fd8edbab,2024-11-21T07:46:20.207000
|
||||
CVE-2023-23514,0,1,245758ee40226c775ff17d539a5960b47000250d9f1ab16e116ce1823a48a751,2025-03-11T16:15:13.297000
|
||||
CVE-2023-23516,0,0,642fb93fd27c63e523bbbbd8ec697d800beb99b36c421b23b39ea2a2701fa5db,2024-12-05T18:15:20.327000
|
||||
CVE-2023-23517,0,0,6a1148e661422f5e410162fc2fdbed9643d5f1e579c62f3516f611a9d8d6ddd0,2024-11-21T07:46:20.443000
|
||||
CVE-2023-23518,0,0,6c6ea72d1d5fa166b16795cd07cdb95d0f04cad27cf2fa1c29491076e8a261dc,2024-11-21T07:46:20.560000
|
||||
CVE-2023-23519,0,0,6ae079c73305079889dc6e2c39307dc9a5c80b6690e163d5d57d6da77db7d7bf,2024-11-21T07:46:20.680000
|
||||
CVE-2023-23517,0,1,6c2b9556abb97d193dc34c362430f543f121bd5621c2f2756cdfc728f6364d91,2025-03-11T16:15:13.490000
|
||||
CVE-2023-23518,0,1,28b7fec879e0537bd5e7400ae17c41c3763bde40e21714e0d41218421b7ad8c2,2025-03-11T16:15:13.680000
|
||||
CVE-2023-23519,0,1,52b97f532c90beedd6a706dff1548312c12dd9772d21d5bcca8f5742bd2c8a7e,2025-03-11T16:15:13.880000
|
||||
CVE-2023-2352,0,0,f2b57b0bbfa316225559cd4e96ca98c890ce4e800269f7fdc72b0f4686c5a062,2024-11-21T07:58:26.520000
|
||||
CVE-2023-23520,0,0,8777bc89c4d7c677913b2ac7598bb4c26e2ad1a798c78f0b2cfea451cbf6f5c4,2024-11-21T07:46:20.787000
|
||||
CVE-2023-23522,0,0,bbd0640742c9d2795d413f296659352eddbb371a6c698d12a46f59e02e337e80,2024-11-21T07:46:20.903000
|
||||
@ -221008,10 +221008,10 @@ CVE-2023-26099,0,0,daef45a4a5079e3664281482bb5aed531859143d74f266889fdf4d70272bd
|
||||
CVE-2023-2610,0,0,09b4faf2015566c48d195c0564ba2eaa8f67a730801f03b898ad9fb8b6160753,2024-11-29T12:15:05.820000
|
||||
CVE-2023-26100,0,0,d594c19d8868f03c4d54d9d2f43f87203b1428ae199cf215eeef544fc3b5c47d,2025-02-05T20:15:36.030000
|
||||
CVE-2023-26101,0,0,b5f97f93f6104ea87af9962b64069465926b1f82322929f11609f64ca3ccf2cb,2025-02-05T15:15:16.947000
|
||||
CVE-2023-26102,0,0,ad48db17daa5813c2c603727ba9c9458d6a541fdeff41ece33be20080052bdc5,2024-11-21T07:50:46.753000
|
||||
CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4fc1,2024-11-21T07:50:46.877000
|
||||
CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47
|
||||
CVE-2023-26105,0,0,7cc2762bb92da835a09938bd30ea450932cc3a111ca4007596fe1bf509cfbdd5,2024-11-21T07:50:47.137000
|
||||
CVE-2023-26102,0,1,a15bc38ea5f1545e6e11ae97b9beb00ed2d2296dcc09cd9f1128815226a4b150,2025-03-11T16:15:14.070000
|
||||
CVE-2023-26103,0,1,0acc07eca1658e88ca7d4629323a059a43e754af5e7d3cb0c3217cecf5a309a5,2025-03-11T16:15:14.263000
|
||||
CVE-2023-26104,0,1,f549d5c4e0996a925d324892cf898b9b17daabd8f84a8d740d52d2f22e993662,2025-03-11T16:15:14.450000
|
||||
CVE-2023-26105,0,1,0b83c6910cae3fa98c1561674557544349c02ac2c7da310412fc9c3bbbd91854,2025-03-11T15:15:37.983000
|
||||
CVE-2023-26106,0,0,5aec010201382e2cd4ddda8f70104650c3355d4509e17262f2080cc54e5810ea,2025-03-05T21:15:17.863000
|
||||
CVE-2023-26107,0,0,578cb0f10341889cf4fc29d8ba9d2f73fba021847b3abbdc9b8f124d3f89714e,2025-03-05T20:15:54.340000
|
||||
CVE-2023-26108,0,0,ab0b203fc897e6f3e27361a11daf42748026f640c5776f715c7a515e500151be,2024-11-21T07:50:47.483000
|
||||
@ -221920,7 +221920,7 @@ CVE-2023-27369,0,0,53ea492f4014f9a96dc283724b1330cd227c3403ebab1a750f9c76feb0488
|
||||
CVE-2023-2737,0,0,2d58eab6403b8ec835f691292ee157b11d2132c361cab72cff399928ed237c60,2024-11-21T07:59:11.863000
|
||||
CVE-2023-27370,0,0,2caa0c83c4c453d1353c995ebb950b7f0e81ef2851f9f0bf8ca09ec66f7d3849,2025-01-03T17:01:01.870000
|
||||
CVE-2023-27371,0,0,2a3f97a58295ebda42a0c6cc169c64eef1379055af6286654e30c6197b78c7c5,2024-11-21T07:52:46.460000
|
||||
CVE-2023-27372,0,0,21435a747a9696e416d2c3ef746764775f76705636523d17cbaf48daf348c5bd,2024-11-21T07:52:46.640000
|
||||
CVE-2023-27372,0,1,2338d0880859c2218f2eeccb7298350babcb66e0d24999462c3506f048b6bd99,2025-03-11T15:15:38.177000
|
||||
CVE-2023-27373,0,0,a45362998f49ad07ca276ad8910dd4e52f099f28ea8bb38aacf61103367c86d7,2025-03-07T20:15:36.693000
|
||||
CVE-2023-27375,0,0,93b29bc90b77f869b8c8cecb54fb2193dda487043c0e4379efa49cf6c5b6689a,2024-11-21T07:52:46.940000
|
||||
CVE-2023-27376,0,0,cb9f804b554841faa04bce12934a68c4432bf8ecf78215538f55219d32109908,2024-11-21T07:52:47.067000
|
||||
@ -224085,7 +224085,7 @@ CVE-2023-29845,0,0,0d6601a8b19a56bb94196f82c15ebc3bb9a3355618b52f3161b02c947456d
|
||||
CVE-2023-29847,0,0,cbd9ab3b3aea2e256972aca68ae61c4fb791ad8431f3332b4f90887044d0fcc8,2025-02-06T21:15:20.397000
|
||||
CVE-2023-29848,0,0,87145e74e1bca1e68a1619f3f291dc2d0caaa2830bcb2e8145e9ddd416eda338,2025-02-04T17:15:14.370000
|
||||
CVE-2023-29849,0,0,339b30d1ae57b156acc51777afdadacc5c4e21fa6ccea3ad619cd3cbe7995c6d,2025-02-04T16:15:36.283000
|
||||
CVE-2023-2985,0,0,472b3e2cbc4ab1c4d383ed0d9aeffe34e7119a96832fa5b024a76bb75303c206,2024-11-21T07:59:42.080000
|
||||
CVE-2023-2985,0,1,df478477f9fb1194e751690ecbcbe6a070a54d560ec708ee0634cb01bbc5c707,2025-03-11T16:15:14.727000
|
||||
CVE-2023-29850,0,0,e23e41ca7326518efc51de7c326f367054eae2616881359dcbf8b83161d49e44,2025-02-06T21:15:20.580000
|
||||
CVE-2023-29854,0,0,012366e688770c0d6213ce4f75fe1ac7d233ac85898af1c9151dc885dac50822,2025-03-05T19:15:35.153000
|
||||
CVE-2023-29855,0,0,d323bb21d88b51243639bf4e65087391cd56259cdfe10db9098175a76bd19a53,2025-02-06T15:15:12.047000
|
||||
@ -224258,7 +224258,7 @@ CVE-2023-30210,0,0,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6
|
||||
CVE-2023-30211,0,0,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
|
||||
CVE-2023-30212,0,0,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
|
||||
CVE-2023-30216,0,0,5eb3072b936944b32199c9563ff2bd8df56a2dd5a23baf265c2a91655d2cc13b,2025-01-29T20:15:32.147000
|
||||
CVE-2023-3022,0,0,5d7350e1404edf239160a82f8a65005daae022e5cfa515dad0d1b71dc1a576a1,2024-11-21T08:16:15.790000
|
||||
CVE-2023-3022,0,1,30128331775488e13ecf386e82e48d5b539239191d58bbec9a979c50cb41db5a,2025-03-11T15:15:38.650000
|
||||
CVE-2023-30222,0,0,311828e54dafd6d0db801e3d776df3fb7876dc84d7c76629b5a43b88dee46bb7,2024-11-21T07:59:55.240000
|
||||
CVE-2023-30223,0,0,22603cb5f264912092468b6977407892d8678dbb3e405984b4437903070fd7ce,2024-11-21T07:59:55.393000
|
||||
CVE-2023-30226,0,0,3d14aa7f77a3bea0cfd62c396d78bc88eb292fb0748e120a471dcdb46a7f274a,2024-11-21T07:59:55.540000
|
||||
@ -225200,7 +225200,7 @@ CVE-2023-31406,0,0,6807e52300f654096b3444928537bbf5bd905dcdd7bdfadf4c54f763b8f84
|
||||
CVE-2023-31407,0,0,5633b6d5b535b99fc860fde1ccb9a957615d718ab262ccefea2c67364128958f,2024-11-21T08:01:47.957000
|
||||
CVE-2023-31408,0,0,59838602bd646a5aaf55c57b242b706a86e52780670e3b0fbf6129782d0ef2e4,2024-11-21T08:01:48.083000
|
||||
CVE-2023-31409,0,0,b3edb6ee510cd2535ccfb9b32d08d3c89c1a62e297eb8ea145c7b2d52d0ed587,2024-11-21T08:01:48.250000
|
||||
CVE-2023-3141,0,0,9b268333284028cbb03f8d9a4d768971994e84ad3b7e1bb606ae49dc70b4406c,2024-11-21T08:16:32.843000
|
||||
CVE-2023-3141,0,1,50f99483e8be7221c37e4b5d285eea43bdd641ccca36cedf9a5d5400faea38c9,2025-03-11T15:15:38.867000
|
||||
CVE-2023-31410,0,0,69a6c12625ba60cddfaa6f0d5b683c81178475ca41b7e5ddc6802612a82fca29,2024-11-21T08:01:48.377000
|
||||
CVE-2023-31411,0,0,d7f07bb9e039c868f52e87fa75158cc828e7a1392c2dfc5e56e6fb6a1bab2bb8,2024-11-21T08:01:48.497000
|
||||
CVE-2023-31412,0,0,777ecc7e8f06e06d0385607faa87da9fb6c635ee45b54bbed274e4bbf90f56c3,2024-11-21T08:01:48.617000
|
||||
@ -225330,7 +225330,7 @@ CVE-2023-31606,0,0,566928f240e95aed16a3c3742b1ad454864df53f0c03b37939832a70716ca
|
||||
CVE-2023-31607,0,0,7d3508d6e36307d736ffd554a5eb1b404a89842a52017b1a1adf8a9e40662c65,2025-01-23T19:15:09.613000
|
||||
CVE-2023-31608,0,0,3f3db7a5e1c8311107b7f33f068938a9f5fd1a8c9b6f38e2c393e4d5fc2cf548,2025-01-23T19:15:09.780000
|
||||
CVE-2023-31609,0,0,2005bfc3d2b97af7a1dec83b5fb91826b19eab5bef445d4fd6dbd5344a0dbbcb,2025-01-23T17:15:11.150000
|
||||
CVE-2023-3161,0,0,d5fbf8881c99cc38acea4c62e7b256434b5924f14ca714597eea73ce4cf32125,2024-11-21T08:16:35.683000
|
||||
CVE-2023-3161,0,1,2db2aa8c139374940eeca48c4793b67ccf430a88c192e53879178b3a2f4837bf,2025-03-11T15:15:39.120000
|
||||
CVE-2023-31610,0,0,4635c8d6131c4b4c122038805363b2d666290afd290352c3b42f3a755aa19c61,2025-01-23T17:15:11.337000
|
||||
CVE-2023-31611,0,0,7d49566bf2b65a83f8da17cf49d5899b27094e60dd447a97224d6c0c8c7656f7,2025-01-23T17:15:11.503000
|
||||
CVE-2023-31612,0,0,776f8b729d141f0dbbf1994fdb1bf5856b52d64ad6cf8da4800ef2964c166227,2025-01-23T17:15:11.660000
|
||||
@ -225748,7 +225748,7 @@ CVE-2023-32192,0,0,9ddad804b5e1f24517e731cf63fc7724b58e01e76819ef245be1681605b11
|
||||
CVE-2023-32193,0,0,3fc0deec46f1f84bb86bb18144fefd8401960da10ffc30dbcb4b73bcaa487fa6,2024-10-16T16:38:14.557000
|
||||
CVE-2023-32194,0,0,b026e294b9ee7e0ac795c3c964def03f8175fac7911f8283e7b5b212d9d71d5b,2024-10-16T16:38:14.557000
|
||||
CVE-2023-32196,0,0,79159a2f6efc5cfee63b1c771d3ff38df7bebfb52936a9e17291c69b0f073c87,2024-10-16T16:38:14.557000
|
||||
CVE-2023-3220,0,0,60dd783c3ead3cf222f72f3af6cb46e458ae1bec6174b63a99c735f758734ff6,2024-11-21T08:16:43.633000
|
||||
CVE-2023-3220,0,1,091b3568d542ce7f8e9639994e311d2dd153be652f295bce2cf3036b33345197,2025-03-11T15:15:39.357000
|
||||
CVE-2023-32200,0,0,bd3b707fd4f345c8c3028816f1e6552e40039230142d8b9e762e26d6d0380966,2024-11-21T08:02:53.243000
|
||||
CVE-2023-32201,0,0,931662d2bb3c46b3ef8495876fa9a03301878dcf7cc2306d578f2b4f434d18a1,2024-12-23T22:15:06.950000
|
||||
CVE-2023-32202,0,0,e2c24c84537688439264cd465b421a98fad6a5179b84fddeb05252e348ad893b,2024-11-21T08:02:53.537000
|
||||
@ -226244,7 +226244,7 @@ CVE-2023-32676,0,0,5189b035440283ec39891623bbb2317368f5fd2359f30593287634d20e6e4
|
||||
CVE-2023-32677,0,0,629ae0e2710ad52a1609f41917b9a6ed3d5583cf36fc8722876b9d9f6f6ebe2c,2024-11-21T08:03:49.880000
|
||||
CVE-2023-32678,0,0,b28857343fdf0c940223c3ea13365bb170b828dfa0f85165e9cca87c49d995f5,2024-11-21T08:03:50.010000
|
||||
CVE-2023-32679,0,0,959c8f4087976263071eb5ae8ceebda7e6a91e605405c9dbc581b01b066b12fd,2024-11-21T08:03:50.137000
|
||||
CVE-2023-3268,0,0,7130fc6a01db180c7b9e9be087a2316e9d5313e5310c4b6344534d0afa80ba71,2024-11-21T08:16:51.880000
|
||||
CVE-2023-3268,0,1,dc2fdffca5c79d7648c13f17d930188baddf7af174441440f084e1f062f83ddf,2025-03-11T15:15:39.587000
|
||||
CVE-2023-32680,0,0,c937c5697c77e75a5d2f30ba7990452ef8555001c774a67e77a4947c8eca3a5a,2024-11-21T08:03:50.250000
|
||||
CVE-2023-32681,0,0,f322bf0f963c1d07d2732145d26c55a4933344ebb8c80e2800f25e388a51d59d,2025-02-13T17:16:32.583000
|
||||
CVE-2023-32682,0,0,f84e86997f01b9286bbf9252e4140b2a15469095ee23e7957c6eee04c12d0b60,2024-11-21T08:03:50.513000
|
||||
@ -226676,7 +226676,7 @@ CVE-2023-33166,0,0,fc5e669407323aacb94b4eb443ff4eb247ac383d2f497736606be2e5df627
|
||||
CVE-2023-33167,0,0,65961ffe8131c25aac2b3f553b81fafddab9a6fd559f0114ebdce0f087773193,2024-11-21T08:05:01.640000
|
||||
CVE-2023-33168,0,0,07044c818c72aac62abe2732395c444fd1b037729139bab2dae0cd3b65b36418,2024-11-21T08:05:01.803000
|
||||
CVE-2023-33169,0,0,5f7ddbe87df22202390df4e9f76089de0e3ecd8e7a2e91c834aafa11f8bf01f2,2024-11-21T08:05:01.977000
|
||||
CVE-2023-3317,0,1,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
|
||||
CVE-2023-3317,0,0,998c7194391572d465007a4c6e113dc1110ef1dedf28a8c7e4613e6e7a50a5e9,2025-03-11T14:15:19.697000
|
||||
CVE-2023-33170,0,0,4740fdc1650bd08609ec03a3acc7df1767c51bc386a704677bc0d493ad016b9e,2025-01-01T02:15:49.803000
|
||||
CVE-2023-33171,0,0,1e3a87325870a0adb4c2a3210560f6a055d1e803c99efb6a10bb0547de89d341,2024-11-21T08:05:02.320000
|
||||
CVE-2023-33172,0,0,cc229436a781d727cc8b2e22ecb008a3f1031f9e3accfb65eee1bcdc2932eeee,2024-11-21T08:05:02.460000
|
||||
@ -227527,7 +227527,7 @@ CVE-2023-34252,0,0,740fef90fdaf696e3d5d9264aef39da208739f0be77ebb8fccb87ebdc2e6c
|
||||
CVE-2023-34253,0,0,7fa9d9b4a8331571eaa196a0b4846212c60f701a59352f250ed22a6a06a79317,2024-11-21T08:06:52.047000
|
||||
CVE-2023-34254,0,0,28bc1c030aea3f52ac42aea5cabfb0b2c4b8caf27bbf30b675459c6d8263c10e,2024-11-21T08:06:52.180000
|
||||
CVE-2023-34255,0,0,80be5f9e6f93d1dff56157d1720c5c0d5b302e9fcf81ddd8a1748a4ec5b2a6f7,2023-11-07T04:15:33.133000
|
||||
CVE-2023-34256,0,0,691415f2f013332d745607532da3b4ac21fbf0bcec117633be38405c94853d0c,2024-11-21T08:06:52.333000
|
||||
CVE-2023-34256,0,1,2971f87b23a035bc12803f37d7531776c6e71a539301a445243e46e0254a045e,2025-03-11T16:15:14.927000
|
||||
CVE-2023-34257,0,0,9f794a27940ab7963e721dba620365ce2ab3173ff58e0a8914d6146ac5d4b9cd,2025-01-10T15:15:14.193000
|
||||
CVE-2023-34258,0,0,fcdb643155db51246493eace9830d7f00f9ad9f8e9c26b5f3acf2452f9cf252a,2025-01-08T22:15:28.060000
|
||||
CVE-2023-34259,0,0,a17ffd4a41a9842f96ee8008d3ec22fa6d3e74baa3727d6c80193a1cef77d2d8,2024-11-21T08:06:52.813000
|
||||
@ -230164,6 +230164,7 @@ CVE-2023-37929,0,0,4095396c6fb48583172ab2f6692b90080e3afde295fcb5a19cf8d9f8e85d9
|
||||
CVE-2023-3793,0,0,e9ede59406bf67af7b0914c618fd7187696ca61b0cb1dc2d5985173c262f0733,2024-11-21T08:18:04.660000
|
||||
CVE-2023-37931,0,0,a0b40b55eb2247b05e0ceeef5e9f955a4a55dda449f703f6bca219262f750a7a,2025-02-18T22:15:09.843000
|
||||
CVE-2023-37932,0,0,f0df6819630bb22aa824d7b6acf6b4dd3a2036be6cce60c742b53c8d1d382fd2,2024-11-21T08:12:29.797000
|
||||
CVE-2023-37933,1,1,1913a6c697a48293d7b0ab243c8a71572abb462a408f81f874a365cc47c312ef,2025-03-11T15:15:38.480000
|
||||
CVE-2023-37934,0,0,4e265b9ab5d64a68f77d4af970245395e5cadba01a90f14cccc92367afbeed0f,2024-11-21T08:12:29.930000
|
||||
CVE-2023-37935,0,0,e2680834b672fa8ed2fa3700d283e20af31e71aaa863e0a1bb6357a666cbb04b,2024-11-21T08:12:30.057000
|
||||
CVE-2023-37936,0,0,6c417e5254b6c599e5552cccb6a812920d0355b6d45b34bb4ff96b53d102f97d,2025-01-31T17:42:50.520000
|
||||
@ -232561,6 +232562,7 @@ CVE-2023-40719,0,0,acb9404eafc431f6a2f22b63d83343ddbcd8d8fcb1d42ba190543035718d7
|
||||
CVE-2023-4072,0,0,82174d2d178aaae9823279d7c94363a7d8d8c0249d0bb927556aae15a4ef631f,2024-11-21T08:34:20.930000
|
||||
CVE-2023-40720,0,0,872f2e87477a3acf4f7037778bf724a33680287f443a76024cd4bafc9380b862,2024-11-21T08:20:01.767000
|
||||
CVE-2023-40721,0,0,525320d4b38dbb063f7787a42abbae1dc2c7572ad404edfbb6a8dcb204805391,2025-02-11T17:15:21.403000
|
||||
CVE-2023-40723,1,1,9c02e6e8349dda2a5d98dcf08ee228e3fa0acc74b0c12d1bfc484624bb4fbc2f,2025-03-11T15:15:39.843000
|
||||
CVE-2023-40724,0,0,abe3d5cc194993fa95bdc99514308eaf93e09eb564e3440e22bb9515f2b2686b,2024-11-21T08:20:01.927000
|
||||
CVE-2023-40725,0,0,adfd99195eeb3f34ccc5f2e7792fb5337ad270a7a45216e0d9397d56f8676724,2024-11-21T08:20:02.053000
|
||||
CVE-2023-40726,0,0,97ba555b44aef4ac8cadb1249031b30ecd84032311ea02ae66df686bdd55cdfd,2024-11-21T08:20:02.183000
|
||||
@ -233872,7 +233874,7 @@ CVE-2023-42505,0,0,9ab6dd7dfb0786f84b349b31afd50f70f2ea98f9beaf48099e6faa812df78
|
||||
CVE-2023-42506,0,0,d508286d8d36552fe9e854515ba2d8ca9c53a4ad88c155e383c764e9361a1662,2024-11-21T08:22:41.463000
|
||||
CVE-2023-42507,0,0,95f7a442861b72d1544ea11fd2f010b80be26f85fc4ee471e711ebf0c522461a,2024-11-21T08:22:41.587000
|
||||
CVE-2023-42508,0,0,bbab358f9374ff4c93e4d5a1fa139f2b77986fa251894acc45ef49de283b22c4,2024-11-21T08:22:41.710000
|
||||
CVE-2023-42509,0,0,a06e6070e17df137e856689b352041f63d0ec43c6d5afd289063ecab08fd8677,2024-11-21T08:22:41.853000
|
||||
CVE-2023-42509,0,1,5e091343f47a78ed905bf6dc566855e28be9a2ac9ad6561eb6aaf809f9f7c4fe,2025-03-11T16:57:11.073000
|
||||
CVE-2023-4251,0,0,034a7b92d2b37c92649fc5aca046c5ee579347dfc80fc8e43d0fbe60fc0e4888,2024-11-21T08:34:43.783000
|
||||
CVE-2023-4252,0,0,241d0ed23bbed15be4caa83e96cb94794db8837cd6045145c5f3eeffcba80b19,2024-11-21T08:34:43.910000
|
||||
CVE-2023-42520,0,0,0f7e649e5abe2bcf81466af32f0e75ed8e91444f7c9b03366f081f463c015076,2024-11-21T08:22:42
|
||||
@ -233983,8 +233985,8 @@ CVE-2023-42657,0,0,ff9635b59e66a373b92dc5cc965f63411c6bad67160b336d54494d5984693
|
||||
CVE-2023-42658,0,0,f85c83eea1f0b03149812b838b04c5ff6848374d7b1db3fa92a4b6c4f29ed17f,2024-11-21T08:22:54.187000
|
||||
CVE-2023-42659,0,0,5723dd9c27186e966696178e04179c10e5ff1519d366a270811b6abc75f5c410,2024-11-21T08:22:54.320000
|
||||
CVE-2023-42660,0,0,8471bb7980a27be272845426154246c7ef4e7660331ec2831f10ab8b5a6da968,2024-11-21T08:22:54.447000
|
||||
CVE-2023-42661,0,0,23b4a4a921181fe76e480174f93b8f1e4fa2ad00ee4732cb9eae8de17a25aceb,2024-11-21T08:22:54.567000
|
||||
CVE-2023-42662,0,0,4332ac0acd5998085bd448c6a9ddd34d7fbbaf26aa77b4def940aac3f2f1c49a,2024-11-21T08:22:54.683000
|
||||
CVE-2023-42661,0,1,044518fa3c30714d849a15294b9c6cf4ecc5ca041c38a53f98eb6ed5719e406a,2025-03-11T16:57:02.150000
|
||||
CVE-2023-42662,0,1,3c4ba6455e091ea46a4a1f4bd3bf293f07b07aa2a2bf89cb2a988e819313957a,2025-03-11T16:40:52.237000
|
||||
CVE-2023-42663,0,0,7098afbcd944e4cb142bebdeb8bfa8201200547b7bdff1dd38937aae900d1d2c,2025-02-13T17:17:09.083000
|
||||
CVE-2023-42664,0,0,047574b3680118a4fbf5c0bcc44f6fe2f32d580fa6b9141e2353affb0098ab4d,2024-11-21T08:22:54.940000
|
||||
CVE-2023-42665,0,0,ac4ccacd7822c4c3b294a20315585c0819327c5044918b2c5b28e3a5361fa613,2024-02-14T18:15:46.030000
|
||||
@ -234105,6 +234107,7 @@ CVE-2023-42780,0,0,cdd093383de8ac80b2dd603c4cd8b5fb12111fdfaea151dda39675c869053
|
||||
CVE-2023-42781,0,0,e6266811e943f5b3219ef0407d2b4114a945fd77347810cc844cb61ed53dc644,2024-11-21T08:23:08.683000
|
||||
CVE-2023-42782,0,0,da0c83cbed17a04613b39ce2336362e43c1e910e28a92e71a36daf2e58e858be,2024-11-21T08:23:08.817000
|
||||
CVE-2023-42783,0,0,98b628fd4937ef156152a20479ae772c8ff5e58950f81df1627766b6fb5ac59b,2024-11-21T08:23:08.960000
|
||||
CVE-2023-42784,1,1,ffd94a0fb16b6b6651efc867799a71f085dee63f239bf562c22b99d608c43473,2025-03-11T15:15:40.033000
|
||||
CVE-2023-42785,0,0,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000
|
||||
CVE-2023-42786,0,0,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000
|
||||
CVE-2023-42787,0,0,9495dbf34a13c743d9a5e135b36546505b91d005fdd69c84cafbd04056c07414,2024-11-21T08:23:09.100000
|
||||
@ -236367,11 +236370,11 @@ CVE-2023-46158,0,0,82a3b27a09f8b6d4af50535637f653dfbe6af9e09b53a66ace7d317ef15d7
|
||||
CVE-2023-46159,0,0,a9a4381520ef89bf12666310cf5a0db135d670a0c49e8d35deb299a317d62286,2024-11-21T08:28:00.460000
|
||||
CVE-2023-4616,0,0,f64fa3b90907518ea67902a05e6872124fd0726c90f62c0e26e73916a42979b6,2024-11-21T08:35:33.150000
|
||||
CVE-2023-46167,0,0,afd529d982da16d18720d4c13388bd1183b6956c7d792ce9bc4a9ee4dd22bb23,2024-11-21T08:28:00.590000
|
||||
CVE-2023-46169,0,0,c122dcedb7a3106bebafab755be081f5a7c1050dadce9a606ebf1c2b42582696,2024-11-21T08:28:00.727000
|
||||
CVE-2023-46169,0,1,b85fd983b269c0a82ccba29bb108a177e2f752d7ee10f097b0a4c78f51f3d124,2025-03-11T16:55:36.417000
|
||||
CVE-2023-4617,0,0,b03743ffbbfe7e3ed1460051a543b4b3a4b51beb915eb8de95f3b60d0ec8d639,2024-12-19T10:15:13.147000
|
||||
CVE-2023-46170,0,0,02fbb345e6684ea3252480382fe917b2093cd91020cabb6e62386cbddcab9ae0,2024-11-21T08:28:00.837000
|
||||
CVE-2023-46171,0,0,99246d3eb2c5af0979b770d4b460e6e7d5f8b424ca56568cf6c30f5c307fa2a1,2024-11-21T08:28:00.963000
|
||||
CVE-2023-46172,0,0,e6d64572c481ef5111eb147fe1f8e056cf30f2bd98551cff315706b0e04dd94d,2024-11-21T08:28:01.080000
|
||||
CVE-2023-46170,0,1,2f961787bf847094d884d27393834993346c8bb5c67f07436d86634c22693f19,2025-03-11T16:55:27.780000
|
||||
CVE-2023-46171,0,1,3a5bdd1266cb78081d97ec808236ef46be575b58e8227032fc1682d4c1ebaae5,2025-03-11T16:55:19.027000
|
||||
CVE-2023-46172,0,1,64d797d4dd2c4d65392b258eb4f8322c328f88c24d8edbe3404d4798be86dd6f,2025-03-11T16:54:26.763000
|
||||
CVE-2023-46174,0,0,4cc9539c5fe9034dbae55b6f379ceef39504bfb484d49fbac34e60901ce64f91,2024-11-21T08:28:01.200000
|
||||
CVE-2023-46175,0,0,26721f799191f5602a0142ae17cb7a4743c01c780bc2a9d312b7ffec491d9c22,2024-09-30T12:46:20.237000
|
||||
CVE-2023-46176,0,0,026b76715c132f309c8fceb70e4a6fec5192b55c2ff94eabf1a439ef34a0e685,2024-11-21T08:28:01.400000
|
||||
@ -238375,7 +238378,7 @@ CVE-2023-48721,0,0,a57495dfa76ee6e939f1f2b3381889b765b7c4b544073fd167f06af83cf20
|
||||
CVE-2023-48722,0,0,b4bce794dbbf9b1d35759682688342e6b781296e0b85eb6427551aab9dea68c5,2024-11-21T08:32:19.843000
|
||||
CVE-2023-48723,0,0,46bda205941385a606aeb420da268e3516d52a9631f8eb19fb287c1f54b86a50,2024-01-02T16:15:12.377000
|
||||
CVE-2023-48724,0,0,e6ab0d9e64a2284fcdfff90e3a9f85a443cde662a0db6f09bf6b186bd198ead6,2024-11-21T08:32:19.990000
|
||||
CVE-2023-48725,0,0,6e75b34e9b6f3f0fe7af03e50852b0309e2d1e2fe178308088a05d1a27c25dd3,2024-11-21T08:32:20.120000
|
||||
CVE-2023-48725,0,1,c9d9d8856e0027f7c317bbfe0ee2e5abce4f5c7a5e1ebe942f758d2d523fcdcc,2025-03-11T16:56:47.143000
|
||||
CVE-2023-48727,0,0,57081be578023f81a6e95f9fdd0d786ef87b8ace2b7257c8e6a92924f470be77,2024-11-21T08:32:20.260000
|
||||
CVE-2023-48728,0,0,3d40f2cfee57843e3b1c2a05847e8926585ff2485f5aee916a2deecebd7bf716,2024-11-21T08:32:20.380000
|
||||
CVE-2023-48729,0,0,6610f082f226d878b6889d68d8e386a1615e2b9519b2fcf4a41ca3546b7580e9,2024-02-14T18:15:46.243000
|
||||
@ -238441,6 +238444,7 @@ CVE-2023-48784,0,0,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd62
|
||||
CVE-2023-48788,0,0,2db98462fc8ef2fb921267e516a454b300a71aa8f3c35868beb3a33fd3cb277a,2025-01-27T20:56:34.083000
|
||||
CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000
|
||||
CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000
|
||||
CVE-2023-48790,1,1,fc8925c21035cacf425395afeddf12b2570f3fbe5d9630a90a20fd5242f97b2e,2025-03-11T15:15:40.227000
|
||||
CVE-2023-48791,0,0,31c96e4e1869546f12717fd141d38efd00e2ed04c54f4d96999394432c372674,2024-11-21T08:32:26.740000
|
||||
CVE-2023-48792,0,0,de3a854106cd0cc670737f05a31c26ef1df7bbfc37a35ab06907ec52d7b8d166,2024-11-21T08:32:26.867000
|
||||
CVE-2023-48793,0,0,d3e6293b1688749ef1b2a2f41972e932db866d779affe9d4c74e699cada6710c,2024-11-21T08:32:27.047000
|
||||
@ -243671,8 +243675,8 @@ CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43f
|
||||
CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000
|
||||
CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000
|
||||
CVE-2024-0367,0,0,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000
|
||||
CVE-2024-0368,0,0,01599c55a91425e2ba7730abbc41f61a2e52bd19c0845871043d03d028cadb76,2024-11-21T08:46:25.077000
|
||||
CVE-2024-0369,0,0,5ff93566d28a0ecc5b41044532b8462289ecee111c6146af9553d30292e58558,2024-11-21T08:46:25.280000
|
||||
CVE-2024-0368,0,1,899a131a121911b9b59721868468591c2716da1a0d3a8fdfcc57bb32e8e39e49,2025-03-11T16:51:23.420000
|
||||
CVE-2024-0369,0,1,cc21965cce3ae62979230688ecf1eb3bf3ef856bdbae3a57fefed343f23b6742,2025-03-11T16:38:55.427000
|
||||
CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000
|
||||
CVE-2024-0371,0,0,5c3d442f8ecd87f51d1c113b9afa4febd80318afc8cd2eb08f21826e97011962,2024-11-21T08:46:25.620000
|
||||
CVE-2024-0372,0,0,cdefb651d58754406381dc11b785774bfb0c82915c9d61404379e3d0e8cdf370,2024-11-21T08:46:25.763000
|
||||
@ -243745,9 +243749,9 @@ CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d477
|
||||
CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000
|
||||
CVE-2024-0445,0,0,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000
|
||||
CVE-2024-0446,0,0,124de0675cc01e13555049891a9a6623c7dacc61fc8dd34a8640dbaebb1bf4be,2025-02-10T22:15:32.380000
|
||||
CVE-2024-0447,0,0,7548d345fbc58c2a7dc6655a6b70a54701d5e8b807502de5f85fcff9a6f1eff6,2024-11-21T08:46:36.667000
|
||||
CVE-2024-0447,0,1,7244dcb7cd7d54fe2e11983b8e31094feb40a99088e225fca1d7ac5c46622709,2025-03-11T16:38:17.530000
|
||||
CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000
|
||||
CVE-2024-0449,0,0,6d075a833530dc7bf5a3b691ee9e41b5afa9e0f8be26a593c77ea2c5a8a57e9d,2024-11-21T08:46:36.907000
|
||||
CVE-2024-0449,0,1,d99e5d0a35181dd2a3d2d031655f5697c37a03e36f367816eeff2d8b2c43571a,2025-03-11T16:37:53.670000
|
||||
CVE-2024-0450,0,0,a1b920c11dee63a8e3076083ddfa38e003146c3343c7cb62828f303698cddd99,2024-11-21T08:46:37.017000
|
||||
CVE-2024-0451,0,0,5ae993f8fa6f67f9d1878c2219b82442c9f9c27de5c52f54d2bec468f56d2b20,2024-11-21T08:46:37.177000
|
||||
CVE-2024-0452,0,0,e6fa2ac1a01ec8b171e192e303abcab51e8cb5be7741930dcf71a5f39de8743b,2024-11-21T08:46:37.307000
|
||||
@ -243886,7 +243890,7 @@ CVE-2024-0588,0,0,7363ace3d041ccd002b9e661fab0dd7d9434accbd53e8594f6313805a3b242
|
||||
CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000
|
||||
CVE-2024-0590,0,0,f481ef28d4575792e39f3242fc31f5dcf3d5ce08c797600680221de34f5472dd,2025-03-04T12:24:19.653000
|
||||
CVE-2024-0591,0,0,7fbea116192591335f8f1d5d2d14cd82c8c9b52d606ae6c5428a8e5fb76fea73,2025-02-07T17:53:51.437000
|
||||
CVE-2024-0592,0,0,1a17724febf8153342670e1a2ae0c506c1f9d961e5fb4933bcc637f6677b5b7a,2024-11-21T08:46:57.690000
|
||||
CVE-2024-0592,0,1,d0edc05bd1c4665eac5c0d8b9a0ca86cdd3c8cf54377132974e72b81d9d39b2a,2025-03-11T16:36:50.407000
|
||||
CVE-2024-0593,0,0,f4e7a74601373b533789dea3664523c6cc99316255f76051d128ea0eea35276e,2025-01-31T16:36:29.673000
|
||||
CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b2485d,2024-11-21T08:46:57.910000
|
||||
CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000
|
||||
@ -243967,13 +243971,13 @@ CVE-2024-0677,0,0,b4c560c44727f9fe5276cdcda87d504c928ad1eaf14102e32eb183b929a3ff
|
||||
CVE-2024-0678,0,0,43e537611bc5b5d189fcbe022a7433f6dd35e16a8d10cfc0840dff499dd5c5f9,2024-11-21T08:47:08
|
||||
CVE-2024-0679,0,0,61e0d9c8766a5ecfcd68948a8bff1790dbda73e7ca286c7816ef777adbbab7b0,2024-11-21T08:47:08.137000
|
||||
CVE-2024-0680,0,0,a0668df1b5089627ca4a88c86111e9531108e2bd157fb56cee2218188a426e3d,2025-02-07T01:27:25.297000
|
||||
CVE-2024-0681,0,1,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
|
||||
CVE-2024-0681,0,0,87b2adbd7715ef0c6f7e3fc22b44e178c33c40b6f7c29347a759ebf613b9f7be,2025-03-11T13:33:45.277000
|
||||
CVE-2024-0682,0,0,0d610781e138a825a4958396671c33b7f8a7fbba61d41cf7c6c5ed681606439a,2025-02-07T01:26:17.227000
|
||||
CVE-2024-0683,0,0,0b61242f72deccafdccabf6b8c0e4833c3a60dae01a34ab1083f8aefc6994287,2025-02-13T20:14:10.457000
|
||||
CVE-2024-0684,0,0,4389372bb76766ff46732933ea0f1b8d1d950513125b7fa6117c7f956f196fa2,2024-11-21T08:47:08.707000
|
||||
CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b8262392,2024-11-21T08:47:08.837000
|
||||
CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000
|
||||
CVE-2024-0687,0,1,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
|
||||
CVE-2024-0687,0,0,4bc75288efc332cd39928a1531984d4878dcfa80318eb330531ab2ed67d80283,2025-03-11T13:32:08.780000
|
||||
CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000
|
||||
CVE-2024-0689,0,0,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000
|
||||
CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000
|
||||
@ -243986,7 +243990,7 @@ CVE-2024-0696,0,0,34d00cb254f7cf4a7093a585c54d9d7f30888019d67c8e153525039a02e0b8
|
||||
CVE-2024-0697,0,0,e9919142a54436f19fc761fdb7f668d20ed1451c051d4c52306aa6fd1fc674aa,2024-11-21T08:47:10.177000
|
||||
CVE-2024-0698,0,0,a01ed5dc7b9347205ead50276d5f53c378c03afb7285b2a0d01a27119979e7cd,2024-11-21T08:47:10.293000
|
||||
CVE-2024-0699,0,0,76e0d4ff7a6c7cec726bb9d0f8dcd611b263184fdcc42117ab04d2112edec24d,2024-11-21T08:47:10.410000
|
||||
CVE-2024-0700,0,1,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
|
||||
CVE-2024-0700,0,0,ac3e3621778b65e996092479935d35d5822a5b6777807eb3a41da8381759c32c,2025-03-11T13:30:56.303000
|
||||
CVE-2024-0701,0,0,1676b6dada46706acbed70af8cd91d936d02f269f1a280f9961571f79de427ca,2024-11-21T08:47:10.637000
|
||||
CVE-2024-0702,0,0,350df7245d7a8ec7d5bfd7a7abcb59e4b6713c6e1dc19c91c960db18519e03f3,2025-03-04T12:24:19.653000
|
||||
CVE-2024-0703,0,0,2bdd6368afe49b73347586b7dff865ce242ed66459569d92da90bc646df4d49a,2024-11-21T08:47:10.867000
|
||||
@ -244107,12 +244111,12 @@ CVE-2024-0821,0,0,8d0f135a1bde00f8a9f6278553dfaf4cfb224409407e8fbdd3c58db9c4b996
|
||||
CVE-2024-0822,0,0,ef76e16156f0ac7ca3043141b54dd9d9595137069497b8b98eaa4426b49c0d84,2024-11-21T08:47:26.913000
|
||||
CVE-2024-0823,0,0,21edb93883c10572ce3fc6543a7117ab2546576231087fc0efeac50fff9d0967,2024-11-21T08:47:27.097000
|
||||
CVE-2024-0824,0,0,ab0f1a06d03ea9246da6993faa29a4153ae4f70daba1ec82239bb8b33042024a,2024-11-21T08:47:27.227000
|
||||
CVE-2024-0825,0,0,8368c0b2d935747c4416145f93f1c58e0c8789147efa665f75b7d372823dcb87,2024-11-21T08:47:27.350000
|
||||
CVE-2024-0825,0,1,3eeadae267eb84632257a554ce3df82d1232b825b126727f8f5568c48e044933,2025-03-11T16:45:26.630000
|
||||
CVE-2024-0826,0,0,182eb30be7fa0f586f4634f649452c117748e8eb01ef17d62588eb48812ccf8c,2025-02-07T17:54:42.907000
|
||||
CVE-2024-0827,0,1,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
|
||||
CVE-2024-0828,0,1,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
|
||||
CVE-2024-0829,0,1,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
|
||||
CVE-2024-0830,0,1,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
|
||||
CVE-2024-0827,0,0,1c1c2a437ddf2e263a0e16738a9b7c32ed2f6c7126fe4c0a5b85b2f22331fe95,2025-03-11T13:30:12.340000
|
||||
CVE-2024-0828,0,0,08ed1c566231bfe152239416f88b685f1e730719acab616dcb31b166494b4f68,2025-03-11T13:29:49.430000
|
||||
CVE-2024-0829,0,0,5bb2157175e5250f2e2e093d4d7b216d7ae80006642d5db874613bc95830711e,2025-03-11T13:28:57.287000
|
||||
CVE-2024-0830,0,0,2537d26da3d0f537279ff6cad22123677c09daf01747ce2451bc4871679ca23b,2025-03-11T13:28:31.400000
|
||||
CVE-2024-0831,0,0,6baee579993cbeecaeb7cee0d0b13caae035ddda995acb36d260dde4d948fb10,2024-11-21T08:47:28.063000
|
||||
CVE-2024-0832,0,0,1b423f590b65fdd178420c761d7331c78ddff8dcb7f56481b4bdab36868e37da,2024-11-21T08:47:28.210000
|
||||
CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc738e,2024-11-21T08:47:28.357000
|
||||
@ -244121,7 +244125,7 @@ CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d866
|
||||
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
|
||||
CVE-2024-0837,0,0,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
|
||||
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
|
||||
CVE-2024-0839,0,1,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
|
||||
CVE-2024-0839,0,0,7419611ff80e53e758c8cd80aa20c0012d18c6529423bd11ea8736de6294e56b,2025-03-11T13:25:38.507000
|
||||
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
|
||||
CVE-2024-0841,0,0,3a05f459f3a8d83064b8e1099ecdeed027bd751dc61114ac0cf64a122e6ab390,2024-11-21T08:47:29.387000
|
||||
CVE-2024-0842,0,0,a21addff431b6495eec5619acafe2703ab2ab97c3043e7de1d5167d73e837833,2024-11-21T08:47:29.533000
|
||||
@ -244171,7 +244175,7 @@ CVE-2024-0893,0,0,2170c9e0100ff8148342649596480f9f43610161d24258e2101ab822f42ebb
|
||||
CVE-2024-0895,0,0,58c1bfbdedc7520b1b4b816bdf4e4c17ad39e5dd3321c15ae1cfdf8d5f2cfc42,2024-11-21T08:47:38.400000
|
||||
CVE-2024-0896,0,0,50bc494bccf14a5e7be91859c9b4550fa927c34acf01e96b6deb15e4d86525ed,2025-01-02T17:15:39.220000
|
||||
CVE-2024-0897,0,0,72a30bc0c93e8d051fe6ef3a2130ed86d55a5842537e30205f254ddfcbc1de65,2025-01-02T17:15:24.673000
|
||||
CVE-2024-0898,0,1,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
|
||||
CVE-2024-0898,0,0,8394f20dfcf20cca218c60caab8e8921405eec0f2b750b799f6bc4997bfe3c7c,2025-03-11T13:21:21.240000
|
||||
CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d9879,2024-11-21T08:47:39.107000
|
||||
CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000
|
||||
CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000
|
||||
@ -245016,7 +245020,7 @@ CVE-2024-10825,0,0,54ed301e324cdb7db6d0e88be13790fdaf11976da44d29c7e3fa072661bfb
|
||||
CVE-2024-10826,0,0,8483a84ab9e71d0ea73bc9e4319fdfbff8435867ca387f9a4e6773e9ea829486,2025-01-02T18:07:57.863000
|
||||
CVE-2024-10827,0,0,a81852c84499a448113e0c7be334c3f9aa68b76a583e8d33dd8ef2cc355a6e7f,2025-01-02T18:07:41.333000
|
||||
CVE-2024-10828,0,0,f50bf6cc23072807a8490498df27e8cf2141e8f43fa5a851246088f1addc0cef,2024-11-19T17:41:59.290000
|
||||
CVE-2024-1083,0,1,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
|
||||
CVE-2024-1083,0,0,0b85acc3c9cd326498cec9694b41b8eed1802c759f536404a786f6e3a92c9c19,2025-03-11T13:20:23.640000
|
||||
CVE-2024-10832,0,0,7120a3ddd993e3ab9c00284bc31e67657daa016574a4c41a7d739be14f96b64d,2024-12-04T03:15:04.427000
|
||||
CVE-2024-10836,0,0,5c16ff94bdcb3d8da8a7ce3912c47b3ac593666fb37c5010a5b9f5a82863bed2,2024-12-06T04:15:05.037000
|
||||
CVE-2024-10837,0,0,45b62909fcac6857769ac65c543bedb380cd04ee29f9d476294873378d0f2da9,2024-11-12T13:56:24.513000
|
||||
@ -245060,7 +245064,7 @@ CVE-2024-10876,0,0,cd2a03b731b615444f96af44211cf410ba2fe90ff9f3789af363bf6a1ce52
|
||||
CVE-2024-10877,0,0,7a3393b83a736557c04741e18efad94edf3c7ad0d4111e23694c36456b37491f,2024-11-19T15:52:44.487000
|
||||
CVE-2024-10878,0,0,e935cc8c1a3c418e2fb468b6a5204c057f596013ccdff68d1c5f5fec79fa2c40,2024-11-26T18:15:18.827000
|
||||
CVE-2024-10879,0,0,4fe7980fab4d2b80bcef2527765198187b03e9ced339a1403c07f82b84a559ea,2025-02-05T14:48:55.997000
|
||||
CVE-2024-1088,0,0,1d96b4cc19606bd5aa5187289a2ea0d426fba6045c1c1468d34c2706c791c746,2024-11-21T08:49:46.240000
|
||||
CVE-2024-1088,0,1,1911aaa4ea5cf2488027a06b8854fc8da49c7762b2ed23a42e3267c8f6452bc6,2025-03-11T16:45:03.303000
|
||||
CVE-2024-10880,0,0,34e1f62004f258ec82211d7b06454c17d69af4db3b940dca81e8b8e6d3913832,2024-11-23T05:15:06.207000
|
||||
CVE-2024-10881,0,0,2f3e22e11ad56ac6852044dc7782949b3df53870d23afcbba1c70c4b3722e551,2024-12-05T04:15:03.937000
|
||||
CVE-2024-10882,0,0,6b794c8f9b9f9e6f0ac203482f6418bfe899c8f536064495a56268c4eadd94aa,2024-11-13T17:01:16.850000
|
||||
@ -245336,7 +245340,7 @@ CVE-2024-11196,0,0,86073d672062faceb084c20cbe17a461a555aa7cdb4bc7856e7e10151f683
|
||||
CVE-2024-11197,0,0,3740e434f528bbbd61234dede2b4a36fd46292349d79d4749d70c21ad64992c9,2024-11-21T13:57:24.187000
|
||||
CVE-2024-11198,0,0,fc0b00a2733ca1e8fff2fe360f2e4cb1494fa8044fb680aa8d0f8cfd928aecc9,2024-11-19T21:57:32.967000
|
||||
CVE-2024-11199,0,0,4da6055bcafe2b8bce3b600ee20c2f5f1bd34151af116c40502e83cef4f24d3d,2024-11-23T10:15:03.897000
|
||||
CVE-2024-1120,0,0,117338e0693d1442b4d765711d1f59e5c219537f14e8d75a3d2c01086a02d944,2024-11-21T08:49:50.663000
|
||||
CVE-2024-1120,0,1,e98a16b725b0fddf3aa12432b0f5808c93b7dcd8a0fc795507e0507696589e0e,2025-03-11T16:46:21.947000
|
||||
CVE-2024-11200,0,0,7a5014fc24dac51453395d7130a599729868592263e54cecb121b499d8896404,2024-12-03T14:15:19.923000
|
||||
CVE-2024-11201,0,0,95ced2cef5a51b7fa14517c64bac4bc07296789d71763b16f225669a1035af34,2024-12-06T06:15:22.533000
|
||||
CVE-2024-11202,0,0,1c4fa16dc439f105ac28005f4d485fd2d81fcbfbfe746e38e05c1690388ba0cf,2024-11-26T08:15:03.710000
|
||||
@ -245704,7 +245708,7 @@ CVE-2024-11576,0,0,a8e0825213ef4c9c0f1c6d5ae79fb6ce1feb72964e892a902e8877ef0fbe7
|
||||
CVE-2024-11577,0,0,efb2567cb5c51db073457c6007c99b46c942618b2803d597011c7d051ef31b73,2024-12-20T17:36:00.887000
|
||||
CVE-2024-11578,0,0,3949bbadfcf8e803d9af59cc77849a55a262b9e95c93b371e5299de46c360cc1,2025-01-03T17:42:27.113000
|
||||
CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c20555837a,2024-12-20T17:35:51.253000
|
||||
CVE-2024-1158,0,1,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
|
||||
CVE-2024-1158,0,0,ddc5ced1956eeb64e48a779f8daaf13c9a158192a2be6ca09b38cb90d29393c7,2025-03-11T13:18:18.670000
|
||||
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
|
||||
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
|
||||
CVE-2024-11582,0,0,5e500d72782f3c6c9cfe57a8b04f3c73a0d08c89d5d781f1ea62d59a2f770b01,2025-02-19T04:15:10.200000
|
||||
@ -246633,7 +246637,7 @@ CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da
|
||||
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
|
||||
CVE-2024-12544,0,0,1f922a477e2d69a4ac7542d9141b74ae4ec5dce380319f3540946ad13911e768,2025-03-01T08:15:33.367000
|
||||
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
|
||||
CVE-2024-12546,1,1,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
|
||||
CVE-2024-12546,0,0,b678f39d6f830fe2fa66f4d8801b922ae1606fc5b519756ecdaf2f0f344a535f,2025-03-11T14:15:20.210000
|
||||
CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a5533de,2025-02-19T15:24:27.477000
|
||||
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
|
||||
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
|
||||
@ -246910,7 +246914,7 @@ CVE-2024-12876,0,0,1ffa30e052c61ab887510a276fef8ab27590dc6fb9dfd38d21f07749b3182
|
||||
CVE-2024-12877,0,0,1888c35ba77d5a377e4b45354716e40dd6bfa1aa3f5f5b568834841a45c1fee2,2025-02-25T15:53:19.030000
|
||||
CVE-2024-12878,0,0,b64e1d2b2d1550ae633bcf2c37a6e44f5ae55d86c6146ff799e23d8870487b64,2025-02-26T16:15:14.863000
|
||||
CVE-2024-12879,0,0,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000
|
||||
CVE-2024-1288,0,0,58e0de106533fbadfe91ccbe8498dc993b445ddb25044f1435a62ec63a4fb787,2024-11-21T08:50:14.440000
|
||||
CVE-2024-1288,0,1,b16952ad0ec4325f74f86e8c0458f9c7f871b72b07bc8f5d805e0c9508272e88,2025-03-11T16:49:51.733000
|
||||
CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000
|
||||
CVE-2024-12883,0,0,fb17662563168c3886515b2425060e99b8383719947868b35de58ecbdd790200,2025-01-10T21:24:53.957000
|
||||
CVE-2024-12884,0,0,9e0582801645aa8c79972d850a96750ed43f73125934e68ee05e8491bd848510,2025-01-10T21:22:48.413000
|
||||
@ -247510,7 +247514,7 @@ CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90
|
||||
CVE-2024-13506,0,0,930bb6bf4f5f135719a404ee3e3d8937d2d3b23c92567785b27ff7a81d86db45,2025-02-11T11:15:12.263000
|
||||
CVE-2024-13508,0,0,5f4e00e5fdca87a538d7f485431f2011a0b7359585f9c44faeaf0151393de35d,2025-02-19T00:15:09.360000
|
||||
CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000
|
||||
CVE-2024-1351,0,0,405f7ca5457b566dd144bafd06aaa6f59a3ff04b5a8a69549d30c39336936faa,2025-02-13T18:16:24.043000
|
||||
CVE-2024-1351,0,1,3ce5565a1cf25a34ada057dcbec10019bc03a7a3b1fdc771d78627f87a05ddf7,2025-03-11T16:56:35.430000
|
||||
CVE-2024-13510,0,0,bf025b224548dff5677e13c6095ef04edc46d236692642ff5d521730071b549d,2025-02-04T10:15:08.167000
|
||||
CVE-2024-13511,0,0,8b315badaeb5a615c739271a3e79d1cb9a54c1aaf05d6bc1436615af32fdbe24,2025-02-05T18:22:40.217000
|
||||
CVE-2024-13512,0,0,15b524ef140c14d839848665047eaf39bfa9911689193bf2e25f735ef0c619c4,2025-01-31T18:08:22.743000
|
||||
@ -247576,14 +247580,14 @@ CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4e
|
||||
CVE-2024-13571,0,0,ab309a8c78e09a2ce738fdc24b971e3cca9be1cecd7a9446e1d144bb91a81bc0,2025-02-26T16:15:15.210000
|
||||
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
|
||||
CVE-2024-13573,0,0,47f56a6be89a4bb63ceadbae078e78a73033980ecb24e71f52f10b691c304d4b,2025-02-24T15:40:57.757000
|
||||
CVE-2024-13574,0,0,e8fa1ade73e9481fb704f93d82f5f17b8b9dc57044ddc9a22b20ba9880547d49,2025-03-11T06:15:25.680000
|
||||
CVE-2024-13574,0,1,a3824c096da031a79efdd9d44aee6c98173057ab11d0ce2659de8d8300b52fe4,2025-03-11T15:15:40.527000
|
||||
CVE-2024-13575,0,0,16cadedde273d2e44dd03e3555b4c264bb672dfe1040b3f8027897e23779bbe3,2025-02-21T15:35:18.820000
|
||||
CVE-2024-13576,0,0,48cc32358acb541ca620ae43d659608cb24956f0ab7ef76dd6f13e11fb588a30,2025-02-24T15:42:32.780000
|
||||
CVE-2024-13577,0,0,7ec226add5baf80fe65c72cfac22716a4ed179a333ffd2c2c08673fb55d268bb,2025-02-21T18:34:11.867000
|
||||
CVE-2024-13578,0,0,2e03d593d9cc9c5cb01e1d2f1b7697601c3fdfe810a05cbd665a89f4ae6da901,2025-02-21T18:33:08.770000
|
||||
CVE-2024-13579,0,0,9640388d79eec1df931f220b7238300cfc32ad9fa9f52686d215010fe1b6e407,2025-02-21T18:32:31.837000
|
||||
CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000
|
||||
CVE-2024-13580,0,0,dcfc2143ca86c28f3f85eec6634510fbac0c94243c65d05c88a1ddf73ddb4731,2025-03-11T06:15:25.813000
|
||||
CVE-2024-13580,0,1,f7f33894d4a344d61f919692cf3def7d7308c04f540a8cc7226ad66b9e0eddd9,2025-03-11T15:15:40.683000
|
||||
CVE-2024-13581,0,0,23b802948fc1ec2e74b6a22e5bf61730cbf3169612c89a9c03c344016e0c5f8b,2025-02-21T18:31:11.640000
|
||||
CVE-2024-13582,0,0,8d1bcfb1104599f11a579c3e54940cf5492586d1eaf9dd31aaec9254649458fc,2025-02-21T18:29:05.973000
|
||||
CVE-2024-13583,0,0,74ad7b83b093ee530d03665dfed8aeb7981ef34d0b7fd0bb7def11fe8ca86354,2025-02-05T01:38:33.527000
|
||||
@ -247615,7 +247619,7 @@ CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40f
|
||||
CVE-2024-13611,0,0,12cf0d23fdb6ecb0f110f9a143d60d61370605283cf62e7faa4a9aec63988bc1,2025-03-01T09:15:09.220000
|
||||
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
|
||||
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
|
||||
CVE-2024-13615,0,0,97d9c0be1e6a98b89fbc09315ada2f3c74202fe6aea59044ac6e8414fe522c2c,2025-03-11T06:15:25.920000
|
||||
CVE-2024-13615,0,1,2b3d7c20a4af237993378d11227e4d1fa24944b2308af01c8b5ff1225188d389,2025-03-11T15:15:40.840000
|
||||
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
|
||||
CVE-2024-13622,0,0,d2688be4d32a38fa0003e8b919920c245dea1fd4a1949bfeea892e9dd65d3580,2025-02-21T16:05:34.047000
|
||||
CVE-2024-13623,0,0,46a09ae0be01707a027ecd2168a6150e19984c64d67b3517affe48621dcf728f,2025-01-31T07:15:09.830000
|
||||
@ -247725,7 +247729,7 @@ CVE-2024-13728,0,0,fc3600c0f61ce7085e8da7204bc76ef6f37fa32ad9251533dccbbb08ac578
|
||||
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
|
||||
CVE-2024-13732,0,0,bcdeee89cdeb266ab97f726fd75be409e85077926d11675c2a570d0f94bb99ad,2025-01-31T20:22:33.503000
|
||||
CVE-2024-13733,0,0,4ca526af1929c133c0fe46b638ac9c59d6820bc471060a7321cdbca576df02e1,2025-02-04T10:15:08.527000
|
||||
CVE-2024-13734,0,0,c0c2c683f5b658fc14994e3be65481765f20d38b94a5d38a7b8c7ec0b131b1aa,2025-02-27T10:15:09.980000
|
||||
CVE-2024-13734,0,1,fb13d30c5d3b7eac80b2a64e86d45d007134e68bd4fdca6d18f22cd1479a839b,2025-03-11T15:55:48.603000
|
||||
CVE-2024-13735,0,0,3547c31c6d72f19019bc47ce66440b94aad2dbe68a07077b91d9f59acae687cd,2025-02-25T03:45:15.060000
|
||||
CVE-2024-13736,0,0,e1c661a83958ba599f5e79cad01930aa57fce7dc9eb18a31a6e422469d19d5dd,2025-03-06T12:42:22.567000
|
||||
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
|
||||
@ -247799,7 +247803,7 @@ CVE-2024-13832,0,0,7b2f53a85419258936a296c93c771968c75a2af3851abffefcd1775c16b73
|
||||
CVE-2024-13833,0,0,0880b5318dcbe63992d3f2badd6c78eb8ebd6b2e485dc13d406b59785dd947c4,2025-03-01T12:15:33.230000
|
||||
CVE-2024-13834,0,0,43e5ae6cc904537a30eeccc37c7b9a07fd2bfb264b9574278bc2a72960c00c36,2025-02-24T12:37:18.957000
|
||||
CVE-2024-13835,0,0,bb466c42b5ac88f927aad0c176f7f2be8448370020dc544158a1fa7d8a0b9abf,2025-03-08T03:15:36.760000
|
||||
CVE-2024-13836,0,0,023f13c3eadf78202b05c2c4394d8dd9c57ce5f1cf5df6629baae82707c3d4d3,2025-03-11T06:15:26.070000
|
||||
CVE-2024-13836,0,1,db6e49418a661de0a1787c92b36ae426d3cce34cbe5b5b4aacb35b485e1eb235,2025-03-11T15:15:41.010000
|
||||
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
|
||||
CVE-2024-13839,0,0,271371a4da5d24a94b607140c89c40b4d635e3f04318c9eb7bb8dbeb5839bd6e,2025-03-05T10:15:18.443000
|
||||
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
|
||||
@ -247814,19 +247818,19 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050
|
||||
CVE-2024-13850,0,0,21374982a6b82adc74612a8ed4ca91538e192f9010fe0e837b933250ab0049eb,2025-02-24T17:36:09.667000
|
||||
CVE-2024-13851,0,0,592a591d98f0f1b719f907e8ef0e6cf89b3d77cf86e303183778d5c89e82d5cb,2025-03-06T16:36:54.387000
|
||||
CVE-2024-13852,0,0,dd2c33f18b8ccbee6b646903a658fcb7af55315e978ebdb8f9c794cc0b1e0482,2025-02-21T15:50:45.813000
|
||||
CVE-2024-13853,0,1,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
|
||||
CVE-2024-13853,0,0,afe74d73e4f34b373f4881fea9ab4c7b95eb8da3977e592a4fd669c68326ff5f,2025-03-11T14:15:20.417000
|
||||
CVE-2024-13854,0,0,183a2c601c3fd979d79a24b06fa3cbfa973155a4b804ec2de6206e0f22615048,2025-03-06T12:42:22.567000
|
||||
CVE-2024-13855,0,0,9aad1f9df577d823156d8f799c672a44111ca2c006ede84d8cbdc8cff07c1227,2025-02-25T18:23:31.507000
|
||||
CVE-2024-13857,0,0,62c21b594570822db9f726e0947e55bc1e6ac977159c9c8adce0532ccfd1f3c4,2025-03-07T10:15:16.293000
|
||||
CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000
|
||||
CVE-2024-13862,0,0,6a0babfd6f76f244174771c4c3bca176635075b85528805a413dee6669b8f0a4,2025-03-11T06:15:26.303000
|
||||
CVE-2024-13864,0,1,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
|
||||
CVE-2024-13862,0,1,22b36d42c637f4d3af4cb8a8a20990860c7cb0de0e7b0b6f4015a9938343536b,2025-03-11T15:15:41.180000
|
||||
CVE-2024-13864,0,0,f647edd0adb05ef5de412b885151977c97c8ed39f0f14946834eb242ea7c1983,2025-03-11T14:15:20.570000
|
||||
CVE-2024-13866,0,0,7d9c8d2b250d9bc5b19eef56e97d885c4cc053e0a99371616549569976a9e91e,2025-03-05T09:15:09.587000
|
||||
CVE-2024-13867,0,0,d1ccd3c88095b1998a7fe8f4f64aebb963278c8b08e66fe2014f445cd5f48e2a,2025-02-18T18:41:21.660000
|
||||
CVE-2024-13868,0,0,892bab8e346a933d5fd6b056fc8d7270c97a096d31581e4b311d92d8c397205c,2025-03-06T15:15:15.297000
|
||||
CVE-2024-13869,0,0,c77419cef6121e679e8e638d5bb725353463651ff74190e6dc66952341bcdf5d,2025-03-05T21:28:15.293000
|
||||
CVE-2024-1387,0,0,8e6bcbdaec79085616e17d0cff8f7e9074033b4370339ebb2fb375231d6ccb3f,2025-01-07T18:19:26.400000
|
||||
CVE-2024-13873,0,1,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
|
||||
CVE-2024-13873,0,0,55e5174b0343fd72e7abadc33d2c5cbba17148439d124d339cc41ecc820eadf2,2025-03-11T13:32:22.040000
|
||||
CVE-2024-13879,0,0,840cef42e99ba3012c3b31f8bded69776814665d9c25d0869b7b55ae4acecc40,2025-02-17T16:15:15.950000
|
||||
CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000
|
||||
CVE-2024-13882,0,0,d23d49c98387f6442c8f9aba1e2405a91c54af6f21f17367597a68563af5b8f3,2025-03-08T09:15:31.250000
|
||||
@ -247839,7 +247843,7 @@ CVE-2024-13893,0,0,3c191b019ad8bca41c9ceeb2c69d9c8d113c5eb0e064d21fcad8c74b69588
|
||||
CVE-2024-13894,0,0,ab63312fe14c13f84248948fb7e1cbd71d43e934157dafc13d81e8ce97c05349,2025-03-06T14:15:35.777000
|
||||
CVE-2024-13895,0,0,4492bc2ee257d18bca9953df9b8cac0c39e553a0becf0650f5a076f780c0075e,2025-03-08T03:15:37.073000
|
||||
CVE-2024-13897,0,0,2b3f7eacba585b88f33d4479c2c59b1496c7bd3c646dfd79c58ddcf5446cb9a9,2025-03-06T09:15:25.787000
|
||||
CVE-2024-13899,0,1,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
|
||||
CVE-2024-13899,0,0,e4edc715220452fd07e6220b5cb8d42a824a7066c35204e88b1bc8bd671b1f9d,2025-03-11T13:26:57.550000
|
||||
CVE-2024-1390,0,0,ffdeb8cc4a3b1077717739c1e237f842eedff68b0ec02858887f3acd549f9f88,2025-01-22T16:49:11.553000
|
||||
CVE-2024-13900,0,0,a36f38c86f625b2f6c78f95d04b10fcda1c4c7dcd50cfc141d8c356f3933fb59,2025-02-25T04:02:36.137000
|
||||
CVE-2024-13901,0,0,eae64dcc2a1b4a359bdfacf8ac3e5ceaa3388c11896901d76eda175625edfbfb,2025-03-01T06:15:33.827000
|
||||
@ -247847,7 +247851,7 @@ CVE-2024-13902,0,0,2d798b0c40a1d59ba77da363cceb392cdd45de698d6466927a1240987fa60
|
||||
CVE-2024-13904,0,0,4066bd52c81a7420cad2f813b88c8a82bd66a4addf44ebe17ec9b3f40af765e5,2025-03-07T09:15:15.817000
|
||||
CVE-2024-13905,0,0,c66be7cfbd34a458bb74dba95d4e6476fcc9754cf0f34a578dc3aa455a41a709,2025-02-27T05:15:13.610000
|
||||
CVE-2024-13906,0,0,49d3c886d6eb569e3be95840598d3644d2e3a759a922a1777a4a1a594b4b6b41,2025-03-07T08:15:37.467000
|
||||
CVE-2024-13907,0,0,6fda522756c0eddffc3b4aa0f215f879fcfe6340ad02f1a9da7e38e20feb022c,2025-02-27T07:15:33.543000
|
||||
CVE-2024-13907,0,1,3b0e87cf5752b8b0fccb0cb5069f80bf05370ddfb297c2e78ae1a11702604545,2025-03-11T16:26:05.363000
|
||||
CVE-2024-13908,0,0,b02feb571c3f56395c71015215fc0c37a39f6c271a94ae36e8f1cf1686537b5a,2025-03-08T07:15:10.690000
|
||||
CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000
|
||||
CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1beea02,2025-03-01T09:15:09.517000
|
||||
@ -247904,7 +247908,7 @@ CVE-2024-1437,0,0,48f9317293466e50e9270a7a4c2ee4c7fe04a4aa3c804e8a49c32b35bb2e25
|
||||
CVE-2024-1438,0,0,fb430c357e1d68126b60f1d8048d93feaf0a298b7940bd08e7f1ba2d2923a492,2024-11-21T08:50:35.250000
|
||||
CVE-2024-1439,0,0,f018ca5c79044eb8d371c019838f427bc56a525451022c350168bc4b20b8a53d,2024-11-21T08:50:35.387000
|
||||
CVE-2024-1441,0,0,8524643e4a58354b4c6d975cbc4efa93d311c9d367be16dec8b7308fac65f976,2024-11-21T08:50:35.540000
|
||||
CVE-2024-1442,0,0,e603df77fc5b326a2e95105c33d6ffef2421f0c4884da42b043346435997aefc,2024-11-22T12:15:18.137000
|
||||
CVE-2024-1442,0,1,d2ae5e9689666f79c8cd6fcdb6df5574b7bc8d53d4d2e3769df0e7673b9ac707,2025-03-11T16:56:13.943000
|
||||
CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a7e,2024-11-21T08:50:35.827000
|
||||
CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8dc,2024-02-16T17:15:08.710000
|
||||
CVE-2024-1445,0,0,9033b90861f7285eae992be67e87fa2af5ca400c3f531050c841d15e90f13438,2025-02-27T22:03:40.670000
|
||||
@ -248165,7 +248169,7 @@ CVE-2024-1721,0,0,d0c914e77af4545b0584eaf250ba5ee3ac40626828eb6c5198526b9da864dd
|
||||
CVE-2024-1722,0,0,2f8380e4faab36562505848e0f3e8b24fceb1e65479ce875a559cbcf5e30527d,2025-02-14T17:24:40.253000
|
||||
CVE-2024-1723,0,0,11d3a45a60abd75514c9d5b662d454bbccfffc4644e8e6300f550c3165594abc,2024-11-21T08:51:09.993000
|
||||
CVE-2024-1724,0,0,b6939c282714eb0a778dca5ac11d48814e19c1fa2e871297c9ec9803570c2103,2024-11-21T08:51:10.117000
|
||||
CVE-2024-1725,0,0,89bb0cde0d54eebd135824ba7c6a8a694f36b81bce992a7be08e7883a75418ef,2024-11-21T08:51:10.290000
|
||||
CVE-2024-1725,0,1,c49e15e382bfabd0a0cdb614647abc7293de465c4bc389c49725ead47acce1e9,2025-03-11T16:55:54.263000
|
||||
CVE-2024-1726,0,0,5f254584205b82d10fa82259cc018f6a7e67209450947674089aa2a53b6163a7,2024-11-21T08:51:10.430000
|
||||
CVE-2024-1727,0,0,835ea1a8de83b3427eca53b821927695e2fbfdeed0970e648bc2bbc24acad5f8,2024-11-21T08:51:10.560000
|
||||
CVE-2024-1728,0,0,65ac5027c66230a900a5259c3b3bb10c527fa4ddae212a665be9e3b619bf334f,2024-11-21T08:51:10.707000
|
||||
@ -248210,7 +248214,7 @@ CVE-2024-1767,0,0,baef958abb8d02ce0e77d39e5455301fda321cb3c7dbc1f62e744892ba3db0
|
||||
CVE-2024-1768,0,0,084ea6e85b6e0db23c5de56c4e455942100ac7c25c4612406b0ed1fa01484f30,2024-11-21T08:51:16.190000
|
||||
CVE-2024-1769,0,0,ff77fc668bdbec6d05987f2f81bab9ea4e80c812689056057cde0b607f3fa566,2024-12-23T17:21:56.777000
|
||||
CVE-2024-1770,0,0,be7f84c853421e443cf5ae22747f87bd5c1fa8ecada9be24081bdcc6cc4bfe2f,2024-11-21T08:51:16.457000
|
||||
CVE-2024-1771,0,0,dfc64cd2d5902446d25294ce0163ab293276e26453b42c802ea6af4493302727,2024-11-21T08:51:16.577000
|
||||
CVE-2024-1771,0,1,3ea2f5226776062012b591b88fae846979789fdefd15944d103f97583a853f0a,2025-03-11T16:42:28.580000
|
||||
CVE-2024-1772,0,0,f99b113d86a69f6dc327bee2933c94ef07e01bd499efa53690214e4c00dd4e45,2024-11-21T08:51:16.703000
|
||||
CVE-2024-1773,0,0,8c65223f5516c06a2296cf03b178bcc4f946b8107a149044c776ecc9d166fc1e,2025-02-07T19:25:53.603000
|
||||
CVE-2024-1774,0,0,efbf233830d48bc327722f1b9ca6dd8e89c31b3681155704940a2eada3524c1a,2024-11-21T08:51:16.943000
|
||||
@ -248324,8 +248328,8 @@ CVE-2024-1885,0,0,7ea3ed176519e2703621ca997a7c0e104a14942fddc42c5f1878f52916751d
|
||||
CVE-2024-1886,0,0,34e830dda137490c30a7bd9991c0e47aa55f4dae681659115cad098a32c8ad40,2024-11-21T08:51:31.620000
|
||||
CVE-2024-1887,0,0,07427fe43adcc87e1ed287ebb70ad8434035bface1f49d7d6d6ee5c166f8d81a,2024-11-21T08:51:31.743000
|
||||
CVE-2024-1888,0,0,2e83865db88ed6ed7d86140820c0a0e9367a53c83075660506e138a739819dc6,2024-11-21T08:51:31.867000
|
||||
CVE-2024-1889,0,1,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
|
||||
CVE-2024-1890,0,1,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
|
||||
CVE-2024-1889,0,0,ce255133a881fe52df9bbc7416dccbfa58f22187bfa04959d323dcc69fe7614b,2025-03-11T14:51:56.797000
|
||||
CVE-2024-1890,0,0,9132dde10838f92d09c0a5b98d997a9ff884ec07b13957a64dacf09d8005b8b6,2025-03-11T14:51:33.223000
|
||||
CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000
|
||||
CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000
|
||||
CVE-2024-1893,0,0,0ec8c49fd71ae75323e3eb052e6c32aa986dbf45b2fbc40f25b1de1b4b42a104,2025-02-05T15:47:12.477000
|
||||
@ -248407,7 +248411,7 @@ CVE-2024-1972,0,0,0cc508917c2a729c9424480608443d75bc2e0685066a841069988bd5d702f9
|
||||
CVE-2024-1973,0,0,bdcc19c6cd3463ae97ce819fbb0ae7d75ae93c2f8b01f9a3134154723cf24538,2024-11-21T08:51:42.740000
|
||||
CVE-2024-1974,0,0,eaa50a4b08004c31860f05e044d5035945cf42def5f73984f24e27883e4f1dd6,2025-01-22T17:28:42.213000
|
||||
CVE-2024-1975,0,0,1ae0a6f555a0b739aa7c380171466dc1803a13ce978f8add5306445e96cc4399,2024-11-21T08:51:43
|
||||
CVE-2024-1976,0,0,a3555dbbbe1be129a03f073ac3b859df5d9dc7ad39e5f16531bc3f78a64440d9,2024-11-21T08:51:43.140000
|
||||
CVE-2024-1976,0,1,721a06b8c0569106f65a760df35d94dadd89ddf9ce5caee99bfdb33cc6bf531b,2025-03-11T16:47:09.213000
|
||||
CVE-2024-1977,0,0,b866919a45ab83f05a121c6cfdedc8a9e6189ad67b4d630b7e1d7f06da0f1de5,2025-01-16T17:49:32.567000
|
||||
CVE-2024-1978,0,0,f34d08f80c401194bafc483f71731efa7c10b199979cff06480c329f89074d9c,2025-01-16T19:01:27.267000
|
||||
CVE-2024-1979,0,0,450c8bced69f6acee39bec8a0cbc5907a91ea6349c4a430e3400e611d5082a4e,2024-11-21T08:51:43.507000
|
||||
@ -248417,10 +248421,10 @@ CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c65
|
||||
CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000
|
||||
CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000
|
||||
CVE-2024-1985,0,0,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000
|
||||
CVE-2024-1986,0,0,a7c84f282c3013ac88d7d83adb82846d5089dadc1a1375bf53f285962b881c3f,2024-11-21T08:51:44.357000
|
||||
CVE-2024-1986,0,1,9b98c609bb8992e2b4aca6821d4dbd4522e2f2a7233df6ab200c59c164e306f3,2025-03-11T16:40:10.820000
|
||||
CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000
|
||||
CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000
|
||||
CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000
|
||||
CVE-2024-1989,0,1,fb90ba8d298433814d9991719c5f96161751eef3cf6f5242d4f23501e06d7ccc,2025-03-11T16:41:12.650000
|
||||
CVE-2024-1990,0,0,269ecdaa26e7f72c4581113e86aecb027ddb59a00bb2be22c9f1e5fe0de2de0f,2025-01-17T19:30:21.120000
|
||||
CVE-2024-1991,0,0,609f174783bfbfc114313c7a20f55f994a40d20e0ff7bf44be0d1102da2583fe,2025-01-31T01:32:27.643000
|
||||
CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000
|
||||
@ -250736,21 +250740,21 @@ CVE-2024-22636,0,0,1e4cdb2e19498454c9737dcc475529caca1b19ae7a7edc7a426850b53d2e4
|
||||
CVE-2024-22637,0,0,039dade77fb191dfff09d08e405b542969a40a1d849914bee2191918ea512437,2024-11-21T08:56:30.870000
|
||||
CVE-2024-22638,0,0,108c8d542114070b6bb19320dbaaed817ba8f9ac690df310bade69c7c6ad70ee,2024-11-21T08:56:31.130000
|
||||
CVE-2024-22639,0,0,b53eee7dd80d478ea7b648e5833080319bd362dcf02e89daf46cd874e11917e4,2024-11-21T08:56:31.303000
|
||||
CVE-2024-2264,0,0,5c90d9ae72cf2b98634ac4925a03d47873ed890489d6a7784be19b15868c29eb,2024-11-21T09:09:22.863000
|
||||
CVE-2024-2264,0,1,232f67d48922124185b77f3f2d22dd07a1ecb262fe1a85256c747ae02d4e1317,2025-03-11T16:54:11.227000
|
||||
CVE-2024-22640,0,0,36d03e2cc909d79303f2eb78528e93e4fa6104824792fe48795b4980eb53856d,2024-11-21T08:56:31.477000
|
||||
CVE-2024-22641,0,0,856997cba980d31d366e37b94b0280a7e60234a998b80aca46f5f187c46c3c1f,2024-11-21T08:56:31.717000
|
||||
CVE-2024-22643,0,0,7d4b7a061bc3ed794466e62486d751770d3631735470a24af5d97437931c0235,2024-11-21T08:56:31.947000
|
||||
CVE-2024-22646,0,0,897269ea5a23769f1e114da4b7edb99d6a5804625943364785d03f7623433ad8,2024-11-21T08:56:32.110000
|
||||
CVE-2024-22647,0,0,959369f80422c942be459d7a75ac3f8d8e95fde82ea38d6255b4ac420d054c40,2024-11-21T08:56:32.270000
|
||||
CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69b0c,2024-11-21T08:56:32.420000
|
||||
CVE-2024-2265,0,0,04a54a701baf68779e4ce416559f6fcc353233fd426334a66f849695269d7d83,2024-11-21T09:09:23.013000
|
||||
CVE-2024-2265,0,1,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
|
||||
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
|
||||
CVE-2024-2266,0,0,149e5cbf8240d257640179c28ee36c419b37e8ddb8178d9ecfb532d67af9f69b,2024-11-21T09:09:23.160000
|
||||
CVE-2024-2266,0,1,62cdec52c3b043a305a2e8df6661c578fa55e3ccbfd1587b0dddb8b3d043f390,2025-03-11T16:53:46.840000
|
||||
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
|
||||
CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000
|
||||
CVE-2024-22663,0,0,6782a4082917ca38ebefef21e6f884aa140361fc8b102266ad8603a42c670e55,2024-11-21T08:56:33.187000
|
||||
CVE-2024-22667,0,0,edadec3a89e6c904804bef3249f22b6ef314bb09dc1b9905e67b22ac9563e6a1,2025-02-05T17:29:53.050000
|
||||
CVE-2024-2267,0,0,b0cf1527dec8e0daf9b4fcb54d90684de4aa09c8c3089d675830b60a2d36868a,2024-11-21T09:09:23.303000
|
||||
CVE-2024-2267,0,1,146a68e8c974bf1fe2a1896be2a5d484d82af8e3d85c42d653d86b50d3d2386f,2025-03-11T16:53:27.713000
|
||||
CVE-2024-2268,0,0,6d4e388d01cad7696055cb5384a116da443134cd3dd3539603ce459631f4aee3,2024-11-21T09:09:23.440000
|
||||
CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000
|
||||
CVE-2024-2269,0,0,b232691159734d72e16ba92082c60703628bf04e21c3699c7081fa618b278db0,2024-11-21T09:09:23.580000
|
||||
@ -252696,7 +252700,7 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d
|
||||
CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000
|
||||
CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000
|
||||
CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000
|
||||
CVE-2024-2546,0,1,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
|
||||
CVE-2024-2546,0,0,61804463bcd98d480ed37784327d8061c47253639826c7fd157b5366bcf93c66,2025-03-11T14:07:31.350000
|
||||
CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000
|
||||
CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000
|
||||
CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000
|
||||
@ -257843,6 +257847,7 @@ CVE-2024-32115,0,0,c848180be95bbc961b1fa26b25498cb9780e7ec1c116797482a6eccbb7c27
|
||||
CVE-2024-32116,0,0,140b66d8b58d23b0fe567501dcd986adbe9732a7da9e43b727de51e69eac6a7d,2025-01-21T22:19:07.690000
|
||||
CVE-2024-32117,0,0,bd78be4c7fc18e4c6cdf647393be0c96c39e14b7e7c17f1e39dba267511a48ce,2025-01-21T22:19:39.353000
|
||||
CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000
|
||||
CVE-2024-32123,1,1,2faf8987365127bdaafb0cb2ff51b70fb8608b065e7754f4c1a57ee6623eb5e0,2025-03-11T15:15:41.353000
|
||||
CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000
|
||||
CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000
|
||||
CVE-2024-32127,0,0,dded2ba7f0afc7a4f66304fe4ecc3b2ff22d2370ed0fac28ea97950754f4c2c6,2024-11-21T09:14:30.743000
|
||||
@ -258846,6 +258851,7 @@ CVE-2024-33498,0,0,1f30c91f4e1fa0f80d47e74558faedb6e33193f008defa74408da9a039105
|
||||
CVE-2024-33499,0,0,7f116e8c4230ef1848187957908348d64a492aad49a5d13e6d4695a9da304020,2024-11-21T09:17:02.293000
|
||||
CVE-2024-3350,0,0,e59786b43aa812e979d218752afde9eb031596b29f2efdc76a2915844b443c6f,2025-02-11T14:44:28.947000
|
||||
CVE-2024-33500,0,0,e05afec9b3c6153d2fb5e689d4f464913d13afee88f2b1108d2e9de13f02b158,2024-11-21T09:17:02.433000
|
||||
CVE-2024-33501,1,1,b22f5006f03b3bc1c907ca72d07467e05ec47af4bc9a19214a15fbdfc276e4c8,2025-03-11T15:15:41.550000
|
||||
CVE-2024-33502,0,0,b03ad6bdb7d50af328d0ec93aa8c63cc9d0b53d31f47494a80e249bff05450e0,2025-01-21T21:03:02.247000
|
||||
CVE-2024-33503,0,0,0c9f63716718c75aeaccba8cd0b99b5f4c042abe278d330de5d973c399a6c93e,2025-01-31T17:36:27.323000
|
||||
CVE-2024-33504,0,0,4f7a7e539d3a7bb985456ceaf1379824ec92908fe83342e88d744ac81e0ced13,2025-02-11T17:15:22.110000
|
||||
@ -266324,7 +266330,7 @@ CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216
|
||||
CVE-2024-43189,0,0,4329b1ae56560813f03b2e4daf88ebd148985b5623906e90c7a82cb945637938,2024-11-18T17:11:56.587000
|
||||
CVE-2024-4319,0,0,e167e76473e812074495ec236ec0a27727cfd54ad2188a3f78327f54417068db,2024-11-21T09:42:37.037000
|
||||
CVE-2024-43191,0,0,d5199499d5a91eb79af242e34e3162c18fd6ecd91ff3af4ecfe818744df5d4b8,2024-09-30T12:46:20.237000
|
||||
CVE-2024-43196,0,1,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
|
||||
CVE-2024-43196,0,0,3289563bfba313d1a658d9221f9b742518d70cfef918039fc44e6c379e3519f4,2025-03-11T14:57:13.920000
|
||||
CVE-2024-43199,0,0,fcee5ba70074f223c6f2288517860f0fd6af7cbe4c5e3f3003c072f968a17261,2024-11-21T09:35:07.337000
|
||||
CVE-2024-4320,0,0,66936457ccf92d087f54d9a7056c5f1c270eaa9e639ccc366ce51fdb54afa27d,2024-11-21T09:42:37.150000
|
||||
CVE-2024-43201,0,0,453483b258239daf1448f7e5203b69017bb10ecdf3ec4f3974614dfa66c011ca,2025-02-28T18:15:27.813000
|
||||
@ -267313,7 +267319,7 @@ CVE-2024-44189,0,0,74bae7e0ea0e127ff0dd8bcfea5ffa0e13e07892dd1a7bf2df17de4205cd8
|
||||
CVE-2024-4419,0,0,ba2477d3286ec6ab4ab62bfd9b86b02d79b23b6497b6c9703950ad337d472a29,2024-11-21T09:42:47.617000
|
||||
CVE-2024-44190,0,0,ec036b1f60dea569eef287561200a33a41aeefcf64eef3b61618ae6ebfbc5800,2024-09-24T18:02:25.313000
|
||||
CVE-2024-44191,0,0,d240f1b8433a5ce6dbe87e65698049b28e8c35859d01c776684fda07dd899ed0,2024-12-02T15:00:03.333000
|
||||
CVE-2024-44192,0,1,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
|
||||
CVE-2024-44192,0,0,4922d90e9ac0b62848d829438bd2dce6363151c2b61fc5a7d0793c9f6072cb72,2025-03-11T14:15:22.503000
|
||||
CVE-2024-44193,0,0,e8cd317fa1c1f489397fd49c4be8f85204f966e9fa00998149de32c25c4e3ea8,2024-12-11T02:53:58.413000
|
||||
CVE-2024-44194,0,0,789113f0658a6ddde1f6417d93be90ede379c24f3199a65cf3b83f7069f1c9c3,2024-12-06T15:15:08.690000
|
||||
CVE-2024-44195,0,0,793ae5f7226dd15cb3926acd88ee4934145dd1a5d78b00b744cd556289693063,2025-01-23T20:38:14.517000
|
||||
@ -268008,8 +268014,10 @@ CVE-2024-4532,0,0,014dcf5f2708015805e201ab211b9cd9fe192f81599e256bd8dd0d34d23e73
|
||||
CVE-2024-45320,0,0,278f3e436c23697518810a78c3b9b78245686b4943dd896d4ed03278de6fb6ab,2025-02-18T06:15:12.060000
|
||||
CVE-2024-45321,0,0,7c76da4e7fbb2242661f83a4480b440b53d8e0cb0dfda635981d7f5cbb74ebaf,2024-12-05T18:47:30.633000
|
||||
CVE-2024-45323,0,0,0b7a355a77d8731838f1cae0db38407098fd6b4582cf218a996117fa53bb1c18,2024-09-20T16:23:51.397000
|
||||
CVE-2024-45324,1,1,4133e76a2b4058cd57a414a0735ec625febe037e9b94067ea126f144c2293bdd,2025-03-11T15:15:41.743000
|
||||
CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce38b,2025-01-31T16:36:15.783000
|
||||
CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000
|
||||
CVE-2024-45328,1,1,11f11b7289e12a876badbd8e94658387a6a3d463241f480366ea749a2022371c,2025-03-11T15:15:41.963000
|
||||
CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000
|
||||
CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000
|
||||
CVE-2024-45331,0,0,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000
|
||||
@ -268751,6 +268759,7 @@ CVE-2024-46655,0,0,619756e28facd4dcca44a3c94ed931cf61b4408f1c51eeb5eca49c9e1ace2
|
||||
CVE-2024-46657,0,0,a5ced2fc9af0ce563815dae98d1fb612587af65b11df31ab1959075bb6481834,2024-12-11T16:15:11.770000
|
||||
CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c6d5,2024-10-07T19:37:30.467000
|
||||
CVE-2024-4666,0,0,b7505f51131c566a65a04c854bf3da56137a32df8f67317652113aca5c7be8be,2024-11-21T09:43:20.073000
|
||||
CVE-2024-46663,1,1,02c9063bc1f46f6ec7418f43b4f986605256f7597000bf034817913025656f4e,2025-03-11T15:15:42.130000
|
||||
CVE-2024-46664,0,0,f54dbed03769eeb78c38ac376a02143972104b9e7c971603cb26dcfe7d10522c,2025-01-31T16:37:48.283000
|
||||
CVE-2024-46665,0,0,ef84340be5f24c6331b3c4cb8bb0c1f046ee2bbf6a690df5c86ed76a3b7f8a7a,2025-01-31T16:09:23.847000
|
||||
CVE-2024-46666,0,0,8cb884f5e29fd5cfbec8babcd5171e651caec0625bb78127caef38457e72b5d9,2025-02-18T22:15:11.220000
|
||||
@ -270757,19 +270766,19 @@ CVE-2024-49333,0,0,e40cf35196ca18dee45163c0748fc145e27ae20ad0111de97528d70fea881
|
||||
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
|
||||
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
|
||||
CVE-2024-49336,0,0,539510d6e23e902df6d4e3e95547a312e71b12d932a3c561f3bb392c366417be,2025-02-25T12:15:30.257000
|
||||
CVE-2024-49337,0,1,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
|
||||
CVE-2024-49337,0,0,621ee91fb29666d3ce85f7dee78867edeac1e5dd4cc61ef0e36c5f3869d73023,2025-03-11T14:06:18.787000
|
||||
CVE-2024-49338,0,0,089f0961a6c5fcf1312af989afac1f42747fad3dccba1132721dce2e32b4ec33,2025-01-18T15:15:07.433000
|
||||
CVE-2024-49339,0,0,9425fb5c81f6dff392aaa0664ff1617cf111ffa2e6ae53225c22b9e873bc9df4,2025-01-31T17:15:15.260000
|
||||
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
|
||||
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
|
||||
CVE-2024-49344,0,1,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
|
||||
CVE-2024-49344,0,0,347784b34265f8b719b2af5b861570ef0177fd877a75f8c8b31285ef2dd3bfb4,2025-03-11T14:02:39.433000
|
||||
CVE-2024-49348,0,0,3f0061500b4dd4e17045ad16baa9e311ee1ac03ef6339695bbc97d441fd8b3c3,2025-02-05T12:15:28.570000
|
||||
CVE-2024-49349,0,0,ffc8da5d31c0a7888ad36cdc475b5ebfda5cfed0e4d2d3c1c13edb178b03d3f1,2025-01-31T17:15:15.410000
|
||||
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
|
||||
CVE-2024-49352,0,0,f24ee2d0b214fc07a70235001ceb8e4d8491919596338c7e2ff1739a0221b03f,2025-02-05T11:15:14.540000
|
||||
CVE-2024-49353,0,0,9a47fbcd7bb71cb815723fc7b290a5c5cc22a3729566f5b695bfbad427fe41cb,2024-11-26T04:15:05.690000
|
||||
CVE-2024-49354,0,0,9932955dc8f1f42bc5bd9552d18c452e3eba49c8f646b04262c7f057d2eb1053,2025-01-18T16:15:39.040000
|
||||
CVE-2024-49355,0,1,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
|
||||
CVE-2024-49355,0,0,cdb3030866a9a32f64528f4f82648ae2e6c29c66313443a1a997d09c50e59a15,2025-03-11T14:51:01.153000
|
||||
CVE-2024-49357,0,0,60dd20801e0d688d79febf6ddf905b7a0f6bb6d52339368c8c03007d3568ef2f,2024-11-06T15:28:38.160000
|
||||
CVE-2024-49358,0,0,9b3087a9abf7bda8601a66a382dce9cb35757f55c0440ca46162af784c9d23d1,2024-11-06T15:27:26.637000
|
||||
CVE-2024-49359,0,0,f7b8bcd2f4e26f53c20b7ffd38bd81c3325d7981bb7902337d9402d860e0b277,2024-11-06T15:27:02.347000
|
||||
@ -271085,11 +271094,11 @@ CVE-2024-49775,0,0,80561302864ea58e0b8a0928ce56db4a412fa4e922f0595e7642f4c103198
|
||||
CVE-2024-49776,0,0,b329b9bb81d9728287170b18d3b168a17467bbe39eccc58affb8da9d8a750f4a,2024-11-15T18:35:34.550000
|
||||
CVE-2024-49777,0,0,2267bc9ff93ef330d0a1f69ee1d413cb1459de2363d63c74f1eb9f77896870cc,2024-11-15T18:35:35.413000
|
||||
CVE-2024-49778,0,0,ce01f58133a3eca198de9ca85c44a1634d3ab246b582a1e70ee7b9bae211ce29,2024-11-15T18:35:36.260000
|
||||
CVE-2024-49779,0,1,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
|
||||
CVE-2024-49779,0,0,11d9faeca8efac548a54dd7061c5352db691c8008a0a29eedad545ec098243af,2025-03-11T13:55:21.797000
|
||||
CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c370,2025-01-27T21:42:09.123000
|
||||
CVE-2024-49780,0,1,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
|
||||
CVE-2024-49781,0,1,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
|
||||
CVE-2024-49782,0,1,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
|
||||
CVE-2024-49780,0,0,a5eeb5c953f31f22f904b9f32603ea26eb58551c6c880e6e71e38fa58f3218fc,2025-03-11T14:37:00.743000
|
||||
CVE-2024-49781,0,0,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
|
||||
CVE-2024-49782,0,0,eb1b325660d089297b139ebb8b35100ee9bf0dd503067300e105da1e368055be,2025-03-11T14:19:11.780000
|
||||
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
|
||||
CVE-2024-49791,0,0,96d737340062d391dc8d2ec65a3cf5814cdc712ae532abc47d5246ff31fb5b9d,2025-02-12T18:59:58.627000
|
||||
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
|
||||
@ -272246,7 +272255,11 @@ CVE-2024-51300,0,0,33bc9629d8540cbc2a733d31834d387baeb17f5f2187d5a5ac9dba848e387
|
||||
CVE-2024-51301,0,0,b66b641e4139e8ebaacd5ea6b531eed897a4506f18dea4aecced28d30671fab9,2024-11-01T12:57:03.417000
|
||||
CVE-2024-51304,0,0,1e110f5dd97c111e86ad4208bc6fd08aebd2d72d5bb280d26d0c29b8a309ef6b,2024-11-01T12:57:03.417000
|
||||
CVE-2024-5131,0,0,da5e519e37c4c18d994f27345cf3977fa837f039bcfa4f9d0e1faf90c1e84ff4,2024-11-21T09:47:02.353000
|
||||
CVE-2024-51319,1,1,2e10ad98f289bc32afe74a5132b79998845ade77f388d58a7300df2e3a60ac10,2025-03-11T15:15:42.313000
|
||||
CVE-2024-5132,0,0,1e1b0edf57956ef222afc7fdedc2f2211203f4402428303961b463cfc0ea97cb,2024-06-07T17:15:51.840000
|
||||
CVE-2024-51320,1,1,148a9b02d8313a38924d776ff31fd5c461323d8ed756be9f7a634f21c9e2ac8c,2025-03-11T15:15:42.447000
|
||||
CVE-2024-51321,1,1,3694f3f7720c2bc27f120049121c7803418bcb2120cd7be5fe47551e76c383a6,2025-03-11T15:15:42.570000
|
||||
CVE-2024-51322,1,1,f2b808cf5678dc485ab43515f10449914ab03abadd8400eebe996db1d2691758,2025-03-11T15:15:42.700000
|
||||
CVE-2024-51324,0,0,eae5779c3dbd2366931d9bbf9284e8b16a0b71d3d019224bd3ee356a90e26f8b,2025-02-12T22:15:39.830000
|
||||
CVE-2024-51326,0,0,32849095581e0af021d41eb6c3bbf891e7ba8499eb2382e7af07f008ba32d1d0,2024-11-06T15:02:12.403000
|
||||
CVE-2024-51327,0,0,5850f25922ddeec5e8ef2cdf5d18bbd20c5c5a49e7b4e65d69d89cf904135f25,2024-11-06T15:02:55.710000
|
||||
@ -273453,6 +273466,8 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50
|
||||
CVE-2024-52958,0,0,98e92315476166e2b33ba1e5334b4d282532d45d1556c1889e5c3ca4b973b75e,2024-11-27T06:15:18.590000
|
||||
CVE-2024-52959,0,0,ab868f6da3782d67cb53183f2f781a21b6375778bdbc1b7f5893121d76931881,2024-11-27T06:15:19.083000
|
||||
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
|
||||
CVE-2024-52960,1,1,233636e10d8786909f484dfb9dcd5a910159cd5a09c9722d5ccf26e64c25bdee,2025-03-11T15:15:42.813000
|
||||
CVE-2024-52961,1,1,8f690f3ac82316cb2ca972521b76bf71dc739ec9aa0a660930965a33c544d76c,2025-03-11T15:15:42.960000
|
||||
CVE-2024-52963,0,0,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000
|
||||
CVE-2024-52966,0,0,45e610534e7771fede3fd74a53db786846838aed2a0896cbe74153f4c82676d4,2025-02-11T17:15:23.260000
|
||||
CVE-2024-52967,0,0,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000
|
||||
@ -274222,8 +274237,10 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f
|
||||
CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000
|
||||
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
|
||||
CVE-2024-54015,0,0,15d5e1f3ec3d810c595ec1f32b64edabb37773d7fc12e946dfae697ba0178074,2025-03-11T10:15:15.450000
|
||||
CVE-2024-54018,1,1,dc8039244849f098489d5e2d0a96dd0b014c4c4a2ca7cba777f8b01232f5b796,2025-03-11T15:15:43.113000
|
||||
CVE-2024-5402,0,0,8a48be9314b3c9a679ac7b7baef4e61d2577cdb21f0001defb98f97ce31ab9a7,2024-11-21T09:47:34.947000
|
||||
CVE-2024-54021,0,0,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000
|
||||
CVE-2024-54026,1,1,c81b5f16f7918a61df17870ba5998cee06532556ca31b9249a0a740899d5fa57,2025-03-11T15:15:43.307000
|
||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
|
||||
CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
|
||||
@ -274252,8 +274269,8 @@ CVE-2024-5407,0,0,e082637321598f3dc8c3c9e1760b81a1e1197c4d13cd58fed3245c37f0bb71
|
||||
CVE-2024-5408,0,0,0b23a712a85d13fef48f02294d854672174790bd624dfee1416450ccef66434a,2024-11-21T09:47:35.690000
|
||||
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
|
||||
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
|
||||
CVE-2024-54084,1,1,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
|
||||
CVE-2024-54085,1,1,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
|
||||
CVE-2024-54084,0,0,4f0e210377467adee92f82d52ddf648b0c3cd7ee62f68ddad2a0ed9c569d6caf,2025-03-11T14:15:22.730000
|
||||
CVE-2024-54085,0,0,92258a2f99aac6276b664e2659d44d3ca335dbf093ccda66d6489065aa3fa75c,2025-03-11T14:15:22.893000
|
||||
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
|
||||
CVE-2024-5409,0,0,f7df79bf8c405f523130badde3800a80499e2a2f05cefac143617aad785ef5de,2024-11-21T09:47:35.810000
|
||||
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
|
||||
@ -274308,7 +274325,7 @@ CVE-2024-54135,0,0,77abd8154d8be3db4d7c9a03332ccd4782b63a6662a48190c38b32b12c923
|
||||
CVE-2024-54136,0,0,80704e0566a081b20b8eab10be4518ccdfa42ef09f8212c54ca1e875893e5b3f,2024-12-06T16:15:22.500000
|
||||
CVE-2024-54137,0,0,399d2df4e6b74eb8cfc8f334c4fdddeca2483bd8f66667dd2fd1dfb49e3c09f3,2024-12-06T16:15:22.637000
|
||||
CVE-2024-54138,0,0,24479f8b306f3a947f6a1356e02b128912af7a0f233c0d8af6849988772fc0dd,2024-12-06T22:15:21.880000
|
||||
CVE-2024-54139,0,0,b96fc31458bdf50652ad2210ef3e45c991013d239869ac415ba3a2488523964b,2024-12-13T16:15:26.210000
|
||||
CVE-2024-54139,0,1,85f4ecc3d5596ad60d965730d70a86223263f918fe4ceea08e540d594e22e620,2025-03-11T16:44:20.720000
|
||||
CVE-2024-5414,0,0,5121b02a6b535c7a985e876782b07c16fe258b67f2027b8e6e110fd30fd4eea8,2024-11-21T09:47:36.480000
|
||||
CVE-2024-54140,0,0,31257e10dae8888bcca62759980c11bff94610e8424d0a991aa232e4e053f669,2024-12-05T22:15:20.400000
|
||||
CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000
|
||||
@ -274622,11 +274639,11 @@ CVE-2024-54465,0,0,3f87a539a20fcac13fcbeaaced058bbe0bd71776e4b4a361d00304853bb61
|
||||
CVE-2024-54466,0,0,cde2c633b064403c3330cf4e329fab2afdda24c70189b50f9e401743db80aa51,2024-12-18T17:59:28.667000
|
||||
CVE-2024-54467,0,0,97704c6eb8f9e282ec369ceef019385d9c2a941658cdbd5dc27bd31fa074ab07,2025-03-11T03:15:37.643000
|
||||
CVE-2024-54468,0,0,a830975289ea24b4b020a52bcfcc38a9f682d3ea938ccb481221a83a22c3f0ba,2025-03-03T22:45:38.540000
|
||||
CVE-2024-54469,0,1,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
|
||||
CVE-2024-54469,0,0,3641e76c72428a7525ac727ea5c6cdba619173e4ff3bb6de12a5bea5ce9e77fe,2025-03-11T14:15:23.030000
|
||||
CVE-2024-5447,0,0,b60e0535b73a6be4da90a7fc1432b0141afa78596c3a5ade6408fe521639c5d0,2024-11-21T09:47:42.057000
|
||||
CVE-2024-54470,0,0,fe219ee429ae9d3c4f4ad02abbcafd7f018f3e8df8603d9d5274597d26ba2e87,2025-01-16T17:15:12.433000
|
||||
CVE-2024-54471,0,0,9114b466fc34414fa4a572e7f670091682a604ed9fad8d4333c1e0a423973c24,2024-12-19T15:25:31.960000
|
||||
CVE-2024-54473,0,1,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
|
||||
CVE-2024-54473,0,0,47a4f84a552b7dc517b0045992037231e1dd2a8cc0db1415d8d2465f1f3980e2,2025-03-11T14:15:23.210000
|
||||
CVE-2024-54474,0,0,46020811ce34dbfd650ffc7999c45871747b6fff681a5d6cbaf390708806a517,2024-12-16T22:15:07.160000
|
||||
CVE-2024-54475,0,0,a64bd081c6112afb87121e755186f1170b928c354a4f743bbaba93305cdbdc46,2025-03-03T22:45:38.540000
|
||||
CVE-2024-54476,0,0,c3a2d50ed82696e409e8a6d9ada543e48ecc4ebf5b11c3b3ae34dd603b3df108,2024-12-19T15:26:43.340000
|
||||
@ -274700,7 +274717,7 @@ CVE-2024-54550,0,0,37e7e19b86f585f36721504b7c8a72258806c5ed7bd0186e279c332d1969c
|
||||
CVE-2024-54557,0,0,3d0baeae19a93d052c3842b20411bb1817950b16584194ccb52fef0fc3d214c6,2025-01-31T22:15:10.300000
|
||||
CVE-2024-54558,0,0,8ee580f8e9a0224e09fdd9d69c6d762673dea49f7a4c7d321411c375ce2a0993,2025-03-11T03:15:37.937000
|
||||
CVE-2024-5456,0,0,3a1546469deeff993eb12e81bd13a91014bb8b4c59bc306c05d9d1bfeb03ccf5,2024-11-21T09:47:43.173000
|
||||
CVE-2024-54560,0,1,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
|
||||
CVE-2024-54560,0,0,330f8313dba017e5c7e6fbdb6b21385c83134fb8fe797e7729ceffadf52cb115,2025-03-11T14:15:23.417000
|
||||
CVE-2024-5457,0,0,5c67880d08a73805d7cd1c17b384d326fd43c5a8887de09123f9750f9092dc92,2024-11-21T09:47:43.290000
|
||||
CVE-2024-5458,0,0,8dbafb99fb85c57a2766bb8c0351967563ad88f8cfa7b660abd7c7ec5db25669,2024-11-21T09:47:43.413000
|
||||
CVE-2024-5459,0,0,b7a22fae8a0174b7cca0e1147f2ed714677dfde4089a65746f06fba0f29d7308,2024-11-21T09:47:43.570000
|
||||
@ -275016,8 +275033,11 @@ CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3
|
||||
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
|
||||
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
||||
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
||||
CVE-2024-55590,1,1,2314eaa7dec81b8bed45b970c8c49b68532c401ec78d9b49350e5348ba11fcd2,2025-03-11T15:15:43.650000
|
||||
CVE-2024-55591,0,0,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000
|
||||
CVE-2024-55592,1,1,fb226d1a840c3545d9fec57f603b2bc6540521c0208c0d286c3f12f6787fcb0e,2025-03-11T15:15:43.823000
|
||||
CVE-2024-55593,0,0,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155600,2025-02-03T22:06:19.163000
|
||||
CVE-2024-55597,1,1,69e67101b9cbc9c0c4538abf03d0ccea9cd7cc11d97b2f16830f06083c78931a,2025-03-11T15:15:44.010000
|
||||
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
||||
CVE-2024-55601,0,0,9b35d862d187fd3c6770804bae011b28b724e76b6c1dd4a3a89f0f4207a3e507,2024-12-09T22:15:23.100000
|
||||
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
|
||||
@ -275302,8 +275322,8 @@ CVE-2024-56186,0,0,11acf8f0bb70b3cccc707a3cc5eb1a912874cf4eafd524c30fe5c9098b6f8
|
||||
CVE-2024-56187,0,0,3639156078a5c2d713cc91bc8115385316c6106e48fedf60d31f8c65ed6c2f1b,2025-03-10T19:15:39.293000
|
||||
CVE-2024-56188,0,0,754dcb051afab226439b896bcaffa6c79155d464519b66818e7a589f41414022,2025-03-10T19:15:39.393000
|
||||
CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000
|
||||
CVE-2024-56191,0,0,6d6e439309f911cd89fe05c483aed2c6456da3b34def44a970c450b01f649a66,2025-03-10T21:15:39.880000
|
||||
CVE-2024-56192,0,0,c70740ec10129faece240e224a1d2efd21b1913c8abf85f982388ad67961b19e,2025-03-10T21:15:40.007000
|
||||
CVE-2024-56191,0,1,77d84834f877e83cc26c98877dcd83bef54eea22cda79a792579609d9f5e120c,2025-03-11T16:15:16.743000
|
||||
CVE-2024-56192,0,1,e891313d3a3d881ff3fb16ff06f440a0adf6d5a24add6a642e38837e41b3d035,2025-03-11T16:15:16.900000
|
||||
CVE-2024-56195,0,0,17e80087440c26a48bf26150f466408464e462d5b44a69d93d4cf901c8b8922b,2025-03-06T16:15:49.230000
|
||||
CVE-2024-56196,0,0,12fd90de17993bd12dfedd30b7f3bb5633be1f20034d52a88794197505bacdce,2025-03-06T16:15:49.637000
|
||||
CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000
|
||||
@ -276966,7 +276986,7 @@ CVE-2024-6257,0,0,3c450049ad1a84e0b297a8d37be25b1d0e2549032909d0064d332ba84cab26
|
||||
CVE-2024-6258,0,0,9f8fd150e46db75469fd7fc658db5aa120700d36ac5826497f097b978edd30a4,2024-09-19T01:40:32.813000
|
||||
CVE-2024-6259,0,0,c6f96fdcb3ff3fff17080c8c4b550038410883f348096d5bc80a22f11eca4cfc,2024-09-19T01:33:36.477000
|
||||
CVE-2024-6260,0,0,d4af7b4cfc44f08d8432811020e56f72bfcd7f1f60b9158bd5a407cfd9935f76,2024-11-22T20:15:12.013000
|
||||
CVE-2024-6261,0,0,e7733b4af567c2826228022fdb349dc1cb9f5ab66144a859ecb4cb89a52a70ca,2025-02-27T06:15:21.790000
|
||||
CVE-2024-6261,0,1,4b0ca53c793968c715a704527aa4216ee372b1d4251b03a5da1b268d5ce019b7,2025-03-11T16:32:04.440000
|
||||
CVE-2024-6262,0,0,25f9bfdcc4aa7fbe45f36b65288775ce8759f234561b7e68f77257c5e457e984,2024-11-21T09:49:17.823000
|
||||
CVE-2024-6263,0,0,64ac66a765d88001d3119809569f68e9e73208abe19a92eeb56f7a4ffa929880,2024-11-21T09:49:17.943000
|
||||
CVE-2024-6264,0,0,02e86a9a4bf982b67050a877dc734ef40fad5667e32ddac6d7d5d04963214bed,2024-11-21T09:49:18.070000
|
||||
@ -279527,7 +279547,7 @@ CVE-2024-9191,0,0,2d8772819e072256f7caa86d1c651c053e8fc5e8d42fd3c3815efa0104833a
|
||||
CVE-2024-9192,0,0,802019c9061fe1dee1b6059a0f58621063432e2ddeee0c2676186f080e117e0c,2024-11-18T17:11:17.393000
|
||||
CVE-2024-9193,0,0,e9fcabeca8c2a679cb4268e62dc1a9ef8ec799fb5d366ccb5b675730020983a2,2025-02-28T09:15:11.437000
|
||||
CVE-2024-9194,0,0,1077144cc77b6254f33936a25ffd1f7bfdaa1a60153ac4b35fb53e4c8f3eb6e6,2024-11-21T17:15:27.480000
|
||||
CVE-2024-9195,0,0,29a3855b8bed692163705c71bc27ac9f489a5fe6ce73924e05c630425f69a304,2025-02-28T09:15:11.633000
|
||||
CVE-2024-9195,0,1,fc36972059984bb59ac8e6b7f38a03aaaa1f1346862dca07117632e8f3cf8c55,2025-03-11T15:49:13.197000
|
||||
CVE-2024-9196,0,0,451745349e35725debe11f08251f5349b7496561e06ccf08f6fdde37a22bdb15,2025-02-11T02:15:36.827000
|
||||
CVE-2024-9197,0,0,33c1567de1a18762ef3858935357bc00f6cde05df47d6c1305df2581bf9eb8d5,2025-01-21T21:18:24.393000
|
||||
CVE-2024-9198,0,0,641d70ca97204854d04cbb4e4de612cfeb0ea4b8a4de965802073ac66a64a690,2024-10-02T14:33:52.780000
|
||||
@ -280579,7 +280599,7 @@ CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e4
|
||||
CVE-2025-0624,0,0,de78027bd9a8f6ac534b385e2815e6bcb51a3409fcc39fc14002d87fba9f3f6c,2025-03-11T12:15:11.820000
|
||||
CVE-2025-0625,0,0,9d9d3d8170b51d99a85dfc09422efdaffda47b5baadb8c85253715ce0dc062af,2025-01-22T19:15:10.397000
|
||||
CVE-2025-0626,0,0,16ee263c85f3aad6f9b7c5ed60390a064032d53adec3f9f8437b4c73151fb8c7,2025-03-01T18:15:34.140000
|
||||
CVE-2025-0629,0,1,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
|
||||
CVE-2025-0629,0,0,24ead6902cb92b995d21c528547a6763c08e6185f38a728255a287cde487cd29,2025-03-11T14:15:24.090000
|
||||
CVE-2025-0630,0,0,bb04cf8ef857d76c3a37bf8a5fa23865f63bacce52c7cbeba321e37955a961c9,2025-02-04T20:15:49.940000
|
||||
CVE-2025-0631,0,0,f678fe6dd09f7e9ac50fdb058244ff83ef796d29890119e12d088befc24858a0,2025-01-28T19:15:14.270000
|
||||
CVE-2025-0633,0,0,d99126f9166a4e84d3e57050e6aafa26d9cc8a19aa8e9fa3be65f2f9a812f3e1,2025-02-19T07:15:33.537000
|
||||
@ -280982,7 +281002,7 @@ CVE-2025-1265,0,0,bc018ef071fadf7e153cbb8aa96a03eb4bac560d27730ea77e8eae7baedae9
|
||||
CVE-2025-1269,0,0,3d8990f3f321bb84afc5ce31cc37206b4dfeae7b9639d4320eceb6f39d26cfbc,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
CVE-2025-1282,0,0,bcd550bc4b0f7b2c27f0f5e69aeba338cc0185c6a99805b296dc4f3134453366,2025-02-27T09:15:10.160000
|
||||
CVE-2025-1282,0,1,124879e93e6bb778f215176375d975ac746201c3f19a3ffa344b76a1a781600c,2025-03-11T16:08:00.790000
|
||||
CVE-2025-1283,0,0,4175667403ef8488e39c5e8c2dd94a274e533a8ac41a5d588031878a218b6b1e,2025-03-04T20:59:05.417000
|
||||
CVE-2025-1287,0,0,37b8d6e5bb02fec4db4fe6ebb7f78e649494f82b2a965d784db2bbf955be9dfb,2025-03-08T09:15:31.590000
|
||||
CVE-2025-1291,0,0,8a62a97f45d265e09336f40212a9e842d191a55f47481ae3892da3a9dec0674e,2025-03-01T09:15:09.710000
|
||||
@ -281068,7 +281088,7 @@ CVE-2025-1435,0,0,d840829e9adebbd2e05cc9e4789e2ef73a3bfba41e90989d315c56fa7ea84a
|
||||
CVE-2025-1441,0,0,a148724949d3a67ddbdb90d03ba8b4c0c01959027f1d8b9da83469468076f49e,2025-02-28T19:47:07.220000
|
||||
CVE-2025-1447,0,0,b52fc293ec2c8f7276787d8ec4e27a605d8feb40937673c00f5fe8646d83ab92,2025-02-19T01:15:09.407000
|
||||
CVE-2025-1448,0,0,dcd55b821241f3fcd52c60ec5d939cca30ac2e0644079f21a4efc2df8a0c8c2d,2025-02-19T02:15:08.833000
|
||||
CVE-2025-1450,0,0,162c0b930672185bd108fa37bb3f44f1a62099d9e3d7e96e9e17908566b144b1,2025-02-27T10:15:10.677000
|
||||
CVE-2025-1450,0,1,6ec73f6e6cf96ef1bc86e6c9120d538e032062f45d5e518108c7bc768f28c558,2025-03-11T15:46:05.180000
|
||||
CVE-2025-1459,0,0,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000
|
||||
CVE-2025-1460,0,0,a5c8e5382cd35abbaca03691402634777bdd210b53f824eaa70027825fcc1ff3,2025-02-26T23:15:10.193000
|
||||
CVE-2025-1463,0,0,66bff7e70ca672b5367a8323921deb52eeae1be259f6bf189f389bd789ca9f1c,2025-03-05T12:15:35.270000
|
||||
@ -281180,8 +281200,8 @@ CVE-2025-1681,0,0,3ee297593e4a5818266094c9d5282266af1bf843390e9752b5023996a22e10
|
||||
CVE-2025-1682,0,0,cc794daa0dbacddc54b0e89e0bf9a4796b5672845d169d6dbf1869b7f592f754,2025-02-28T00:15:36.100000
|
||||
CVE-2025-1686,0,0,aeb3e336ffe94b1c0a7e4872f92b31f7de132db0e69b60fe0611b8798ab6716d,2025-02-27T15:15:40.940000
|
||||
CVE-2025-1687,0,0,553889bbf1832e8d0246ba505a729ffeb25a6379aca1ca1f8f3f4851031d21de,2025-02-28T00:15:36.240000
|
||||
CVE-2025-1689,0,0,27f88440d15cc4638b7de0e755f526794faf4f0384e03f795f8c0315bae674a7,2025-02-27T07:15:35.400000
|
||||
CVE-2025-1690,0,0,27374a34521b8d136365bb94ee2f06ae3a84166302e0fd1fcbd44e96dfb04c6f,2025-02-27T09:15:10.697000
|
||||
CVE-2025-1689,0,1,049ae4dee98f065b7f7f52ce04df5123177e15522ad59dafeab6f6ff67faccdb,2025-03-11T16:19:41.870000
|
||||
CVE-2025-1690,0,1,c42b6345f56018d5d381c14a2d743b6ae6c7942dfe15639a3c3d47de6c96a0de,2025-03-11T15:59:35.800000
|
||||
CVE-2025-1691,0,0,5eec1cea57e35f579c692b6064aead03fa43885ba22ff953ac9e969443e43853,2025-02-27T16:15:38.610000
|
||||
CVE-2025-1692,0,0,2e6d02e2120ba7cdd2d2dce988c300f2bd2785f615f13934cbd4bb5f104f2bf7,2025-02-27T13:15:11.413000
|
||||
CVE-2025-1693,0,0,7ebc617b821b94f1ea8c04b23cc41634822af607e5925c55616ab5694b115f50,2025-02-27T13:15:11.563000
|
||||
@ -281190,7 +281210,7 @@ CVE-2025-1696,0,0,ce6275a845a1290c62e8c0fe3a0fcacdf1abe14eafe526218c3da3df65c4ed
|
||||
CVE-2025-1702,0,0,41f2b6913f8c8180797afd2cc2f175ceac2f74f281e62e10b6b473a6add44571,2025-03-05T12:15:35.420000
|
||||
CVE-2025-1714,0,0,61e824a1ccdf54ec33bae3dd88565effb2433516529becf60015224f7bb0775a,2025-03-07T05:15:16.233000
|
||||
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
|
||||
CVE-2025-1717,0,0,4eace37625fa94455212ed05fc0d7dccd597669fe610b1618145f4f97f30cd81,2025-02-27T08:15:31.130000
|
||||
CVE-2025-1717,0,1,a3187f28d4c7b205f040a730275c0f286adbd6d6550e77331f01e3625795de14,2025-03-11T16:12:42.783000
|
||||
CVE-2025-1723,0,0,da7e603c0fdbcf8b17bcff90e3ff294dcf324014070d98aed22d913dc322d276,2025-03-03T08:15:15.717000
|
||||
CVE-2025-1726,0,0,2f1dd31a8200e6d83c282baf3f0abaf3df3bb9d56b822973c75d4b2e2b3c7f8c,2025-02-26T20:15:13.510000
|
||||
CVE-2025-1728,0,0,126b29abd5a8b7142eab21be075a4425d5b9e0d4bb1eedd2c9477807954e2152,2025-02-26T22:15:14.333000
|
||||
@ -281789,7 +281809,7 @@ CVE-2025-21356,0,0,f7ea5cba60a230879dca18c3ee9d0c02c15b08e12f56fbab6a571232794a0
|
||||
CVE-2025-21357,0,0,f113e4301bd00fab146fb1b2c2663099f0920807897ab88a84dd70d6d7ccbaa8,2025-01-21T19:40:05.823000
|
||||
CVE-2025-21358,0,0,dab5145a40f866bd6dc784e58f5b52a4233c1ecc2ba83c4c10bd60eb1e0cf109,2025-02-14T22:53:11.470000
|
||||
CVE-2025-21359,0,0,b08a0e3b95bd80411438de60c10b9f10ab424a6c433a2a5fc5fbadceddca0f2d,2025-02-14T22:50:04.610000
|
||||
CVE-2025-2136,0,1,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
|
||||
CVE-2025-2136,0,0,d012d42881f746e4b57a0feb33815a1f38da62d7d60a89c360eb127e93347a3a,2025-03-11T14:15:26.553000
|
||||
CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000
|
||||
CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000
|
||||
CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000
|
||||
@ -281800,7 +281820,7 @@ CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea
|
||||
CVE-2025-21367,0,0,ee574f31e150644922f442d6f99c433b14b4fc5cc545ddcec754dd048735da70,2025-02-14T22:46:58.147000
|
||||
CVE-2025-21368,0,0,6c0f601be861c16b3bf5acbace3cefe9363096c39f16a1f2cff45abb52cfb9f0,2025-02-26T15:23:31.897000
|
||||
CVE-2025-21369,0,0,d0f7f9a542e9386cee8bc2fe054aad034a1d34994bfe93b9978ffac49c3bff63,2025-02-26T15:23:31.897000
|
||||
CVE-2025-2137,0,1,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
|
||||
CVE-2025-2137,0,0,4d22a395a343341660bc79a88076d9ca305f30018cbfccf713e4af1159d19a0c,2025-03-11T14:15:26.737000
|
||||
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
|
||||
CVE-2025-21371,0,0,f41819969d65dc6998fb17f05a6a2ed4a10ad2f05a6bab1e2a1104b97d6ce0fd,2025-03-03T22:15:37.820000
|
||||
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
|
||||
@ -282188,13 +282208,13 @@ CVE-2025-21841,0,0,0dca55d80fff9bcd7a7d9ca27998b88ddb1e3e910c9ef6e7f9773a1db067d
|
||||
CVE-2025-21842,0,0,3341f3038ecf404014e00b515c1bfa146525327fcf880829bca5a72d8d6579f7,2025-03-07T09:15:17.237000
|
||||
CVE-2025-21843,0,0,3c861851a6a9ed333443a3318029811e8258a3287563151b71a94780dd7552ce,2025-03-07T09:15:17.343000
|
||||
CVE-2025-2189,0,0,0f0485d6b72522c6026e55cc9bfa123cea29477bef4292e09a4550e88c1b0506,2025-03-11T12:15:12.057000
|
||||
CVE-2025-2190,0,1,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
|
||||
CVE-2025-2190,0,0,16b1a05c84b9c153f0c21b975460283193f2f077bc77e69b6f4d369ddd154f19,2025-03-11T14:15:27.163000
|
||||
CVE-2025-2191,0,0,3cf8cad58124b509a1a514bc0c337544536183b60b4c73508e7eca625ca9d4ab,2025-03-11T12:15:12.277000
|
||||
CVE-2025-2192,1,1,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
|
||||
CVE-2025-2193,1,1,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
|
||||
CVE-2025-2194,1,1,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
|
||||
CVE-2025-2195,1,1,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
|
||||
CVE-2025-2196,1,1,59e5a21c779c1b597e73c1ddba8e0655dec15010418379179d66140aea5d4385,2025-03-11T14:15:28.123000
|
||||
CVE-2025-2192,0,0,2f112aaf25fe0e137e21c5adbc7b1661b6634fd3b1bcf8c17de2bb81f707ee96,2025-03-11T14:15:27.443000
|
||||
CVE-2025-2193,0,0,dbb88f82f459ba010cbc51df271b53627184df972115671971d575e549527184,2025-03-11T14:15:27.630000
|
||||
CVE-2025-2194,0,0,e1aa96e726cf539676cb80ef975737c88c94790ed00a89f75cdf680a8e3413dc,2025-03-11T14:15:27.753000
|
||||
CVE-2025-2195,0,0,e292a4558d2ed8851de21bc82f067e4484772946d40eaa7eddec3f6225a02ee5,2025-03-11T14:15:27.937000
|
||||
CVE-2025-2196,0,1,2e4abd9c4f34d1ee0490e793cc34c4f7350a86f2ca91a96b3d64b855f88f05ff,2025-03-11T15:15:45.820000
|
||||
CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000
|
||||
CVE-2025-22130,0,0,fe16d9f63e9545f97bce7adcca434385cbaf054f6f17003be6f1b5abf3fc1663,2025-01-08T16:15:38.543000
|
||||
CVE-2025-22131,0,0,6176cb6449a6745057b5584cc8bde5826af6d54b0e60fda45ed3c6106ba08f4b,2025-03-06T13:30:34.893000
|
||||
@ -282328,11 +282348,11 @@ CVE-2025-22362,0,0,9877c63a6160c0c338a7dcb00929c3a65bc9baa6fcce8ad8cada6e19670cf
|
||||
CVE-2025-22363,0,0,34e2db3f81fd7a3e94ee4111d69bd101fd65058f31cf66551a8678163c9bff7f,2025-01-07T17:15:33.377000
|
||||
CVE-2025-22364,0,0,02d6b470672aaccdb63d99c6862a47c68775bfe3d3e9c9816eef4305afe53ac6,2025-01-07T11:15:19.600000
|
||||
CVE-2025-22365,0,0,4c3451815a0a11b5acf2693a92329835d8e81c7866963277c1b209d8a8847915,2025-01-07T17:15:33.510000
|
||||
CVE-2025-22366,1,1,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
|
||||
CVE-2025-22367,1,1,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
|
||||
CVE-2025-22368,1,1,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
|
||||
CVE-2025-22369,1,1,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
|
||||
CVE-2025-22370,1,1,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
|
||||
CVE-2025-22366,0,0,49af6ad49f00f1b612f67fb10b6b7ef3b1df897488f85d0b19cc24457a4d6da2,2025-03-11T14:15:24.313000
|
||||
CVE-2025-22367,0,0,7b16dfd7874d4e8011943d8912e54683aefa7fee306071fb6e1baf0b74dece4b,2025-03-11T14:15:24.480000
|
||||
CVE-2025-22368,0,0,0b73a0a5bdd93900ca4da33140761cf6e68b8a7dbd80d8ed9741111f05f6a91c,2025-03-11T14:15:24.627000
|
||||
CVE-2025-22369,0,0,3547a766c1f44b0b25d5915538b1ac4bd7520b7de4c5cfcd55236561bd2f432d,2025-03-11T14:15:24.767000
|
||||
CVE-2025-22370,0,0,d256625e076d8518b6f293d565068cb744a8504faf610a3e0544f7e67df6efb2,2025-03-11T14:15:24.917000
|
||||
CVE-2025-22376,0,0,0b599d4fbe0b053f67328db02ad6a56c3b1af5acbc775b8d4fa33614fa96b0bf,2025-01-21T18:15:15.473000
|
||||
CVE-2025-22383,0,0,971c2012aab2f3f792cbdd2c68df4004dd1217088db2d92a7bb003d39ddd9443,2025-01-06T15:15:16.103000
|
||||
CVE-2025-22384,0,0,cce93b0fc1a45d09b2ac82e610ea925820e4793a4749701feb605ea07db42a77,2025-01-06T17:15:47.820000
|
||||
@ -282351,6 +282371,7 @@ CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7
|
||||
CVE-2025-22447,0,0,a09e9c6c341148275cdf7848d50c90872c1118351a20ee6b95f2dabdacf4dbd2,2025-03-06T04:15:25.377000
|
||||
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22454,1,1,1046ed7645c2324b9db0513cc36c6430cb7f73bcf372319688f1d7839792ac01,2025-03-11T15:15:44.737000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
@ -284118,6 +284139,7 @@ CVE-2025-25675,0,0,bcf48b74286fdf685bef73e0a7e4d2cb90868ad9ff8b8120157d8f7bb75cd
|
||||
CVE-2025-25676,0,0,daf85732e597f1793e01b57a88af2ab73ae5e7b139e5e84dbb4cacf83744c130,2025-02-21T18:16:04.577000
|
||||
CVE-2025-25678,0,0,64aaf58170ee4d79f4247ea2c0b96da46219dfaa04983aca5741969381b237f2,2025-02-21T18:16:08.493000
|
||||
CVE-2025-25679,0,0,3cebd49dfacc441892528658235bae2847665b7e89bb57bdaf15bcd2a8d49f09,2025-02-24T18:15:19.213000
|
||||
CVE-2025-25680,1,1,8769235f7dfed6dab81aa90fd879cc3d4a3649aa255c188d45e8deb5967072c7,2025-03-11T16:15:17.413000
|
||||
CVE-2025-25723,0,0,425dc4fb8d4f247799df71c6ff14d0a00e50caf5b0b8d49b8a12841be3d71cad,2025-03-05T16:15:39.960000
|
||||
CVE-2025-25724,0,0,b38e9501f3518fc8b79ccc8bc6f4bc07f2a4c98992aa95823eb5aac9be02cfc0,2025-03-02T02:15:36.603000
|
||||
CVE-2025-25725,0,0,ac97ba103984120a346a524ddb442d8216a673461532b95f069cbd7053e539c0,2025-03-02T02:15:36.760000
|
||||
@ -284133,6 +284155,7 @@ CVE-2025-25743,0,0,304984a5ab9ad7f158808ee9d3872992975a39931983d4ba42d4f443e0977
|
||||
CVE-2025-25744,0,0,9b17d9cf4931ebf4a6e3aaab07248462238b28b620de67883e624c40839a59fc,2025-03-05T19:15:38.860000
|
||||
CVE-2025-25745,0,0,6954ac06db222a2d53d510e8895c4f26dd1f1d917e56ca97169f9eb9f3840768,2025-02-14T16:15:37.010000
|
||||
CVE-2025-25746,0,0,cbf058e2dc9833cb4adeac1d2f404166a61c0d96a6ad617dde3893fa4bf6a37d,2025-02-24T16:30:37.200000
|
||||
CVE-2025-25747,1,1,a1c6ddcced5f18ec040d1d1e271930e310c5eb290a17db4d61127328dc681262,2025-03-11T16:15:17.547000
|
||||
CVE-2025-25759,0,0,293b850ebe0a274765acc91f23faade1c53b146b12bb218a57ca1cee0ac51835,2025-03-04T15:15:28.353000
|
||||
CVE-2025-25760,0,0,963e7e75521960c9620a7affa1021c0ca484b511b623074b9cde550324014cef,2025-03-04T15:15:28.590000
|
||||
CVE-2025-25761,0,0,f248f6741f63a9a7aedabfe16b412988575b28956c4c9e9dd6d7c9dcf3c9c70f,2025-02-27T15:15:41.777000
|
||||
@ -284619,7 +284642,7 @@ CVE-2025-27353,0,0,24ac6ebce3848378b1344a6468f91efd03d707d9d99a1f55a994a6db165de
|
||||
CVE-2025-27355,0,0,caa62ce9bbf1bb76cf121e6e89f446abe3d40a89991436a920bab478df84b04e,2025-02-24T15:15:20.917000
|
||||
CVE-2025-27356,0,0,c6532ae1cc5e3e40abfb75187df6e9c621394ebd78da8fba75994511b24c76a9,2025-02-24T15:15:21.077000
|
||||
CVE-2025-27357,0,0,e2381e6c407b4287d4d33f07c25d73cafce07e3f2901d8a47889678f366841e0,2025-02-24T15:15:21.233000
|
||||
CVE-2025-27363,1,1,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
|
||||
CVE-2025-27363,0,0,09f9fb825caea6d57e7cffd59254354664df495b52672380cd8ff2dc022bb320,2025-03-11T14:15:25.427000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27370,0,0,301bcdda9004e5b7c615787be8261d29f372b1c6dad0d66a3ec48ed006a51eb2,2025-03-07T17:15:22.083000
|
||||
CVE-2025-27371,0,0,31b005538dedaada9447bbdc44fad86b917b948837ed08d1d87a7d4ac7d8bec8,2025-03-07T17:15:22.190000
|
||||
@ -284634,6 +284657,7 @@ CVE-2025-27399,0,0,39035d656129062238f81ef47ca04f7a1e8421cb055350242877932e69dd8
|
||||
CVE-2025-27400,0,0,09b6d518bf48aeab880dbe66e6bc2a5dd8752164e9bf158ed67c63f0b7ab8431,2025-02-28T16:15:40.237000
|
||||
CVE-2025-27401,0,0,a0a9ff73f453a0c4b6de03870f141abd84f19622792f55cbc6c22475d44e32fa,2025-03-04T17:15:19.547000
|
||||
CVE-2025-27402,0,0,920b5ec493a4fe20f3d86d2225a25091e0d3f71f7744b6da408c9c08d3dfbc7c,2025-03-04T17:15:19.703000
|
||||
CVE-2025-27403,1,1,70337e0a3800c5c59ee3032fe8368851fa8455e67e280b02d352e4fa8ed0ce9f,2025-03-11T15:15:45.570000
|
||||
CVE-2025-27408,0,0,93737553abae903ea76018e61e22703521d366acf436a7c85e20d8d3f4423a3a,2025-03-04T23:15:10.897000
|
||||
CVE-2025-27410,0,0,622f5e65362d03d0ed561fcc081614d728b6f23a5af908c6c614a85e8709a2df,2025-03-04T21:15:14.197000
|
||||
CVE-2025-27411,0,0,3bb429b2a417984eb72d2c43dc11687835b7b048bd7b98fbb69cff47d115b00f,2025-03-05T16:15:40.310000
|
||||
@ -284686,12 +284710,15 @@ CVE-2025-27590,0,0,201e48bfcc12fc16d983254396bffb4f767e29b88b32a1b2192e9772fcd99
|
||||
CVE-2025-27597,0,0,bb6bb7339c557ff94dcb422c1a12aacb10bddb14702e5ea32139946907caf3b8,2025-03-07T18:15:48.163000
|
||||
CVE-2025-27598,0,0,f103b7cfc03d14de6c0bad2d3d92bc8b207a423383ddf9a01b7e7a34a226a3e7,2025-03-07T20:15:38.660000
|
||||
CVE-2025-27600,0,0,8b710cbe29c4262a75baeb6eae5e68d150a67d7271571cd258a60494511c3b90,2025-03-06T19:15:28.117000
|
||||
CVE-2025-27601,1,1,df52cc35c591bba27e95164eee6faf7b1153751f41839962728fd4c8e26597ca,2025-03-11T16:15:17.943000
|
||||
CVE-2025-27602,1,1,b9bde515c15b535cbdce5201f55bcf595c4355929bcf374774ce8cbee47e8318,2025-03-11T16:15:18.100000
|
||||
CVE-2025-27603,0,0,f9c7ddeb8ce74cd54f0397839af1f26d47d617c308be8dcd0c12cfaac63eb48c,2025-03-07T18:15:48.293000
|
||||
CVE-2025-27604,0,0,52aff360271261f8fa4246ad7435647d74e939ffea0a51055b3b8569444bea06,2025-03-07T17:15:22.290000
|
||||
CVE-2025-27607,0,0,2a3ab37b8dc052c83770a9345ff1d91d3383eb713728d7b951bbcbdb63a1534a,2025-03-07T18:15:48.483000
|
||||
CVE-2025-27610,0,0,c33d0784ac28efda70daeefbc9e57202288568b88569c58831907a224f199e9e,2025-03-10T23:15:35.073000
|
||||
CVE-2025-27615,0,0,1d9b17fd6d1efa58df936827bdc2b29656e574c998ae5df70178cd728c98c177,2025-03-10T19:15:40.917000
|
||||
CVE-2025-27616,0,0,124b4c8a641b46285e5ff925029836649f77d1ae4fc7a43a77192949c8ad959b,2025-03-10T19:15:41.080000
|
||||
CVE-2025-27617,1,1,8fc9cf979b73fa6ba29c977f6cb88da60f3e6ce7e9df90300e90513f74a659ec,2025-03-11T16:15:18.310000
|
||||
CVE-2025-27622,0,0,aab424c81f70efb6c2294313600d100f64e720f683885d3b6918b7e0d0c95ce5,2025-03-06T17:15:23.497000
|
||||
CVE-2025-27623,0,0,a7729605ea601dac947d3c9e9dda3f4cf0fc759f67e3d847999a08d4d426400f,2025-03-06T17:15:23.647000
|
||||
CVE-2025-27624,0,0,386e769fd54c9c9e387001be90fa20a8140740d08fb61eb8c2dc8cbb750364f8,2025-03-06T17:15:23.797000
|
||||
@ -284756,7 +284783,7 @@ CVE-2025-27825,0,0,99e9b9d3befd54cbb55880416607fbc7e5d90c9fee9cdc2881cb2480979fe
|
||||
CVE-2025-27826,0,0,83fe28f5c1c38336a328c924367a016f575cf3bedee9c6070949943b515ded3d,2025-03-07T22:15:38.527000
|
||||
CVE-2025-27839,0,0,212b3d30d2c1f53f372c7e143c6e03922deeb9da14f018db14d5749815db8000,2025-03-08T00:15:38.340000
|
||||
CVE-2025-27840,0,0,31b43659fdf50a1c837def79b3ff8549c2485895c251972e0cf021cb5a031b4d,2025-03-10T14:15:25.943000
|
||||
CVE-2025-27893,0,1,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
|
||||
CVE-2025-27893,0,0,a7d9d5e7e8d9c3f5b258ec55eeef037e0e84dc16b4d2b284979eeb2051048448,2025-03-11T14:15:26.033000
|
||||
CVE-2025-27910,0,0,563dfaf4a98237987ed986f935d53295ee6e1d7704cf33b760a3d1b009fcbb36,2025-03-10T22:15:27.287000
|
||||
CVE-2025-27911,0,0,a0c6ccdc879c82f419af984764f8bbd745b8c7dbfe537741e5c7db439b43c1d8,2025-03-11T08:15:11.500000
|
||||
CVE-2025-27912,0,0,67c4abc4012a58019561c5dfd64461436dcdb5654152f5b2e4d5067de3236377,2025-03-11T08:15:11.727000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user