mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-02-03T23:00:27.599814+00:00
This commit is contained in:
parent
72d21b6d1f
commit
c8d7160bea
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-5872",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T00:15:08.857",
|
||||
"lastModified": "2024-11-21T01:45:24.330",
|
||||
"lastModified": "2025-02-03T21:15:10.410",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2012-5873",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-26T00:15:08.913",
|
||||
"lastModified": "2024-11-21T01:45:24.480",
|
||||
"lastModified": "2025-02-03T21:15:11.443",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -65,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-31244",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-25T16:15:08.990",
|
||||
"lastModified": "2024-11-21T07:04:12.410",
|
||||
"lastModified": "2025-02-03T21:15:11.653",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-40482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-25T19:15:10.180",
|
||||
"lastModified": "2024-11-21T07:21:26.683",
|
||||
"lastModified": "2025-02-03T21:15:11.827",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-203"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-26841",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-04-25T13:15:10.027",
|
||||
"lastModified": "2024-11-21T07:51:59.427",
|
||||
"lastModified": "2025-02-03T22:15:26.607",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
32
CVE-2023/CVE-2023-521xx/CVE-2023-52163.json
Normal file
32
CVE-2023/CVE-2023-521xx/CVE-2023-52163.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-52163",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:12.060",
|
||||
"lastModified": "2025-02-03T21:15:12.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.txone.com/blog/digiever-fixes-sorely-needed/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
32
CVE-2023/CVE-2023-521xx/CVE-2023-52164.json
Normal file
32
CVE-2023/CVE-2023-521xx/CVE-2023-52164.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2023-52164",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:12.180",
|
||||
"lastModified": "2025-02-03T21:15:12.180",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "access_device.cgi on Digiever DS-2105 Pro 3.1.0.71-11 devices allows arbitrary file read. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.txone.com/blog/digiever-fixes-sorely-needed/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0740",
|
||||
"sourceIdentifier": "emo@eclipse.org",
|
||||
"published": "2024-04-26T10:15:10.960",
|
||||
"lastModified": "2024-11-21T08:47:15.553",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-03T21:16:40.350",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,68 @@
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:eclipse:target_management:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "4.5.400",
|
||||
"matchCriteriaId": "B1BE2096-F942-4F77-9758-62C18A362B55"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.eclipse.org/r/c/tm/org.eclipse.tm/+/202145",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/171",
|
||||
"source": "emo@eclipse.org"
|
||||
"source": "emo@eclipse.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://git.eclipse.org/r/c/tm/org.eclipse.tm/+/202145",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/171",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25935",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-11T01:24:58.247",
|
||||
"lastModified": "2024-11-21T09:01:36.420",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:58:36.570",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.2.6.0",
|
||||
"matchCriteriaId": "05AE7D29-813B-4B68-A773-223DCE3571A1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-9-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-9-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2867",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:20.297",
|
||||
"lastModified": "2024-11-21T09:10:42.893",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-03T21:31:46.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "4.15.5",
|
||||
"matchCriteriaId": "DAEFAACF-4FC6-4DA3-AB61-9BC596FA132F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061186%40wp-user-avatar%2Ftrunk&old=3053353%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061186%40wp-user-avatar%2Ftrunk&old=3053353%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-33539",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-04-29T06:15:08.930",
|
||||
"lastModified": "2024-11-21T09:17:06.603",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:14:03.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpzoom:wpzoom_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.1.36",
|
||||
"matchCriteriaId": "E619FE5C-4A84-460C-9933-23D2C3B9D63C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
"source": "audit@patchstack.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-348xx/CVE-2024-34896.json
Normal file
25
CVE-2024/CVE-2024-348xx/CVE-2024-34896.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34896",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:12.573",
|
||||
"lastModified": "2025-02-03T21:15:12.573",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Nedis SmartLife Video Doorbell (WIFICDP10GY), Nedis SmartLife IOS v1.4.0 causes users who are disconnected from a previous peer-to-peer connection with the device to still have access to live video feed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nedis.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-359419",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-348xx/CVE-2024-34897.json
Normal file
25
CVE-2024/CVE-2024-348xx/CVE-2024-34897.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-34897",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:12.680",
|
||||
"lastModified": "2025-02-03T21:15:12.680",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nedis SmartLife android app v1.4.0 was discovered to contain an API key disclosure vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://nedis.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-359419",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2024/CVE-2024-351xx/CVE-2024-35177.json
Normal file
56
CVE-2024/CVE-2024-351xx/CVE-2024-35177.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-35177",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:27.600",
|
||||
"lastModified": "2025-02-03T22:15:27.600",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. The wazuh-agent for Windows is vulnerable to a Local Privilege Escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by placing one of the many DLL that are loaded and not present on the system in the installation folder of the agent OR by replacing the service executable binary itself with a malicious one. The root cause is an improper ACL applied on the installation folder when a non-default installation path is specified (e.g,: C:\\wazuh). Many DLLs are loaded from the installation folder and by creating a malicious DLLs that exports the functions of a legit one (and that is not found on the system where the agent is installed, such as rsync.dll) it is possible to escalate privileges from a low-privileged user and obtain code execution under the context of NT AUTHORITY\\SYSTEM. This issue has been addressed in version 4.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-pmr2-2r83-h3cv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3544",
|
||||
"sourceIdentifier": "security@progress.com",
|
||||
"published": "2024-05-02T15:15:07.053",
|
||||
"lastModified": "2024-11-21T09:29:50.663",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-03T21:38:22.117",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,78 @@
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:lts:*:*:*",
|
||||
"versionEndExcluding": "7.2.48.11",
|
||||
"matchCriteriaId": "D221FAEA-7441-4868-899E-9FE12D88DD95"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:*",
|
||||
"versionStartIncluding": "7.2.49.0",
|
||||
"versionEndExcluding": "7.2.54.10",
|
||||
"matchCriteriaId": "71C25CAF-73A9-4F9A-9914-ABCFB0C9D4BE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:*",
|
||||
"versionStartIncluding": "7.2.55.0",
|
||||
"versionEndExcluding": "7.2.59.4",
|
||||
"matchCriteriaId": "651AEE76-E95B-4E43-86E6-190062B23FE7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kemptechnologies.com/",
|
||||
"source": "security@progress.com"
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543",
|
||||
"source": "security@progress.com"
|
||||
"source": "security@progress.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://kemptechnologies.com/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-40514",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T23:15:07.600",
|
||||
"lastModified": "2025-01-16T23:15:07.600",
|
||||
"lastModified": "2025-02-03T21:15:12.780",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " La vulnerabilidad de permisos inseguros en themesebrand Chatvia v.5.3.2 permite a un atacante remoto escalar privilegios a trav\u00e9s del nombre del perfil de usuario y las funciones de carga de im\u00e1genes."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/php-lover-boy/ChatVia",
|
||||
|
29
CVE-2024/CVE-2024-444xx/CVE-2024-44449.json
Normal file
29
CVE-2024/CVE-2024-444xx/CVE-2024-44449.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-44449",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:12.927",
|
||||
"lastModified": "2025-02-03T21:15:12.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Cross Site Scripting vulnerability in Quorum onQ OS v.6.0.0.5.2064 allows a remote attacker to obtain sensitive information via the msg parameter in the Login page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://quorum.com/about/",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://seclists.org/fulldisclosure/2025/Jan/23",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://seclists.org/fulldisclosure/2025/Jan/23",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45331",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-16T09:15:06.500",
|
||||
"lastModified": "2025-01-16T09:15:06.500",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:03:06.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,126 @@
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.2.6",
|
||||
"matchCriteriaId": "F07BE2AB-5F28-4773-B9C3-1D76EA1C2D06"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "E6F162A7-0D01-43E0-99D8-D7B87B080853"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.1",
|
||||
"versionEndExcluding": "7.2.7",
|
||||
"matchCriteriaId": "38BFF3B9-3927-4B15-A573-4EDB20362841"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.3",
|
||||
"matchCriteriaId": "40C3665B-3E49-4D0C-B924-266D49F1E510"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.2.6",
|
||||
"matchCriteriaId": "71CC4AA3-04CC-49CA-A012-E28C4D1F11DE"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "3AE9CAFD-5D5B-4799-8690-624225963595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.1",
|
||||
"versionEndExcluding": "7.2.7",
|
||||
"matchCriteriaId": "75DA0ED6-C606-4763-A7B0-575F8061237A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-127",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-46450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T22:15:39.840",
|
||||
"lastModified": "2025-01-16T22:15:39.840",
|
||||
"lastModified": "2025-02-03T21:15:13.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " El control de acceso incorrecto en el enrutador WiFi de doble banda inteligente Tenda AC1200 modelo AC6 v2.0 Firmware v15.03.06.50 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de una solicitud web manipulada espec\u00edficamente."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://pastebin.com/BXxTqsZk",
|
||||
|
56
CVE-2024/CVE-2024-477xx/CVE-2024-47770.json
Normal file
56
CVE-2024/CVE-2024-477xx/CVE-2024-47770.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2024-47770",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:27.777",
|
||||
"lastModified": "2025-02-03T22:15:27.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view agent list on Wazuh dashboard with no privilege access. This issue has been addressed in release version 4.9.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-269"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-648q-8m78-5cwv",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-48460",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T22:15:39.973",
|
||||
"lastModified": "2025-01-16T22:15:39.973",
|
||||
"lastModified": "2025-02-03T21:15:13.217",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Un problema en Eugeny Tabby 1.0.213 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del servidor y env\u00eda el nombre de usuario y la contrase\u00f1a SSH incluso cuando falla la verificaci\u00f3n de la clave del host."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Eugeny/tabby/issues/9955",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48884",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:32.873",
|
||||
"lastModified": "2025-01-16T17:15:12.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:18:16.507",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,133 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndExcluding": "7.0.19",
|
||||
"matchCriteriaId": "32CFAF1E-358A-4F6D-96CB-D7229F0D9D74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.12",
|
||||
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.6",
|
||||
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.5",
|
||||
"matchCriteriaId": "CD60BA50-3F98-46BF-97E8-28AB207DE12A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.2",
|
||||
"matchCriteriaId": "C0B0D078-2F52-46B4-B9C0-162447828E1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "BBF1E214-4BC5-47E8-BF02-072D6D830BAF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndIncluding": "7.0.5",
|
||||
"matchCriteriaId": "5EEE0DFA-DE31-4D26-AC98-6BCED8F008DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "CDB9CE13-AAF4-418C-BA26-1A0D53C5C1C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.0.16",
|
||||
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.10",
|
||||
"matchCriteriaId": "4D7D031B-221B-4738-AC83-4FB92A106528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-259",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48885",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-16T09:15:06.737",
|
||||
"lastModified": "2025-01-16T09:15:06.737",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:11:41.750",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,133 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "1.0.0",
|
||||
"versionEndExcluding": "7.0.19",
|
||||
"matchCriteriaId": "32CFAF1E-358A-4F6D-96CB-D7229F0D9D74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.12",
|
||||
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.6",
|
||||
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.5",
|
||||
"matchCriteriaId": "CD60BA50-3F98-46BF-97E8-28AB207DE12A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.2",
|
||||
"matchCriteriaId": "C0B0D078-2F52-46B4-B9C0-162447828E1B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndIncluding": "6.4.10",
|
||||
"matchCriteriaId": "BBF1E214-4BC5-47E8-BF02-072D6D830BAF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndIncluding": "7.0.5",
|
||||
"matchCriteriaId": "5EEE0DFA-DE31-4D26-AC98-6BCED8F008DC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "CDB9CE13-AAF4-418C-BA26-1A0D53C5C1C2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.0.16",
|
||||
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.10",
|
||||
"matchCriteriaId": "4D7D031B-221B-4738-AC83-4FB92A106528"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-259",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48886",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.027",
|
||||
"lastModified": "2025-01-14T14:15:33.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:16:04.733",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,161 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1390"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "EF81840B-F269-4B40-8014-D4B18A2A016F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "DC9AD7A8-B390-4037-872B-02E1BEEDEC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "6EA0888C-2D95-46ED-9BA9-F99072C02FE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.0.15",
|
||||
"matchCriteriaId": "60E6EA0C-12E8-4EA7-901C-BEDE07BC88DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.18",
|
||||
"matchCriteriaId": "D273F0B5-A9F3-460B-8E96-7BEB816A91D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.11",
|
||||
"matchCriteriaId": "77A6D950-F8AE-4E12-9D43-C49BFE03B3D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "6794E3E0-7FC3-40D8-9568-20E6878E3EDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.0.16",
|
||||
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.9",
|
||||
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-221",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48890",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.187",
|
||||
"lastModified": "2025-01-14T14:15:33.187",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:13:42.850",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortisoar_imap_connector:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "3.5.8",
|
||||
"matchCriteriaId": "81F7D35F-38C7-4C7A-9038-58819B10D19C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-415",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-48893",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.333",
|
||||
"lastModified": "2025-01-14T14:15:33.333",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:12:20.713",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.1",
|
||||
"versionEndIncluding": "7.3.3",
|
||||
"matchCriteriaId": "9FC79454-2365-43A2-B27F-BF007CD41981"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-405",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50563",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-16T10:15:09.480",
|
||||
"lastModified": "2025-01-16T10:15:09.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:54:17.977",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,162 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1390"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "EF81840B-F269-4B40-8014-D4B18A2A016F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "DC9AD7A8-B390-4037-872B-02E1BEEDEC6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "6EA0888C-2D95-46ED-9BA9-F99072C02FE6"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.1",
|
||||
"versionEndExcluding": "7.4.4",
|
||||
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "2.0.0",
|
||||
"versionEndExcluding": "2.0.15",
|
||||
"matchCriteriaId": "60E6EA0C-12E8-4EA7-901C-BEDE07BC88DA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.18",
|
||||
"matchCriteriaId": "D273F0B5-A9F3-460B-8E96-7BEB816A91D9"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.11",
|
||||
"matchCriteriaId": "77A6D950-F8AE-4E12-9D43-C49BFE03B3D4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "6794E3E0-7FC3-40D8-9568-20E6878E3EDB"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.0.16",
|
||||
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.9",
|
||||
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-221",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50564",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.490",
|
||||
"lastModified": "2025-01-14T14:15:33.490",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:11:08.317",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,77 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-321"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.4.1",
|
||||
"matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-216",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-50566",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.650",
|
||||
"lastModified": "2025-01-14T14:15:33.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:09:31.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.1",
|
||||
"versionEndExcluding": "7.2.9",
|
||||
"matchCriteriaId": "CBA16B3B-9767-4B61-BA35-2DDF70D66D09"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.6",
|
||||
"matchCriteriaId": "24796E3A-DDCB-4949-9080-5DCEEECF0B6C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.2",
|
||||
"versionEndExcluding": "7.2.8",
|
||||
"matchCriteriaId": "57B085BA-AF25-4EE9-8EC6-BD588F3C90CF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "9FBDCAD3-019A-4F46-AB5D-448E525E4E94"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.6.0",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "3C4D647A-5EA1-4047-9E59-987FC8A74F0B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-463",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52963",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.807",
|
||||
"lastModified": "2025-01-14T14:15:33.807",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:56:00.043",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.6.1",
|
||||
"matchCriteriaId": "84DD8626-BB61-4F9E-A339-DBEE0D071347"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-373",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52967",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:33.967",
|
||||
"lastModified": "2025-01-14T14:15:33.967",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T21:59:09.277",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,77 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-80"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.0.0",
|
||||
"versionEndExcluding": "6.0.15",
|
||||
"matchCriteriaId": "9CE5BD60-C70A-492C-BC35-5F568A4F180D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-211",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-52969",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:34.123",
|
||||
"lastModified": "2025-01-14T14:15:34.123",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:01:44.330",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndIncluding": "7.1.7",
|
||||
"matchCriteriaId": "212DD268-6A3F-4F12-A935-D6BA7B5DD4F1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-417",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53320",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-31T16:15:34.883",
|
||||
"lastModified": "2025-01-31T16:15:34.883",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-03T21:15:13.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Qualisys C++ SDK commit a32a21a was discovered to contain multiple stack buffer overflows via the GetCurrentFrame, SaveCapture, and LoadProject functions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Qualisys C++ SDK commit a32a21a conten\u00eda m\u00faltiples desbordamientos de b\u00fafer de pila a trav\u00e9s de las funciones GetCurrentFrame, SaveCapture y LoadProject."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qualisys/qualisys_cpp_sdk/issues/47",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-53354",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-31T22:15:09.340",
|
||||
"lastModified": "2025-01-31T22:15:09.340",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-03T21:15:13.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "EasyVirt DCScope <=8.6.0 and CO2Scope <=1.3.0 are vulnerable to SQL Injection."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "EasyVirt DCScope <=8.6.0 y CO2Scope <=1.3.0 son vulnerables a la inyecci\u00f3n SQL."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53354.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-53553",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T23:15:07.700",
|
||||
"lastModified": "2025-01-16T23:15:07.700",
|
||||
"lastModified": "2025-02-03T21:15:13.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de solicitudes web manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54021",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:34.287",
|
||||
"lastModified": "2025-01-14T14:15:34.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:04:26.590",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,103 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@fortinet.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-113"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-436"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.12",
|
||||
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.6",
|
||||
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.9",
|
||||
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.5",
|
||||
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-282",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-54660",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T22:15:40.200",
|
||||
"lastModified": "2025-01-16T22:15:40.200",
|
||||
"lastModified": "2025-02-03T21:15:13.873",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Se descubri\u00f3 un problema de inyecci\u00f3n JNDI en Cloudera JDBC Connector para Hive antes de la versi\u00f3n 2.6.26 y JDBC Connector para Impala antes de la versi\u00f3n 2.6.35. Los atacantes pueden inyectar par\u00e1metros maliciosos en la URL de JDBC, lo que activa la inyecci\u00f3n JNDI durante el proceso cuando el controlador JDBC usa esta URL para conectarse a la base de datos. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. La inyecci\u00f3n JNDI es posible a trav\u00e9s de la propiedad de conexi\u00f3n JDBC krbJAASFile para el Servicio de autenticaci\u00f3n y autorizaci\u00f3n de Java (JAAS). El uso de par\u00e1metros no confiables en krbJAASFile o en el host remoto puede activar la inyecci\u00f3n JNDI en la URL de JDBC a trav\u00e9s de krbJAASFile."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-55593",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-01-14T14:15:34.610",
|
||||
"lastModified": "2025-01-14T14:15:34.610",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-03T22:06:19.163",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.3.6",
|
||||
"versionEndExcluding": "7.6.2",
|
||||
"matchCriteriaId": "D1A4D0B4-27A6-4DD1-9E01-F0927EFC4ED4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-465",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-568xx/CVE-2024-56898.json
Normal file
21
CVE-2024/CVE-2024-568xx/CVE-2024-56898.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56898",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.047",
|
||||
"lastModified": "2025-02-03T21:15:14.047",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Incorrect access control in Geovision GV-ASWeb version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to manage and create new user accounts via supplying a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-569xx/CVE-2024-56901.json
Normal file
21
CVE-2024/CVE-2024-569xx/CVE-2024-56901.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.157",
|
||||
"lastModified": "2025-02-03T21:15:14.157",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) in the Account Management component of Geovision GV-ASWeb version 6.1.1.0 or less allows attackers to arbitrarily create Admin accounts via a crafted GET request method."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56901",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-569xx/CVE-2024-56902.json
Normal file
21
CVE-2024/CVE-2024-569xx/CVE-2024-56902.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56902",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.270",
|
||||
"lastModified": "2025-02-03T21:15:14.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in Geovision GV-ASWeb with version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to be able to request information about other accounts via a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56902",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-569xx/CVE-2024-56903.json
Normal file
21
CVE-2024/CVE-2024-569xx/CVE-2024-56903.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-56903",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.357",
|
||||
"lastModified": "2025-02-03T21:15:14.357",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Cross-Site Request Forgery (CSRF) in Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to execute arbitrary operations via supplying a crafted HTTP request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/DRAGOWN/CVE-2024-56903",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-57097",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T20:15:33.897",
|
||||
"lastModified": "2025-02-03T20:15:33.897",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-03T21:15:14.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,50 @@
|
||||
"value": "ClassCMS 4.8 is vulnerable to Cross Site Scripting (XSS) in class/admin/channel.php."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ClassCMS/ClassCMS/issues/5",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ClassCMS/ClassCMS/issues/5",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2024-57434",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-31T22:15:12.613",
|
||||
"lastModified": "2025-01-31T22:15:12.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-03T21:15:14.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control. The project imports users by default, and the test user is made a super administrator."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Macrozheng Mall-Tiny 1.0.1 es vulnerable a un control de acceso incorrecto. El proyecto importa usuarios de forma predeterminada y el usuario de prueba se convierte en superadministrador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,63 @@
|
||||
"id": "CVE-2024-57435",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-31T22:15:13.103",
|
||||
"lastModified": "2025-01-31T22:15:13.103",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-02-03T21:15:14.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In macrozheng mall-tiny 1.0.1, an attacker can send null data through the resource creation interface resulting in a null pointer dereference occurring in all subsequent operations that require authentication, which triggers a denial-of-service attack and service restart failure."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En macrozheng mall-tiny 1.0.1, un atacante puede enviar datos nulos a trav\u00e9s de la interfaz de creaci\u00f3n de recursos, lo que da como resultado una desreferencia de puntero nulo en todas las operaciones posteriores que requieren autenticaci\u00f3n, lo que desencadena un ataque de denegaci\u00f3n de servicio y una falla de reinicio del servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-574xx/CVE-2024-57451.json
Normal file
21
CVE-2024/CVE-2024-574xx/CVE-2024-57451.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-57451",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:14.893",
|
||||
"lastModified": "2025-02-03T21:15:14.893",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57704",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T23:15:08.113",
|
||||
"lastModified": "2025-01-16T23:15:08.113",
|
||||
"lastModified": "2025-02-03T21:15:14.990",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": "Tenda AC8v4 V16.03.34.06 tiene una vulnerabilidad de desbordamiento de pila. La funci\u00f3n setSchedWifi del archivo /goform/openSchedWifi se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento schedStartTime provoca un desbordamiento del b\u00fafer basado en la pila."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-57784",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T23:15:08.213",
|
||||
"lastModified": "2025-01-16T23:15:08.213",
|
||||
"lastModified": "2025-02-03T21:15:15.133",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Un problema en el componente /php/script_uploads.php de Zenitel AlphaWeb XE v11.2.3.10 permite a los atacantes ejecutar directory traversal."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/s4fv4n/8cc4e4cb6fd028e803898837b73aa342",
|
||||
|
64
CVE-2025/CVE-2025-221xx/CVE-2025-22129.json
Normal file
64
CVE-2025/CVE-2025-221xx/CVE-2025-22129.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-22129",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.040",
|
||||
"lastModified": "2025-02-03T22:15:28.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-280"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f34g-wc2m-mf76",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=3edf8158ba40be66f0b661888b8b2805784795d1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41434",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-229xx/CVE-2025-22918.json
Normal file
21
CVE-2025/CVE-2025-229xx/CVE-2025-22918.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-22918",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-03T21:15:15.400",
|
||||
"lastModified": "2025-02-03T21:15:15.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Polycom RealPresence Group 500 <=20 has Insecure Permissions due to automatically loaded cookies. This allows for the use of administrator functions, resulting in the leakage of sensitive user information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MinggongKs/Polycom/blob/main/README.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-232xx/CVE-2025-23210.json
Normal file
82
CVE-2025/CVE-2025-232xx/CVE-2025-23210.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-23210",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.187",
|
||||
"lastModified": "2025-02-03T22:15:28.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "phpoffice/phpspreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions have been found to have a Bypass of the Cross-site Scripting (XSS) sanitizer using the javascript protocol and special characters. This issue has been addressed in versions 3.9.0, 2.3.7, 2.1.8, and 1.29.9. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/cde2926a9e2baf146783f8fd1771bbed7d1dc7b3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-r57h-547h-w24f",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-240xx/CVE-2025-24029.json
Normal file
68
CVE-2025/CVE-2025-240xx/CVE-2025-24029.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-24029",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.320",
|
||||
"lastModified": "2025-02-03T22:15:28.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users (possibly anonymous ones if the widget is used in the dashboard of a public project) might get access to artifacts they should not see. This issue has been addressed in Tuleap Community Edition 16.3.99.1737562605 as well as Tuleap Enterprise Edition 16.3-5 and Tuleap Enterprise Edition 16.2-7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-280"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=269cbaa73bac6d1c50674c48c9987263f2b38804",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a97480f951351c0f8f2f3f27f7daa3f7f9c37c75",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://tuleap.net/plugins/tracker/?aid=41476",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-243xx/CVE-2025-24370.json
Normal file
82
CVE-2025/CVE-2025-243xx/CVE-2025-24370.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-24370",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:15.547",
|
||||
"lastModified": "2025-02-03T21:15:15.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Django-Unicorn adds modern reactive component functionality to Django templates. Affected versions of Django-Unicorn are vulnerable to python class pollution vulnerability. The vulnerability arises from the core functionality `set_property_value`, which can be remotely triggered by users by crafting appropriate component requests and feeding in values of second and third parameter to the vulnerable function, leading to arbitrary changes to the python runtime status. With this finding at least five ways of vulnerability exploitation have been observed, stably resulting in Cross-Site Scripting (XSS), Denial of Service (DoS), and Authentication Bypass attacks in almost every Django-Unicorn-based application. This issue has been addressed in version 0.62.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-915"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adamghill/django-unicorn/commit/17614200f27174f789d4af54cc3a1f2b0df7870c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adamghill/django-unicorn/security/advisories/GHSA-g9wf-5777-gq43",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-243xx/CVE-2025-24371.json
Normal file
86
CVE-2025/CVE-2025-243xx/CVE-2025-24371.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-24371",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.460",
|
||||
"lastModified": "2025-02-03T22:15:28.460",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CometBFT is a distributed, Byzantine fault-tolerant, deterministic state machine replication engine. In the `blocksync` protocol peers send their `base` and `latest` heights when they connect to a new node (`A`), which is syncing to the tip of a network. `base` acts as a lower ground and informs `A` that the peer only has blocks starting from height `base`. `latest` height informs `A` about the latest block in a network. Normally, nodes would only report increasing heights. If `B` fails to provide the latest block, `B` is removed and the `latest` height (target height) is recalculated based on other nodes `latest` heights. The existing code however doesn't check for the case where `B` first reports `latest` height `X` and immediately after height `Y`, where `X > Y`. `A` will be trying to catch up to 2000 indefinitely. This condition requires the introduction of malicious code in the full node first reporting some non-existing `latest` height, then reporting lower `latest` height and nodes which are syncing using `blocksync` protocol. This issue has been patched in versions 1.0.1 and 0.38.17 and all users are advised to upgrade. Operators may attempt to ban malicious peers from the network as a workaround."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-703"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cometbft/cometbft/releases/tag/v0.38.17",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cometbft/cometbft/releases/tag/v1.0.1",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-248xx/CVE-2025-24899.json
Normal file
82
CVE-2025/CVE-2025-248xx/CVE-2025-24899.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-24899",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:15.703",
|
||||
"lastModified": "2025-02-03T21:15:15.703",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/commit/a658b8519f1a3347634b04733cf91ed933af1f99",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24901.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24901.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24901",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.590",
|
||||
"lastModified": "2025-02-03T22:15:28.590",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `deletar_permissao.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jp48-94wm-3gmc",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24902.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24902.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24902",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.723",
|
||||
"lastModified": "2025-02-03T22:15:28.723",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_cargo.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24905.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24905.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24905",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.840",
|
||||
"lastModified": "2025-02-03T22:15:28.840",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_codigobarras_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qjc6-5qv6-fr8m",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24906.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24906.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24906",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:28.963",
|
||||
"lastModified": "2025-02-03T22:15:28.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jpph-g9p7-9jrm",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24957.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24957.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24957",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:29.087",
|
||||
"lastModified": "2025-02-03T22:15:29.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_socio.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x28g-6228-99p9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-249xx/CVE-2025-24958.json
Normal file
78
CVE-2025/CVE-2025-249xx/CVE-2025-24958.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-24958",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T22:15:29.210",
|
||||
"lastModified": "2025-02-03T22:15:29.210",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_tag.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.4,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2mhx-5998-46hx",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-249xx/CVE-2025-24959.json
Normal file
82
CVE-2025/CVE-2025-249xx/CVE-2025-24959.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-24959",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:15.853",
|
||||
"lastModified": "2025-02-03T21:15:15.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. This issue has been patched in version 8.3.2. Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `\"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 1.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/google/zx/pull/1094",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/google/zx/security/advisories/GHSA-qwp8-x4ff-5h87",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-249xx/CVE-2025-24960.json
Normal file
64
CVE-2025/CVE-2025-249xx/CVE-2025-24960.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-24960",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:16.020",
|
||||
"lastModified": "2025-02-03T21:15:16.020",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Jellystat is a free and open source Statistics App for Jellyfin. In affected versions Jellystat is directly using a user input in the route(s). This can lead to Path Traversal Vulnerabilities. Since this functionality is only for admin(s), there is very little scope for abuse. However, the `DELETE` `files/:filename` can be used to delete any file. This issue has been addressed in version 1.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://cwe.mitre.org/data/definitions/22.html",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CyferShepard/Jellystat/pull/303",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-6x46-6w9f-ffv6",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-249xx/CVE-2025-24961.json
Normal file
86
CVE-2025/CVE-2025-249xx/CVE-2025-24961.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-24961",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:16.170",
|
||||
"lastModified": "2025-02-03T21:15:16.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/apache/jclouds/commit/b0819e0ef5e08c792a4d1724b938714ce9503aa3",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gaul/s3proxy/commit/86b6ee4749aa163a78e7898efc063617ed171980",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gaul/s3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-249xx/CVE-2025-24962.json
Normal file
82
CVE-2025/CVE-2025-249xx/CVE-2025-24962.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-24962",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-03T21:15:16.317",
|
||||
"lastModified": "2025-02-03T21:15:16.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "reNgine is an automated reconnaissance framework for web applications. In affected versions a user can inject commands via the nmap_cmd parameters. This issue has been addressed in commit `c28e5c8d` and is expected in the next versioned release. Users are advised to filter user input and monitor the project for a new release."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/commit/c28e5c8d304478a787811580b4d80b330920ace4",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
109
README.md
109
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-03T21:00:31.907943+00:00
|
||||
2025-02-03T23:00:27.599814+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-03T20:55:26.147000+00:00
|
||||
2025-02-03T22:18:16.507000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,68 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279918
|
||||
279947
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `24`
|
||||
Recently added CVEs: `29`
|
||||
|
||||
- [CVE-2024-11132](CVE-2024/CVE-2024-111xx/CVE-2024-11132.json) (`2025-02-03T20:15:32.047`)
|
||||
- [CVE-2024-11133](CVE-2024/CVE-2024-111xx/CVE-2024-11133.json) (`2025-02-03T20:15:32.203`)
|
||||
- [CVE-2024-11134](CVE-2024/CVE-2024-111xx/CVE-2024-11134.json) (`2025-02-03T20:15:32.373`)
|
||||
- [CVE-2024-12510](CVE-2024/CVE-2024-125xx/CVE-2024-12510.json) (`2025-02-03T19:15:11.827`)
|
||||
- [CVE-2024-12511](CVE-2024/CVE-2024-125xx/CVE-2024-12511.json) (`2025-02-03T20:15:32.797`)
|
||||
- [CVE-2024-12859](CVE-2024/CVE-2024-128xx/CVE-2024-12859.json) (`2025-02-03T20:15:32.940`)
|
||||
- [CVE-2024-50656](CVE-2024/CVE-2024-506xx/CVE-2024-50656.json) (`2025-02-03T19:15:12.370`)
|
||||
- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-02-03T20:15:33.610`)
|
||||
- [CVE-2024-56946](CVE-2024/CVE-2024-569xx/CVE-2024-56946.json) (`2025-02-03T20:15:33.743`)
|
||||
- [CVE-2024-57004](CVE-2024/CVE-2024-570xx/CVE-2024-57004.json) (`2025-02-03T19:15:12.777`)
|
||||
- [CVE-2024-57097](CVE-2024/CVE-2024-570xx/CVE-2024-57097.json) (`2025-02-03T20:15:33.897`)
|
||||
- [CVE-2024-57098](CVE-2024/CVE-2024-570xx/CVE-2024-57098.json) (`2025-02-03T20:15:34.013`)
|
||||
- [CVE-2024-57099](CVE-2024/CVE-2024-570xx/CVE-2024-57099.json) (`2025-02-03T20:15:34.157`)
|
||||
- [CVE-2024-57237](CVE-2024/CVE-2024-572xx/CVE-2024-57237.json) (`2025-02-03T19:15:13.053`)
|
||||
- [CVE-2024-57238](CVE-2024/CVE-2024-572xx/CVE-2024-57238.json) (`2025-02-03T19:15:13.177`)
|
||||
- [CVE-2024-57450](CVE-2024/CVE-2024-574xx/CVE-2024-57450.json) (`2025-02-03T20:15:34.253`)
|
||||
- [CVE-2024-57452](CVE-2024/CVE-2024-574xx/CVE-2024-57452.json) (`2025-02-03T20:15:34.373`)
|
||||
- [CVE-2024-57498](CVE-2024/CVE-2024-574xx/CVE-2024-57498.json) (`2025-02-03T20:15:34.477`)
|
||||
- [CVE-2024-57669](CVE-2024/CVE-2024-576xx/CVE-2024-57669.json) (`2025-02-03T20:15:34.960`)
|
||||
- [CVE-2024-57968](CVE-2024/CVE-2024-579xx/CVE-2024-57968.json) (`2025-02-03T20:15:36.550`)
|
||||
- [CVE-2025-22978](CVE-2025/CVE-2025-229xx/CVE-2025-22978.json) (`2025-02-03T20:15:36.720`)
|
||||
- [CVE-2025-25064](CVE-2025/CVE-2025-250xx/CVE-2025-25064.json) (`2025-02-03T20:15:37.257`)
|
||||
- [CVE-2025-25065](CVE-2025/CVE-2025-250xx/CVE-2025-25065.json) (`2025-02-03T20:15:37.370`)
|
||||
- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-02-03T20:15:37.477`)
|
||||
- [CVE-2024-35177](CVE-2024/CVE-2024-351xx/CVE-2024-35177.json) (`2025-02-03T22:15:27.600`)
|
||||
- [CVE-2024-44449](CVE-2024/CVE-2024-444xx/CVE-2024-44449.json) (`2025-02-03T21:15:12.927`)
|
||||
- [CVE-2024-47770](CVE-2024/CVE-2024-477xx/CVE-2024-47770.json) (`2025-02-03T22:15:27.777`)
|
||||
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-02-03T21:15:14.047`)
|
||||
- [CVE-2024-56901](CVE-2024/CVE-2024-569xx/CVE-2024-56901.json) (`2025-02-03T21:15:14.157`)
|
||||
- [CVE-2024-56902](CVE-2024/CVE-2024-569xx/CVE-2024-56902.json) (`2025-02-03T21:15:14.270`)
|
||||
- [CVE-2024-56903](CVE-2024/CVE-2024-569xx/CVE-2024-56903.json) (`2025-02-03T21:15:14.357`)
|
||||
- [CVE-2024-57451](CVE-2024/CVE-2024-574xx/CVE-2024-57451.json) (`2025-02-03T21:15:14.893`)
|
||||
- [CVE-2025-22129](CVE-2025/CVE-2025-221xx/CVE-2025-22129.json) (`2025-02-03T22:15:28.040`)
|
||||
- [CVE-2025-22918](CVE-2025/CVE-2025-229xx/CVE-2025-22918.json) (`2025-02-03T21:15:15.400`)
|
||||
- [CVE-2025-23210](CVE-2025/CVE-2025-232xx/CVE-2025-23210.json) (`2025-02-03T22:15:28.187`)
|
||||
- [CVE-2025-24029](CVE-2025/CVE-2025-240xx/CVE-2025-24029.json) (`2025-02-03T22:15:28.320`)
|
||||
- [CVE-2025-24370](CVE-2025/CVE-2025-243xx/CVE-2025-24370.json) (`2025-02-03T21:15:15.547`)
|
||||
- [CVE-2025-24371](CVE-2025/CVE-2025-243xx/CVE-2025-24371.json) (`2025-02-03T22:15:28.460`)
|
||||
- [CVE-2025-24899](CVE-2025/CVE-2025-248xx/CVE-2025-24899.json) (`2025-02-03T21:15:15.703`)
|
||||
- [CVE-2025-24901](CVE-2025/CVE-2025-249xx/CVE-2025-24901.json) (`2025-02-03T22:15:28.590`)
|
||||
- [CVE-2025-24902](CVE-2025/CVE-2025-249xx/CVE-2025-24902.json) (`2025-02-03T22:15:28.723`)
|
||||
- [CVE-2025-24905](CVE-2025/CVE-2025-249xx/CVE-2025-24905.json) (`2025-02-03T22:15:28.840`)
|
||||
- [CVE-2025-24906](CVE-2025/CVE-2025-249xx/CVE-2025-24906.json) (`2025-02-03T22:15:28.963`)
|
||||
- [CVE-2025-24957](CVE-2025/CVE-2025-249xx/CVE-2025-24957.json) (`2025-02-03T22:15:29.087`)
|
||||
- [CVE-2025-24958](CVE-2025/CVE-2025-249xx/CVE-2025-24958.json) (`2025-02-03T22:15:29.210`)
|
||||
- [CVE-2025-24959](CVE-2025/CVE-2025-249xx/CVE-2025-24959.json) (`2025-02-03T21:15:15.853`)
|
||||
- [CVE-2025-24960](CVE-2025/CVE-2025-249xx/CVE-2025-24960.json) (`2025-02-03T21:15:16.020`)
|
||||
- [CVE-2025-24961](CVE-2025/CVE-2025-249xx/CVE-2025-24961.json) (`2025-02-03T21:15:16.170`)
|
||||
- [CVE-2025-24962](CVE-2025/CVE-2025-249xx/CVE-2025-24962.json) (`2025-02-03T21:15:16.317`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `81`
|
||||
Recently modified CVEs: `36`
|
||||
|
||||
- [CVE-2024-57665](CVE-2024/CVE-2024-576xx/CVE-2024-57665.json) (`2025-02-03T20:15:34.787`)
|
||||
- [CVE-2024-57676](CVE-2024/CVE-2024-576xx/CVE-2024-57676.json) (`2025-02-03T20:15:35.083`)
|
||||
- [CVE-2024-57677](CVE-2024/CVE-2024-576xx/CVE-2024-57677.json) (`2025-02-03T20:15:35.260`)
|
||||
- [CVE-2024-57678](CVE-2024/CVE-2024-576xx/CVE-2024-57678.json) (`2025-02-03T20:15:35.427`)
|
||||
- [CVE-2024-57679](CVE-2024/CVE-2024-576xx/CVE-2024-57679.json) (`2025-02-03T20:15:35.577`)
|
||||
- [CVE-2024-57680](CVE-2024/CVE-2024-576xx/CVE-2024-57680.json) (`2025-02-03T20:15:35.740`)
|
||||
- [CVE-2024-57681](CVE-2024/CVE-2024-576xx/CVE-2024-57681.json) (`2025-02-03T20:15:35.907`)
|
||||
- [CVE-2024-57682](CVE-2024/CVE-2024-576xx/CVE-2024-57682.json) (`2025-02-03T20:15:36.063`)
|
||||
- [CVE-2024-57683](CVE-2024/CVE-2024-576xx/CVE-2024-57683.json) (`2025-02-03T20:15:36.223`)
|
||||
- [CVE-2024-57776](CVE-2024/CVE-2024-577xx/CVE-2024-57776.json) (`2025-02-03T20:15:36.390`)
|
||||
- [CVE-2024-8798](CVE-2024/CVE-2024-87xx/CVE-2024-8798.json) (`2025-02-03T20:13:18.163`)
|
||||
- [CVE-2025-0437](CVE-2025/CVE-2025-04xx/CVE-2025-0437.json) (`2025-02-03T19:15:13.967`)
|
||||
- [CVE-2025-20635](CVE-2025/CVE-2025-206xx/CVE-2025-20635.json) (`2025-02-03T19:31:24.417`)
|
||||
- [CVE-2025-20636](CVE-2025/CVE-2025-206xx/CVE-2025-20636.json) (`2025-02-03T19:39:49.587`)
|
||||
- [CVE-2025-20638](CVE-2025/CVE-2025-206xx/CVE-2025-20638.json) (`2025-02-03T19:40:23.927`)
|
||||
- [CVE-2025-21665](CVE-2025/CVE-2025-216xx/CVE-2025-21665.json) (`2025-02-03T19:57:54.933`)
|
||||
- [CVE-2025-21666](CVE-2025/CVE-2025-216xx/CVE-2025-21666.json) (`2025-02-03T19:59:37.907`)
|
||||
- [CVE-2025-21667](CVE-2025/CVE-2025-216xx/CVE-2025-21667.json) (`2025-02-03T20:00:28.727`)
|
||||
- [CVE-2025-21672](CVE-2025/CVE-2025-216xx/CVE-2025-21672.json) (`2025-02-03T20:04:22.147`)
|
||||
- [CVE-2025-21683](CVE-2025/CVE-2025-216xx/CVE-2025-21683.json) (`2025-02-03T20:01:29.163`)
|
||||
- [CVE-2025-22964](CVE-2025/CVE-2025-229xx/CVE-2025-22964.json) (`2025-02-03T19:15:14.207`)
|
||||
- [CVE-2025-22976](CVE-2025/CVE-2025-229xx/CVE-2025-22976.json) (`2025-02-03T19:15:14.397`)
|
||||
- [CVE-2025-23011](CVE-2025/CVE-2025-230xx/CVE-2025-23011.json) (`2025-02-03T20:15:36.823`)
|
||||
- [CVE-2025-23012](CVE-2025/CVE-2025-230xx/CVE-2025-23012.json) (`2025-02-03T20:15:36.977`)
|
||||
- [CVE-2025-24140](CVE-2025/CVE-2025-241xx/CVE-2025-24140.json) (`2025-02-03T20:15:37.090`)
|
||||
- [CVE-2024-45331](CVE-2024/CVE-2024-453xx/CVE-2024-45331.json) (`2025-02-03T21:03:06.133`)
|
||||
- [CVE-2024-46450](CVE-2024/CVE-2024-464xx/CVE-2024-46450.json) (`2025-02-03T21:15:13.043`)
|
||||
- [CVE-2024-48460](CVE-2024/CVE-2024-484xx/CVE-2024-48460.json) (`2025-02-03T21:15:13.217`)
|
||||
- [CVE-2024-48884](CVE-2024/CVE-2024-488xx/CVE-2024-48884.json) (`2025-02-03T22:18:16.507`)
|
||||
- [CVE-2024-48885](CVE-2024/CVE-2024-488xx/CVE-2024-48885.json) (`2025-02-03T21:11:41.750`)
|
||||
- [CVE-2024-48886](CVE-2024/CVE-2024-488xx/CVE-2024-48886.json) (`2025-02-03T22:16:04.733`)
|
||||
- [CVE-2024-48890](CVE-2024/CVE-2024-488xx/CVE-2024-48890.json) (`2025-02-03T22:13:42.850`)
|
||||
- [CVE-2024-48893](CVE-2024/CVE-2024-488xx/CVE-2024-48893.json) (`2025-02-03T22:12:20.713`)
|
||||
- [CVE-2024-50563](CVE-2024/CVE-2024-505xx/CVE-2024-50563.json) (`2025-02-03T21:54:17.977`)
|
||||
- [CVE-2024-50564](CVE-2024/CVE-2024-505xx/CVE-2024-50564.json) (`2025-02-03T22:11:08.317`)
|
||||
- [CVE-2024-50566](CVE-2024/CVE-2024-505xx/CVE-2024-50566.json) (`2025-02-03T22:09:31.510`)
|
||||
- [CVE-2024-52963](CVE-2024/CVE-2024-529xx/CVE-2024-52963.json) (`2025-02-03T21:56:00.043`)
|
||||
- [CVE-2024-52967](CVE-2024/CVE-2024-529xx/CVE-2024-52967.json) (`2025-02-03T21:59:09.277`)
|
||||
- [CVE-2024-52969](CVE-2024/CVE-2024-529xx/CVE-2024-52969.json) (`2025-02-03T22:01:44.330`)
|
||||
- [CVE-2024-53320](CVE-2024/CVE-2024-533xx/CVE-2024-53320.json) (`2025-02-03T21:15:13.373`)
|
||||
- [CVE-2024-53354](CVE-2024/CVE-2024-533xx/CVE-2024-53354.json) (`2025-02-03T21:15:13.520`)
|
||||
- [CVE-2024-53553](CVE-2024/CVE-2024-535xx/CVE-2024-53553.json) (`2025-02-03T21:15:13.667`)
|
||||
- [CVE-2024-54021](CVE-2024/CVE-2024-540xx/CVE-2024-54021.json) (`2025-02-03T22:04:26.590`)
|
||||
- [CVE-2024-54660](CVE-2024/CVE-2024-546xx/CVE-2024-54660.json) (`2025-02-03T21:15:13.873`)
|
||||
- [CVE-2024-55593](CVE-2024/CVE-2024-555xx/CVE-2024-55593.json) (`2025-02-03T22:06:19.163`)
|
||||
- [CVE-2024-57097](CVE-2024/CVE-2024-570xx/CVE-2024-57097.json) (`2025-02-03T21:15:14.450`)
|
||||
- [CVE-2024-57434](CVE-2024/CVE-2024-574xx/CVE-2024-57434.json) (`2025-02-03T21:15:14.600`)
|
||||
- [CVE-2024-57435](CVE-2024/CVE-2024-574xx/CVE-2024-57435.json) (`2025-02-03T21:15:14.747`)
|
||||
- [CVE-2024-57704](CVE-2024/CVE-2024-577xx/CVE-2024-57704.json) (`2025-02-03T21:15:14.990`)
|
||||
- [CVE-2024-57784](CVE-2024/CVE-2024-577xx/CVE-2024-57784.json) (`2025-02-03T21:15:15.133`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
309
_state.csv
309
_state.csv
@ -56994,8 +56994,8 @@ CVE-2012-5865,0,0,e7273473923d06142c8869f1336b248828a959eb51799f032b3ec387b3f720
|
||||
CVE-2012-5866,0,0,92633694169307fcf435b5acb2b91490c7a52bbc0e90d1ba10cf6ef932e7990e,2024-11-21T01:45:23.880000
|
||||
CVE-2012-5867,0,0,b4eeb23ac594ce781f99466fc914490b7be45508d175e43621f7b3b0e0cb25d5,2024-11-21T01:45:24.047000
|
||||
CVE-2012-5868,0,0,66aa23a04d8110fbede33f8f38e2013c9e85e41f91627e773d1a21b549168ba3,2024-11-21T01:45:24.193000
|
||||
CVE-2012-5872,0,0,fc619c8eba5c3275d25cf62f707a9ba274e2314afaf77db94b5ec6647f5ad134,2024-11-21T01:45:24.330000
|
||||
CVE-2012-5873,0,0,adc404dc6978de6fdf7d7253e9d40d3b95d4d5556d827897838253c5082b224c,2024-11-21T01:45:24.480000
|
||||
CVE-2012-5872,0,1,8c737dde4cb6de273c8c1e4394bdf0bfd0f35ea780a2526dd275f877686aa8e8,2025-02-03T21:15:10.410000
|
||||
CVE-2012-5873,0,1,2f1691f043f9f2a58ed01c11ba5a3796edbe901299b6d12e7b4ef48649de945f,2025-02-03T21:15:11.443000
|
||||
CVE-2012-5874,0,0,e134fcf69f54bf4ff765053ed80812b29cce8b897696f43b7aa7e68a5b23a620,2024-11-21T01:45:24.623000
|
||||
CVE-2012-5875,0,0,39b638d4b228dd080815003f9f3f8b4fefb8384ef53556b4b56b1bc502b7bfb4,2024-11-21T01:45:24.790000
|
||||
CVE-2012-5876,0,0,be53b73aaaacf3e3503ad4460aa53387072cd3d426a3c4a41ebd9bb7894a1f8e,2024-11-21T01:45:24.940000
|
||||
@ -194655,12 +194655,12 @@ CVE-2022-25269,0,0,3aa5924fd5f15a04a6adcbacf9b439b5b233f0444655dae512aed418394f3
|
||||
CVE-2022-2527,0,0,596db19b9923bf9e8506e12860e975491cf9aeab9ee0221abe73d9611347846f,2024-11-21T07:01:11.507000
|
||||
CVE-2022-25270,0,0,6ed8e426a9819aafe936e295f5c7a587986135df6bcb9c9e2509c07479fc79a5,2024-11-21T06:51:55.260000
|
||||
CVE-2022-25271,0,0,3bb104611e2f4ae9081ced197d3ced92dc51c5af622840acbf2bf752f4b865dc,2024-11-21T06:51:55.353000
|
||||
CVE-2022-25273,0,1,7fbfa251402cdeef6254265e58709ab5ec90b14610ec6f4a4b20beee4a3e39eb,2025-02-03T20:15:30.217000
|
||||
CVE-2022-25274,0,1,8fc79bcd85d15e92faced7b2e8f6204a347e7763398431726a06954bfc5761b2,2025-02-03T19:15:08.793000
|
||||
CVE-2022-25275,0,1,1c078f2e7f4e1fec62b3bb9a719783e9a5a44d26057eb11587fa0a20b0c22181,2025-02-03T19:15:09.090000
|
||||
CVE-2022-25276,0,1,7833630046e5f22974cb857d7243e6a0d692894d2c480bfc8ccc11a2be66ec18,2025-02-03T19:15:09.243000
|
||||
CVE-2022-25277,0,1,1d860482a0f6e8e516c1651aac111035697557b2d770709936cd885e420a9f44,2025-02-03T19:15:09.410000
|
||||
CVE-2022-25278,0,1,5e5ca20b2b5c4ca29b3300f5a32c0f961523db02e3c32a6ce113abbabb3c3661,2025-02-03T19:15:09.573000
|
||||
CVE-2022-25273,0,0,7fbfa251402cdeef6254265e58709ab5ec90b14610ec6f4a4b20beee4a3e39eb,2025-02-03T20:15:30.217000
|
||||
CVE-2022-25274,0,0,8fc79bcd85d15e92faced7b2e8f6204a347e7763398431726a06954bfc5761b2,2025-02-03T19:15:08.793000
|
||||
CVE-2022-25275,0,0,1c078f2e7f4e1fec62b3bb9a719783e9a5a44d26057eb11587fa0a20b0c22181,2025-02-03T19:15:09.090000
|
||||
CVE-2022-25276,0,0,7833630046e5f22974cb857d7243e6a0d692894d2c480bfc8ccc11a2be66ec18,2025-02-03T19:15:09.243000
|
||||
CVE-2022-25277,0,0,1d860482a0f6e8e516c1651aac111035697557b2d770709936cd885e420a9f44,2025-02-03T19:15:09.410000
|
||||
CVE-2022-25278,0,0,5e5ca20b2b5c4ca29b3300f5a32c0f961523db02e3c32a6ce113abbabb3c3661,2025-02-03T19:15:09.573000
|
||||
CVE-2022-2528,0,0,8d42d23ab2160c22fdc5c04e91effa706200d9ffe7558f3159d2cf043079d31d,2024-11-21T07:01:11.620000
|
||||
CVE-2022-2529,0,0,ce42c3cf48c54f15258ee3debbd0e6cd0cf52759d10a848c50d0f76f8e505e30,2024-11-21T07:01:11.843000
|
||||
CVE-2022-25290,0,0,93a870738a6070b4214d8f31cf5cead74f654c7c35b8a4bb409a786e42d61feb,2024-11-21T06:51:56.097000
|
||||
@ -196799,7 +196799,7 @@ CVE-2022-27967,0,0,f75dff3cc6bd62bdffc1bf35ac24cc9564626271bd8614770b9fc0e47be11
|
||||
CVE-2022-27968,0,0,cbccbaa3fb6e435452fb2d35b68fc1e04bd36685e00472d2e8cf695db98b779f,2024-11-21T06:56:33.647000
|
||||
CVE-2022-27969,0,0,fd8fe6e82a84b904efb9c1d457e39c306d37a1e0b67a860df3ae203df0aeca4f,2024-11-21T06:56:33.803000
|
||||
CVE-2022-2797,0,0,c2d28b535a5b76163b4dfc84f513eaf3f1625ecc552a48e7d22cbceb9c2f2976,2024-11-21T07:01:42.827000
|
||||
CVE-2022-27978,0,1,196ab5e117c6915091c44832c9df1f86ceee99cc75bce1269f20694cf505a379,2025-02-03T19:15:09.747000
|
||||
CVE-2022-27978,0,0,196ab5e117c6915091c44832c9df1f86ceee99cc75bce1269f20694cf505a379,2025-02-03T19:15:09.747000
|
||||
CVE-2022-27979,0,0,12323a539da57d1871d2c48aa28a439604dfd301c80755327669a1ef191c00f0,2025-02-03T18:15:27.897000
|
||||
CVE-2022-2798,0,0,6bc30bf6cb421bba621e8ca645f50cdbace2a887f4c812363d64522868eff2cc,2024-11-21T07:01:42.920000
|
||||
CVE-2022-27982,0,0,5ac40339ffe38a015892bd701007901e549aedbf1e22ef79b6f56f1f35a687a1,2024-11-21T06:56:34.267000
|
||||
@ -199562,7 +199562,7 @@ CVE-2022-31239,0,0,71c73ca9ed1bba223825e44ed9733ff42f2ccbb8fad7211a007f3dc884aa6
|
||||
CVE-2022-3124,0,0,de075dcd013a0f7b4fb8abfd88b5d9318f72bdfd16faaf76cbacc9d47cda7185,2024-11-21T07:18:52.577000
|
||||
CVE-2022-31242,0,0,5ff27fd88b8a2b8024099751c11ea6d8e82e343cee053ae525c223e7a8656438,2023-11-07T03:47:36.203000
|
||||
CVE-2022-31243,0,0,03d1b745f940173aefdce9af8e85cdfe2d291931c7c5f940ab813e336259d950,2024-11-21T07:04:12.250000
|
||||
CVE-2022-31244,0,0,a819ce0d07dd6fdb89bbcf4e1534fe2be32e525650cb2c81b6d9b742338f31de,2024-11-21T07:04:12.410000
|
||||
CVE-2022-31244,0,1,15378c8c9e7ad62b3eccbed3823411505b4151a14404dd3d4a408a0051a7923e,2025-02-03T21:15:11.653000
|
||||
CVE-2022-31245,0,0,f25c8d1c345fc0cd063bad457059629b5f8a7588e5978112320a5f25f84d042b,2024-11-21T07:04:12.570000
|
||||
CVE-2022-31246,0,0,a85f383e12f52bbc27c933575a40dc44661e830efe4a32850b97b6afdf52d0af,2024-11-21T07:04:12.730000
|
||||
CVE-2022-31247,0,0,804bad6810d87b5805aa181e472cb5549678974ac2c2cbac9f56a494a04f3f96,2024-11-21T07:04:12.897000
|
||||
@ -206666,7 +206666,7 @@ CVE-2022-40475,0,0,6de94b9a336ae41b3d1d3adc1f78b66800eb00ccc5db069c8886c55d9bf93
|
||||
CVE-2022-40476,0,0,fe4e93dab516974550ab95d0993fe50d2a081a2c7aa47ef0599f49a47be7069d,2024-11-21T07:21:26.367000
|
||||
CVE-2022-4048,0,0,078ca5ed72f6aed7a90faf02ab6f85e1474cb4ba97a87f704be733be7414d83d,2024-11-21T07:34:30.583000
|
||||
CVE-2022-40480,0,0,7635a575e6ac1bb92ae92240aaa30a82fd563044e395eabf8cf1e31f4c639956,2024-11-21T07:21:26.527000
|
||||
CVE-2022-40482,0,0,fc87e26d6ca3fad045e090d4f76502aa80467790690b7326a654f50612e39f64,2024-11-21T07:21:26.683000
|
||||
CVE-2022-40482,0,1,adf86389892f7a95569aa98f0e2f6a341d90adac7010847b374647ab76ccd9ed,2025-02-03T21:15:11.827000
|
||||
CVE-2022-40483,0,0,60c8097e6a915de7214200aa26f52cd02d74d232a175bcb245d590ece07c4dba,2024-11-21T07:21:26.860000
|
||||
CVE-2022-40484,0,0,4a2721e015188f13a3c8cebba998fdc46540c181e160a823911afe0177fc6508,2024-11-21T07:21:27.020000
|
||||
CVE-2022-40485,0,0,a98e46b39dcbae79f7b24f45d7af6400d61f0a9cb4e84cd27ffa7ba75dbc7829,2024-11-21T07:21:27.173000
|
||||
@ -219558,7 +219558,7 @@ CVE-2023-25306,0,0,edcf081a190ce1746bf6344523ba03f49a546931e1f6e6192e742c750e584
|
||||
CVE-2023-25307,0,0,169769ff3f98fbbb2d755cb83126804d404a380acff35a8f1b6aa4539f98db5c,2024-11-21T07:49:24.450000
|
||||
CVE-2023-25309,0,0,12fb26cab8d54fb6e8bd69905a74bdb9e62d267a6541c74cf35ecd6b4a2c3007,2025-01-27T17:15:10.743000
|
||||
CVE-2023-2531,0,0,a6425f0bed224abaaf3ff0019a68b7cad19db87c026c67e6739047930d76bcb2,2024-11-21T07:58:47.277000
|
||||
CVE-2023-25313,0,1,b3aa49f2b4e810fbda0ee639c3661dcf4aab51afd0feb5e6f0ea823461c0133c,2025-02-03T19:15:10.043000
|
||||
CVE-2023-25313,0,0,b3aa49f2b4e810fbda0ee639c3661dcf4aab51afd0feb5e6f0ea823461c0133c,2025-02-03T19:15:10.043000
|
||||
CVE-2023-25314,0,0,713c1d209f85bc607917983156315b9580c4e3437434b7c235d8fb23eb605acd,2024-11-21T07:49:24.870000
|
||||
CVE-2023-2533,0,0,db7332ea725d80d1fea4bb9c8fcc31dd08047586f6cf8216ad2be737deb5dbc4,2024-11-21T07:58:47.400000
|
||||
CVE-2023-25330,0,0,08f3ee33c083dc703c8c8ce32873b303743eeee4c637ccb5438853532d2b5f13,2024-11-21T07:49:25
|
||||
@ -219566,7 +219566,7 @@ CVE-2023-2534,0,0,2765d8e31a6947ae0d35fb13d15df7a661ee4119acfec516d581783fb3089e
|
||||
CVE-2023-25341,0,0,a6c0ae09f38d0a080f9399b91e16f70d20e262ee8151f1a5c7bc5a49f687504a,2024-11-21T15:15:09.430000
|
||||
CVE-2023-25344,0,0,8a83a30314d7b7167b00f406ae152838e039dee182e8c3aadf0cc57ee858b016,2024-11-21T07:49:25.280000
|
||||
CVE-2023-25345,0,0,3047d7e94bcb27ce1963bc1007e57600c1401bd6a1e52384238fe1fc44a5b2f8,2024-11-21T07:49:25.413000
|
||||
CVE-2023-25346,0,1,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000
|
||||
CVE-2023-25346,0,0,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000
|
||||
CVE-2023-25347,0,0,8138b3973d3e366663faf7de4265569e4c2f24365a27a090704a19edcaa8b236,2024-11-21T07:49:25.670000
|
||||
CVE-2023-25348,0,0,43b2d94221c22266ccc7c295ab2746cc9adaa7e535258cc20d633841f6d263bf,2024-11-21T07:49:25.803000
|
||||
CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94ea,2023-11-07T04:12:51.317000
|
||||
@ -220780,8 +220780,8 @@ CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291
|
||||
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
|
||||
CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b3db,2024-11-21T07:51:59.153000
|
||||
CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
|
||||
CVE-2023-26840,0,1,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
|
||||
CVE-2023-26841,0,0,cf784a03f1035170d882277f185f72bfa73df1e3de452edb90b82c5e700e3c31,2024-11-21T07:51:59.427000
|
||||
CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
|
||||
CVE-2023-26841,0,1,0100fc3380f5eb3112a8ff24af369b3bb07821b8b3ee2a09a94dcc1b0c1d83e8,2025-02-03T22:15:26.607000
|
||||
CVE-2023-26842,0,0,d39eda28623af714efe7f85aeb376ccc0342f23c9b1231f090e68b81cb28e036,2025-01-09T20:15:31.650000
|
||||
CVE-2023-26843,0,0,786845edc94077cb46de16ddea7568a47d83125548a040d79aacb36c0f0421db,2024-11-21T07:51:59.693000
|
||||
CVE-2023-26845,0,0,a2f9c7776186d3df0ceb2e2b27a5bea533a9c3929c9c21044c3c55f1e99de846,2024-11-21T07:51:59.823000
|
||||
@ -220946,7 +220946,7 @@ CVE-2023-2710,0,0,bbd950c47099bc88d64bb058a0226963cf5a7ad679ae4fd83996df9b0ed882
|
||||
CVE-2023-27100,0,0,0e61c6dc694544bd522e6f7bc5bf622c868f7c1729822799174f320832889ead,2024-11-21T07:52:19.457000
|
||||
CVE-2023-27102,0,0,43206d7feebc53f36322c7bcf41e3384d340eb37765f35c8f8b4230f6a3b3ab7,2024-11-21T07:52:19.630000
|
||||
CVE-2023-27103,0,0,0c2cc1f5a1a436504209f6afe5057ad57ee9d7902586a1f37acf68eb6e94952e,2024-11-21T07:52:19.800000
|
||||
CVE-2023-27105,0,1,a2ac853ae8b5a1864d4c8e573d9d32437415e63c2388e884a543809ec8def8dd,2025-02-03T19:15:10.610000
|
||||
CVE-2023-27105,0,0,a2ac853ae8b5a1864d4c8e573d9d32437415e63c2388e884a543809ec8def8dd,2025-02-03T19:15:10.610000
|
||||
CVE-2023-27107,0,0,e6a869423647989ad9390778f105dad2522c4f74ded7838327e13ca780866f9a,2025-02-03T18:15:29.030000
|
||||
CVE-2023-27108,0,0,1099d4cf449e520df3fbd66a5a4e50d6e79831543c9ea6178d1d6936cf0cdbc4,2025-01-30T17:15:13.723000
|
||||
CVE-2023-2711,0,0,c43472a8c20d741979b439e3bc102f5f9559519492c61f60f11a183488cbe254,2024-11-21T07:59:08.223000
|
||||
@ -221532,7 +221532,7 @@ CVE-2023-27836,0,0,e570ef98939da4780bfb99b46bb9aa7a73a3d5992a3a95011a96e45e50ba6
|
||||
CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
|
||||
CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000
|
||||
CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000
|
||||
CVE-2023-27843,0,1,e581568ce25fbecaed7391f9196e990bee2c3d9614523ec2b5f36b1ed39fc6f3,2025-02-03T20:15:30.890000
|
||||
CVE-2023-27843,0,0,e581568ce25fbecaed7391f9196e990bee2c3d9614523ec2b5f36b1ed39fc6f3,2025-02-03T20:15:30.890000
|
||||
CVE-2023-27844,0,0,d50e54915915a81c30ae45321cf2d2301ae4439b36ed52c01727a35a9a89bbf7,2024-11-21T07:53:33.583000
|
||||
CVE-2023-27845,0,0,e777b579d76cec52bb5b019a8f229f789ae039687ebb3010325b3e376a4defbc,2024-11-21T07:53:33.737000
|
||||
CVE-2023-27846,0,0,941104c667d49321aacb210fa29956f621f847ee2c27e41941b4c3ab6b70892f,2024-11-21T07:53:33.877000
|
||||
@ -223057,7 +223057,7 @@ CVE-2023-2944,0,0,ea99dc2d328adce3aec1939b68dad67cae73132ae3b0585d6944cc503963a8
|
||||
CVE-2023-29440,0,0,74decdd6d8c412f16c3d75e2437c1fb86e169adce7e9a34ae0cd2bf987527d53,2024-11-21T07:57:03.667000
|
||||
CVE-2023-29441,0,0,3855998b8b19dbf6b34f2fabde8f0df78e4b67cb78ad5c082d076d66e115b41c,2024-11-21T07:57:03.777000
|
||||
CVE-2023-29442,0,0,ab850c434e9117b9d4a0fdbaf6b7f37411c67315f36c28aa20204ed767b55228,2025-02-03T18:15:29.670000
|
||||
CVE-2023-29443,0,1,7d5603721e9096e1af6b918ade917428b12ab26a5d119df7d7f49cdc3766a488,2025-02-03T20:15:31.143000
|
||||
CVE-2023-29443,0,0,7d5603721e9096e1af6b918ade917428b12ab26a5d119df7d7f49cdc3766a488,2025-02-03T20:15:31.143000
|
||||
CVE-2023-29444,0,0,c180b7ada634af3e57836df81f10201114c70180ae7eebd52c5ff9adf6139359,2024-11-21T07:57:04.190000
|
||||
CVE-2023-29445,0,0,5a8615039954f8d0ee16a301da699b15b52538ebfdb21795cab2395156d21055,2024-11-21T07:57:04.330000
|
||||
CVE-2023-29446,0,0,f0e24da7a7faca944e9caf9e3bfba27275abc9b34dd6592a12b801cf64b677cf,2024-11-21T07:57:04.453000
|
||||
@ -223485,9 +223485,9 @@ CVE-2023-30204,0,0,d5ffcadcb8d15bfedbfb38f6fe262b7f90dac86d61a95305b0ddef65b3dba
|
||||
CVE-2023-30205,0,0,614d6f5b15d2f822c49fe7e35216e74c845bf51fc1f6080fd96b781b69d54905,2025-01-30T21:15:11.693000
|
||||
CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000
|
||||
CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000
|
||||
CVE-2023-30210,0,1,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6e5f,2025-02-03T19:15:11.067000
|
||||
CVE-2023-30211,0,1,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
|
||||
CVE-2023-30212,0,1,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
|
||||
CVE-2023-30210,0,0,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6e5f,2025-02-03T19:15:11.067000
|
||||
CVE-2023-30211,0,0,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
|
||||
CVE-2023-30212,0,0,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
|
||||
CVE-2023-30216,0,0,5eb3072b936944b32199c9563ff2bd8df56a2dd5a23baf265c2a91655d2cc13b,2025-01-29T20:15:32.147000
|
||||
CVE-2023-3022,0,0,5d7350e1404edf239160a82f8a65005daae022e5cfa515dad0d1b71dc1a576a1,2024-11-21T08:16:15.790000
|
||||
CVE-2023-30222,0,0,311828e54dafd6d0db801e3d776df3fb7876dc84d7c76629b5a43b88dee46bb7,2024-11-21T07:59:55.240000
|
||||
@ -223960,11 +223960,11 @@ CVE-2023-30783,0,0,b44da5d617e33bbde90112843d1af232464242b8308dd4c634f340a01d458
|
||||
CVE-2023-30784,0,0,cfd4653bbaa5c41883f9f26b09ffea3f235e2da18fe676c18193f1bb1bb7f653,2024-11-21T08:00:53.900000
|
||||
CVE-2023-30785,0,0,494a520551848a4d0110ce05511ea99edf5b76856f90ec254032b365baeef1af,2024-11-21T08:00:54.030000
|
||||
CVE-2023-30786,0,0,abf585160480244aa4011803fcc4c2f44598c1f0b77e9f8e22447c6e1e4d2177,2024-11-21T08:00:54.150000
|
||||
CVE-2023-30787,0,1,a3e7ccc3017a4bebe7ec7a4962b9a0e1bd3fbbaa4835f6abf4828b07ade6eecf,2025-02-03T19:15:11.560000
|
||||
CVE-2023-30787,0,0,a3e7ccc3017a4bebe7ec7a4962b9a0e1bd3fbbaa4835f6abf4828b07ade6eecf,2025-02-03T19:15:11.560000
|
||||
CVE-2023-30788,0,0,85a4836470b3b8f59250c1e41bda76fb45205bd75c14db397cf28544ee1fe84b,2024-11-21T08:00:54.407000
|
||||
CVE-2023-30789,0,1,7e3271394437e46912a950ebe4e52cc987f552f3301a864a2edec9ab9c92ca36,2025-02-03T20:15:31.383000
|
||||
CVE-2023-30789,0,0,7e3271394437e46912a950ebe4e52cc987f552f3301a864a2edec9ab9c92ca36,2025-02-03T20:15:31.383000
|
||||
CVE-2023-3079,0,0,29a23b3a6494ee01f2960fe1112ce6683479a771fffa6ec601450f04b6ac2d73,2025-01-08T18:15:15.897000
|
||||
CVE-2023-30790,0,1,7d76feda4f2907ea8f4e833b31b96362470670f93eba99a9a8deb9f0fdaf94b8,2025-02-03T20:15:31.560000
|
||||
CVE-2023-30790,0,0,7d76feda4f2907ea8f4e833b31b96362470670f93eba99a9a8deb9f0fdaf94b8,2025-02-03T20:15:31.560000
|
||||
CVE-2023-30791,0,0,8af240725d0fbeb118fa2f99d54364cfd184e2b65d09d8fe085a7f73c134e4eb,2024-11-21T08:00:54.737000
|
||||
CVE-2023-30792,0,0,1c9ccbffa0866f88486178ac46d3bd535e6b60690cee2c6c9407503cccb28e36,2025-01-30T17:15:16.647000
|
||||
CVE-2023-30795,0,0,706eba1a0a770e345d69e7da71cb132bd3b853f81b3bdab05a71689424c4b984,2024-11-21T08:00:55
|
||||
@ -224332,7 +224332,7 @@ CVE-2023-3122,0,0,891e1447dc025bf828fcc66fcd0df36febd7728974c22e5814b70aceee5678
|
||||
CVE-2023-31220,0,0,4d9877457b8b6c91a1ccbb5bbc27762eadf2b30beffd6fabcf43ad66d2b3ea6b,2024-11-21T08:01:38.983000
|
||||
CVE-2023-31221,0,0,8f6a44bdf7822116be89f45c3a27e661ea46b3f4959c654dc384195e503a1a0e,2024-11-21T08:01:39.100000
|
||||
CVE-2023-31222,0,0,7961a39815ac2759759ce411687c93596119ee1f2b490d852d79d101cabe03c1,2024-11-21T08:01:39.230000
|
||||
CVE-2023-31223,0,1,c22f0f1ce4445ef7daaa47732e6eb4b89342d27464a97e2f6e41096a8d0806df,2025-02-03T20:15:31.877000
|
||||
CVE-2023-31223,0,0,c22f0f1ce4445ef7daaa47732e6eb4b89342d27464a97e2f6e41096a8d0806df,2025-02-03T20:15:31.877000
|
||||
CVE-2023-31224,0,0,f0811b5c5188602ccf913e1f9c204f9fa1146aa79807b8093094e08b07797914,2024-11-21T08:01:39.500000
|
||||
CVE-2023-31225,0,0,c179ff0062cdecc8949e280eac70e5653236acbbefd2c7eee3423ec7fd2c4db4,2025-01-16T17:15:11.517000
|
||||
CVE-2023-31226,0,0,b624206e6bd26b66e04ba787947c0cfc9054c6de981dd4726eebb088955551d6,2025-01-15T22:15:26.220000
|
||||
@ -225648,7 +225648,7 @@ CVE-2023-3287,0,0,bc7945fe3a8e884c43817a325b466366474e030f34cb4e7e12d35f6606d965
|
||||
CVE-2023-32870,0,0,1b9b9ded4bc521561b65c39463b9a8aea214fedf975162131593e8034abbcb15,2024-11-21T08:04:14.310000
|
||||
CVE-2023-32871,0,0,2983c17fc36b9ec7e966876a49fe77adc4b43006be7dfa472d640c06bf2ded77,2024-11-21T08:04:14.430000
|
||||
CVE-2023-32872,0,0,2a65468222c513a5c3283cca063ae50eb6f570358214a2c573d783a17d20d9df,2024-11-21T08:04:14.590000
|
||||
CVE-2023-32873,0,1,699ff1d4c138e6e99b2261bdb4f7f27748077b00a828d7d2fd5bce572c44ae55,2025-02-03T19:39:08.680000
|
||||
CVE-2023-32873,0,0,699ff1d4c138e6e99b2261bdb4f7f27748077b00a828d7d2fd5bce572c44ae55,2025-02-03T19:39:08.680000
|
||||
CVE-2023-32874,0,0,5da010a5f1e1c8f5313e6719f41dae8a7e3ec4743ab58a5cb5194e7554008925,2024-11-21T08:04:14.860000
|
||||
CVE-2023-32875,0,0,0fbd6550b4e96abf60d2bf3371650742ac8f81b4037c5a1b07eb6564d6c71804,2024-11-21T08:04:14.997000
|
||||
CVE-2023-32876,0,0,a8fdb8d227637f01ee3e815b45bedce18fa99fe9942402aa9e81494656415d09,2024-11-21T08:04:15.130000
|
||||
@ -239881,6 +239881,8 @@ CVE-2023-52159,0,0,6eb945cd9fef03740ac892ccde0f4b06fee1e4906c8d36e2826e00cbfba5f
|
||||
CVE-2023-52160,0,0,19fb4e397a5f0157e35e2583548edfe6ba46e6d8b3d42ca883782c1d0672d7f7,2024-11-21T08:39:18.380000
|
||||
CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000
|
||||
CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000
|
||||
CVE-2023-52163,1,1,a817b5a2490fa755c4523b3727877a6db57e3b1875b856943a2aa5970b2bd8d8,2025-02-03T21:15:12.060000
|
||||
CVE-2023-52164,1,1,1220edbbadc2ceef714b7f1ca1d97823ec0cb200fcbc894b83ace1e408b7b09c,2025-02-03T21:15:12.180000
|
||||
CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000
|
||||
CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000
|
||||
CVE-2023-5217,0,0,d44e1d2f72cb8b5db95a55c2054613a61b82f8a9115f7aa84863f6c0994e909d,2025-02-03T14:15:37.370000
|
||||
@ -242245,7 +242247,7 @@ CVE-2023-7056,0,0,1980e4aa976669958435f7c075c5149d1378fb4e5a5e73750f9a435303d5c3
|
||||
CVE-2023-7057,0,0,60048ffa2918e194ebd0ffe7b9be056d273340da496e50ff10a81f3d8117ce54,2024-11-21T08:45:09.103000
|
||||
CVE-2023-7058,0,0,29100a716a798c6246d4ae3e940f794de7f55e3cc8deb3cb58bd6a4a72e4322b,2024-11-21T08:45:09.273000
|
||||
CVE-2023-7059,0,0,1c5c16cfc960bcc68665c7f3e0a19a60f451ec54f272685814a4b4177c17ba37,2024-11-21T08:45:09.417000
|
||||
CVE-2023-7060,0,1,bafef5ae035e62068b1baf3fc8c52213d4164d1dc64c864eb2c6d561f573d600,2025-02-03T19:56:14.277000
|
||||
CVE-2023-7060,0,0,bafef5ae035e62068b1baf3fc8c52213d4164d1dc64c864eb2c6d561f573d600,2025-02-03T19:56:14.277000
|
||||
CVE-2023-7061,0,0,d9ae5bb88bfbad36b65a9e88e4a687965031397b8b12195fd22c1e5c2ef95926,2024-11-21T08:45:09.753000
|
||||
CVE-2023-7062,0,0,b29f2fcc36688ad681a5c28deac20a90e50feaf3905f4d349c86d5155bf45434,2024-11-21T08:45:09.903000
|
||||
CVE-2023-7063,0,0,eb7594f6d961ff7819ef655c73a315f5ae94ca53f32e92ecdcf503cd5e6e5cbf,2024-11-21T08:45:10.047000
|
||||
@ -243126,7 +243128,7 @@ CVE-2024-0736,0,0,d52a109febd4221e7d6bee9ef06bd56d38739afc69d8018c7fed67cd91f644
|
||||
CVE-2024-0737,0,0,e230e8509d2bc4269146ffbbf15546734ffb0db2187c8f047250d096d5529415,2024-11-21T08:47:15.143000
|
||||
CVE-2024-0738,0,0,bb47aea6d8e61d6d6dc4793ab6b8d6c98c33264ec347061c48b507fd252c3327,2024-11-21T08:47:15.273000
|
||||
CVE-2024-0739,0,0,6418975657121646e678b9e81e9b3be959eb46eb2a741aa57923784b207c11c8,2024-11-21T08:47:15.410000
|
||||
CVE-2024-0740,0,0,d0d08c90e1fdab7aeca0747bcb543062334c9bcbcc458ff04d102ee39e9cc340,2024-11-21T08:47:15.553000
|
||||
CVE-2024-0740,0,1,ae9aaef4be44ac4b95f11126ad2608bed174d5a80f7654a1260c4e5549d0197b,2025-02-03T21:16:40.350000
|
||||
CVE-2024-0741,0,0,e4183954f1bfb4d99dcc24ff415844e39f12866fd118a376ba5dab01ca5e78dd,2024-11-21T08:47:15.683000
|
||||
CVE-2024-0742,0,0,2a45f1769355648d1b8896b1a5513a4c49d6f4c03b844082914ec14fd476d1c5,2024-11-21T08:47:15.817000
|
||||
CVE-2024-0743,0,0,023f9b7a3a6e565c03ca64a31e63efdc94e980f2a993495eaccf02912321f0b7,2024-11-21T08:47:15.940000
|
||||
@ -244351,9 +244353,9 @@ CVE-2024-11127,0,0,a3efa55977cec0481a9d0f60f752166adc632313ccf7c08d957fcbfaa47d4
|
||||
CVE-2024-11128,0,0,882d8275a00c8cb0e7da63d6968cc44dbc96bb40e15e86cb424dc1932b7790ce,2025-01-13T22:15:13.680000
|
||||
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
|
||||
CVE-2024-11130,0,0,2031b0d91a76a3ae308e67f748474890b1fb080d7d4cbebe58df244865c594b4,2024-11-15T17:57:53.270000
|
||||
CVE-2024-11132,1,1,304b325bdbf2ad0ae8399bef4daaa597989aa89edc6e194f2d28806df90f41c7,2025-02-03T20:15:32.047000
|
||||
CVE-2024-11133,1,1,2554526159f3787b46b3f54aed7dd6cfb6c38f760d839f78670f4764bebb0680,2025-02-03T20:15:32.203000
|
||||
CVE-2024-11134,1,1,4d6accde2c53f210bbeb0a5a325b5d7261e7d2fbd8c0c5b864cc5e00435cb9a2,2025-02-03T20:15:32.373000
|
||||
CVE-2024-11132,0,0,304b325bdbf2ad0ae8399bef4daaa597989aa89edc6e194f2d28806df90f41c7,2025-02-03T20:15:32.047000
|
||||
CVE-2024-11133,0,0,2554526159f3787b46b3f54aed7dd6cfb6c38f760d839f78670f4764bebb0680,2025-02-03T20:15:32.203000
|
||||
CVE-2024-11134,0,0,4d6accde2c53f210bbeb0a5a325b5d7261e7d2fbd8c0c5b864cc5e00435cb9a2,2025-02-03T20:15:32.373000
|
||||
CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000
|
||||
CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d687b6,2024-11-15T13:58:08.913000
|
||||
CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
|
||||
@ -244462,7 +244464,7 @@ CVE-2024-11259,0,0,9646b1c84e05b201fbae9644480c07a1fd89adc65f5074aa5e44f275cf69f
|
||||
CVE-2024-1126,0,0,2088ba320b0f3d864b4dacf7a42dde73f3534cbb6abd237206f08e3f6b49579d,2025-01-15T18:21:17.073000
|
||||
CVE-2024-11261,0,0,ebd0147e6a6ab1ab0e631a63b82775c203c78389943f8839aa447a17b71fca13,2024-11-21T23:21:32.573000
|
||||
CVE-2024-11262,0,0,2fc2d8fe2ec6c0e4d2457bea194bb9fd27c0134f7b30d56376be41870a4428a7,2024-11-21T20:52:29.160000
|
||||
CVE-2024-11263,0,1,6da3dcf090856c1ff8ddbcb851ae4f60d559550f7e58a797a86bc019886b27d7,2025-02-03T20:09:54.800000
|
||||
CVE-2024-11263,0,0,6da3dcf090856c1ff8ddbcb851ae4f60d559550f7e58a797a86bc019886b27d7,2025-02-03T20:09:54.800000
|
||||
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
|
||||
CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2258,2024-12-09T18:15:22.120000
|
||||
CVE-2024-1127,0,0,64ca0bb18ea16b2fd1f9f1c90b4e9efdaa03cabe0d526d98a06239671c9cf287,2025-01-15T18:22:10.127000
|
||||
@ -245217,7 +245219,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
|
||||
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
|
||||
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
|
||||
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
|
||||
CVE-2024-12085,0,1,9a161213d022d60d671ea3cb4cb11ce33fd8c0478fd9dd236104abdf8ba774f7,2025-02-03T20:15:32.520000
|
||||
CVE-2024-12085,0,0,9a161213d022d60d671ea3cb4cb11ce33fd8c0478fd9dd236104abdf8ba774f7,2025-02-03T20:15:32.520000
|
||||
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
|
||||
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
|
||||
CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000
|
||||
@ -245588,8 +245590,8 @@ CVE-2024-12507,0,0,f098eff6e3ef53742e66474a6ac17418c00af6d9e6800445130b20da01af7
|
||||
CVE-2024-12508,0,0,21bc7864dfec1ec4afdc6f630d41f80e3589bc17435e07461da258099a6c3dd8,2025-01-17T07:15:26.387000
|
||||
CVE-2024-12509,0,0,8448cb7b981b452e7bee8263b7d56776b70a911630dc0596718dc3941caa2300,2024-12-20T07:15:12.177000
|
||||
CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000
|
||||
CVE-2024-12510,1,1,a5bc20746d20cee007d6cb84e0ba740c7549182ef4105784cdae871ad0951b14,2025-02-03T20:15:32.690000
|
||||
CVE-2024-12511,1,1,4498314307985f20d08d6e83a6dc0811c228944a12b2b574b86b03ce4b76a9b7,2025-02-03T20:15:32.797000
|
||||
CVE-2024-12510,0,0,a5bc20746d20cee007d6cb84e0ba740c7549182ef4105784cdae871ad0951b14,2025-02-03T20:15:32.690000
|
||||
CVE-2024-12511,0,0,4498314307985f20d08d6e83a6dc0811c228944a12b2b574b86b03ce4b76a9b7,2025-02-03T20:15:32.797000
|
||||
CVE-2024-12512,0,0,01f6925126ff40e10f9cfc85a87e097de579dd6f4d0a1c38c7ea151cb6164ed7,2025-01-25T08:15:07.810000
|
||||
CVE-2024-12513,0,0,6393dedffea01c8a6ef2142d1a8a9d6ba57b27f731b145d36f16e844db01eb62,2024-12-18T03:15:26.427000
|
||||
CVE-2024-12514,0,0,f43a5430cb383b14a2cf8b8af6c6293e976c61736ad57e2dfa43a4cdef30e051,2025-01-09T11:15:14.137000
|
||||
@ -245843,7 +245845,7 @@ CVE-2024-12854,0,0,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d81
|
||||
CVE-2024-12855,0,0,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320cc05,2025-01-08T09:15:06.927000
|
||||
CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000
|
||||
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
|
||||
CVE-2024-12859,1,1,98d01c2454f66a38c507471cacb49665e067ce9a160e49756e11100e4f3549c4,2025-02-03T20:15:32.940000
|
||||
CVE-2024-12859,0,0,98d01c2454f66a38c507471cacb49665e067ce9a160e49756e11100e4f3549c4,2025-02-03T20:15:32.940000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-12861,0,0,2e6551729d4e6153dcb30ad0ddedc7b2053441c7fdf06c9991efe154d5e21335,2025-01-31T19:01:20.827000
|
||||
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
|
||||
@ -247077,9 +247079,9 @@ CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859
|
||||
CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000
|
||||
CVE-2024-2006,0,0,2f60560639ffe114ddd455af53cebea4773b7cd759fbea5625bf0cb7baf45d3a,2024-11-21T09:08:47.770000
|
||||
CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000
|
||||
CVE-2024-20064,0,1,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
|
||||
CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
|
||||
CVE-2024-20065,0,0,bf074bad299ffa79a3be73371461cbe43be69d6ec7b9d447aba21b460c271103,2024-11-21T08:51:56.390000
|
||||
CVE-2024-20066,0,1,48f0868b364f74f862b9b1a95f9481326a24c98f8a04d203de9b9786c379840a,2025-02-03T19:33:57.627000
|
||||
CVE-2024-20066,0,0,48f0868b364f74f862b9b1a95f9481326a24c98f8a04d203de9b9786c379840a,2025-02-03T19:33:57.627000
|
||||
CVE-2024-20067,0,0,901f3d8ffac01d227dbd399686ef68e66883e2ceabc7974cf4ebf3015fa2b2d3,2024-11-21T08:51:56.720000
|
||||
CVE-2024-20068,0,0,e8917e7224a78ea2b81bc102a0672a078fe9310aa9002d95585fcb4dcc2eb1c2,2024-11-21T15:15:26.107000
|
||||
CVE-2024-20069,0,0,cb8b51716d8af44a4da05fa5082284a53d777e13684248400691e0c288b02bcf,2024-11-21T08:51:57.060000
|
||||
@ -247089,14 +247091,14 @@ CVE-2024-20071,0,0,7884ad25d18168b2699c9e4e19d117fad33de94b53f83ba46627c6cda4ba8
|
||||
CVE-2024-20072,0,0,31c94c10eeffc138c15dbd92b4664230cac36e81728231bf7fe7256b1ef33559,2024-11-21T08:51:57.607000
|
||||
CVE-2024-20073,0,0,07f0822b3fd14de0e741854a96fccfd976ccf68d3355a88668c62f284d493e58,2024-11-21T08:51:57.800000
|
||||
CVE-2024-20074,0,0,7c362ac85e324e731d48cff7cbbbe716d2cf25b771ccc17560cd42052c42fe7f,2024-11-21T08:51:57.973000
|
||||
CVE-2024-20075,0,1,3711293e47e595a1ac6af15d57409fb5435c6e59ea3e2e0f05a41211f984cbe7,2025-02-03T19:34:38.457000
|
||||
CVE-2024-20075,0,0,3711293e47e595a1ac6af15d57409fb5435c6e59ea3e2e0f05a41211f984cbe7,2025-02-03T19:34:38.457000
|
||||
CVE-2024-20076,0,0,fd5819e847bb53da5e6bcc13a92001213a63fd0e827570a579802534c6aa7f6b,2024-11-21T08:51:58.260000
|
||||
CVE-2024-20077,0,0,07f38d510770e06ff3155be7bc8ba8fbd7cb2bdb66f616fbfcdfe488be9b9594,2024-11-21T08:51:58.440000
|
||||
CVE-2024-20078,0,0,79776c6378c179dd664c67f9329d451a25e12b18275ba11be1f53c490c002848,2024-11-21T08:51:58.603000
|
||||
CVE-2024-20079,0,1,efccfd54dbb35585546b823b1e7c97a9b2b8a8083d07de82388fbfe62a1d31e4,2025-02-03T19:36:08.587000
|
||||
CVE-2024-20079,0,0,efccfd54dbb35585546b823b1e7c97a9b2b8a8083d07de82388fbfe62a1d31e4,2025-02-03T19:36:08.587000
|
||||
CVE-2024-2008,0,0,7b4dbca5381ca7709b92df0a00c3fd407a2e47be3d31c92bb03e5d8bad60000d,2024-11-21T09:08:48.043000
|
||||
CVE-2024-20080,0,0,87a81132abb3bb780b0e25bf1bd3d6a2c4adca3372f748129021b75855669772,2024-11-21T08:51:58.920000
|
||||
CVE-2024-20081,0,1,0abe5a10157013b4527d939c36cd5dd3cec2890adff55e12af201c2da68ed8f5,2025-02-03T19:36:54
|
||||
CVE-2024-20081,0,0,0abe5a10157013b4527d939c36cd5dd3cec2890adff55e12af201c2da68ed8f5,2025-02-03T19:36:54
|
||||
CVE-2024-20082,0,0,e794b04f117ee9253c4b40a0306e7b558917bfc285addc7b94df9d6ee490df8e,2024-08-14T15:35:04.003000
|
||||
CVE-2024-20083,0,0,b768ffcced20a56fd034a3790d36b728b00cb906d06266e2f5b9e06310ec4b67,2024-08-21T18:35:02.057000
|
||||
CVE-2024-20084,0,0,1058362d86c9c64cbfb3895c1786f1b27cc3480b4e423adb0ee47552df693bc9,2024-10-27T03:35:00.590000
|
||||
@ -247129,7 +247131,7 @@ CVE-2024-20108,0,0,1396ac71b05c962e52132dffa47ef1234f2c2dca3e32a1fef4c04be9e6eb1
|
||||
CVE-2024-20109,0,0,36896b5553c838401df867b2d85ccf0af9a3ae622b20b4323a5933ca8ab9ef91,2024-11-04T18:50:05.607000
|
||||
CVE-2024-2011,0,0,9a5ec92cf66d01c9d41e73e55f014b333e2f85b3899d7384d5dad77eaaadd606,2024-11-21T09:08:48.397000
|
||||
CVE-2024-20110,0,0,c0c0b57095467e9e578be0254bc5c66d85b22730f1fdbd3e9d9ac09570df9ad2,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20111,0,1,76201ebcb9615f2901f87955a5ec4cdd3ff22581084daae497d35641d8b8207e,2025-02-03T19:37:37.797000
|
||||
CVE-2024-20111,0,0,76201ebcb9615f2901f87955a5ec4cdd3ff22581084daae497d35641d8b8207e,2025-02-03T19:37:37.797000
|
||||
CVE-2024-20112,0,0,90511d9a575981327aa24c3538319319bd2bc6f6cfee6551a9c0c8283f0351c7,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20113,0,0,ea26508bb2379803f2f8f81c7c67695e3c2dc385c480fbdf13053e0fa941316a,2024-11-04T18:50:05.607000
|
||||
CVE-2024-20114,0,0,4be3eeb5f32105fd9c961a05295edfb10b3ab5f0b1a478ebc0d480cb037e18a4,2024-11-05T19:58:15.577000
|
||||
@ -247147,7 +247149,7 @@ CVE-2024-20124,0,0,50a655c8e56f55ef53d789d4c63a8d392a88363f5d64306c93dc9620b3346
|
||||
CVE-2024-20125,0,0,003a0c3a3b9ddf38da99a8b47462e79051bcf123de4fe606a156f4ac1ec32978,2024-12-03T03:15:04.773000
|
||||
CVE-2024-20127,0,0,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
|
||||
CVE-2024-20128,0,0,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
|
||||
CVE-2024-20129,0,1,4a661ee1df5e19b6252bfb8ddf4a783213eaf2a8e58524efa112b62fb1e3bc34,2025-02-03T19:38:21.213000
|
||||
CVE-2024-20129,0,0,4a661ee1df5e19b6252bfb8ddf4a783213eaf2a8e58524efa112b62fb1e3bc34,2025-02-03T19:38:21.213000
|
||||
CVE-2024-2013,0,0,2d1608ffc6046704b03ee6d685b760a5a5d2d260fb3c1ece913c5d36d369916c,2024-11-21T09:08:48.677000
|
||||
CVE-2024-20130,0,0,9fa9ea386c9ffc0b7d44f01de44883687f2e3b0e78cbaa6fd868b905210c2127,2024-12-02T16:15:07.200000
|
||||
CVE-2024-20131,0,0,8fd2297574d725ac0fece2f5c68542bb051aeb26cfd676b7d793f5934d342636,2024-12-02T16:15:07.387000
|
||||
@ -247161,7 +247163,7 @@ CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382
|
||||
CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
|
||||
CVE-2024-2014,0,0,9c6b7427d7e4ecbb91bf5ac0c5393a05c9efb2a90a5cef1334b8ef37b43c6713,2024-11-21T09:08:48.813000
|
||||
CVE-2024-20140,0,0,abdefdf55af9c04b39505134bb76fe7fc2020967809a7e6f1b53a61d701fa68a,2025-01-06T15:15:11.600000
|
||||
CVE-2024-20141,0,1,8c8f54b370f4264985953f185a9523eadfc76d4e5ed1954d6ee1114f5647c8d1,2025-02-03T19:37:54.117000
|
||||
CVE-2024-20141,0,0,8c8f54b370f4264985953f185a9523eadfc76d4e5ed1954d6ee1114f5647c8d1,2025-02-03T19:37:54.117000
|
||||
CVE-2024-20142,0,0,dc59ab1a9f5a7658edebd0e5049615cfaed86e3e69126a4033044766d9e225d9,2025-02-03T18:15:33.520000
|
||||
CVE-2024-20143,0,0,72741489c266087fa52a215cdc5a63a1e8e5c05ba33b72063739424e15100b6a,2025-01-06T15:15:11.753000
|
||||
CVE-2024-20144,0,0,dd0bde2dc33084db00dc8205beac10e41605c84cd3041697ffc83cea5ab50ed6,2025-01-06T15:15:11.917000
|
||||
@ -251366,7 +251368,7 @@ CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb
|
||||
CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
|
||||
CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
|
||||
CVE-2024-25625,0,0,5cc90678dde97da2589a1a0d3599bc3f52e0625b9e2172e9700aa7de66246445,2024-11-21T09:01:06.387000
|
||||
CVE-2024-25626,0,1,f02e56290cb5b100e94919272bfbb330213ad132979c2e09c687f6ade453a247,2025-02-03T19:52:09.697000
|
||||
CVE-2024-25626,0,0,f02e56290cb5b100e94919272bfbb330213ad132979c2e09c687f6ade453a247,2025-02-03T19:52:09.697000
|
||||
CVE-2024-25627,0,0,7cbce9e513644e3e2bc69141c068497c8530550daae3c8ffcfeb9fb3cc079991,2024-12-18T19:34:36.927000
|
||||
CVE-2024-25628,0,0,7e120fb8d8628e240dd092a683ce7920f893f4e4925ec5e71fd9cd00ee4291cf,2024-12-18T19:43:00.970000
|
||||
CVE-2024-25629,0,0,2348b0d2c945acb0e0d5504c41e7dc6d746dcade849f77c5811728b15d0cf086,2024-11-21T09:01:06.910000
|
||||
@ -251577,7 +251579,7 @@ CVE-2024-25931,0,0,8cbe399f7fd0918aca51288fcf69cd817979574ffe4dbee799b5e808475d8
|
||||
CVE-2024-25932,0,0,5347ed6760391be270b3034f9a6f35f69064b64a9ff35240e953d7452eb242a6,2024-11-21T09:01:36.037000
|
||||
CVE-2024-25933,0,0,10c4dcd1d4877c2c5d9d0ce4b63a969433dc4656fa5c7f916b0ffa00f975f7c4,2024-11-21T09:01:36.157000
|
||||
CVE-2024-25934,0,0,62ea49431b2bed66fcc156f5ea3cdf41723ad0795ba3206bf55318a5498e2cb0,2024-11-21T09:01:36.283000
|
||||
CVE-2024-25935,0,0,66be2dcb22fbb70c35c4ddb4f21e1f6946a1ef5585b5ff1ae05a77950d584a36,2024-11-21T09:01:36.420000
|
||||
CVE-2024-25935,0,1,4d6cf250bcacc40f3e7c214dffbd0ceaf73502d44424813822318a8cce9a2e50,2025-02-03T21:58:36.570000
|
||||
CVE-2024-25936,0,0,883e76a8e3b646c5fa72740a548a845a65d2a06142b661c1322ccee0cc64fa50,2024-11-21T09:01:36.543000
|
||||
CVE-2024-25937,0,0,ff95c9e0762c8748df9a9a290ad15a2baaab9ad61fd50aa6f8e199feb077d8a3,2025-01-24T18:42:26.510000
|
||||
CVE-2024-25938,0,0,1d865435e59bdefe0610d67720b1f7a1a1a64e9177daafdb2de5f4c0e3a2169a,2024-11-21T09:01:36.797000
|
||||
@ -253755,7 +253757,7 @@ CVE-2024-28666,0,0,624b6b2b388bce85a975ce3a777bfae7ed3108996cd956dca2a209f1f4b66
|
||||
CVE-2024-28667,0,0,7954c82a1b134d6d11512799a170b0f0e3d568e6c2821e6dbe8090b84dd30387,2024-11-21T09:06:43.600000
|
||||
CVE-2024-28668,0,0,0751eefb865e6994a02e5078d0717f744911cdbf16e6c214b69929aebe673670,2024-11-21T09:06:43.810000
|
||||
CVE-2024-28669,0,0,fee252bc5a362683de5d6620bf53622d90aae197f4d777ecf6aa8875c3ca93be,2024-11-21T09:06:44.043000
|
||||
CVE-2024-2867,0,0,e9fe63186091344fa885fc1a43105c337d44be37fe1e54dd9c51912453abc2c3,2024-11-21T09:10:42.893000
|
||||
CVE-2024-2867,0,1,695fb3cef52f8c43c4514aa63d89e2f41f7dd2846ca1454a5970d54e2aad2119,2025-02-03T21:31:46.770000
|
||||
CVE-2024-28670,0,0,ab1611ec1ccd2f7d119446b2099a2f6fb91c67e9ea96502c09668ca7e90eeafe,2024-11-21T09:06:44.270000
|
||||
CVE-2024-28671,0,0,e25733fa67de3d649f7259e16738d845a6db94b940dd14d343831edd5a38fae4,2024-11-21T09:06:44.500000
|
||||
CVE-2024-28672,0,0,182cb4e0c7a8ffda160916a5cb3c7781dca562943a914d3c5dacdeb9e9903ade,2024-11-21T09:06:44.720000
|
||||
@ -253988,7 +253990,7 @@ CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911
|
||||
CVE-2024-28957,0,0,4149b5010d0b1c2568f2f4f291564713cd37dee8d620ca60dda3ebe3092552df,2024-11-21T09:07:16.013000
|
||||
CVE-2024-2896,0,0,89f8d0b7afd8cee22c5446e1104fb112d58a6865bcf798f3d90494b32b968aed,2025-01-22T17:53:24.233000
|
||||
CVE-2024-28960,0,0,07be4df1b4177567bcc011207a77201ed2e71e2ecf6eaf000238ed73bba54553,2024-11-21T09:07:16.223000
|
||||
CVE-2024-28961,0,1,87c9b60b357bf30d7c0405ba8731cde228bc8c4ab3cf58f2969eaa6a20c7e442,2025-02-03T20:52:51.730000
|
||||
CVE-2024-28961,0,0,87c9b60b357bf30d7c0405ba8731cde228bc8c4ab3cf58f2969eaa6a20c7e442,2025-02-03T20:52:51.730000
|
||||
CVE-2024-28962,0,0,1722d1439be0e57d00fac6f93bc2a029df89951b0809396a3013f82491cdd038,2024-08-19T17:12:57.750000
|
||||
CVE-2024-28963,0,0,90af2cbac3489ca5b5031cdff6c6b93c76520044d68bd42eb0cb7f0b415116c7,2024-11-21T09:07:16.740000
|
||||
CVE-2024-28964,0,0,593986ba5f871f41c1e58cc50f9a477399f293fb88ddff86003e46ad58a192d7,2024-11-21T09:07:16.867000
|
||||
@ -257393,7 +257395,7 @@ CVE-2024-33535,0,0,7a77f8316da56cdbe7cd912c5793c385d5fedaf3106bb00760d015f13fb43
|
||||
CVE-2024-33536,0,0,f05490b7bf8644b4a1d589905cd7f3af60266d65bc78f3b7338229a7646bb4ad,2024-08-14T13:18:41.847000
|
||||
CVE-2024-33537,0,0,0886a242a6730ba370e36101a3c58d0788ccb260b9c1d7fd06af8845e03c863c,2024-11-21T09:17:06.363000
|
||||
CVE-2024-33538,0,0,6031543c1e8f7332b27767ffba7d7f283b2edc0d54e78085e9719185cf928845,2024-11-21T09:17:06.483000
|
||||
CVE-2024-33539,0,0,81a0a394dbf1b831d5977accac20e1523af0831a330b2fbfdee3431c944f249c,2024-11-21T09:17:06.603000
|
||||
CVE-2024-33539,0,1,72c3542aa8d8725beca7d8a6e44230a2c468bc762c740741c2c54a91a6f142de,2025-02-03T21:14:03.657000
|
||||
CVE-2024-3354,0,0,be734c2fa1e134bd3899eaf134caf3aaa45022e143c25a5165a4c933bcc2b268,2024-11-21T09:29:26.687000
|
||||
CVE-2024-33540,0,0,757c59563d6d7999151106a5d086f394dda6b9ed32a0a12c94f07a25768805ac,2024-11-21T09:17:06.720000
|
||||
CVE-2024-33541,0,0,8422811b196b3d6374bcdecea7093e1a6243ebcebb4e62fbeb4cc91e4075157d,2024-11-21T09:17:06.837000
|
||||
@ -257455,7 +257457,7 @@ CVE-2024-33591,0,0,cc0b3e1a8005fca6bdde429f1645199dae8127265f507aa7135f763d1ea21
|
||||
CVE-2024-33592,0,0,57a423445817006efdc2e1718fd633c42602896845703c70fa12c3806ac934c2,2024-11-21T09:17:13.040000
|
||||
CVE-2024-33593,0,0,2ff7dd969b76cfef29da117603d3cf5b5321eb86d16894177faad46f88c22ff9,2024-11-21T09:17:13.160000
|
||||
CVE-2024-33594,0,0,f93bf31615b7caf94835199d99388290be3f93ee1d582298cdd84b7dede79bc3,2024-11-21T09:17:13.270000
|
||||
CVE-2024-33595,0,1,a805c420fe87f6ef378281508bcfbf2cc49d09005c6ec73c482bb9de03c7bd33,2025-02-03T20:37:50.263000
|
||||
CVE-2024-33595,0,0,a805c420fe87f6ef378281508bcfbf2cc49d09005c6ec73c482bb9de03c7bd33,2025-02-03T20:37:50.263000
|
||||
CVE-2024-33596,0,0,fbaffa0b140a8362b482c3db61edc19b10f44782474d8f4af0258e0ff09787ad,2024-11-21T09:17:13.510000
|
||||
CVE-2024-33597,0,0,3c9aca69d119f0c73c01703e5a9e2b05680fa7c90b2eafa2f165306223ebe183,2024-11-21T09:17:13.617000
|
||||
CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce124261e9,2024-11-21T09:17:13.730000
|
||||
@ -257678,7 +257680,7 @@ CVE-2024-33907,0,0,621c3e9e0064a0cfba07e2b00ee09c218cb7474799c5ddcba5baa09cf7cfa
|
||||
CVE-2024-33908,0,0,18e5ba74b5b314f4d44fb68022de92a3f27b318cf379aeb205fcb5dcb49e942e,2024-11-21T09:17:43.157000
|
||||
CVE-2024-33910,0,0,02e7d7d2c717810e2e6046c8ab909ba55dab8588e7c23d058b758e17103fa1a5,2024-11-21T09:17:43.260000
|
||||
CVE-2024-33911,0,0,0e3e9910921546cb7570b8065942096c714978a134424a460a960dbda2fdb342,2024-11-21T09:17:43.373000
|
||||
CVE-2024-33912,0,1,a608e7e465c57121cca07e9663053bedfaf8d84018b404734ba5de93c623d002,2025-02-03T19:05:39.657000
|
||||
CVE-2024-33912,0,0,a608e7e465c57121cca07e9663053bedfaf8d84018b404734ba5de93c623d002,2025-02-03T19:05:39.657000
|
||||
CVE-2024-33913,0,0,c3f41653850668bfae1fd42c342538945d3100d9b4dc2c329a882cfcb5828e2e,2024-11-21T09:17:43.583000
|
||||
CVE-2024-33914,0,0,f1c6db7e65f5d7f5cbf1d0a7aebea997776701c106aa56b55d4efd8ea3417c4d,2024-11-21T09:17:43.687000
|
||||
CVE-2024-33915,0,0,b5d6ca9802eb50cf7b3fedca8792fbf9297319e0fe0443966abc02517a524960,2024-11-21T09:17:43.793000
|
||||
@ -257713,7 +257715,7 @@ CVE-2024-33943,0,0,b77919a507f687021ba9148ce1d8c48c43dc95604e7e9ae3b80165ff1ebde
|
||||
CVE-2024-33944,0,0,8107bdfa110c42a67b370b28b6032c4fedd46fa8830fa43d32b9afa1ea4f4a72,2024-11-21T09:17:46.880000
|
||||
CVE-2024-33945,0,0,663037eb252c02a075faa18441baa77c7453ddb52ce86148e41de59ef7a2557e,2024-11-21T09:17:47
|
||||
CVE-2024-33946,0,0,15a2e4d5c082043ccac85e56dcfa5a00eff8040d8c032eb68d6cca9f5c3675a5,2024-11-21T09:17:47.137000
|
||||
CVE-2024-33947,0,1,6548443175ad59b3402f88becac72c8007201eccd188da523420dc24514a2387,2025-02-03T19:25:22.367000
|
||||
CVE-2024-33947,0,0,6548443175ad59b3402f88becac72c8007201eccd188da523420dc24514a2387,2025-02-03T19:25:22.367000
|
||||
CVE-2024-33948,0,0,ccb71dcbfca26fcc7de0ed0cf5158a07c0a9cc5f617c3f5245b95fb2167b8718,2024-11-21T09:17:47.370000
|
||||
CVE-2024-33949,0,0,12cb4f2e3bb24f978889f08ab3f36c83d607e106b74553bd4e0c7a9e68069485,2024-11-21T09:17:47.487000
|
||||
CVE-2024-33950,0,0,be55c53a010bcb4dd9f49c253b98364ebff13f86ee8804cadf7051ef43d89130,2024-11-21T09:17:47.593000
|
||||
@ -258496,6 +258498,8 @@ CVE-2024-34885,0,0,152b0b9e5d3216b5b9a7beaa1f04a898f996e21d92477998a2435b7f0ccb0
|
||||
CVE-2024-34887,0,0,15bfad19b1d1ed181ea959191d94dc734739bf83ed021b83e2ef5681c9e26ff6,2024-11-06T19:28:15.613000
|
||||
CVE-2024-3489,0,0,d81ffb51bf0a659f164f0f5b63c8747e7c707bdc92a027d4fc95141a53a81b1b,2025-01-21T20:21:03.310000
|
||||
CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d3819c2,2024-11-05T17:35:17.710000
|
||||
CVE-2024-34896,1,1,2f8a155fd996a91a940bcb6e264fbe092c2a0657976e851445c91413f6b43530,2025-02-03T21:15:12.573000
|
||||
CVE-2024-34897,1,1,84ab9c262ee5310a655523000ad21bc8bb020241fb0320e2f4b356a94ef63f2d,2025-02-03T21:15:12.680000
|
||||
CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000
|
||||
CVE-2024-3490,0,0,a44d4e788dbbb31c2d20e7cda7c06080195f41b9c2be3506ebb9ea17f43626d8,2024-11-21T09:29:42.900000
|
||||
CVE-2024-34905,0,0,59d0bb8ac29776054ec2390b8e9ed63207063a9a715e1e403ae1d1ccb3a38a14,2024-11-21T09:19:31.277000
|
||||
@ -258641,6 +258645,7 @@ CVE-2024-35173,0,0,6e586b770532bbec70a1a22d51641e5ebb020c65a9dd9f5f046c1c6774686
|
||||
CVE-2024-35174,0,0,45c1ded6f418eee47f7da5d436a57a8ad12156a76cd16071e103316cd7fdd28a,2024-11-21T09:19:52.110000
|
||||
CVE-2024-35175,0,0,a179c493e8da23269d894ab04f1e089839bd9ee38680abe3cc23fa7eab44ad84,2024-11-21T09:19:52.233000
|
||||
CVE-2024-35176,0,0,cd7c06e702b20f7586c9797213d0d169f32a11f320cb23ae0e84f8206d3dc637,2024-11-21T09:19:52.363000
|
||||
CVE-2024-35177,1,1,6ab509a02c4115271c883ad0d8a5c4bec5ea3e321a7cf9eeee5e83705a55941e,2025-02-03T22:15:27.600000
|
||||
CVE-2024-35178,0,0,000399d7fb1e4b3382e7019b3b765e8064c80d03de9bbfb2efb7da22ade8bc16,2024-11-21T09:19:52.497000
|
||||
CVE-2024-35179,0,0,6950f3726be7d42ceff56563ab7a850a3b63c902fafdf64f25e0ab0b9b8f136e,2024-11-21T09:19:52.647000
|
||||
CVE-2024-3518,0,0,28e40d955975eda60eef469f911f09f2e176e3a34ac0ef0a96203cd6c32e5ea7,2024-11-21T09:29:46.057000
|
||||
@ -258738,7 +258743,7 @@ CVE-2024-35276,0,0,1937e4da4ebbed6219ab7acef031d83c083e4d1d9f42b35bc42e8cd536e76
|
||||
CVE-2024-35277,0,0,9b1c46c6fad3b7b9cebb1e68ad6e16a0a56d16503c2cc4664845a580d4c08994,2025-01-31T17:08:01.087000
|
||||
CVE-2024-35278,0,0,ed7a7296d05909d4bbaa5fc3371c1f92af247b6b0ef38af5a59952281601061c,2025-01-31T17:09:31.407000
|
||||
CVE-2024-3528,0,0,73792362235e828bd56025419c83c67ec901a0e2b04dfa37d11c551a857b0238,2024-11-21T09:29:47.207000
|
||||
CVE-2024-35280,0,1,dd11101af525380e833a1f48135fdb75854382d9758352e56925ab58457069e6,2025-02-03T20:55:26.147000
|
||||
CVE-2024-35280,0,0,dd11101af525380e833a1f48135fdb75854382d9758352e56925ab58457069e6,2025-02-03T20:55:26.147000
|
||||
CVE-2024-35282,0,0,174e154b42e127fa67b7958222015b753e479a85266f575b2e2ca4b3057942d7,2024-09-20T19:44:17.557000
|
||||
CVE-2024-35283,0,0,fdb32a776c5efc323466eaba6c259cf3489c6c6ec5c750c58fec77f2eb007c63,2024-11-21T09:20:03.977000
|
||||
CVE-2024-35284,0,0,277d9a5f01a809bf78700b423f1bf84acc1c72d215de5cf4ec67e6bf8fd3241f,2024-11-21T09:20:04.203000
|
||||
@ -258851,7 +258856,7 @@ CVE-2024-35431,0,0,1fbcf4f2a9b1d4465bec51b14790fa2c159e2e2d8264716641b679960526d
|
||||
CVE-2024-35432,0,0,ced9de72c3bbcb4e9eb80bc2fabbb0ed55c2fd0dc103afeb5274fbf689dfadb0,2024-11-21T09:20:20.053000
|
||||
CVE-2024-35433,0,0,b493ef1c1f660f4525c4b3c861e30fc780cde47e49bfe7f8f859b2235b5ed7e1,2024-11-21T09:20:20.267000
|
||||
CVE-2024-35434,0,0,0fcffaa00cbc213252ffe7916deef7a46e78adaf94b00c9474f03d7ed84f9b20,2024-11-21T09:20:20.497000
|
||||
CVE-2024-3544,0,0,9c6c6143f0831488198a7554d5322b81c0db6d917e22681c0cec25c1ee50a7c0,2024-11-21T09:29:50.663000
|
||||
CVE-2024-3544,0,1,2056c8385985aefccc45ead5e31b0ec097417378af08b30a42b3680f42015625,2025-02-03T21:38:22.117000
|
||||
CVE-2024-3545,0,0,7b9236373d9ab11af1789b681fa050d76729541f270e002aeefd34c01bf94533,2024-11-21T09:29:50.790000
|
||||
CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000
|
||||
CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000
|
||||
@ -261704,7 +261709,7 @@ CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409
|
||||
CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000
|
||||
CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000
|
||||
CVE-2024-38829,0,0,6e70b82cf4a08eca299f1ef01398ce598581c72dcb52145f07efeeba754e9484,2024-12-10T15:15:07.593000
|
||||
CVE-2024-3883,0,1,3c05229bd27210ef7b717a9b70b4fa6a5c33404b1a0d4dfb073ca4ca5e09847f,2025-02-03T20:24:02.197000
|
||||
CVE-2024-3883,0,0,3c05229bd27210ef7b717a9b70b4fa6a5c33404b1a0d4dfb073ca4ca5e09847f,2025-02-03T20:24:02.197000
|
||||
CVE-2024-38830,0,0,e8b420777d2e30b087a73e69b065c501d17864d02afe330332d83c0cf0b2fca5,2024-11-26T12:15:18.413000
|
||||
CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846679,2024-11-26T15:15:31.957000
|
||||
CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101dc5,2024-12-06T20:15:25.977000
|
||||
@ -262197,7 +262202,7 @@ CVE-2024-39565,0,0,a43a2fa18dee435a7afd7aa616f891db93192eeeee36531ec4da585ba34ec
|
||||
CVE-2024-39567,0,0,71539119d2ce1198f19acd4e87a68c7cabdd0a3662eecc27368e9a62e07c5a54,2024-11-21T09:28:01.753000
|
||||
CVE-2024-39568,0,0,7a4a8537e7aed931a024eab8deb65d1bfefb3706ef563f723bfc76d0f28bdaaf,2024-11-21T09:28:01.897000
|
||||
CVE-2024-39569,0,0,27fde70ff8632d189acd650877066fad57adb6783aa0ce6f7c3524dbc6b9ee14,2024-11-21T09:28:02.070000
|
||||
CVE-2024-3957,0,1,5f1004a57c5b1d394b83a93a43bc06c3a9b04a672f2964fea2af6d32c7955a5f,2025-02-03T20:04:49.840000
|
||||
CVE-2024-3957,0,0,5f1004a57c5b1d394b83a93a43bc06c3a9b04a672f2964fea2af6d32c7955a5f,2025-02-03T20:04:49.840000
|
||||
CVE-2024-39570,0,0,1b741c3dc53a47054ce07b914b00c432cf2eb0ae31dcef81aac6b0a006a9e6a0,2024-11-21T09:28:02.240000
|
||||
CVE-2024-39571,0,0,9d109fef17f1ff86885ca7d414f1bbb8b318ca948a992dc7fe88be40d2fb48e2,2024-11-21T09:28:02.400000
|
||||
CVE-2024-39573,0,0,8c15ddb12dc2ce17c0761f85628693c64102a07acf53afaa71ac55703bb6953f,2024-11-21T09:28:02.550000
|
||||
@ -262708,7 +262713,7 @@ CVE-2024-40510,0,0,01a4f30105e4141bfbdf735dfe770a9e53e3acbffd49d6de09904f8ea086a
|
||||
CVE-2024-40511,0,0,559bde25f295eea2f47294178cdd60114ad9f4dfeba09aee5941c614d809c509,2024-09-30T12:45:57.823000
|
||||
CVE-2024-40512,0,0,d36f48a03ff3dd4f93c813812097a184b347da771d3626b2c3f74ff38cddb70a,2024-09-30T12:45:57.823000
|
||||
CVE-2024-40513,0,0,67c8ef3a8b60e9f7e7c4abbefb380dbf0a359919da4c1e7bd0c5910f01a661de,2025-02-03T15:15:17.040000
|
||||
CVE-2024-40514,0,0,24cd42ce15a68daeb1e07304169cd251b4ac0ff1eb95686b861e492991564350,2025-01-16T23:15:07.600000
|
||||
CVE-2024-40514,0,1,66e5abd13151d57b369b2394d8a1b3d7801d079b9a53630111fabe5275f004a6,2025-02-03T21:15:12.780000
|
||||
CVE-2024-40515,0,0,02cb86e3e0b377895050d0961542e60a81e71e07527579b9769598689f04005a,2024-11-21T09:31:14.117000
|
||||
CVE-2024-40516,0,0,d4d687972653b472f242f6a074ac835c001043a1ab0dbc3ea72906e0b080dd33,2024-11-21T09:31:14.310000
|
||||
CVE-2024-40518,0,0,bbf2d149d5fcc55b5b0dc1b47361a8364a7ddf49f79972030ac300284c5871b5,2024-11-21T09:31:14.500000
|
||||
@ -263032,7 +263037,7 @@ CVE-2024-40916,0,0,82ebdaf06b20a2269d938b3153cbdb78890cd0db63a1ce97dd0c1bc48550f
|
||||
CVE-2024-40917,0,0,e5496f490d0c568e9f7e3a5c365e732a46727d19cbef564b8d2a95df2258a823,2025-01-17T14:15:31.457000
|
||||
CVE-2024-40918,0,0,3738b52e660eff78e57a66cf0344d751dd28f503d25401e493f5e1dfce6c612a,2024-11-21T09:31:51.417000
|
||||
CVE-2024-40919,0,0,425190dab35c698e3ab52597ab9b6a309984bfab30b5d462c3f238e4a6105603,2025-02-03T15:36:50.240000
|
||||
CVE-2024-4092,0,1,c9c6dcb4c7346491e1c7d63e26a0f363e8630c348d22faaf5ad4a5a4e276cbdb,2025-02-03T19:37:22.913000
|
||||
CVE-2024-4092,0,0,c9c6dcb4c7346491e1c7d63e26a0f363e8630c348d22faaf5ad4a5a4e276cbdb,2025-02-03T19:37:22.913000
|
||||
CVE-2024-40920,0,0,3cb128ae9cb7e0d6a550f4c857aae094743aebcb6d77c93c3092dd0a2d9cd8c6,2024-11-21T09:31:51.670000
|
||||
CVE-2024-40921,0,0,9d5370b986414dcc036d0ed8ccf7bed4a98c4e9a56c12ef5e7a7009772743c95,2024-11-21T09:31:51.807000
|
||||
CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e76f,2024-11-21T09:31:52.607000
|
||||
@ -263416,7 +263421,7 @@ CVE-2024-41444,0,0,40dc2a2ff5c1d7d012984e5f8e458529a422a415ff1fc824c0d056c0835c5
|
||||
CVE-2024-41445,0,0,39f65e85a8026950b749bd33850514ea1abf27c7d809b4b0d704f4057a44f5ed,2024-10-01T19:03:27.197000
|
||||
CVE-2024-4145,0,0,bf30081aa256f27ec5ec45b8e903ae674bd8ea9a8556cad62f5df9c1c025c206,2024-11-21T09:42:16.447000
|
||||
CVE-2024-41453,0,0,ca223a754854826e8622a14a8b2af6b1993b3c3d5360c8f104b3a028994b74b2,2025-01-16T18:15:22.540000
|
||||
CVE-2024-41454,0,1,f432be40962662d3e59b91235821ca9087be693716b80eef279aedceae1215eb,2025-02-03T19:15:12.060000
|
||||
CVE-2024-41454,0,0,f432be40962662d3e59b91235821ca9087be693716b80eef279aedceae1215eb,2025-02-03T19:15:12.060000
|
||||
CVE-2024-41459,0,0,945e7666277f92adefa4a45ea355c655829c2bacc91d62c763534ab8d13fdaf5,2024-11-21T09:32:40.673000
|
||||
CVE-2024-4146,0,0,0663ca1946310f885e7b84f94c4d0e50a90d3f22de3a0daeb9adf70314f7435a,2024-11-21T09:42:16.633000
|
||||
CVE-2024-41460,0,0,680a17cffac82c4d739a25bf30c24e3dd4848de66dc731770f357c7e6681469e,2024-11-21T09:32:40.897000
|
||||
@ -264404,7 +264409,7 @@ CVE-2024-4264,0,0,a9295252e6ae8012e96f6ab16d3bdbd8ae0aa19058b71f0f60f84b3b14a65d
|
||||
CVE-2024-42640,0,0,e2483a866051d6ad5491e120ca1e63baafa96b595191cf3ff24d316cd3ae355b,2024-10-15T17:35:04.623000
|
||||
CVE-2024-42642,0,0,8b9dbd65dd33a84fe9cea5686d35e4d710f2dc020d9e983ec9c75281204c9951,2024-10-24T17:35:08.450000
|
||||
CVE-2024-42643,0,0,8a7ffe9096c6fc485689357bf740b04bf0699d92b7db10f64f29f9740e899130,2024-10-23T18:35:01.897000
|
||||
CVE-2024-4265,0,1,63c69a6cee2ab681d27175eb4b27c4a304073c6b651fc7157e33c15128b605d7,2025-02-03T19:26:56.200000
|
||||
CVE-2024-4265,0,0,63c69a6cee2ab681d27175eb4b27c4a304073c6b651fc7157e33c15128b605d7,2025-02-03T19:26:56.200000
|
||||
CVE-2024-42657,0,0,aae4bb4de88b679aa9e838d637eb1c44f24a311bee4d0dbccbb5612ac8800d9d,2024-08-20T16:13:12.413000
|
||||
CVE-2024-42658,0,0,efeed58100a3ac2800edc3ef0a58719dedf6608d6515675634cf3d501a381be7,2024-08-20T16:12:50.290000
|
||||
CVE-2024-4266,0,0,dd415bb2761565177a8c96bc405ab004c3acce8a957171f3d59dbeb664e1dc5c,2024-11-21T09:42:30.480000
|
||||
@ -265838,6 +265843,7 @@ CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512
|
||||
CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000
|
||||
CVE-2024-4444,0,0,39fa2450f325301ad817fc86319bbebd1813f8dd3cf2b80a01c74cecff95e276,2025-01-14T21:40:27.670000
|
||||
CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000
|
||||
CVE-2024-44449,1,1,47b864eaa67e3159adbe4b6fa4810c68f694aa0b8ef0226b9f2473a49efe078d,2025-02-03T21:15:12.927000
|
||||
CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000
|
||||
CVE-2024-44450,0,0,e2b00db1a138b66c9c880a204501c6260391eb5150f3adddaf21310d31badd17,2025-01-07T19:15:32.417000
|
||||
CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000
|
||||
@ -266382,7 +266388,7 @@ CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce
|
||||
CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000
|
||||
CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000
|
||||
CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000
|
||||
CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000
|
||||
CVE-2024-45331,0,1,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000
|
||||
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
|
||||
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
|
||||
CVE-2024-45336,0,0,fe73a42ff3e2ab154f5274280efb95e7cafdf2051c26cad0bfba3d1769494881,2025-01-28T16:15:38.220000
|
||||
@ -266956,7 +266962,7 @@ CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194
|
||||
CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000
|
||||
CVE-2024-46446,0,0,32498f8ed9e97dfaea9d9d29b52aff01ff427c37b0ae17db53d50ecbc649b2b9,2024-10-11T13:04:46.337000
|
||||
CVE-2024-4645,0,0,ae6fcbc17927f6fb7b15dd7e2cd4ad23d3bc0045e51ea10de74a0f641554c9cd,2024-11-21T09:43:16.590000
|
||||
CVE-2024-46450,0,0,14c9e64b7af6d48eea92fb8f953cb7965786133f412aab795801a4f9c47027b8,2025-01-16T22:15:39.840000
|
||||
CVE-2024-46450,0,1,584d1302ac1dc2148fd9744364b99c8a1b26b6993af7f31c4407277e184a87a4,2025-02-03T21:15:13.043000
|
||||
CVE-2024-46451,0,0,5691c8cee8fae2502da71b898418de27414898c09a161c995aa0a792f136951b,2024-09-17T14:35:31.353000
|
||||
CVE-2024-46453,0,0,eb16d6a14c6afb2906a10bcd83b48fa20d81c17662bd8c281c8b51af6f96c56d,2024-10-07T13:53:04.767000
|
||||
CVE-2024-46455,0,0,0b91cb2d456ef57e37eaec00f828b8cebf8d0a48c98cc5abe6b851bbbf1c9130,2024-12-12T02:02:38.990000
|
||||
@ -268098,6 +268104,7 @@ CVE-2024-47767,0,0,94aadbc9fc16d474275d6aca7a65361d425ec92b8c6014ba3dfdd771cd3b2
|
||||
CVE-2024-47768,0,0,88ae4f70ab087b8300d230292887e805c01d66e7a5c039ba6592b0b94e773598,2024-11-13T14:55:39.690000
|
||||
CVE-2024-47769,0,0,0c177c50fe296e854c4d574b21c2d2abde6e70c193e41fa822f8df15acb9f1d0,2024-11-13T15:12:54.033000
|
||||
CVE-2024-4777,0,0,f5d82bbae979bc4d2f73fd5aa0aa703237c6002a2996292106f7c34b0b91fd70,2025-01-22T16:45:18.820000
|
||||
CVE-2024-47770,1,1,afe4aa81d02e77cafa99d2e366e838a323f3381c60df009fddf03b20fe0ffaf5,2025-02-03T22:15:27.777000
|
||||
CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000
|
||||
CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000
|
||||
CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000
|
||||
@ -268166,7 +268173,7 @@ CVE-2024-47846,0,0,c9022179ec37ee40991163bc4cce5d4fa49c6b77eda9fa0067bb8fa4a210f
|
||||
CVE-2024-47847,0,0,b2eba8815e2eaeded97152df9d38e905e18e5feb1489eedc3cf58f4fd768e51e,2024-10-16T16:42:05.567000
|
||||
CVE-2024-47848,0,0,e6d753ff6a9c2b27d5318c0e58d5684b9ce935a4058835313c44047d27d48dfd,2024-10-07T17:48:28.117000
|
||||
CVE-2024-47849,0,0,03c49378aaf03dfcd0534d7e954b9ef3c600228150c696f66c6ac0fada5d8849,2024-10-16T16:34:40.490000
|
||||
CVE-2024-4785,0,1,6eab3e353a6724f0414217b6f01f95af472b3949bd6e2b068a62e0b94f58da31,2025-02-03T20:33:19.783000
|
||||
CVE-2024-4785,0,0,6eab3e353a6724f0414217b6f01f95af472b3949bd6e2b068a62e0b94f58da31,2025-02-03T20:33:19.783000
|
||||
CVE-2024-47850,0,0,441f3961f9e4e945afc3ba6c99275c3ca982a87349160ec46e09e3a7a38ca645,2024-11-21T09:40:13.580000
|
||||
CVE-2024-47854,0,0,a9f09de7f0b5818799d7735e32fab0528117f290764772f98a3e102c722b0ab3,2024-11-26T16:15:15.850000
|
||||
CVE-2024-47855,0,0,2488ce52c534b254c4fe75f30de0e6a94b0d61e1b79ce7021bafc48eccaf27dc,2024-11-07T20:35:11.733000
|
||||
@ -268490,7 +268497,7 @@ CVE-2024-48456,0,0,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a
|
||||
CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000
|
||||
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
|
||||
CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000
|
||||
CVE-2024-48460,0,0,9c6a11915e1a14d980c8032256794eb66753933cf88fb0466f6211d8fc8f07e2,2025-01-16T22:15:39.973000
|
||||
CVE-2024-48460,0,1,34f8ed9ab98ddfc75ca095067339237e8229c3fecc07fb29885848ae665d4986,2025-02-03T21:15:13.217000
|
||||
CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48463,0,0,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000
|
||||
CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8455,2024-10-30T18:35:15.410000
|
||||
@ -268594,7 +268601,7 @@ CVE-2024-4875,0,0,ac1a4cd3c3015a7e51b909244836132983e845092f22afd31b06eebb6822f8
|
||||
CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000
|
||||
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
|
||||
CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000
|
||||
CVE-2024-48761,0,1,aed3da36bd3ff4fb2a394bac175723ebc25add12580c327e927a6afaaa96b534,2025-02-03T19:15:12.210000
|
||||
CVE-2024-48761,0,0,aed3da36bd3ff4fb2a394bac175723ebc25add12580c327e927a6afaaa96b534,2025-02-03T19:15:12.210000
|
||||
CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000
|
||||
CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000
|
||||
CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000
|
||||
@ -268681,13 +268688,13 @@ CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b2
|
||||
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
|
||||
CVE-2024-48881,0,0,b23f95dff65a492953a695b231d4f9344fc7f54af69ded8ea700f43b3702364e,2025-01-31T15:54:29.633000
|
||||
CVE-2024-48883,0,0,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90b63,2025-01-13T20:15:28.770000
|
||||
CVE-2024-48884,0,0,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000
|
||||
CVE-2024-48885,0,0,da7f0208f0c95fd2f24f647844a7354b8155e6f4c2c3df76ced6f9f588a64496,2025-01-16T09:15:06.737000
|
||||
CVE-2024-48886,0,0,f1a654d0b24acae0f655db620517eac5f88a03e1413c63f93bf4f53b28192e5a,2025-01-14T14:15:33.027000
|
||||
CVE-2024-48884,0,1,5d218ebb657c4c25d4bd1dddf60f0bce646e5bbe1e6167cb08df887cb762a53a,2025-02-03T22:18:16.507000
|
||||
CVE-2024-48885,0,1,f1a5e74246adb6d7bd8e325564baa4055ce18f2e80eed587565e5479d790b2f4,2025-02-03T21:11:41.750000
|
||||
CVE-2024-48886,0,1,0c43c603ad0a80f9c21978b3b5043d329abd064d0a00462c64b3fb5285dce5fd,2025-02-03T22:16:04.733000
|
||||
CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000
|
||||
CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000
|
||||
CVE-2024-48890,0,0,1ab9aa34e2dee7c83ce102bb687e8be474b284b9f530d42d9e01ca00b624c9bd,2025-01-14T14:15:33.187000
|
||||
CVE-2024-48893,0,0,f685b37228cb812a8fb671bf4237846143f7461727ddcdead4141757fa4bd791,2025-01-14T14:15:33.333000
|
||||
CVE-2024-48890,0,1,e4c2ca148242c15d7451f4a3f4325a96e3aaa804db1c474d5b5964d77366de86,2025-02-03T22:13:42.850000
|
||||
CVE-2024-48893,0,1,4f56fb1297afed12ceeb17e448071cc4ac40c56f80a066a1a7973c4290bf29b7,2025-02-03T22:12:20.713000
|
||||
CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000
|
||||
CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000
|
||||
CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc49a,2024-11-20T14:48:25.373000
|
||||
@ -270157,9 +270164,9 @@ CVE-2024-50559,0,0,dfa1c4cb23ceb2f70b4684ba6fc94ad535123e84e14b38239e2546f378ae5
|
||||
CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de1531,2024-11-21T09:46:52.267000
|
||||
CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000
|
||||
CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000
|
||||
CVE-2024-50563,0,0,3cb3058b3811bf7ede7a877a75dc542e9a8e220f47a4f871ab56ae9b4b417ff5,2025-01-16T10:15:09.480000
|
||||
CVE-2024-50564,0,0,4a2a7b51380febe6370791b50e7a15a1842efcd306622119d6977fa863ed9b3d,2025-01-14T14:15:33.490000
|
||||
CVE-2024-50566,0,0,bfd3951dba82f12232fef18f6a6bbbebb83fdb8ed0afe1245f9953979e379434,2025-01-14T14:15:33.650000
|
||||
CVE-2024-50563,0,1,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000
|
||||
CVE-2024-50564,0,1,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000
|
||||
CVE-2024-50566,0,1,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000
|
||||
CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000
|
||||
CVE-2024-50570,0,0,2d9dc66724750d347def0458b21203e33f8d848938408b5276fa284db7ba2a64,2024-12-18T15:15:12.660000
|
||||
CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000
|
||||
@ -270220,7 +270227,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e
|
||||
CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000
|
||||
CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000
|
||||
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
|
||||
CVE-2024-50656,1,1,b6048ec034cf2de098020db8c89c8a2cbaac6142dfc2a566a356a30ba806ea18,2025-02-03T19:15:12.370000
|
||||
CVE-2024-50656,0,0,b6048ec034cf2de098020db8c89c8a2cbaac6142dfc2a566a356a30ba806ea18,2025-02-03T19:15:12.370000
|
||||
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
|
||||
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
|
||||
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
|
||||
@ -271195,8 +271202,8 @@ CVE-2024-52331,0,0,5cf69bb827959d336a5028afd5f469c4b331d80891193094491be908c529d
|
||||
CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000
|
||||
CVE-2024-52333,0,0,e1bc57a7d739bdd387fb07cc28b3547c00461f3445b0a694a0bfc9660ebe8df6,2025-01-13T16:15:17.990000
|
||||
CVE-2024-52335,0,0,e1e5dff8245ade7d0df486779ba826bca2b65cb6a4f443a05cb574ac0185e48c,2024-12-06T14:15:21.230000
|
||||
CVE-2024-52336,0,1,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
|
||||
CVE-2024-52337,0,1,d2eb07dadd155ebe6f1cef4fe3a2e3193e0824361eb9c47556565f3a1a02b6c0,2025-02-03T20:15:33.273000
|
||||
CVE-2024-52336,0,0,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
|
||||
CVE-2024-52337,0,0,d2eb07dadd155ebe6f1cef4fe3a2e3193e0824361eb9c47556565f3a1a02b6c0,2025-02-03T20:15:33.273000
|
||||
CVE-2024-52338,0,0,9bcca0f5584def2789a1613da17d1dfa11f003cf9877e634fced8f070cd4a571,2024-11-29T15:15:17.550000
|
||||
CVE-2024-52339,0,0,8c254a85b0cc7761c2c8f8cf7f1a34f104621eefc5d8f80c80f60233cb82f4fd,2024-11-19T21:57:32.967000
|
||||
CVE-2024-5234,0,0,3621dd7a9355ab69fb44113adac5d6db321db5bd9e4f974601bbdcdbc1644b98,2024-11-21T09:47:14.493000
|
||||
@ -271645,9 +271652,9 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50
|
||||
CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549df9,2024-11-27T06:15:18.590000
|
||||
CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6b64,2024-11-27T06:15:19.083000
|
||||
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
|
||||
CVE-2024-52963,0,0,ff01669b1598f0bce0b4b90af8cc55f96a203c8a430eccd639efb9c221ab9715,2025-01-14T14:15:33.807000
|
||||
CVE-2024-52967,0,0,ee495ed0ae82b5386a5a5e29b20d009f38e7fec0fdb15824df2e77e4920e6e29,2025-01-14T14:15:33.967000
|
||||
CVE-2024-52969,0,0,d48edc4c533d9acd9a260c0e4d555526245a1be1476ba79e29b9502b8c79f01c,2025-01-14T14:15:34.123000
|
||||
CVE-2024-52963,0,1,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000
|
||||
CVE-2024-52967,0,1,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000
|
||||
CVE-2024-52969,0,1,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb5572938c,2025-02-03T22:01:44.330000
|
||||
CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000
|
||||
CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000
|
||||
CVE-2024-52973,0,0,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000
|
||||
@ -271952,9 +271959,9 @@ CVE-2024-53296,0,0,e28bf767e01b1aaa2164d43f0620bdb3386846f2c98a1468aa6affeb743ed
|
||||
CVE-2024-53299,0,0,9f86b830eea010b1a445e73d9dbaf9c5c5f6dc050ddebe79e4b7713ae5f50bb1,2025-01-23T18:15:30.777000
|
||||
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
|
||||
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
|
||||
CVE-2024-53319,0,1,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000
|
||||
CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000
|
||||
CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000
|
||||
CVE-2024-53320,0,0,de3584e4f9d77dddd8f22e3c0aa5fc427b88db6771b98089a3ae5a7a326901b3,2025-01-31T16:15:34.883000
|
||||
CVE-2024-53320,0,1,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000
|
||||
CVE-2024-5333,0,0,ca365b0ec9b98451e4f093530c18de841de4387827ff042bada205a635c53f76,2024-12-16T17:15:14.070000
|
||||
CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04a94,2024-11-25T22:15:18.437000
|
||||
CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000
|
||||
@ -271962,8 +271969,8 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
|
||||
CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000
|
||||
CVE-2024-53345,0,0,f122664bf501aa1be2960db7352db8f065380488d2573ffac2bf7a21da16724b,2025-01-07T20:15:29.923000
|
||||
CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000
|
||||
CVE-2024-53354,0,0,e1b648a6a4be7930b88b2d086e1942a5b20fa37be934512a75fe194bbddd815a,2025-01-31T22:15:09.340000
|
||||
CVE-2024-53355,0,1,ca5b0e88509e9dfe276e8a1129d2d942bec54d0cf30330b2eaf5af51359d112f,2025-02-03T19:15:12.480000
|
||||
CVE-2024-53354,0,1,037168b08e181fc45ec0d539f57aec2ef9e07d70617d283e15863c003fb78658,2025-02-03T21:15:13.520000
|
||||
CVE-2024-53355,0,0,ca5b0e88509e9dfe276e8a1129d2d942bec54d0cf30330b2eaf5af51359d112f,2025-02-03T19:15:12.480000
|
||||
CVE-2024-53356,0,0,2fd1e2076fbd775edcaf5d4689b90cbce5557883ad8b8cae5caae4b0b5736bc1,2025-02-03T18:15:36.487000
|
||||
CVE-2024-53357,0,0,5d73d16921abdcf0162ad5d0212c0e48db4937f78179f55ecec148d968b7ce15,2025-02-03T17:15:21.270000
|
||||
CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000
|
||||
@ -271984,7 +271991,7 @@ CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3
|
||||
CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000
|
||||
CVE-2024-5343,0,0,a520df0d2c87c5fe35335a1b343c956cc8dcf1b7b7959b5acc51996bdc11fd0c,2024-11-21T09:47:27.647000
|
||||
CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d645ce,2024-12-04T16:15:26.240000
|
||||
CVE-2024-53438,0,1,d4b7ce1083106411af815b353970b625a6a3a517c2a135e9bb937be4c90fc83e,2025-02-03T19:15:12.633000
|
||||
CVE-2024-53438,0,0,d4b7ce1083106411af815b353970b625a6a3a517c2a135e9bb937be4c90fc83e,2025-02-03T19:15:12.633000
|
||||
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
|
||||
CVE-2024-53441,0,0,15e36cc5d95e47c6196e0366735e3d4fafceb35f2476d36323b8dd3867fef6fc,2024-12-12T02:07:57.850000
|
||||
CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000
|
||||
@ -272022,7 +272029,7 @@ CVE-2024-53537,0,0,d1edfe105b95fc20dfa993a8f81a60afeea48c708dd506bb2a3430a2edc83
|
||||
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
|
||||
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
|
||||
CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000
|
||||
CVE-2024-53553,0,0,96586682b18b18abf40cb4975540b6e6024c206d62f7a1515e26de218ae6785b,2025-01-16T23:15:07.700000
|
||||
CVE-2024-53553,0,1,f76cd837b8044f3ae7bee9c286ff4b43a72406724cd6dd80c83638da1316919f,2025-02-03T21:15:13.667000
|
||||
CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab5983b,2024-11-26T16:15:18.520000
|
||||
CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000
|
||||
CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000
|
||||
@ -272346,7 +272353,7 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f
|
||||
CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000
|
||||
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
|
||||
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
|
||||
CVE-2024-54021,0,0,13a0709ef7a4e77dec1177a991cc8b9c7e150472cbf3b901ccd7992c11bb3fd1,2025-01-14T14:15:34.287000
|
||||
CVE-2024-54021,0,1,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000
|
||||
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
|
||||
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
|
||||
CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
|
||||
@ -272810,7 +272817,7 @@ CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afa
|
||||
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
|
||||
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
|
||||
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
|
||||
CVE-2024-54660,0,0,edef0c5871f664f8877d185e31c3b8a6ca427240ddfe23726caee85e94e3c9fa,2025-01-16T22:15:40.200000
|
||||
CVE-2024-54660,0,1,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000
|
||||
CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000
|
||||
CVE-2024-54662,0,0,40063869c5984ddcfcaf82116b2fa9ee6b8ef71c24c68deda4080eb1ea805f5c,2024-12-18T16:15:14.220000
|
||||
CVE-2024-54663,0,0,f5353753ee157eb79c3a456bcb90fa176ea7107dfe149747714f2e06d4f48033,2024-12-31T19:15:47.500000
|
||||
@ -273085,7 +273092,7 @@ CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c8
|
||||
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
|
||||
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
|
||||
CVE-2024-55591,0,0,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000
|
||||
CVE-2024-55593,0,0,9430bce7692d2c8e6d288cbe72f31d16d74be58a9c07a6a6961fc12e525a7607,2025-01-14T14:15:34.610000
|
||||
CVE-2024-55593,0,1,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155600,2025-02-03T22:06:19.163000
|
||||
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
|
||||
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
|
||||
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
|
||||
@ -273563,7 +273570,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d
|
||||
CVE-2024-5646,0,0,c48b41c63e1dae6ddb1f5f69529911450f8300b5322652ac7b1465148b11ea55,2024-11-21T09:48:05.203000
|
||||
CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000
|
||||
CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000
|
||||
CVE-2024-56497,0,1,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000
|
||||
CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000
|
||||
CVE-2024-5650,0,0,e326c3216630004af5368334e17751b93c2144fc6e95ba439673319f24c5efbd,2024-11-21T09:48:05.557000
|
||||
CVE-2024-56507,0,0,2fcd6aea186081b10138c7efdbe4c6828fb4bc2d016266039f2e51dacfa7b54c,2024-12-27T21:15:08.287000
|
||||
CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa32e4,2024-12-27T21:15:08.390000
|
||||
@ -273886,16 +273893,20 @@ CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c16458
|
||||
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
|
||||
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
|
||||
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
|
||||
CVE-2024-56898,1,1,9ae57ff9e729ce7948a9198f3fcb4535abcce7cb095215a11d1908052010d69e,2025-02-03T21:15:14.047000
|
||||
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
|
||||
CVE-2024-56901,1,1,961934b3471c81d03b97682bc04d12f2b6ebd894d3542fa5265fea40c509a10b,2025-02-03T21:15:14.157000
|
||||
CVE-2024-56902,1,1,609f9bb136b2c4af95bed57c64465a88e9193ce7d7fcc02e9749eebc0e6813ec,2025-02-03T21:15:14.270000
|
||||
CVE-2024-56903,1,1,c0fde83230cba30dc68b89c58ba19b9d6bc1d05ac23f033fe63f7796558f3aec,2025-02-03T21:15:14.357000
|
||||
CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000
|
||||
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
|
||||
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
|
||||
CVE-2024-56921,1,1,59308a6a4118b5ed6d8f1b39e741ed93cdb6518178f579e631168f317706958b,2025-02-03T20:15:33.610000
|
||||
CVE-2024-56921,0,0,59308a6a4118b5ed6d8f1b39e741ed93cdb6518178f579e631168f317706958b,2025-02-03T20:15:33.610000
|
||||
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
|
||||
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
|
||||
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
|
||||
CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000
|
||||
CVE-2024-56946,1,1,b09cc35b9c52557da77cca1a315e54d72326f38f92deee63bd90ec2ea9015464,2025-02-03T20:15:33.743000
|
||||
CVE-2024-56946,0,0,b09cc35b9c52557da77cca1a315e54d72326f38f92deee63bd90ec2ea9015464,2025-02-03T20:15:33.743000
|
||||
CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000
|
||||
CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000
|
||||
CVE-2024-56949,0,0,9badb9d193ec802649c03676d00eb21db1a186f3dabe0299b597023b2e5f3799,2025-01-28T20:15:51.797000
|
||||
@ -273927,7 +273938,7 @@ CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43
|
||||
CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000
|
||||
CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000
|
||||
CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000
|
||||
CVE-2024-57004,1,1,ffd18e6ae33a0cef082ad91a6f38c4b08dbcc9486ac2b2eeefe2f2fe6b1f73c1,2025-02-03T19:15:12.777000
|
||||
CVE-2024-57004,0,0,ffd18e6ae33a0cef082ad91a6f38c4b08dbcc9486ac2b2eeefe2f2fe6b1f73c1,2025-02-03T19:15:12.777000
|
||||
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
|
||||
CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000
|
||||
CVE-2024-57012,0,0,9eeaeb247ea982bbb49160ccdf98082729e7cd26e86494fbb31016855f1607c5,2025-01-16T15:15:14.090000
|
||||
@ -273959,16 +273970,16 @@ CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51
|
||||
CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000
|
||||
CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000
|
||||
CVE-2024-57095,0,0,34b0fe239993395502715f1a333962d78d9014d2bbef810d2b8502261121cb56,2025-01-24T20:15:33.473000
|
||||
CVE-2024-57097,1,1,6b71dfad1fb80ad09c345d2411b73a123cb3b3664a2723a2bc0cd9a9c119211c,2025-02-03T20:15:33.897000
|
||||
CVE-2024-57098,1,1,526c6bd5fc25a9e33d86cb6eb5f9c2f28fc48cd8314a760fa7b874925ceb9371,2025-02-03T20:15:34.013000
|
||||
CVE-2024-57099,1,1,6862aaeb55106a9d56f138c9c5c35e97d385d30773837f82252148803043a42f,2025-02-03T20:15:34.157000
|
||||
CVE-2024-57097,0,1,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000
|
||||
CVE-2024-57098,0,0,526c6bd5fc25a9e33d86cb6eb5f9c2f28fc48cd8314a760fa7b874925ceb9371,2025-02-03T20:15:34.013000
|
||||
CVE-2024-57099,0,0,6862aaeb55106a9d56f138c9c5c35e97d385d30773837f82252148803043a42f,2025-02-03T20:15:34.157000
|
||||
CVE-2024-5710,0,0,9b8da5c1d380b97df0420ebc8886a7e69a937a7c44dad142b0c060e78b36a5bf,2024-11-21T09:48:12.877000
|
||||
CVE-2024-5711,0,0,ee26b23352bc3eb492910cce0ac4d4e0fcc138593b5b885cf10639f27fe76384,2024-11-21T09:48:13.010000
|
||||
CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a91,2024-11-21T09:48:13.160000
|
||||
CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000
|
||||
CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000
|
||||
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
|
||||
CVE-2024-57159,0,1,bea9b261af3163b5fd86d5922e5e2e3ee5fbac4f0e45b7bbf59086d2f729fecf,2025-02-03T19:15:12.880000
|
||||
CVE-2024-57159,0,0,bea9b261af3163b5fd86d5922e5e2e3ee5fbac4f0e45b7bbf59086d2f729fecf,2025-02-03T19:15:12.880000
|
||||
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
|
||||
CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000
|
||||
CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000
|
||||
@ -273993,8 +274004,8 @@ CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0e
|
||||
CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000
|
||||
CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000
|
||||
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
|
||||
CVE-2024-57237,1,1,a390f960ccf182bd13158080a011b6cda5f49b1e55bf9273343ed86467295bfc,2025-02-03T19:15:13.053000
|
||||
CVE-2024-57238,1,1,62a444d988b312dab378b304977910d82ff6c4e477b76b6aac960d8b3395fdb0,2025-02-03T19:15:13.177000
|
||||
CVE-2024-57237,0,0,a390f960ccf182bd13158080a011b6cda5f49b1e55bf9273343ed86467295bfc,2025-02-03T19:15:13.053000
|
||||
CVE-2024-57238,0,0,62a444d988b312dab378b304977910d82ff6c4e477b76b6aac960d8b3395fdb0,2025-02-03T19:15:13.177000
|
||||
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
|
||||
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
|
||||
CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000
|
||||
@ -274031,16 +274042,17 @@ CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba
|
||||
CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000
|
||||
CVE-2024-57432,0,0,919d02e0a1b59673a162a8bd045a890978b7d93d202a67f79b5bbe75f3b09109,2025-02-03T17:15:21.883000
|
||||
CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd3c8,2025-02-03T17:15:22.020000
|
||||
CVE-2024-57434,0,0,874e15ef2aff82b5f54dab7d50703f5ff0bff116ab1217a9cfc99f88168e235b,2025-01-31T22:15:12.613000
|
||||
CVE-2024-57435,0,0,b2577210fdc470006361399831465a52f720053bc414a2700c7600ed0e018e83,2025-01-31T22:15:13.103000
|
||||
CVE-2024-57434,0,1,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000
|
||||
CVE-2024-57435,0,1,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000
|
||||
CVE-2024-57436,0,0,282eb6e7074212031e9dd5ef81b2445bf8af0720ec49623ad39893ccbcfafed8,2025-01-29T17:15:28.480000
|
||||
CVE-2024-57437,0,0,53c9041a084a44e480671d9200a4e0fe3bfef1699e2847a7342d00abb4f9ebf0,2025-01-29T15:15:17.183000
|
||||
CVE-2024-57438,0,0,a3f3379a583f056a3eceb0974a3a5c5f30e5dd1beddcfe86f2ad82efd2782a16,2025-01-29T15:15:17.283000
|
||||
CVE-2024-57439,0,0,4cb58a3938fc882d4399a493b10fd8366d3d4345b283844490118a46a57a5249,2025-01-29T17:15:28.650000
|
||||
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
|
||||
CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000
|
||||
CVE-2024-57450,1,1,d672f4d4399feef9d4b7e96fe9a32a34f21114f50d942adfac374a01ff7e7330,2025-02-03T20:15:34.253000
|
||||
CVE-2024-57452,1,1,ab17ba2c958b860fb1e227749065c42543e789b75ec4aef288002bc5421c2347,2025-02-03T20:15:34.373000
|
||||
CVE-2024-57450,0,0,d672f4d4399feef9d4b7e96fe9a32a34f21114f50d942adfac374a01ff7e7330,2025-02-03T20:15:34.253000
|
||||
CVE-2024-57451,1,1,25da2c69e1bedb2de75fffcef691d5e5e61c2c7065c349b48d354ab17fd19e5d,2025-02-03T21:15:14.893000
|
||||
CVE-2024-57452,0,0,ab17ba2c958b860fb1e227749065c42543e789b75ec4aef288002bc5421c2347,2025-02-03T20:15:34.373000
|
||||
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
|
||||
CVE-2024-57471,0,0,046199a988b5112e867977ad6d82bd57c13f52bc945d9be0e662c5b8b39ac509,2025-01-23T17:15:17.410000
|
||||
CVE-2024-57473,0,0,5e3e2f533ef78e6f4b74e928a4bd67c4e25caa058e34b8782863e4b551c04e05,2025-01-16T16:15:33.183000
|
||||
@ -274051,15 +274063,15 @@ CVE-2024-57483,0,0,42f78ad72eefb62ad9fc5fc46850ff2f6a434ca41fcee6006d9831dee74ed
|
||||
CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000
|
||||
CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000
|
||||
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
|
||||
CVE-2024-57498,1,1,327faaf8069990c5b00393e08a471db79b18cb91105dd96ae1bae790e2e1ded5,2025-02-03T20:15:34.477000
|
||||
CVE-2024-57498,0,0,327faaf8069990c5b00393e08a471db79b18cb91105dd96ae1bae790e2e1ded5,2025-02-03T20:15:34.477000
|
||||
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
|
||||
CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000
|
||||
CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000
|
||||
CVE-2024-57510,0,1,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000
|
||||
CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000
|
||||
CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000
|
||||
CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000
|
||||
CVE-2024-57519,0,0,1a1af74905cce20abc5596e2722805c77bb23c1788056fac531228633dff1e0a,2025-01-29T15:15:17.483000
|
||||
CVE-2024-57522,0,1,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000
|
||||
CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000
|
||||
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
|
||||
CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000
|
||||
CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000
|
||||
@ -274080,7 +274092,7 @@ CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff117
|
||||
CVE-2024-57556,0,0,bb0c8b6daab6a4685a3c223d5c61804de336ccacfb88de2d986d4a4a234b5bc3,2025-01-24T21:15:10.680000
|
||||
CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000
|
||||
CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000
|
||||
CVE-2024-57575,0,1,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000
|
||||
CVE-2024-57575,0,0,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000
|
||||
CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000
|
||||
CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000
|
||||
CVE-2024-57579,0,0,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000
|
||||
@ -274095,7 +274107,7 @@ CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b16
|
||||
CVE-2024-57595,0,0,d5693a2fe10b4abac0b79780793b0dd88de974ed3b2d52993c0faf6b5032403c,2025-01-27T16:15:31.613000
|
||||
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
CVE-2024-57611,0,1,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000
|
||||
CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000
|
||||
CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000
|
||||
CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000
|
||||
CVE-2024-57617,0,0,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000
|
||||
@ -274151,25 +274163,25 @@ CVE-2024-57661,0,0,6d08cb67e58ae875891d256b6bd08dc049d206ee925b20ca33928959aac61
|
||||
CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaead1f,2025-01-23T17:15:17.830000
|
||||
CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18
|
||||
CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000
|
||||
CVE-2024-57665,0,1,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000
|
||||
CVE-2024-57669,1,1,d409eadc88b4529018be8ca17f00281cdf8ff74894d368fef3370b5b0f111a8d,2025-02-03T20:15:34.960000
|
||||
CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000
|
||||
CVE-2024-57669,0,0,d409eadc88b4529018be8ca17f00281cdf8ff74894d368fef3370b5b0f111a8d,2025-02-03T20:15:34.960000
|
||||
CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000
|
||||
CVE-2024-57676,0,1,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000
|
||||
CVE-2024-57677,0,1,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000
|
||||
CVE-2024-57678,0,1,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000
|
||||
CVE-2024-57679,0,1,e071a51ad34b4e4298ac98848d9860614215c6058e4439e5d23edf7585ed7bf2,2025-02-03T20:15:35.577000
|
||||
CVE-2024-57676,0,0,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000
|
||||
CVE-2024-57677,0,0,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000
|
||||
CVE-2024-57678,0,0,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000
|
||||
CVE-2024-57679,0,0,e071a51ad34b4e4298ac98848d9860614215c6058e4439e5d23edf7585ed7bf2,2025-02-03T20:15:35.577000
|
||||
CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000
|
||||
CVE-2024-57680,0,1,3f9879f31e0ddbdc8f00b143bb53346d8eb78f9585e491a569530ce2a7f38df4,2025-02-03T20:15:35.740000
|
||||
CVE-2024-57681,0,1,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699c05,2025-02-03T20:15:35.907000
|
||||
CVE-2024-57682,0,1,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
|
||||
CVE-2024-57683,0,1,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
|
||||
CVE-2024-57680,0,0,3f9879f31e0ddbdc8f00b143bb53346d8eb78f9585e491a569530ce2a7f38df4,2025-02-03T20:15:35.740000
|
||||
CVE-2024-57681,0,0,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699c05,2025-02-03T20:15:35.907000
|
||||
CVE-2024-57682,0,0,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
|
||||
CVE-2024-57683,0,0,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
|
||||
CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca976,2025-01-16T20:15:33.340000
|
||||
CVE-2024-57686,0,0,bff67f4870fa1a425dfb954d4d6446624978b67b9e08d7ce0318060f20535c1f,2025-01-10T15:15:16.003000
|
||||
CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000
|
||||
CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000
|
||||
CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000
|
||||
CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000
|
||||
CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000
|
||||
CVE-2024-57704,0,1,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000
|
||||
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57719,0,0,643301859a6cc77c578653132f0918510423f22a025f08c288f4c8d7e8730d3b,2025-01-23T15:15:11.920000
|
||||
CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000
|
||||
@ -274203,9 +274215,9 @@ CVE-2024-57772,0,0,5c9e3ebdf8909aa581e4be2fe94c325564f1d0feb1a0d39ebfd0677986ed4
|
||||
CVE-2024-57773,0,0,1472bdb16aea64af8fca7b40bd42060d257a747077a74fb79d13a84acc8a924d,2025-01-21T17:15:16.250000
|
||||
CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485501,2025-01-21T17:15:16.433000
|
||||
CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000
|
||||
CVE-2024-57776,0,1,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
|
||||
CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
|
||||
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
|
||||
CVE-2024-57784,0,0,13e3853bb84451bd96ad42acd016f282a76aebd120900fc78df88a4edeadade0,2025-01-16T23:15:08.213000
|
||||
CVE-2024-57784,0,1,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
|
||||
CVE-2024-57785,0,0,135792af397929898d575e62bc51d4dfce68cd8f2d0c7ad555f4b589f8dc76ad,2025-01-16T23:15:08.317000
|
||||
CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000
|
||||
CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000
|
||||
@ -274328,7 +274340,7 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a
|
||||
CVE-2024-57965,0,0,beca1a5c4241b8a17f2dc2e6caf9cfcb35d784b0c331b6bcd655a61453686e3e,2025-01-29T10:15:08.113000
|
||||
CVE-2024-57966,0,0,40e2f22cb22a31ff1abb28cf2e7cdb6b2203c6459f1e312f0ed24484eb3b3c7c,2025-02-03T05:15:10.080000
|
||||
CVE-2024-57967,0,0,91eb1bfd2e20a3b6504519270fe1735c3bd2ee8a6236093524acc33a3a4157f6,2025-02-03T18:15:37.853000
|
||||
CVE-2024-57968,1,1,bd4f5a3636572fc02776014d13068e8c1326b225cc640c80d722596667392e5d,2025-02-03T20:15:36.550000
|
||||
CVE-2024-57968,0,0,bd4f5a3636572fc02776014d13068e8c1326b225cc640c80d722596667392e5d,2025-02-03T20:15:36.550000
|
||||
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
|
||||
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
|
||||
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
|
||||
@ -276942,7 +276954,7 @@ CVE-2024-8794,0,0,b24016e059cacd35faa72f5043453c9a5987b5a31d25c70b908b4165379261
|
||||
CVE-2024-8795,0,0,039f0ab0aa3ee80883042c232e961eb1ed22c0504e1aebe7367716484cf5c223,2024-09-26T16:46:55.587000
|
||||
CVE-2024-8796,0,0,cfeb096d9be350a9d8b58652d1aa1581aa03d71412f47ada7bdf32657eb188f2,2024-09-30T14:10:38.937000
|
||||
CVE-2024-8797,0,0,ca9c0c02beee7110c7ac2e2c807511497bad347868533650bf39b35e4a13e197,2024-09-27T14:02:23.700000
|
||||
CVE-2024-8798,0,1,87e203a0f34be4e4602bea5d73fb9478a13759ebf35f432f2415726fcbd76602,2025-02-03T20:13:18.163000
|
||||
CVE-2024-8798,0,0,87e203a0f34be4e4602bea5d73fb9478a13759ebf35f432f2415726fcbd76602,2025-02-03T20:13:18.163000
|
||||
CVE-2024-8799,0,0,f5f63f9842eda4e37d16e3a0587518db5a4c87c6136b59cf05197833f6fd2662,2024-10-07T19:22:12.627000
|
||||
CVE-2024-8800,0,0,284c323dbe986db557a2960bdea255f7fe6a9ec33bd09ee83b41a574a4f95eea,2024-10-08T18:59:42.310000
|
||||
CVE-2024-8801,0,0,1e0aae29be9c0cb744c09fcf6b871e68e47c8e0119f25e788bcd23b055cde119,2024-09-30T14:23:46.140000
|
||||
@ -278105,7 +278117,7 @@ CVE-2025-0432,0,0,96716eb8c9d05acc81ec96912ebe6b064fb606be34e0c028359855e734f07b
|
||||
CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000
|
||||
CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000
|
||||
CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000
|
||||
CVE-2025-0437,0,1,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000
|
||||
CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000
|
||||
CVE-2025-0438,0,0,39caf6a5a4788bf8fc0f6b91aa36aaac29a5413ddbad6f8e163db37af52d3ab3,2025-01-15T15:15:14.817000
|
||||
CVE-2025-0439,0,0,0b06da63dc3bcca461d845db4298a4b15ecf0710d9ba4c4d9523a576764e9836,2025-01-15T15:15:15
|
||||
CVE-2025-0440,0,0,f9b771ae4043bf8cf99eeaad5bdb101bbcdc5b7cce3f6409b0beeb87f15a5e43,2025-01-15T15:15:15.247000
|
||||
@ -278357,10 +278369,10 @@ CVE-2025-20631,0,0,41bd5f6770aac6cb8c5b5054e9d7f613bb3ac5a0a94b3b15b3e504232752e
|
||||
CVE-2025-20632,0,0,2d77a25a03c3f236a5d5f41b49b7085b4a24a3e575edfc367aa2e42674296ff3,2025-02-03T17:15:25.383000
|
||||
CVE-2025-20633,0,0,ca283995979e4830fdde2b3067424e1afcfed699f49bf96f3b36b2663cbfbf6b,2025-02-03T17:52:49.367000
|
||||
CVE-2025-20634,0,0,a7b8334cae34280efebb4b6c9cf3578c9469ec3636de93faf80e00f103f3458d,2025-02-03T18:17:55.977000
|
||||
CVE-2025-20635,0,1,65fe66228d0f30d1cbb4c96eba5c4c20eab6b3488b5e520bb46c7b3b55023b67,2025-02-03T19:31:24.417000
|
||||
CVE-2025-20636,0,1,6b1cb377acf80eca086d18d547ffd31b4fe2dff2463d36def9e4ca0101d37bc2,2025-02-03T19:39:49.587000
|
||||
CVE-2025-20635,0,0,65fe66228d0f30d1cbb4c96eba5c4c20eab6b3488b5e520bb46c7b3b55023b67,2025-02-03T19:31:24.417000
|
||||
CVE-2025-20636,0,0,6b1cb377acf80eca086d18d547ffd31b4fe2dff2463d36def9e4ca0101d37bc2,2025-02-03T19:39:49.587000
|
||||
CVE-2025-20637,0,0,01e21e716c01df51a52eb39da1f26c221e3ebff427ba1c1f070d11a24095fec6,2025-02-03T17:54:51.210000
|
||||
CVE-2025-20638,0,1,9e714cc585f02512c5c5fda219a2d683a01596c9aa307760426e5898e59938cc,2025-02-03T19:40:23.927000
|
||||
CVE-2025-20638,0,0,9e714cc585f02512c5c5fda219a2d683a01596c9aa307760426e5898e59938cc,2025-02-03T19:40:23.927000
|
||||
CVE-2025-20639,0,0,8fecb2ed6400cd2539c2040114be616b9077331d755b64fbfcf682dd3141d0a6,2025-02-03T18:15:41.977000
|
||||
CVE-2025-20640,0,0,40ff3414c09b58aa1346613707feda74cde698d5358816ed9981132edb8e2f3a,2025-02-03T18:15:42.190000
|
||||
CVE-2025-20641,0,0,153c26cc51726ea02952f964a6ba554db7a970cb9d0ddabf4bb6e6564c1ac555,2025-02-03T18:15:42.400000
|
||||
@ -278695,14 +278707,14 @@ CVE-2025-21661,0,0,0fa8c68f8e644a9e2944a5faceaf5fb67752dd573becbebbb71e40324bd4c
|
||||
CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
|
||||
CVE-2025-21663,0,0,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000
|
||||
CVE-2025-21664,0,0,87fd856e07f552629b0a9eaa9bb54dc5da1a52702744fda35e3dcc449f63ce6a,2025-02-02T11:15:15.697000
|
||||
CVE-2025-21665,0,1,fb059002f5ce248788ba8e290451855e9eb46e1b2f953588f42101e6529c244b,2025-02-03T19:57:54.933000
|
||||
CVE-2025-21666,0,1,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4316,2025-02-03T19:59:37.907000
|
||||
CVE-2025-21667,0,1,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000
|
||||
CVE-2025-21665,0,0,fb059002f5ce248788ba8e290451855e9eb46e1b2f953588f42101e6529c244b,2025-02-03T19:57:54.933000
|
||||
CVE-2025-21666,0,0,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4316,2025-02-03T19:59:37.907000
|
||||
CVE-2025-21667,0,0,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000
|
||||
CVE-2025-21668,0,0,8b20b97df5dd2ed7cbbba0cbf3d1ebbd67685e3ecc54b7dd3a7c5749df4931d3,2025-01-31T12:15:27.960000
|
||||
CVE-2025-21669,0,0,57297746ea6af4232634b5feda860c3a6d2f8b8ad8b40e3f332c512b5ded5f6b,2025-02-02T11:15:15.980000
|
||||
CVE-2025-21670,0,0,d12c9401cba1e8e9338731815f7b5e159255c5e225990eb8a1877fd4ffbecb00,2025-01-31T12:15:28.160000
|
||||
CVE-2025-21671,0,0,82055684ba59cdb4ac3ab58ee2cb025fec2afdb765aa94af38cc1c0dc4207a2a,2025-01-31T12:15:28.263000
|
||||
CVE-2025-21672,0,1,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000
|
||||
CVE-2025-21672,0,0,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000
|
||||
CVE-2025-21673,0,0,9e628820134e026486c4acee1bb676a96b70d1edf2eac2a3aa94349cc89905c5,2025-01-31T12:15:28.463000
|
||||
CVE-2025-21674,0,0,69194298cd8940d45652dbb676d8c3f7403965bcf926595dfedefd4ad16e7c95,2025-01-31T12:15:28.560000
|
||||
CVE-2025-21675,0,0,c3bd3ced751194a1431aa53c613e3e5b576f540db0c777b43a76ef120c168980,2025-01-31T12:15:28.677000
|
||||
@ -278713,7 +278725,8 @@ CVE-2025-21679,0,0,c0a036194b73d5170da4843624623a1fb4b9e085c3ba3466b8d8f2581a1bd
|
||||
CVE-2025-21680,0,0,b3ddbaaa8dc622ecaf35025de804bcc4011af952e154dc87e5b861a81b1add98,2025-01-31T12:15:29.160000
|
||||
CVE-2025-21681,0,0,33386cfbe1cd639dc40c49e4251fab4b0a535f237b027c151bda6b0c921455cb,2025-01-31T12:15:29.260000
|
||||
CVE-2025-21682,0,0,af36b62ce352ba03944473d01a4afdd64cf998543119197419230273df44e036,2025-01-31T12:15:29.363000
|
||||
CVE-2025-21683,0,1,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
|
||||
CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
|
||||
CVE-2025-22129,1,1,33e0404310f131287ac9ad09e9894e740e319437070c1354f7ac6457bfb0c49c,2025-02-03T22:15:28.040000
|
||||
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
|
||||
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
|
||||
CVE-2025-22132,0,0,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000
|
||||
@ -279076,14 +279089,15 @@ CVE-2025-22912,0,0,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaed
|
||||
CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000
|
||||
CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000
|
||||
CVE-2025-22917,0,0,719cb439e4aa013d46c277c9fd9c1581990f1a43ff92759e99b4634c1058cb35,2025-01-29T16:15:43.907000
|
||||
CVE-2025-22918,1,1,e2d613a5eab7f892f5de317abf0d46cdcd99aac12650adb75272eb6183939977,2025-02-03T21:15:15.400000
|
||||
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
|
||||
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
|
||||
CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000
|
||||
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
|
||||
CVE-2025-22964,0,1,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
|
||||
CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000
|
||||
CVE-2025-22976,0,1,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
|
||||
CVE-2025-22978,1,1,c0e66c6fb03b619e0a62303a233be14e0f9e5c7efff96484200104b1d2538157,2025-02-03T20:15:36.720000
|
||||
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
|
||||
CVE-2025-22978,0,0,c0e66c6fb03b619e0a62303a233be14e0f9e5c7efff96484200104b1d2538157,2025-02-03T20:15:36.720000
|
||||
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
|
||||
CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000
|
||||
CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000
|
||||
@ -279093,8 +279107,8 @@ CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d
|
||||
CVE-2025-23001,0,0,f86b72eba255cd7891e4129e22491fe49ff2d487b6e537f62dbf55fbfcb1eb17,2025-02-03T17:15:26.960000
|
||||
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
|
||||
CVE-2025-23007,0,0,7a82ccd68ff0865dca2d931df3c91220e1f0e4aa623d29dba6dab4a9e33e015f,2025-01-30T14:15:38.300000
|
||||
CVE-2025-23011,0,1,0ac026798cd262001be0206676fdedf031be9d5d65106916b11a08692a6fcc17,2025-02-03T20:15:36.823000
|
||||
CVE-2025-23012,0,1,80e79d2dca58dc0de4053922ddf003d61df0dcf631e49251d47ea13fe8bf6a1b,2025-02-03T20:15:36.977000
|
||||
CVE-2025-23011,0,0,0ac026798cd262001be0206676fdedf031be9d5d65106916b11a08692a6fcc17,2025-02-03T20:15:36.823000
|
||||
CVE-2025-23012,0,0,80e79d2dca58dc0de4053922ddf003d61df0dcf631e49251d47ea13fe8bf6a1b,2025-02-03T20:15:36.977000
|
||||
CVE-2025-23013,0,0,41312d3c40b04a23352f5579b00dccd945ae6a58acc9182af7bda141c59bc5af,2025-02-03T10:15:09.250000
|
||||
CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000
|
||||
CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000
|
||||
@ -279169,6 +279183,7 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f
|
||||
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
|
||||
CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
|
||||
CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000
|
||||
CVE-2025-23210,1,1,6a4edecdd2be14cc5baf4055756d1a14722e22c08495ddb9aeb51e09b13f4384,2025-02-03T22:15:28.187000
|
||||
CVE-2025-23211,0,0,a6a11d8dd85a5dbd2e936abcb11edcf0f73f45b37a04f92dc8536feb2b313fd5,2025-01-28T17:15:26.160000
|
||||
CVE-2025-23212,0,0,eba05a199612019b0b5a609d5960f5c38b362665c405e3d131dbfcf2d2cd93cb,2025-01-28T17:15:26.273000
|
||||
CVE-2025-23213,0,0,aff38eabb9bd04672d3ed96bb05c973962632a9b4695af8a2793f4269fb88cb5,2025-01-28T16:15:41.217000
|
||||
@ -279587,6 +279602,7 @@ CVE-2025-24020,0,0,8af21263c34fe60ecd58053859c55a054f32c688226633322d20a805caa3d
|
||||
CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000
|
||||
CVE-2025-24025,0,0,64a82ba00832aea6030e4df8abcdcc543fdbba12bd4c4b98f456103b2c022fe7,2025-01-24T21:15:11.600000
|
||||
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
|
||||
CVE-2025-24029,1,1,385ccc4a55fe24bfc42e9bba5beb9d3a9d879a7dbc582e7f01a5fdcd43ff103e,2025-02-03T22:15:28.320000
|
||||
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
|
||||
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
|
||||
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
|
||||
@ -279631,7 +279647,7 @@ CVE-2025-24136,0,0,cfcba9ff821cc628de6fb3887686b8fc52473b5da8776ef5e6f574056e7be
|
||||
CVE-2025-24137,0,0,04c64c426bacf16b84ebfa21934b389a675da3a154e1b710c9e3a0886823032f,2025-01-28T20:15:56.410000
|
||||
CVE-2025-24138,0,0,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000
|
||||
CVE-2025-24139,0,0,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000
|
||||
CVE-2025-24140,0,1,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc9a3,2025-02-03T20:15:37.090000
|
||||
CVE-2025-24140,0,0,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc9a3,2025-02-03T20:15:37.090000
|
||||
CVE-2025-24141,0,0,a4fcae130e4f47999a3a0c91057add2d4aac7b8b215cd49acb885ba09a63aad5,2025-01-30T18:03:08.223000
|
||||
CVE-2025-24143,0,0,b231b73a80f231535ad8a610ad9396187ff00845bbac56678616fc96c1cff4f5,2025-01-30T18:03:57.780000
|
||||
CVE-2025-24145,0,0,7f09f4c2ce26328feb2ae7c1f55888f703aed8b1e0464a9dc401981b74d48b00,2025-01-30T18:04:51.137000
|
||||
@ -279671,6 +279687,8 @@ CVE-2025-24365,0,0,0885a59ea8828e04f21a02f08ea8ac3037ccb68262ab26df85674cf9da4c0
|
||||
CVE-2025-24367,0,0,0519da00464691193e6161cca54d34f74e93b28b2087f7c83a26c6e3b8f04cba,2025-01-27T19:15:29.440000
|
||||
CVE-2025-24368,0,0,af7736525efcb0b21a0f340be92a27528f7606ab1a8aa5d024adf94625d201ad,2025-01-27T19:15:29.540000
|
||||
CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b686c,2025-01-27T23:15:11.310000
|
||||
CVE-2025-24370,1,1,83743ece71a996b0e21ce17e6c65dea563fc24a45ce8b656cba6b2e14f1a3850,2025-02-03T21:15:15.547000
|
||||
CVE-2025-24371,1,1,57bc93d515be16c430d092f8c15eb1e2e39f52bd4569d7d2e9ca4ba87102e539,2025-02-03T22:15:28.460000
|
||||
CVE-2025-24374,0,0,9371a32ae864472b5b2206b647349dfc1f97f02d4f3badf9a98913dbf627626c,2025-01-29T16:15:44.090000
|
||||
CVE-2025-24376,0,0,734e2f759167b0a0d3f1cd79dd5b39bd42aea80444fe016a65b89320499a50ba,2025-01-30T16:15:31.630000
|
||||
CVE-2025-24389,0,0,a01d367c2e14347969ed1e747916fa31b486bd94ca0294463ebcf2d13dad8476,2025-01-27T06:15:24.170000
|
||||
@ -279911,9 +279929,20 @@ CVE-2025-24885,0,0,0a632954017de6517b1f4086dc09ffdb61b42a67962d4ef471217a658992e
|
||||
CVE-2025-24886,0,0,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000
|
||||
CVE-2025-24891,0,0,07e08674cd8442d8685f561260fcf45fa0fd7fb9d59fcfb97bcd82467bccf06d,2025-01-31T23:15:08.457000
|
||||
CVE-2025-24898,0,0,f8bcfc2259fc3d9911e2a852f568ccc91b7d19b0d7df108faeb95d24c0f1edd6,2025-02-03T18:15:43.077000
|
||||
CVE-2025-24899,1,1,c8babf5cb0e1a1322604a66a391923a801b5adce4a2bd2bc30da99912d6f55d7,2025-02-03T21:15:15.703000
|
||||
CVE-2025-24901,1,1,85fbd99670cb7152f5a78ddd2f372641c62c288a964885088ec69ea93f6ac6c8,2025-02-03T22:15:28.590000
|
||||
CVE-2025-24902,1,1,2cc845a297fcacb3d61527c2b8b3a8f2873afb7eb26a19393c280fa4f0f5fe87,2025-02-03T22:15:28.723000
|
||||
CVE-2025-24905,1,1,535ec92bc6acb3eb33e964542acc8eac8b5c789380b95a7fcb739895115d2463,2025-02-03T22:15:28.840000
|
||||
CVE-2025-24906,1,1,b6faef0ea9b695012a554192b6a93297c54e48f40988978b0cdab94c59577d08,2025-02-03T22:15:28.963000
|
||||
CVE-2025-24957,1,1,ea9a23ee106a4b65627ac9dbe94e869d7e64f53ea3940441de0f703152984d30,2025-02-03T22:15:29.087000
|
||||
CVE-2025-24958,1,1,41151fe3d3b6ab62a73ff1092b814c4678faa886a270ab7e7037435a9a8965d7,2025-02-03T22:15:29.210000
|
||||
CVE-2025-24959,1,1,3f50c1ad5f7972062b8fc24a1fe63006f07002b7278ef49137dfcb467a189b97,2025-02-03T21:15:15.853000
|
||||
CVE-2025-24960,1,1,53a5923d99a607347416d0a9045b9aa62d1d0c885f01e9f373c8dc3c2431470d,2025-02-03T21:15:16.020000
|
||||
CVE-2025-24961,1,1,2cbff65566e3cbf13800376e9c95f30416724a925e1578b879a0d47f85d2926b,2025-02-03T21:15:16.170000
|
||||
CVE-2025-24962,1,1,cad0fbdcfb05076f806434170502dc17aca55f786aca2318dd6c83afd74eb9b8,2025-02-03T21:15:16.317000
|
||||
CVE-2025-25062,0,0,d7cd47140e90c99ff5d70fbea50bb5a39373533859e38c36979aba1d23137e6e,2025-02-03T04:15:09.587000
|
||||
CVE-2025-25063,0,0,8c34659c6a257a89c707c83868a8b18d34ee010ab7504a5a7479117985ac792f,2025-02-03T04:15:09.760000
|
||||
CVE-2025-25064,1,1,3076e4ff7637d7a7b60e69dd88ee29e96116ff1d59c408ed746bbdb8163cc047,2025-02-03T20:15:37.257000
|
||||
CVE-2025-25065,1,1,58746094964b936818741b64449bb715aafff8a3479a301f5483d466acca8651,2025-02-03T20:15:37.370000
|
||||
CVE-2025-25064,0,0,3076e4ff7637d7a7b60e69dd88ee29e96116ff1d59c408ed746bbdb8163cc047,2025-02-03T20:15:37.257000
|
||||
CVE-2025-25065,0,0,58746094964b936818741b64449bb715aafff8a3479a301f5483d466acca8651,2025-02-03T20:15:37.370000
|
||||
CVE-2025-25066,0,0,d0c17153a53bf4d9b0d515b1e1a73dc9d8d2f57a6959d34f7f617b813c748218,2025-02-03T06:15:11.373000
|
||||
CVE-2025-25181,1,1,f7b9cf7b4935e5ecbcd9854aa2796da2ee83f10476b9a7d0dba28c2d5cb813ed,2025-02-03T20:15:37.477000
|
||||
CVE-2025-25181,0,0,f7b9cf7b4935e5ecbcd9854aa2796da2ee83f10476b9a7d0dba28c2d5cb813ed,2025-02-03T20:15:37.477000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user