Auto-Update: 2025-02-03T23:00:27.599814+00:00

This commit is contained in:
cad-safe-bot 2025-02-03 23:03:54 +00:00
parent 72d21b6d1f
commit c8d7160bea
67 changed files with 3933 additions and 302 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-5872",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T00:15:08.857",
"lastModified": "2024-11-21T01:45:24.330",
"lastModified": "2025-02-03T21:15:10.410",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-89"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2012-5873",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-26T00:15:08.913",
"lastModified": "2024-11-21T01:45:24.480",
"lastModified": "2025-02-03T21:15:11.443",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -65,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-31244",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T16:15:08.990",
"lastModified": "2024-11-21T07:04:12.410",
"lastModified": "2025-02-03T21:15:11.653",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-40482",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T19:15:10.180",
"lastModified": "2024-11-21T07:21:26.683",
"lastModified": "2025-02-03T21:15:11.827",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-203"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-203"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-26841",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-04-25T13:15:10.027",
"lastModified": "2024-11-21T07:51:59.427",
"lastModified": "2025-02-03T22:15:26.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-352"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-52163",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:12.060",
"lastModified": "2025-02-03T21:15:12.060",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing",
"source": "cve@mitre.org"
},
{
"url": "https://www.txone.com/blog/digiever-fixes-sorely-needed/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2023-52164",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:12.180",
"lastModified": "2025-02-03T21:15:12.180",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "access_device.cgi on Digiever DS-2105 Pro 3.1.0.71-11 devices allows arbitrary file read. NOTE: This vulnerability only affects products that are no longer supported by the maintainer."
}
],
"metrics": {},
"references": [
{
"url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing",
"source": "cve@mitre.org"
},
{
"url": "https://www.txone.com/blog/digiever-fixes-sorely-needed/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0740",
"sourceIdentifier": "emo@eclipse.org",
"published": "2024-04-26T10:15:10.960",
"lastModified": "2024-11-21T08:47:15.553",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T21:16:40.350",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -49,24 +69,68 @@
"value": "CWE-78"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:eclipse:target_management:*:*:*:*:*:*:*:*",
"versionEndIncluding": "4.5.400",
"matchCriteriaId": "B1BE2096-F942-4F77-9758-62C18A362B55"
}
]
}
]
}
],
"references": [
{
"url": "https://git.eclipse.org/r/c/tm/org.eclipse.tm/+/202145",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Patch"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/171",
"source": "emo@eclipse.org"
"source": "emo@eclipse.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
},
{
"url": "https://git.eclipse.org/r/c/tm/org.eclipse.tm/+/202145",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://gitlab.eclipse.org/security/vulnerability-reports/-/issues/171",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25935",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-11T01:24:58.247",
"lastModified": "2024-11-21T09:01:36.420",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:58:36.570",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.2.6.0",
"matchCriteriaId": "05AE7D29-813B-4B68-A773-223DCE3571A1"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-9-broken-access-control-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/custom-registration-form-builder-with-submission-manager/wordpress-registrationmagic-plugin-5-2-5-9-broken-access-control-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2867",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:20.297",
"lastModified": "2024-11-21T09:10:42.893",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T21:31:46.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "4.15.5",
"matchCriteriaId": "DAEFAACF-4FC6-4DA3-AB61-9BC596FA132F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061186%40wp-user-avatar%2Ftrunk&old=3053353%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3061186%40wp-user-avatar%2Ftrunk&old=3053353%40wp-user-avatar%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4eb296af-547a-44aa-b804-833204b75256?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-33539",
"sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-29T06:15:08.930",
"lastModified": "2024-11-21T09:17:06.603",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:14:03.657",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,14 +71,38 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpzoom:wpzoom_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.1.36",
"matchCriteriaId": "E619FE5C-4A84-460C-9933-23D2C3B9D63C"
}
]
}
]
}
],
"references": [
{
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com"
"source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://patchstack.com/database/vulnerability/wpzoom-elementor-addons/wordpress-wpzoom-addons-for-elementor-plugin-1-1-35-cross-site-scripting-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34896",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:12.573",
"lastModified": "2025-02-03T21:15:12.573",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Nedis SmartLife Video Doorbell (WIFICDP10GY), Nedis SmartLife IOS v1.4.0 causes users who are disconnected from a previous peer-to-peer connection with the device to still have access to live video feed."
}
],
"metrics": {},
"references": [
{
"url": "http://nedis.com",
"source": "cve@mitre.org"
},
{
"url": "https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-359419",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-34897",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:12.680",
"lastModified": "2025-02-03T21:15:12.680",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nedis SmartLife android app v1.4.0 was discovered to contain an API key disclosure vulnerability."
}
],
"metrics": {},
"references": [
{
"url": "http://nedis.com",
"source": "cve@mitre.org"
},
{
"url": "https://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-359419",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-35177",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:27.600",
"lastModified": "2025-02-03T22:15:27.600",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. The wazuh-agent for Windows is vulnerable to a Local Privilege Escalation vulnerability due to improper ACL of the non-default installation directory. A local malicious user could potentially exploit this vulnerability by placing one of the many DLL that are loaded and not present on the system in the installation folder of the agent OR by replacing the service executable binary itself with a malicious one. The root cause is an improper ACL applied on the installation folder when a non-default installation path is specified (e.g,: C:\\wazuh). Many DLLs are loaded from the installation folder and by creating a malicious DLLs that exports the functions of a legit one (and that is not found on the system where the agent is installed, such as rsync.dll) it is possible to escalate privileges from a low-privileged user and obtain code execution under the context of NT AUTHORITY\\SYSTEM. This issue has been addressed in version 4.9.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-pmr2-2r83-h3cv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3544",
"sourceIdentifier": "security@progress.com",
"published": "2024-05-02T15:15:07.053",
"lastModified": "2024-11-21T09:29:50.663",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-02-03T21:38:22.117",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -49,24 +69,78 @@
"value": "CWE-798"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:lts:*:*:*",
"versionEndExcluding": "7.2.48.11",
"matchCriteriaId": "D221FAEA-7441-4868-899E-9FE12D88DD95"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ltsf:*:*:*",
"versionStartIncluding": "7.2.49.0",
"versionEndExcluding": "7.2.54.10",
"matchCriteriaId": "71C25CAF-73A9-4F9A-9914-ABCFB0C9D4BE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:progress:loadmaster:*:*:*:*:ga:*:*:*",
"versionStartIncluding": "7.2.55.0",
"versionEndExcluding": "7.2.59.4",
"matchCriteriaId": "651AEE76-E95B-4E43-86E6-190062B23FE7"
}
]
}
]
}
],
"references": [
{
"url": "https://kemptechnologies.com/",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
},
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543",
"source": "security@progress.com"
"source": "security@progress.com",
"tags": [
"Product"
]
},
{
"url": "https://kemptechnologies.com/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://support.kemptechnologies.com/hc/en-us/articles/25724813518605-ECS-Connection-Manager-Security-Vulnerabilities-CVE-2024-3544-and-CVE-2024-3543",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-40514",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T23:15:07.600",
"lastModified": "2025-01-16T23:15:07.600",
"lastModified": "2025-02-03T21:15:12.780",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " La vulnerabilidad de permisos inseguros en themesebrand Chatvia v.5.3.2 permite a un atacante remoto escalar privilegios a trav\u00e9s del nombre del perfil de usuario y las funciones de carga de im\u00e1genes."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"references": [
{
"url": "https://github.com/php-lover-boy/ChatVia",

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-44449",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:12.927",
"lastModified": "2025-02-03T21:15:12.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Cross Site Scripting vulnerability in Quorum onQ OS v.6.0.0.5.2064 allows a remote attacker to obtain sensitive information via the msg parameter in the Login page."
}
],
"metrics": {},
"references": [
{
"url": "https://quorum.com/about/",
"source": "cve@mitre.org"
},
{
"url": "https://seclists.org/fulldisclosure/2025/Jan/23",
"source": "cve@mitre.org"
},
{
"url": "http://seclists.org/fulldisclosure/2025/Jan/23",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-45331",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-16T09:15:06.500",
"lastModified": "2025-01-16T09:15:06.500",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:03:06.133",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,126 @@
},
"exploitabilityScore": 1.3,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-266"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.2.6",
"matchCriteriaId": "F07BE2AB-5F28-4773-B9C3-1D76EA1C2D06"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "E6F162A7-0D01-43E0-99D8-D7B87B080853"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.1",
"versionEndExcluding": "7.2.7",
"matchCriteriaId": "38BFF3B9-3927-4B15-A573-4EDB20362841"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.3",
"matchCriteriaId": "40C3665B-3E49-4D0C-B924-266D49F1E510"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.2.6",
"matchCriteriaId": "71CC4AA3-04CC-49CA-A012-E28C4D1F11DE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "3AE9CAFD-5D5B-4799-8690-624225963595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.1",
"versionEndExcluding": "7.2.7",
"matchCriteriaId": "75DA0ED6-C606-4763-A7B0-575F8061237A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-127",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-46450",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T22:15:39.840",
"lastModified": "2025-01-16T22:15:39.840",
"lastModified": "2025-02-03T21:15:13.043",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " El control de acceso incorrecto en el enrutador WiFi de doble banda inteligente Tenda AC1200 modelo AC6 v2.0 Firmware v15.03.06.50 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de una solicitud web manipulada espec\u00edficamente."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://pastebin.com/BXxTqsZk",

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-47770",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:27.777",
"lastModified": "2025-02-03T22:15:27.777",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Wazuh is a free and open source platform used for threat prevention, detection, and response. It is capable of protecting workloads across on-premises, virtualized, containerized, and cloud-based environments. This vulnerability occurs when the system has weak privilege access, that allows an attacker to do privilege escalation. In this case the attacker is able to view agent list on Wazuh dashboard with no privilege access. This issue has been addressed in release version 4.9.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://github.com/wazuh/wazuh/security/advisories/GHSA-648q-8m78-5cwv",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-48460",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T22:15:39.973",
"lastModified": "2025-01-16T22:15:39.973",
"lastModified": "2025-02-03T21:15:13.217",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en Eugeny Tabby 1.0.213 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del servidor y env\u00eda el nombre de usuario y la contrase\u00f1a SSH incluso cuando falla la verificaci\u00f3n de la clave del host."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://github.com/Eugeny/tabby/issues/9955",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48884",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:32.873",
"lastModified": "2025-01-16T17:15:12.310",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:18:16.507",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -51,10 +71,133 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "7.0.19",
"matchCriteriaId": "32CFAF1E-358A-4F6D-96CB-D7229F0D9D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.6",
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.5",
"matchCriteriaId": "CD60BA50-3F98-46BF-97E8-28AB207DE12A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "C0B0D078-2F52-46B4-B9C0-162447828E1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.4.10",
"matchCriteriaId": "BBF1E214-4BC5-47E8-BF02-072D6D830BAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.5",
"matchCriteriaId": "5EEE0DFA-DE31-4D26-AC98-6BCED8F008DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "CDB9CE13-AAF4-418C-BA26-1A0D53C5C1C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.10",
"matchCriteriaId": "4D7D031B-221B-4738-AC83-4FB92A106528"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-259",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48885",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-16T09:15:06.737",
"lastModified": "2025-01-16T09:15:06.737",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:11:41.750",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
@ -51,10 +71,133 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "1.0.0",
"versionEndExcluding": "7.0.19",
"matchCriteriaId": "32CFAF1E-358A-4F6D-96CB-D7229F0D9D74"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.6",
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.5",
"matchCriteriaId": "CD60BA50-3F98-46BF-97E8-28AB207DE12A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.2",
"matchCriteriaId": "C0B0D078-2F52-46B4-B9C0-162447828E1B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndIncluding": "6.4.10",
"matchCriteriaId": "BBF1E214-4BC5-47E8-BF02-072D6D830BAF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndIncluding": "7.0.5",
"matchCriteriaId": "5EEE0DFA-DE31-4D26-AC98-6BCED8F008DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "CDB9CE13-AAF4-418C-BA26-1A0D53C5C1C2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "28B43375-DA74-4C5F-BAEE-39F312EEF51F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.10",
"matchCriteriaId": "4D7D031B-221B-4738-AC83-4FB92A106528"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-259",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48886",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.027",
"lastModified": "2025-01-14T14:15:33.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:16:04.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,161 @@
},
"exploitabilityScore": 2.2,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1390"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "EF81840B-F269-4B40-8014-D4B18A2A016F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "DC9AD7A8-B390-4037-872B-02E1BEEDEC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "6EA0888C-2D95-46ED-9BA9-F99072C02FE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.15",
"matchCriteriaId": "60E6EA0C-12E8-4EA7-901C-BEDE07BC88DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.18",
"matchCriteriaId": "D273F0B5-A9F3-460B-8E96-7BEB816A91D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.11",
"matchCriteriaId": "77A6D950-F8AE-4E12-9D43-C49BFE03B3D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "6794E3E0-7FC3-40D8-9568-20E6878E3EDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-221",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48890",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.187",
"lastModified": "2025-01-14T14:15:33.187",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:13:42.850",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisoar_imap_connector:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.5.8",
"matchCriteriaId": "81F7D35F-38C7-4C7A-9038-58819B10D19C"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-415",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-48893",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.333",
"lastModified": "2025-01-14T14:15:33.333",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:12:20.713",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.1",
"versionEndIncluding": "7.3.3",
"matchCriteriaId": "9FC79454-2365-43A2-B27F-BF007CD41981"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-405",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50563",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-16T10:15:09.480",
"lastModified": "2025-01-16T10:15:09.480",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:54:17.977",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,162 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1390"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "EF81840B-F269-4B40-8014-D4B18A2A016F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "DC9AD7A8-B390-4037-872B-02E1BEEDEC6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortianalyzer_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "6EA0888C-2D95-46ED-9BA9-F99072C02FE6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "7269FDB6-A1D4-4912-8751-87BA52614FDA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.1",
"versionEndExcluding": "7.4.4",
"matchCriteriaId": "164DEDC3-B1C0-42AC-9ADB-CE03CF6A71CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "2.0.0",
"versionEndExcluding": "2.0.15",
"matchCriteriaId": "60E6EA0C-12E8-4EA7-901C-BEDE07BC88DA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.18",
"matchCriteriaId": "D273F0B5-A9F3-460B-8E96-7BEB816A91D9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.11",
"matchCriteriaId": "77A6D950-F8AE-4E12-9D43-C49BFE03B3D4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "6794E3E0-7FC3-40D8-9568-20E6878E3EDB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-221",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Mitigation",
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50564",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.490",
"lastModified": "2025-01-14T14:15:33.490",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:11:08.317",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,77 @@
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-321"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:windows:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.4.1",
"matchCriteriaId": "6089DAFE-EBC1-4082-BBFE-72D88B53A430"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-216",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-50566",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.650",
"lastModified": "2025-01-14T14:15:33.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:09:31.510",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,10 +71,67 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.1",
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "CBA16B3B-9767-4B61-BA35-2DDF70D66D09"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.6",
"matchCriteriaId": "24796E3A-DDCB-4949-9080-5DCEEECF0B6C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "241A8930-4ADA-4380-AA42-F10B28487595"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.2",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "57B085BA-AF25-4EE9-8EC6-BD588F3C90CF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "9FBDCAD3-019A-4F46-AB5D-448E525E4E94"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.6.0",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "3C4D647A-5EA1-4047-9E59-987FC8A74F0B"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-463",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52963",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.807",
"lastModified": "2025-01-14T14:15:33.807",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:56:00.043",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 3.6
}
]
},
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.6.1",
"matchCriteriaId": "84DD8626-BB61-4F9E-A339-DBEE0D071347"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-373",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52967",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:33.967",
"lastModified": "2025-01-14T14:15:33.967",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T21:59:09.277",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,77 @@
},
"exploitabilityScore": 0.9,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-80"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.0.0",
"versionEndExcluding": "6.0.15",
"matchCriteriaId": "9CE5BD60-C70A-492C-BC35-5F568A4F180D"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-211",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-52969",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:34.123",
"lastModified": "2025-01-14T14:15:34.123",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:01:44.330",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndIncluding": "7.1.7",
"matchCriteriaId": "212DD268-6A3F-4F12-A935-D6BA7B5DD4F1"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-417",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53320",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-31T16:15:34.883",
"lastModified": "2025-01-31T16:15:34.883",
"vulnStatus": "Received",
"lastModified": "2025-02-03T21:15:13.373",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Qualisys C++ SDK commit a32a21a was discovered to contain multiple stack buffer overflows via the GetCurrentFrame, SaveCapture, and LoadProject functions."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Qualisys C++ SDK commit a32a21a conten\u00eda m\u00faltiples desbordamientos de b\u00fafer de pila a trav\u00e9s de las funciones GetCurrentFrame, SaveCapture y LoadProject."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qualisys/qualisys_cpp_sdk/issues/47",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-53354",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-31T22:15:09.340",
"lastModified": "2025-01-31T22:15:09.340",
"vulnStatus": "Received",
"lastModified": "2025-02-03T21:15:13.520",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "EasyVirt DCScope <=8.6.0 and CO2Scope <=1.3.0 are vulnerable to SQL Injection."
},
{
"lang": "es",
"value": "EasyVirt DCScope &lt;=8.6.0 y CO2Scope &lt;=1.3.0 son vulnerables a la inyecci\u00f3n SQL."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Elymaro/CVE/blob/main/EasyVirt/CVE-2024-53354.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-53553",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T23:15:07.700",
"lastModified": "2025-01-16T23:15:07.700",
"lastModified": "2025-02-03T21:15:13.667",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Un problema en OPEXUS FOIAXPRESS PUBLIC ACCESS LINK v11.1.0 permite a los atacantes omitir la autenticaci\u00f3n a trav\u00e9s de solicitudes web manipuladas."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"references": [
{
"url": "https://github.com/Turbul3nce/Vulnerability.Research/tree/main/CVE-2024-53553",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54021",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:34.287",
"lastModified": "2025-01-14T14:15:34.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:04:26.590",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,103 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@fortinet.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-113"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.12",
"matchCriteriaId": "C8B93C73-1E94-4854-8405-C3689860A74C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.6",
"matchCriteriaId": "5B276403-CE85-445A-9E5D-BBFBD7AB7A68"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.9",
"matchCriteriaId": "678EB0FA-2B29-4108-8378-C4803A543193"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.5",
"matchCriteriaId": "A71AD879-997D-4787-A1E9-E4132AC521E2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "44CE8EE3-D64A-49C8-87D7-C18B302F864A"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-282",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-54660",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T22:15:40.200",
"lastModified": "2025-01-16T22:15:40.200",
"lastModified": "2025-02-03T21:15:13.873",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Se descubri\u00f3 un problema de inyecci\u00f3n JNDI en Cloudera JDBC Connector para Hive antes de la versi\u00f3n 2.6.26 y JDBC Connector para Impala antes de la versi\u00f3n 2.6.35. Los atacantes pueden inyectar par\u00e1metros maliciosos en la URL de JDBC, lo que activa la inyecci\u00f3n JNDI durante el proceso cuando el controlador JDBC usa esta URL para conectarse a la base de datos. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. La inyecci\u00f3n JNDI es posible a trav\u00e9s de la propiedad de conexi\u00f3n JDBC krbJAASFile para el Servicio de autenticaci\u00f3n y autorizaci\u00f3n de Java (JAAS). El uso de par\u00e1metros no confiables en krbJAASFile o en el host remoto puede activar la inyecci\u00f3n JNDI en la URL de JDBC a trav\u00e9s de krbJAASFile."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://www.blackhat.com/eu-24/briefings/schedule/index.html#a-novel-attack-surface-java-authentication-and-authorization-service-jaas-42179",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-55593",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-01-14T14:15:34.610",
"lastModified": "2025-01-14T14:15:34.610",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-02-03T22:06:19.163",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
@ -51,10 +71,32 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.3.6",
"versionEndExcluding": "7.6.2",
"matchCriteriaId": "D1A4D0B4-27A6-4DD1-9E01-F0927EFC4ED4"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.fortinet.com/psirt/FG-IR-24-465",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56898",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.047",
"lastModified": "2025-02-03T21:15:14.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in Geovision GV-ASWeb version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to manage and create new user accounts via supplying a crafted HTTP request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56898",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56901",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.157",
"lastModified": "2025-02-03T21:15:14.157",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in the Account Management component of Geovision GV-ASWeb version 6.1.1.0 or less allows attackers to arbitrarily create Admin accounts via a crafted GET request method."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56901",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56902",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.270",
"lastModified": "2025-02-03T21:15:14.270",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in Geovision GV-ASWeb with version 6.1.0.0 or less allows unauthorized attackers with low-level privileges to be able to request information about other accounts via a crafted HTTP request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56902",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-56903",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.357",
"lastModified": "2025-02-03T21:15:14.357",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Request Forgery (CSRF) in Geovision GV-ASWeb with the version 6.1.1.0 or less allows attackers to execute arbitrary operations via supplying a crafted HTTP request."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/DRAGOWN/CVE-2024-56903",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-57097",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T20:15:33.897",
"lastModified": "2025-02-03T20:15:33.897",
"vulnStatus": "Received",
"lastModified": "2025-02-03T21:15:14.450",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,50 @@
"value": "ClassCMS 4.8 is vulnerable to Cross Site Scripting (XSS) in class/admin/channel.php."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/ClassCMS/ClassCMS/issues/5",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/ClassCMS/ClassCMS/issues/5",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2024-57434",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-31T22:15:12.613",
"lastModified": "2025-01-31T22:15:12.613",
"vulnStatus": "Received",
"lastModified": "2025-02-03T21:15:14.600",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "macrozheng mall-tiny 1.0.1 is vulnerable to Incorrect Access Control. The project imports users by default, and the test user is made a super administrator."
},
{
"lang": "es",
"value": "Macrozheng Mall-Tiny 1.0.1 es vulnerable a un control de acceso incorrecto. El proyecto importa usuarios de forma predeterminada y el usuario de prueba se convierte en superadministrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_weak_password/mall_tiny_weak_password.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,20 +2,63 @@
"id": "CVE-2024-57435",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-31T22:15:13.103",
"lastModified": "2025-01-31T22:15:13.103",
"vulnStatus": "Received",
"lastModified": "2025-02-03T21:15:14.747",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In macrozheng mall-tiny 1.0.1, an attacker can send null data through the resource creation interface resulting in a null pointer dereference occurring in all subsequent operations that require authentication, which triggers a denial-of-service attack and service restart failure."
},
{
"lang": "es",
"value": "En macrozheng mall-tiny 1.0.1, un atacante puede enviar datos nulos a trav\u00e9s de la interfaz de creaci\u00f3n de recursos, lo que da como resultado una desreferencia de puntero nulo en todas las operaciones posteriores que requieren autenticaci\u00f3n, lo que desencadena un ataque de denegaci\u00f3n de servicio y una falla de reinicio del servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/peccc/restful_vul/blob/main/mall_tiny_dos/mall_tiny_dos.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-57451",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:14.893",
"lastModified": "2025-02-03T21:15:14.893",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ChestnutCMS <=1.5.0 has a directory traversal vulnerability in contentcore.controller.FileController#getFileList, which allows attackers to view any directory."
}
],
"metrics": {},
"references": [
{
"url": "https://locrian-lightning-dc7.notion.site/Directory-traversal-1628e5e2b1a280fdb463c2235acc7f75",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57704",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T23:15:08.113",
"lastModified": "2025-01-16T23:15:08.113",
"lastModified": "2025-02-03T21:15:14.990",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Tenda AC8v4 V16.03.34.06 tiene una vulnerabilidad de desbordamiento de pila. La funci\u00f3n setSchedWifi del archivo /goform/openSchedWifi se ve afectada por esta vulnerabilidad. La manipulaci\u00f3n del argumento schedStartTime provoca un desbordamiento del b\u00fafer basado en la pila."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://github.com/Pr0b1em/IoT/blob/master/Tenda%20AC8v4%20V16.03.34.06.md",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-57784",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T23:15:08.213",
"lastModified": "2025-01-16T23:15:08.213",
"lastModified": "2025-02-03T21:15:15.133",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": " Un problema en el componente /php/script_uploads.php de Zenitel AlphaWeb XE v11.2.3.10 permite a los atacantes ejecutar directory traversal."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 4.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://gist.github.com/s4fv4n/8cc4e4cb6fd028e803898837b73aa342",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-22129",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.040",
"lastModified": "2025-02-03T22:15:28.040",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. In affected versions an unauthorized user might get access to restricted information. This issue has been addressed in Tuleap Community Edition 16.3.99.1736242932, Tuleap Enterprise Edition 16.2-5, and Tuleap Enterprise Edition 16.3-2. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-f34g-wc2m-mf76",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=3edf8158ba40be66f0b661888b8b2805784795d1",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=41434",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-22918",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-03T21:15:15.400",
"lastModified": "2025-02-03T21:15:15.400",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Polycom RealPresence Group 500 <=20 has Insecure Permissions due to automatically loaded cookies. This allows for the use of administrator functions, resulting in the leakage of sensitive user information."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MinggongKs/Polycom/blob/main/README.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-23210",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.187",
"lastModified": "2025-02-03T22:15:28.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "phpoffice/phpspreadsheet is a pure PHP library for reading and writing spreadsheet files. Affected versions have been found to have a Bypass of the Cross-site Scripting (XSS) sanitizer using the javascript protocol and special characters. This issue has been addressed in versions 3.9.0, 2.3.7, 2.1.8, and 1.29.9. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/cde2926a9e2baf146783f8fd1771bbed7d1dc7b3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-r57h-547h-w24f",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-24029",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.320",
"lastModified": "2025-02-03T22:15:28.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tuleap is an Open Source Suite to improve management of software developments and collaboration. Users (possibly anonymous ones if the widget is used in the dashboard of a public project) might get access to artifacts they should not see. This issue has been addressed in Tuleap Community Edition 16.3.99.1737562605 as well as Tuleap Enterprise Edition 16.3-5 and Tuleap Enterprise Edition 16.2-7. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-280"
}
]
}
],
"references": [
{
"url": "https://github.com/Enalean/tuleap/security/advisories/GHSA-hq46-63pc-xfv9",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=269cbaa73bac6d1c50674c48c9987263f2b38804",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/git/tuleap/tuleap/stable?a=commit&h=a97480f951351c0f8f2f3f27f7daa3f7f9c37c75",
"source": "security-advisories@github.com"
},
{
"url": "https://tuleap.net/plugins/tracker/?aid=41476",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-24370",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:15.547",
"lastModified": "2025-02-03T21:15:15.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Django-Unicorn adds modern reactive component functionality to Django templates. Affected versions of Django-Unicorn are vulnerable to python class pollution vulnerability. The vulnerability arises from the core functionality `set_property_value`, which can be remotely triggered by users by crafting appropriate component requests and feeding in values of second and third parameter to the vulnerable function, leading to arbitrary changes to the python runtime status. With this finding at least five ways of vulnerability exploitation have been observed, stably resulting in Cross-Site Scripting (XSS), Denial of Service (DoS), and Authentication Bypass attacks in almost every Django-Unicorn-based application. This issue has been addressed in version 0.62.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-915"
}
]
}
],
"references": [
{
"url": "https://github.com/adamghill/django-unicorn/commit/17614200f27174f789d4af54cc3a1f2b0df7870c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/adamghill/django-unicorn/security/advisories/GHSA-g9wf-5777-gq43",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-24371",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.460",
"lastModified": "2025-02-03T22:15:28.460",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CometBFT is a distributed, Byzantine fault-tolerant, deterministic state machine replication engine. In the `blocksync` protocol peers send their `base` and `latest` heights when they connect to a new node (`A`), which is syncing to the tip of a network. `base` acts as a lower ground and informs `A` that the peer only has blocks starting from height `base`. `latest` height informs `A` about the latest block in a network. Normally, nodes would only report increasing heights. If `B` fails to provide the latest block, `B` is removed and the `latest` height (target height) is recalculated based on other nodes `latest` heights. The existing code however doesn't check for the case where `B` first reports `latest` height `X` and immediately after height `Y`, where `X > Y`. `A` will be trying to catch up to 2000 indefinitely. This condition requires the introduction of malicious code in the full node first reporting some non-existing `latest` height, then reporting lower `latest` height and nodes which are syncing using `blocksync` protocol. This issue has been patched in versions 1.0.1 and 0.38.17 and all users are advised to upgrade. Operators may attempt to ban malicious peers from the network as a workaround."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-703"
}
]
}
],
"references": [
{
"url": "https://github.com/cometbft/cometbft/releases/tag/v0.38.17",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cometbft/cometbft/releases/tag/v1.0.1",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/cometbft/cometbft/security/advisories/GHSA-22qq-3xwm-r5x4",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-24899",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:15.703",
"lastModified": "2025-02-03T21:15:15.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "reNgine is an automated reconnaissance framework for web applications. A vulnerability was discovered in reNgine, where **an insider attacker with any role** (such as Auditor, Penetration Tester, or Sys Admin) **can extract sensitive information from other reNgine users.** After running a scan and obtaining vulnerabilities from a target, the attacker can retrieve details such as `username`, `password`, `email`, `role`, `first name`, `last name`, `status`, and `activity information` by making a GET request to `/api/listVulnerability/`. This issue has been addressed in version 2.2.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/yogeshojha/rengine/commit/a658b8519f1a3347634b04733cf91ed933af1f99",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-r3fp-xr9f-wv38",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24901",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.590",
"lastModified": "2025-02-03T22:15:28.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `deletar_permissao.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jp48-94wm-3gmc",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24902",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.723",
"lastModified": "2025-02-03T22:15:28.723",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_cargo.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-pg73-w9vx-8mgp",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24905",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.840",
"lastModified": "2025-02-03T22:15:28.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_codigobarras_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-qjc6-5qv6-fr8m",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24906",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:28.963",
"lastModified": "2025-02-03T22:15:28.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_cobranca.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-jpph-g9p7-9jrm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24957",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:29.087",
"lastModified": "2025-02-03T22:15:29.087",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `get_detalhes_socio.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-x28g-6228-99p9",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-24958",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T22:15:29.210",
"lastModified": "2025-02-03T22:15:29.210",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "WeGIA is a Web Manager for Charitable Institutions. A SQL Injection vulnerability was discovered in the WeGIA application, `salvar_tag.php` endpoint. This vulnerability could allow an authorized attacker to execute arbitrary SQL queries, allowing access to or deletion of sensitive information. This issue has been addressed in version 3.2.12 and all users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-2mhx-5998-46hx",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-24959",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:15.853",
"lastModified": "2025-02-03T21:15:15.853",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "zx is a tool for writing better scripts. An attacker with control over environment variable values can inject unintended environment variables into `process.env`. This can lead to arbitrary command execution or unexpected behavior in applications that rely on environment variables for security-sensitive operations. Applications that process untrusted input and pass it through `dotenv.stringify` are particularly vulnerable. This issue has been patched in version 8.3.2. Users should immediately upgrade to this version to mitigate the vulnerability. If upgrading is not feasible, users can mitigate the vulnerability by sanitizing user-controlled environment variable values before passing them to `dotenv.stringify`. Specifically, avoid using `\"`, `'`, and backticks in values, or enforce strict validation of environment variables before usage."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 1.0,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/google/zx/pull/1094",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/google/zx/security/advisories/GHSA-qwp8-x4ff-5h87",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-24960",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:16.020",
"lastModified": "2025-02-03T21:15:16.020",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Jellystat is a free and open source Statistics App for Jellyfin. In affected versions Jellystat is directly using a user input in the route(s). This can lead to Path Traversal Vulnerabilities. Since this functionality is only for admin(s), there is very little scope for abuse. However, the `DELETE` `files/:filename` can be used to delete any file. This issue has been addressed in version 1.1.3. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://cwe.mitre.org/data/definitions/22.html",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/CyferShepard/Jellystat/pull/303",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/CyferShepard/Jellystat/security/advisories/GHSA-6x46-6w9f-ffv6",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-24961",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:16.170",
"lastModified": "2025-02-03T21:15:16.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "org.gaul S3Proxy implements the S3 API and proxies requests. Users of the filesystem and filesystem-nio2 storage backends could unintentionally expose local files to users. This issue has been addressed in version 2.6.0. Users are advised to upgrade. There are no known workarounds for this vulnerability."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/apache/jclouds/commit/b0819e0ef5e08c792a4d1724b938714ce9503aa3",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gaul/s3proxy/commit/86b6ee4749aa163a78e7898efc063617ed171980",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/gaul/s3proxy/security/advisories/GHSA-2ccp-vqmv-4r4x",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-24962",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-02-03T21:15:16.317",
"lastModified": "2025-02-03T21:15:16.317",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "reNgine is an automated reconnaissance framework for web applications. In affected versions a user can inject commands via the nmap_cmd parameters. This issue has been addressed in commit `c28e5c8d` and is expected in the next versioned release. Users are advised to filter user input and monitor the project for a new release."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
}
]
}
],
"references": [
{
"url": "https://github.com/yogeshojha/rengine/commit/c28e5c8d304478a787811580b4d80b330920ace4",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/yogeshojha/rengine/security/advisories/GHSA-cg75-ph7x-5rr9",
"source": "security-advisories@github.com"
}
]
}

109
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-02-03T21:00:31.907943+00:00
2025-02-03T23:00:27.599814+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-02-03T20:55:26.147000+00:00
2025-02-03T22:18:16.507000+00:00
```
### Last Data Feed Release
@ -33,68 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279918
279947
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `29`
- [CVE-2024-11132](CVE-2024/CVE-2024-111xx/CVE-2024-11132.json) (`2025-02-03T20:15:32.047`)
- [CVE-2024-11133](CVE-2024/CVE-2024-111xx/CVE-2024-11133.json) (`2025-02-03T20:15:32.203`)
- [CVE-2024-11134](CVE-2024/CVE-2024-111xx/CVE-2024-11134.json) (`2025-02-03T20:15:32.373`)
- [CVE-2024-12510](CVE-2024/CVE-2024-125xx/CVE-2024-12510.json) (`2025-02-03T19:15:11.827`)
- [CVE-2024-12511](CVE-2024/CVE-2024-125xx/CVE-2024-12511.json) (`2025-02-03T20:15:32.797`)
- [CVE-2024-12859](CVE-2024/CVE-2024-128xx/CVE-2024-12859.json) (`2025-02-03T20:15:32.940`)
- [CVE-2024-50656](CVE-2024/CVE-2024-506xx/CVE-2024-50656.json) (`2025-02-03T19:15:12.370`)
- [CVE-2024-56921](CVE-2024/CVE-2024-569xx/CVE-2024-56921.json) (`2025-02-03T20:15:33.610`)
- [CVE-2024-56946](CVE-2024/CVE-2024-569xx/CVE-2024-56946.json) (`2025-02-03T20:15:33.743`)
- [CVE-2024-57004](CVE-2024/CVE-2024-570xx/CVE-2024-57004.json) (`2025-02-03T19:15:12.777`)
- [CVE-2024-57097](CVE-2024/CVE-2024-570xx/CVE-2024-57097.json) (`2025-02-03T20:15:33.897`)
- [CVE-2024-57098](CVE-2024/CVE-2024-570xx/CVE-2024-57098.json) (`2025-02-03T20:15:34.013`)
- [CVE-2024-57099](CVE-2024/CVE-2024-570xx/CVE-2024-57099.json) (`2025-02-03T20:15:34.157`)
- [CVE-2024-57237](CVE-2024/CVE-2024-572xx/CVE-2024-57237.json) (`2025-02-03T19:15:13.053`)
- [CVE-2024-57238](CVE-2024/CVE-2024-572xx/CVE-2024-57238.json) (`2025-02-03T19:15:13.177`)
- [CVE-2024-57450](CVE-2024/CVE-2024-574xx/CVE-2024-57450.json) (`2025-02-03T20:15:34.253`)
- [CVE-2024-57452](CVE-2024/CVE-2024-574xx/CVE-2024-57452.json) (`2025-02-03T20:15:34.373`)
- [CVE-2024-57498](CVE-2024/CVE-2024-574xx/CVE-2024-57498.json) (`2025-02-03T20:15:34.477`)
- [CVE-2024-57669](CVE-2024/CVE-2024-576xx/CVE-2024-57669.json) (`2025-02-03T20:15:34.960`)
- [CVE-2024-57968](CVE-2024/CVE-2024-579xx/CVE-2024-57968.json) (`2025-02-03T20:15:36.550`)
- [CVE-2025-22978](CVE-2025/CVE-2025-229xx/CVE-2025-22978.json) (`2025-02-03T20:15:36.720`)
- [CVE-2025-25064](CVE-2025/CVE-2025-250xx/CVE-2025-25064.json) (`2025-02-03T20:15:37.257`)
- [CVE-2025-25065](CVE-2025/CVE-2025-250xx/CVE-2025-25065.json) (`2025-02-03T20:15:37.370`)
- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-02-03T20:15:37.477`)
- [CVE-2024-35177](CVE-2024/CVE-2024-351xx/CVE-2024-35177.json) (`2025-02-03T22:15:27.600`)
- [CVE-2024-44449](CVE-2024/CVE-2024-444xx/CVE-2024-44449.json) (`2025-02-03T21:15:12.927`)
- [CVE-2024-47770](CVE-2024/CVE-2024-477xx/CVE-2024-47770.json) (`2025-02-03T22:15:27.777`)
- [CVE-2024-56898](CVE-2024/CVE-2024-568xx/CVE-2024-56898.json) (`2025-02-03T21:15:14.047`)
- [CVE-2024-56901](CVE-2024/CVE-2024-569xx/CVE-2024-56901.json) (`2025-02-03T21:15:14.157`)
- [CVE-2024-56902](CVE-2024/CVE-2024-569xx/CVE-2024-56902.json) (`2025-02-03T21:15:14.270`)
- [CVE-2024-56903](CVE-2024/CVE-2024-569xx/CVE-2024-56903.json) (`2025-02-03T21:15:14.357`)
- [CVE-2024-57451](CVE-2024/CVE-2024-574xx/CVE-2024-57451.json) (`2025-02-03T21:15:14.893`)
- [CVE-2025-22129](CVE-2025/CVE-2025-221xx/CVE-2025-22129.json) (`2025-02-03T22:15:28.040`)
- [CVE-2025-22918](CVE-2025/CVE-2025-229xx/CVE-2025-22918.json) (`2025-02-03T21:15:15.400`)
- [CVE-2025-23210](CVE-2025/CVE-2025-232xx/CVE-2025-23210.json) (`2025-02-03T22:15:28.187`)
- [CVE-2025-24029](CVE-2025/CVE-2025-240xx/CVE-2025-24029.json) (`2025-02-03T22:15:28.320`)
- [CVE-2025-24370](CVE-2025/CVE-2025-243xx/CVE-2025-24370.json) (`2025-02-03T21:15:15.547`)
- [CVE-2025-24371](CVE-2025/CVE-2025-243xx/CVE-2025-24371.json) (`2025-02-03T22:15:28.460`)
- [CVE-2025-24899](CVE-2025/CVE-2025-248xx/CVE-2025-24899.json) (`2025-02-03T21:15:15.703`)
- [CVE-2025-24901](CVE-2025/CVE-2025-249xx/CVE-2025-24901.json) (`2025-02-03T22:15:28.590`)
- [CVE-2025-24902](CVE-2025/CVE-2025-249xx/CVE-2025-24902.json) (`2025-02-03T22:15:28.723`)
- [CVE-2025-24905](CVE-2025/CVE-2025-249xx/CVE-2025-24905.json) (`2025-02-03T22:15:28.840`)
- [CVE-2025-24906](CVE-2025/CVE-2025-249xx/CVE-2025-24906.json) (`2025-02-03T22:15:28.963`)
- [CVE-2025-24957](CVE-2025/CVE-2025-249xx/CVE-2025-24957.json) (`2025-02-03T22:15:29.087`)
- [CVE-2025-24958](CVE-2025/CVE-2025-249xx/CVE-2025-24958.json) (`2025-02-03T22:15:29.210`)
- [CVE-2025-24959](CVE-2025/CVE-2025-249xx/CVE-2025-24959.json) (`2025-02-03T21:15:15.853`)
- [CVE-2025-24960](CVE-2025/CVE-2025-249xx/CVE-2025-24960.json) (`2025-02-03T21:15:16.020`)
- [CVE-2025-24961](CVE-2025/CVE-2025-249xx/CVE-2025-24961.json) (`2025-02-03T21:15:16.170`)
- [CVE-2025-24962](CVE-2025/CVE-2025-249xx/CVE-2025-24962.json) (`2025-02-03T21:15:16.317`)
### CVEs modified in the last Commit
Recently modified CVEs: `81`
Recently modified CVEs: `36`
- [CVE-2024-57665](CVE-2024/CVE-2024-576xx/CVE-2024-57665.json) (`2025-02-03T20:15:34.787`)
- [CVE-2024-57676](CVE-2024/CVE-2024-576xx/CVE-2024-57676.json) (`2025-02-03T20:15:35.083`)
- [CVE-2024-57677](CVE-2024/CVE-2024-576xx/CVE-2024-57677.json) (`2025-02-03T20:15:35.260`)
- [CVE-2024-57678](CVE-2024/CVE-2024-576xx/CVE-2024-57678.json) (`2025-02-03T20:15:35.427`)
- [CVE-2024-57679](CVE-2024/CVE-2024-576xx/CVE-2024-57679.json) (`2025-02-03T20:15:35.577`)
- [CVE-2024-57680](CVE-2024/CVE-2024-576xx/CVE-2024-57680.json) (`2025-02-03T20:15:35.740`)
- [CVE-2024-57681](CVE-2024/CVE-2024-576xx/CVE-2024-57681.json) (`2025-02-03T20:15:35.907`)
- [CVE-2024-57682](CVE-2024/CVE-2024-576xx/CVE-2024-57682.json) (`2025-02-03T20:15:36.063`)
- [CVE-2024-57683](CVE-2024/CVE-2024-576xx/CVE-2024-57683.json) (`2025-02-03T20:15:36.223`)
- [CVE-2024-57776](CVE-2024/CVE-2024-577xx/CVE-2024-57776.json) (`2025-02-03T20:15:36.390`)
- [CVE-2024-8798](CVE-2024/CVE-2024-87xx/CVE-2024-8798.json) (`2025-02-03T20:13:18.163`)
- [CVE-2025-0437](CVE-2025/CVE-2025-04xx/CVE-2025-0437.json) (`2025-02-03T19:15:13.967`)
- [CVE-2025-20635](CVE-2025/CVE-2025-206xx/CVE-2025-20635.json) (`2025-02-03T19:31:24.417`)
- [CVE-2025-20636](CVE-2025/CVE-2025-206xx/CVE-2025-20636.json) (`2025-02-03T19:39:49.587`)
- [CVE-2025-20638](CVE-2025/CVE-2025-206xx/CVE-2025-20638.json) (`2025-02-03T19:40:23.927`)
- [CVE-2025-21665](CVE-2025/CVE-2025-216xx/CVE-2025-21665.json) (`2025-02-03T19:57:54.933`)
- [CVE-2025-21666](CVE-2025/CVE-2025-216xx/CVE-2025-21666.json) (`2025-02-03T19:59:37.907`)
- [CVE-2025-21667](CVE-2025/CVE-2025-216xx/CVE-2025-21667.json) (`2025-02-03T20:00:28.727`)
- [CVE-2025-21672](CVE-2025/CVE-2025-216xx/CVE-2025-21672.json) (`2025-02-03T20:04:22.147`)
- [CVE-2025-21683](CVE-2025/CVE-2025-216xx/CVE-2025-21683.json) (`2025-02-03T20:01:29.163`)
- [CVE-2025-22964](CVE-2025/CVE-2025-229xx/CVE-2025-22964.json) (`2025-02-03T19:15:14.207`)
- [CVE-2025-22976](CVE-2025/CVE-2025-229xx/CVE-2025-22976.json) (`2025-02-03T19:15:14.397`)
- [CVE-2025-23011](CVE-2025/CVE-2025-230xx/CVE-2025-23011.json) (`2025-02-03T20:15:36.823`)
- [CVE-2025-23012](CVE-2025/CVE-2025-230xx/CVE-2025-23012.json) (`2025-02-03T20:15:36.977`)
- [CVE-2025-24140](CVE-2025/CVE-2025-241xx/CVE-2025-24140.json) (`2025-02-03T20:15:37.090`)
- [CVE-2024-45331](CVE-2024/CVE-2024-453xx/CVE-2024-45331.json) (`2025-02-03T21:03:06.133`)
- [CVE-2024-46450](CVE-2024/CVE-2024-464xx/CVE-2024-46450.json) (`2025-02-03T21:15:13.043`)
- [CVE-2024-48460](CVE-2024/CVE-2024-484xx/CVE-2024-48460.json) (`2025-02-03T21:15:13.217`)
- [CVE-2024-48884](CVE-2024/CVE-2024-488xx/CVE-2024-48884.json) (`2025-02-03T22:18:16.507`)
- [CVE-2024-48885](CVE-2024/CVE-2024-488xx/CVE-2024-48885.json) (`2025-02-03T21:11:41.750`)
- [CVE-2024-48886](CVE-2024/CVE-2024-488xx/CVE-2024-48886.json) (`2025-02-03T22:16:04.733`)
- [CVE-2024-48890](CVE-2024/CVE-2024-488xx/CVE-2024-48890.json) (`2025-02-03T22:13:42.850`)
- [CVE-2024-48893](CVE-2024/CVE-2024-488xx/CVE-2024-48893.json) (`2025-02-03T22:12:20.713`)
- [CVE-2024-50563](CVE-2024/CVE-2024-505xx/CVE-2024-50563.json) (`2025-02-03T21:54:17.977`)
- [CVE-2024-50564](CVE-2024/CVE-2024-505xx/CVE-2024-50564.json) (`2025-02-03T22:11:08.317`)
- [CVE-2024-50566](CVE-2024/CVE-2024-505xx/CVE-2024-50566.json) (`2025-02-03T22:09:31.510`)
- [CVE-2024-52963](CVE-2024/CVE-2024-529xx/CVE-2024-52963.json) (`2025-02-03T21:56:00.043`)
- [CVE-2024-52967](CVE-2024/CVE-2024-529xx/CVE-2024-52967.json) (`2025-02-03T21:59:09.277`)
- [CVE-2024-52969](CVE-2024/CVE-2024-529xx/CVE-2024-52969.json) (`2025-02-03T22:01:44.330`)
- [CVE-2024-53320](CVE-2024/CVE-2024-533xx/CVE-2024-53320.json) (`2025-02-03T21:15:13.373`)
- [CVE-2024-53354](CVE-2024/CVE-2024-533xx/CVE-2024-53354.json) (`2025-02-03T21:15:13.520`)
- [CVE-2024-53553](CVE-2024/CVE-2024-535xx/CVE-2024-53553.json) (`2025-02-03T21:15:13.667`)
- [CVE-2024-54021](CVE-2024/CVE-2024-540xx/CVE-2024-54021.json) (`2025-02-03T22:04:26.590`)
- [CVE-2024-54660](CVE-2024/CVE-2024-546xx/CVE-2024-54660.json) (`2025-02-03T21:15:13.873`)
- [CVE-2024-55593](CVE-2024/CVE-2024-555xx/CVE-2024-55593.json) (`2025-02-03T22:06:19.163`)
- [CVE-2024-57097](CVE-2024/CVE-2024-570xx/CVE-2024-57097.json) (`2025-02-03T21:15:14.450`)
- [CVE-2024-57434](CVE-2024/CVE-2024-574xx/CVE-2024-57434.json) (`2025-02-03T21:15:14.600`)
- [CVE-2024-57435](CVE-2024/CVE-2024-574xx/CVE-2024-57435.json) (`2025-02-03T21:15:14.747`)
- [CVE-2024-57704](CVE-2024/CVE-2024-577xx/CVE-2024-57704.json) (`2025-02-03T21:15:14.990`)
- [CVE-2024-57784](CVE-2024/CVE-2024-577xx/CVE-2024-57784.json) (`2025-02-03T21:15:15.133`)
## Download and Usage

View File

@ -56994,8 +56994,8 @@ CVE-2012-5865,0,0,e7273473923d06142c8869f1336b248828a959eb51799f032b3ec387b3f720
CVE-2012-5866,0,0,92633694169307fcf435b5acb2b91490c7a52bbc0e90d1ba10cf6ef932e7990e,2024-11-21T01:45:23.880000
CVE-2012-5867,0,0,b4eeb23ac594ce781f99466fc914490b7be45508d175e43621f7b3b0e0cb25d5,2024-11-21T01:45:24.047000
CVE-2012-5868,0,0,66aa23a04d8110fbede33f8f38e2013c9e85e41f91627e773d1a21b549168ba3,2024-11-21T01:45:24.193000
CVE-2012-5872,0,0,fc619c8eba5c3275d25cf62f707a9ba274e2314afaf77db94b5ec6647f5ad134,2024-11-21T01:45:24.330000
CVE-2012-5873,0,0,adc404dc6978de6fdf7d7253e9d40d3b95d4d5556d827897838253c5082b224c,2024-11-21T01:45:24.480000
CVE-2012-5872,0,1,8c737dde4cb6de273c8c1e4394bdf0bfd0f35ea780a2526dd275f877686aa8e8,2025-02-03T21:15:10.410000
CVE-2012-5873,0,1,2f1691f043f9f2a58ed01c11ba5a3796edbe901299b6d12e7b4ef48649de945f,2025-02-03T21:15:11.443000
CVE-2012-5874,0,0,e134fcf69f54bf4ff765053ed80812b29cce8b897696f43b7aa7e68a5b23a620,2024-11-21T01:45:24.623000
CVE-2012-5875,0,0,39b638d4b228dd080815003f9f3f8b4fefb8384ef53556b4b56b1bc502b7bfb4,2024-11-21T01:45:24.790000
CVE-2012-5876,0,0,be53b73aaaacf3e3503ad4460aa53387072cd3d426a3c4a41ebd9bb7894a1f8e,2024-11-21T01:45:24.940000
@ -194655,12 +194655,12 @@ CVE-2022-25269,0,0,3aa5924fd5f15a04a6adcbacf9b439b5b233f0444655dae512aed418394f3
CVE-2022-2527,0,0,596db19b9923bf9e8506e12860e975491cf9aeab9ee0221abe73d9611347846f,2024-11-21T07:01:11.507000
CVE-2022-25270,0,0,6ed8e426a9819aafe936e295f5c7a587986135df6bcb9c9e2509c07479fc79a5,2024-11-21T06:51:55.260000
CVE-2022-25271,0,0,3bb104611e2f4ae9081ced197d3ced92dc51c5af622840acbf2bf752f4b865dc,2024-11-21T06:51:55.353000
CVE-2022-25273,0,1,7fbfa251402cdeef6254265e58709ab5ec90b14610ec6f4a4b20beee4a3e39eb,2025-02-03T20:15:30.217000
CVE-2022-25274,0,1,8fc79bcd85d15e92faced7b2e8f6204a347e7763398431726a06954bfc5761b2,2025-02-03T19:15:08.793000
CVE-2022-25275,0,1,1c078f2e7f4e1fec62b3bb9a719783e9a5a44d26057eb11587fa0a20b0c22181,2025-02-03T19:15:09.090000
CVE-2022-25276,0,1,7833630046e5f22974cb857d7243e6a0d692894d2c480bfc8ccc11a2be66ec18,2025-02-03T19:15:09.243000
CVE-2022-25277,0,1,1d860482a0f6e8e516c1651aac111035697557b2d770709936cd885e420a9f44,2025-02-03T19:15:09.410000
CVE-2022-25278,0,1,5e5ca20b2b5c4ca29b3300f5a32c0f961523db02e3c32a6ce113abbabb3c3661,2025-02-03T19:15:09.573000
CVE-2022-25273,0,0,7fbfa251402cdeef6254265e58709ab5ec90b14610ec6f4a4b20beee4a3e39eb,2025-02-03T20:15:30.217000
CVE-2022-25274,0,0,8fc79bcd85d15e92faced7b2e8f6204a347e7763398431726a06954bfc5761b2,2025-02-03T19:15:08.793000
CVE-2022-25275,0,0,1c078f2e7f4e1fec62b3bb9a719783e9a5a44d26057eb11587fa0a20b0c22181,2025-02-03T19:15:09.090000
CVE-2022-25276,0,0,7833630046e5f22974cb857d7243e6a0d692894d2c480bfc8ccc11a2be66ec18,2025-02-03T19:15:09.243000
CVE-2022-25277,0,0,1d860482a0f6e8e516c1651aac111035697557b2d770709936cd885e420a9f44,2025-02-03T19:15:09.410000
CVE-2022-25278,0,0,5e5ca20b2b5c4ca29b3300f5a32c0f961523db02e3c32a6ce113abbabb3c3661,2025-02-03T19:15:09.573000
CVE-2022-2528,0,0,8d42d23ab2160c22fdc5c04e91effa706200d9ffe7558f3159d2cf043079d31d,2024-11-21T07:01:11.620000
CVE-2022-2529,0,0,ce42c3cf48c54f15258ee3debbd0e6cd0cf52759d10a848c50d0f76f8e505e30,2024-11-21T07:01:11.843000
CVE-2022-25290,0,0,93a870738a6070b4214d8f31cf5cead74f654c7c35b8a4bb409a786e42d61feb,2024-11-21T06:51:56.097000
@ -196799,7 +196799,7 @@ CVE-2022-27967,0,0,f75dff3cc6bd62bdffc1bf35ac24cc9564626271bd8614770b9fc0e47be11
CVE-2022-27968,0,0,cbccbaa3fb6e435452fb2d35b68fc1e04bd36685e00472d2e8cf695db98b779f,2024-11-21T06:56:33.647000
CVE-2022-27969,0,0,fd8fe6e82a84b904efb9c1d457e39c306d37a1e0b67a860df3ae203df0aeca4f,2024-11-21T06:56:33.803000
CVE-2022-2797,0,0,c2d28b535a5b76163b4dfc84f513eaf3f1625ecc552a48e7d22cbceb9c2f2976,2024-11-21T07:01:42.827000
CVE-2022-27978,0,1,196ab5e117c6915091c44832c9df1f86ceee99cc75bce1269f20694cf505a379,2025-02-03T19:15:09.747000
CVE-2022-27978,0,0,196ab5e117c6915091c44832c9df1f86ceee99cc75bce1269f20694cf505a379,2025-02-03T19:15:09.747000
CVE-2022-27979,0,0,12323a539da57d1871d2c48aa28a439604dfd301c80755327669a1ef191c00f0,2025-02-03T18:15:27.897000
CVE-2022-2798,0,0,6bc30bf6cb421bba621e8ca645f50cdbace2a887f4c812363d64522868eff2cc,2024-11-21T07:01:42.920000
CVE-2022-27982,0,0,5ac40339ffe38a015892bd701007901e549aedbf1e22ef79b6f56f1f35a687a1,2024-11-21T06:56:34.267000
@ -199562,7 +199562,7 @@ CVE-2022-31239,0,0,71c73ca9ed1bba223825e44ed9733ff42f2ccbb8fad7211a007f3dc884aa6
CVE-2022-3124,0,0,de075dcd013a0f7b4fb8abfd88b5d9318f72bdfd16faaf76cbacc9d47cda7185,2024-11-21T07:18:52.577000
CVE-2022-31242,0,0,5ff27fd88b8a2b8024099751c11ea6d8e82e343cee053ae525c223e7a8656438,2023-11-07T03:47:36.203000
CVE-2022-31243,0,0,03d1b745f940173aefdce9af8e85cdfe2d291931c7c5f940ab813e336259d950,2024-11-21T07:04:12.250000
CVE-2022-31244,0,0,a819ce0d07dd6fdb89bbcf4e1534fe2be32e525650cb2c81b6d9b742338f31de,2024-11-21T07:04:12.410000
CVE-2022-31244,0,1,15378c8c9e7ad62b3eccbed3823411505b4151a14404dd3d4a408a0051a7923e,2025-02-03T21:15:11.653000
CVE-2022-31245,0,0,f25c8d1c345fc0cd063bad457059629b5f8a7588e5978112320a5f25f84d042b,2024-11-21T07:04:12.570000
CVE-2022-31246,0,0,a85f383e12f52bbc27c933575a40dc44661e830efe4a32850b97b6afdf52d0af,2024-11-21T07:04:12.730000
CVE-2022-31247,0,0,804bad6810d87b5805aa181e472cb5549678974ac2c2cbac9f56a494a04f3f96,2024-11-21T07:04:12.897000
@ -206666,7 +206666,7 @@ CVE-2022-40475,0,0,6de94b9a336ae41b3d1d3adc1f78b66800eb00ccc5db069c8886c55d9bf93
CVE-2022-40476,0,0,fe4e93dab516974550ab95d0993fe50d2a081a2c7aa47ef0599f49a47be7069d,2024-11-21T07:21:26.367000
CVE-2022-4048,0,0,078ca5ed72f6aed7a90faf02ab6f85e1474cb4ba97a87f704be733be7414d83d,2024-11-21T07:34:30.583000
CVE-2022-40480,0,0,7635a575e6ac1bb92ae92240aaa30a82fd563044e395eabf8cf1e31f4c639956,2024-11-21T07:21:26.527000
CVE-2022-40482,0,0,fc87e26d6ca3fad045e090d4f76502aa80467790690b7326a654f50612e39f64,2024-11-21T07:21:26.683000
CVE-2022-40482,0,1,adf86389892f7a95569aa98f0e2f6a341d90adac7010847b374647ab76ccd9ed,2025-02-03T21:15:11.827000
CVE-2022-40483,0,0,60c8097e6a915de7214200aa26f52cd02d74d232a175bcb245d590ece07c4dba,2024-11-21T07:21:26.860000
CVE-2022-40484,0,0,4a2721e015188f13a3c8cebba998fdc46540c181e160a823911afe0177fc6508,2024-11-21T07:21:27.020000
CVE-2022-40485,0,0,a98e46b39dcbae79f7b24f45d7af6400d61f0a9cb4e84cd27ffa7ba75dbc7829,2024-11-21T07:21:27.173000
@ -219558,7 +219558,7 @@ CVE-2023-25306,0,0,edcf081a190ce1746bf6344523ba03f49a546931e1f6e6192e742c750e584
CVE-2023-25307,0,0,169769ff3f98fbbb2d755cb83126804d404a380acff35a8f1b6aa4539f98db5c,2024-11-21T07:49:24.450000
CVE-2023-25309,0,0,12fb26cab8d54fb6e8bd69905a74bdb9e62d267a6541c74cf35ecd6b4a2c3007,2025-01-27T17:15:10.743000
CVE-2023-2531,0,0,a6425f0bed224abaaf3ff0019a68b7cad19db87c026c67e6739047930d76bcb2,2024-11-21T07:58:47.277000
CVE-2023-25313,0,1,b3aa49f2b4e810fbda0ee639c3661dcf4aab51afd0feb5e6f0ea823461c0133c,2025-02-03T19:15:10.043000
CVE-2023-25313,0,0,b3aa49f2b4e810fbda0ee639c3661dcf4aab51afd0feb5e6f0ea823461c0133c,2025-02-03T19:15:10.043000
CVE-2023-25314,0,0,713c1d209f85bc607917983156315b9580c4e3437434b7c235d8fb23eb605acd,2024-11-21T07:49:24.870000
CVE-2023-2533,0,0,db7332ea725d80d1fea4bb9c8fcc31dd08047586f6cf8216ad2be737deb5dbc4,2024-11-21T07:58:47.400000
CVE-2023-25330,0,0,08f3ee33c083dc703c8c8ce32873b303743eeee4c637ccb5438853532d2b5f13,2024-11-21T07:49:25
@ -219566,7 +219566,7 @@ CVE-2023-2534,0,0,2765d8e31a6947ae0d35fb13d15df7a661ee4119acfec516d581783fb3089e
CVE-2023-25341,0,0,a6c0ae09f38d0a080f9399b91e16f70d20e262ee8151f1a5c7bc5a49f687504a,2024-11-21T15:15:09.430000
CVE-2023-25344,0,0,8a83a30314d7b7167b00f406ae152838e039dee182e8c3aadf0cc57ee858b016,2024-11-21T07:49:25.280000
CVE-2023-25345,0,0,3047d7e94bcb27ce1963bc1007e57600c1401bd6a1e52384238fe1fc44a5b2f8,2024-11-21T07:49:25.413000
CVE-2023-25346,0,1,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000
CVE-2023-25346,0,0,1545a193327540134d9d675ee16977b31fe2260b58497e6c55a05aab12a877a0,2025-02-03T19:15:10.233000
CVE-2023-25347,0,0,8138b3973d3e366663faf7de4265569e4c2f24365a27a090704a19edcaa8b236,2024-11-21T07:49:25.670000
CVE-2023-25348,0,0,43b2d94221c22266ccc7c295ab2746cc9adaa7e535258cc20d633841f6d263bf,2024-11-21T07:49:25.803000
CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94ea,2023-11-07T04:12:51.317000
@ -220780,8 +220780,8 @@ CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291
CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000
CVE-2023-26839,0,0,2e06e162dd6641d9de27a0ae00ad48d10c52ded486a65242954258790a85b3db,2024-11-21T07:51:59.153000
CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000
CVE-2023-26840,0,1,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
CVE-2023-26841,0,0,cf784a03f1035170d882277f185f72bfa73df1e3de452edb90b82c5e700e3c31,2024-11-21T07:51:59.427000
CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000
CVE-2023-26841,0,1,0100fc3380f5eb3112a8ff24af369b3bb07821b8b3ee2a09a94dcc1b0c1d83e8,2025-02-03T22:15:26.607000
CVE-2023-26842,0,0,d39eda28623af714efe7f85aeb376ccc0342f23c9b1231f090e68b81cb28e036,2025-01-09T20:15:31.650000
CVE-2023-26843,0,0,786845edc94077cb46de16ddea7568a47d83125548a040d79aacb36c0f0421db,2024-11-21T07:51:59.693000
CVE-2023-26845,0,0,a2f9c7776186d3df0ceb2e2b27a5bea533a9c3929c9c21044c3c55f1e99de846,2024-11-21T07:51:59.823000
@ -220946,7 +220946,7 @@ CVE-2023-2710,0,0,bbd950c47099bc88d64bb058a0226963cf5a7ad679ae4fd83996df9b0ed882
CVE-2023-27100,0,0,0e61c6dc694544bd522e6f7bc5bf622c868f7c1729822799174f320832889ead,2024-11-21T07:52:19.457000
CVE-2023-27102,0,0,43206d7feebc53f36322c7bcf41e3384d340eb37765f35c8f8b4230f6a3b3ab7,2024-11-21T07:52:19.630000
CVE-2023-27103,0,0,0c2cc1f5a1a436504209f6afe5057ad57ee9d7902586a1f37acf68eb6e94952e,2024-11-21T07:52:19.800000
CVE-2023-27105,0,1,a2ac853ae8b5a1864d4c8e573d9d32437415e63c2388e884a543809ec8def8dd,2025-02-03T19:15:10.610000
CVE-2023-27105,0,0,a2ac853ae8b5a1864d4c8e573d9d32437415e63c2388e884a543809ec8def8dd,2025-02-03T19:15:10.610000
CVE-2023-27107,0,0,e6a869423647989ad9390778f105dad2522c4f74ded7838327e13ca780866f9a,2025-02-03T18:15:29.030000
CVE-2023-27108,0,0,1099d4cf449e520df3fbd66a5a4e50d6e79831543c9ea6178d1d6936cf0cdbc4,2025-01-30T17:15:13.723000
CVE-2023-2711,0,0,c43472a8c20d741979b439e3bc102f5f9559519492c61f60f11a183488cbe254,2024-11-21T07:59:08.223000
@ -221532,7 +221532,7 @@ CVE-2023-27836,0,0,e570ef98939da4780bfb99b46bb9aa7a73a3d5992a3a95011a96e45e50ba6
CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000
CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000
CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000
CVE-2023-27843,0,1,e581568ce25fbecaed7391f9196e990bee2c3d9614523ec2b5f36b1ed39fc6f3,2025-02-03T20:15:30.890000
CVE-2023-27843,0,0,e581568ce25fbecaed7391f9196e990bee2c3d9614523ec2b5f36b1ed39fc6f3,2025-02-03T20:15:30.890000
CVE-2023-27844,0,0,d50e54915915a81c30ae45321cf2d2301ae4439b36ed52c01727a35a9a89bbf7,2024-11-21T07:53:33.583000
CVE-2023-27845,0,0,e777b579d76cec52bb5b019a8f229f789ae039687ebb3010325b3e376a4defbc,2024-11-21T07:53:33.737000
CVE-2023-27846,0,0,941104c667d49321aacb210fa29956f621f847ee2c27e41941b4c3ab6b70892f,2024-11-21T07:53:33.877000
@ -223057,7 +223057,7 @@ CVE-2023-2944,0,0,ea99dc2d328adce3aec1939b68dad67cae73132ae3b0585d6944cc503963a8
CVE-2023-29440,0,0,74decdd6d8c412f16c3d75e2437c1fb86e169adce7e9a34ae0cd2bf987527d53,2024-11-21T07:57:03.667000
CVE-2023-29441,0,0,3855998b8b19dbf6b34f2fabde8f0df78e4b67cb78ad5c082d076d66e115b41c,2024-11-21T07:57:03.777000
CVE-2023-29442,0,0,ab850c434e9117b9d4a0fdbaf6b7f37411c67315f36c28aa20204ed767b55228,2025-02-03T18:15:29.670000
CVE-2023-29443,0,1,7d5603721e9096e1af6b918ade917428b12ab26a5d119df7d7f49cdc3766a488,2025-02-03T20:15:31.143000
CVE-2023-29443,0,0,7d5603721e9096e1af6b918ade917428b12ab26a5d119df7d7f49cdc3766a488,2025-02-03T20:15:31.143000
CVE-2023-29444,0,0,c180b7ada634af3e57836df81f10201114c70180ae7eebd52c5ff9adf6139359,2024-11-21T07:57:04.190000
CVE-2023-29445,0,0,5a8615039954f8d0ee16a301da699b15b52538ebfdb21795cab2395156d21055,2024-11-21T07:57:04.330000
CVE-2023-29446,0,0,f0e24da7a7faca944e9caf9e3bfba27275abc9b34dd6592a12b801cf64b677cf,2024-11-21T07:57:04.453000
@ -223485,9 +223485,9 @@ CVE-2023-30204,0,0,d5ffcadcb8d15bfedbfb38f6fe262b7f90dac86d61a95305b0ddef65b3dba
CVE-2023-30205,0,0,614d6f5b15d2f822c49fe7e35216e74c845bf51fc1f6080fd96b781b69d54905,2025-01-30T21:15:11.693000
CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000
CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000
CVE-2023-30210,0,1,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6e5f,2025-02-03T19:15:11.067000
CVE-2023-30211,0,1,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
CVE-2023-30212,0,1,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
CVE-2023-30210,0,0,f95dd71211224dcbf038847040eab40dea07de39ab3ef5ab67ad567f6a5e6e5f,2025-02-03T19:15:11.067000
CVE-2023-30211,0,0,ef46dbe1d0f35a5df82ee85cf3aa7343ab14c740ac76a201b8ea6658c011c4e1,2025-02-03T19:15:11.223000
CVE-2023-30212,0,0,6c256bb79c14b593da1afb52a1f41d88a60b17de65013df30a7222cb8db5cf37,2025-02-03T19:15:11.387000
CVE-2023-30216,0,0,5eb3072b936944b32199c9563ff2bd8df56a2dd5a23baf265c2a91655d2cc13b,2025-01-29T20:15:32.147000
CVE-2023-3022,0,0,5d7350e1404edf239160a82f8a65005daae022e5cfa515dad0d1b71dc1a576a1,2024-11-21T08:16:15.790000
CVE-2023-30222,0,0,311828e54dafd6d0db801e3d776df3fb7876dc84d7c76629b5a43b88dee46bb7,2024-11-21T07:59:55.240000
@ -223960,11 +223960,11 @@ CVE-2023-30783,0,0,b44da5d617e33bbde90112843d1af232464242b8308dd4c634f340a01d458
CVE-2023-30784,0,0,cfd4653bbaa5c41883f9f26b09ffea3f235e2da18fe676c18193f1bb1bb7f653,2024-11-21T08:00:53.900000
CVE-2023-30785,0,0,494a520551848a4d0110ce05511ea99edf5b76856f90ec254032b365baeef1af,2024-11-21T08:00:54.030000
CVE-2023-30786,0,0,abf585160480244aa4011803fcc4c2f44598c1f0b77e9f8e22447c6e1e4d2177,2024-11-21T08:00:54.150000
CVE-2023-30787,0,1,a3e7ccc3017a4bebe7ec7a4962b9a0e1bd3fbbaa4835f6abf4828b07ade6eecf,2025-02-03T19:15:11.560000
CVE-2023-30787,0,0,a3e7ccc3017a4bebe7ec7a4962b9a0e1bd3fbbaa4835f6abf4828b07ade6eecf,2025-02-03T19:15:11.560000
CVE-2023-30788,0,0,85a4836470b3b8f59250c1e41bda76fb45205bd75c14db397cf28544ee1fe84b,2024-11-21T08:00:54.407000
CVE-2023-30789,0,1,7e3271394437e46912a950ebe4e52cc987f552f3301a864a2edec9ab9c92ca36,2025-02-03T20:15:31.383000
CVE-2023-30789,0,0,7e3271394437e46912a950ebe4e52cc987f552f3301a864a2edec9ab9c92ca36,2025-02-03T20:15:31.383000
CVE-2023-3079,0,0,29a23b3a6494ee01f2960fe1112ce6683479a771fffa6ec601450f04b6ac2d73,2025-01-08T18:15:15.897000
CVE-2023-30790,0,1,7d76feda4f2907ea8f4e833b31b96362470670f93eba99a9a8deb9f0fdaf94b8,2025-02-03T20:15:31.560000
CVE-2023-30790,0,0,7d76feda4f2907ea8f4e833b31b96362470670f93eba99a9a8deb9f0fdaf94b8,2025-02-03T20:15:31.560000
CVE-2023-30791,0,0,8af240725d0fbeb118fa2f99d54364cfd184e2b65d09d8fe085a7f73c134e4eb,2024-11-21T08:00:54.737000
CVE-2023-30792,0,0,1c9ccbffa0866f88486178ac46d3bd535e6b60690cee2c6c9407503cccb28e36,2025-01-30T17:15:16.647000
CVE-2023-30795,0,0,706eba1a0a770e345d69e7da71cb132bd3b853f81b3bdab05a71689424c4b984,2024-11-21T08:00:55
@ -224332,7 +224332,7 @@ CVE-2023-3122,0,0,891e1447dc025bf828fcc66fcd0df36febd7728974c22e5814b70aceee5678
CVE-2023-31220,0,0,4d9877457b8b6c91a1ccbb5bbc27762eadf2b30beffd6fabcf43ad66d2b3ea6b,2024-11-21T08:01:38.983000
CVE-2023-31221,0,0,8f6a44bdf7822116be89f45c3a27e661ea46b3f4959c654dc384195e503a1a0e,2024-11-21T08:01:39.100000
CVE-2023-31222,0,0,7961a39815ac2759759ce411687c93596119ee1f2b490d852d79d101cabe03c1,2024-11-21T08:01:39.230000
CVE-2023-31223,0,1,c22f0f1ce4445ef7daaa47732e6eb4b89342d27464a97e2f6e41096a8d0806df,2025-02-03T20:15:31.877000
CVE-2023-31223,0,0,c22f0f1ce4445ef7daaa47732e6eb4b89342d27464a97e2f6e41096a8d0806df,2025-02-03T20:15:31.877000
CVE-2023-31224,0,0,f0811b5c5188602ccf913e1f9c204f9fa1146aa79807b8093094e08b07797914,2024-11-21T08:01:39.500000
CVE-2023-31225,0,0,c179ff0062cdecc8949e280eac70e5653236acbbefd2c7eee3423ec7fd2c4db4,2025-01-16T17:15:11.517000
CVE-2023-31226,0,0,b624206e6bd26b66e04ba787947c0cfc9054c6de981dd4726eebb088955551d6,2025-01-15T22:15:26.220000
@ -225648,7 +225648,7 @@ CVE-2023-3287,0,0,bc7945fe3a8e884c43817a325b466366474e030f34cb4e7e12d35f6606d965
CVE-2023-32870,0,0,1b9b9ded4bc521561b65c39463b9a8aea214fedf975162131593e8034abbcb15,2024-11-21T08:04:14.310000
CVE-2023-32871,0,0,2983c17fc36b9ec7e966876a49fe77adc4b43006be7dfa472d640c06bf2ded77,2024-11-21T08:04:14.430000
CVE-2023-32872,0,0,2a65468222c513a5c3283cca063ae50eb6f570358214a2c573d783a17d20d9df,2024-11-21T08:04:14.590000
CVE-2023-32873,0,1,699ff1d4c138e6e99b2261bdb4f7f27748077b00a828d7d2fd5bce572c44ae55,2025-02-03T19:39:08.680000
CVE-2023-32873,0,0,699ff1d4c138e6e99b2261bdb4f7f27748077b00a828d7d2fd5bce572c44ae55,2025-02-03T19:39:08.680000
CVE-2023-32874,0,0,5da010a5f1e1c8f5313e6719f41dae8a7e3ec4743ab58a5cb5194e7554008925,2024-11-21T08:04:14.860000
CVE-2023-32875,0,0,0fbd6550b4e96abf60d2bf3371650742ac8f81b4037c5a1b07eb6564d6c71804,2024-11-21T08:04:14.997000
CVE-2023-32876,0,0,a8fdb8d227637f01ee3e815b45bedce18fa99fe9942402aa9e81494656415d09,2024-11-21T08:04:15.130000
@ -239881,6 +239881,8 @@ CVE-2023-52159,0,0,6eb945cd9fef03740ac892ccde0f4b06fee1e4906c8d36e2826e00cbfba5f
CVE-2023-52160,0,0,19fb4e397a5f0157e35e2583548edfe6ba46e6d8b3d42ca883782c1d0672d7f7,2024-11-21T08:39:18.380000
CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000
CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000
CVE-2023-52163,1,1,a817b5a2490fa755c4523b3727877a6db57e3b1875b856943a2aa5970b2bd8d8,2025-02-03T21:15:12.060000
CVE-2023-52164,1,1,1220edbbadc2ceef714b7f1ca1d97823ec0cb200fcbc894b83ace1e408b7b09c,2025-02-03T21:15:12.180000
CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000
CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000
CVE-2023-5217,0,0,d44e1d2f72cb8b5db95a55c2054613a61b82f8a9115f7aa84863f6c0994e909d,2025-02-03T14:15:37.370000
@ -242245,7 +242247,7 @@ CVE-2023-7056,0,0,1980e4aa976669958435f7c075c5149d1378fb4e5a5e73750f9a435303d5c3
CVE-2023-7057,0,0,60048ffa2918e194ebd0ffe7b9be056d273340da496e50ff10a81f3d8117ce54,2024-11-21T08:45:09.103000
CVE-2023-7058,0,0,29100a716a798c6246d4ae3e940f794de7f55e3cc8deb3cb58bd6a4a72e4322b,2024-11-21T08:45:09.273000
CVE-2023-7059,0,0,1c5c16cfc960bcc68665c7f3e0a19a60f451ec54f272685814a4b4177c17ba37,2024-11-21T08:45:09.417000
CVE-2023-7060,0,1,bafef5ae035e62068b1baf3fc8c52213d4164d1dc64c864eb2c6d561f573d600,2025-02-03T19:56:14.277000
CVE-2023-7060,0,0,bafef5ae035e62068b1baf3fc8c52213d4164d1dc64c864eb2c6d561f573d600,2025-02-03T19:56:14.277000
CVE-2023-7061,0,0,d9ae5bb88bfbad36b65a9e88e4a687965031397b8b12195fd22c1e5c2ef95926,2024-11-21T08:45:09.753000
CVE-2023-7062,0,0,b29f2fcc36688ad681a5c28deac20a90e50feaf3905f4d349c86d5155bf45434,2024-11-21T08:45:09.903000
CVE-2023-7063,0,0,eb7594f6d961ff7819ef655c73a315f5ae94ca53f32e92ecdcf503cd5e6e5cbf,2024-11-21T08:45:10.047000
@ -243126,7 +243128,7 @@ CVE-2024-0736,0,0,d52a109febd4221e7d6bee9ef06bd56d38739afc69d8018c7fed67cd91f644
CVE-2024-0737,0,0,e230e8509d2bc4269146ffbbf15546734ffb0db2187c8f047250d096d5529415,2024-11-21T08:47:15.143000
CVE-2024-0738,0,0,bb47aea6d8e61d6d6dc4793ab6b8d6c98c33264ec347061c48b507fd252c3327,2024-11-21T08:47:15.273000
CVE-2024-0739,0,0,6418975657121646e678b9e81e9b3be959eb46eb2a741aa57923784b207c11c8,2024-11-21T08:47:15.410000
CVE-2024-0740,0,0,d0d08c90e1fdab7aeca0747bcb543062334c9bcbcc458ff04d102ee39e9cc340,2024-11-21T08:47:15.553000
CVE-2024-0740,0,1,ae9aaef4be44ac4b95f11126ad2608bed174d5a80f7654a1260c4e5549d0197b,2025-02-03T21:16:40.350000
CVE-2024-0741,0,0,e4183954f1bfb4d99dcc24ff415844e39f12866fd118a376ba5dab01ca5e78dd,2024-11-21T08:47:15.683000
CVE-2024-0742,0,0,2a45f1769355648d1b8896b1a5513a4c49d6f4c03b844082914ec14fd476d1c5,2024-11-21T08:47:15.817000
CVE-2024-0743,0,0,023f9b7a3a6e565c03ca64a31e63efdc94e980f2a993495eaccf02912321f0b7,2024-11-21T08:47:15.940000
@ -244351,9 +244353,9 @@ CVE-2024-11127,0,0,a3efa55977cec0481a9d0f60f752166adc632313ccf7c08d957fcbfaa47d4
CVE-2024-11128,0,0,882d8275a00c8cb0e7da63d6968cc44dbc96bb40e15e86cb424dc1932b7790ce,2025-01-13T22:15:13.680000
CVE-2024-1113,0,0,90572d47b15d75a1b5b46414b43b02fcca134882a5755a9a69a3d4ba79038a2d,2024-11-21T08:49:49.557000
CVE-2024-11130,0,0,2031b0d91a76a3ae308e67f748474890b1fb080d7d4cbebe58df244865c594b4,2024-11-15T17:57:53.270000
CVE-2024-11132,1,1,304b325bdbf2ad0ae8399bef4daaa597989aa89edc6e194f2d28806df90f41c7,2025-02-03T20:15:32.047000
CVE-2024-11133,1,1,2554526159f3787b46b3f54aed7dd6cfb6c38f760d839f78670f4764bebb0680,2025-02-03T20:15:32.203000
CVE-2024-11134,1,1,4d6accde2c53f210bbeb0a5a325b5d7261e7d2fbd8c0c5b864cc5e00435cb9a2,2025-02-03T20:15:32.373000
CVE-2024-11132,0,0,304b325bdbf2ad0ae8399bef4daaa597989aa89edc6e194f2d28806df90f41c7,2025-02-03T20:15:32.047000
CVE-2024-11133,0,0,2554526159f3787b46b3f54aed7dd6cfb6c38f760d839f78670f4764bebb0680,2025-02-03T20:15:32.203000
CVE-2024-11134,0,0,4d6accde2c53f210bbeb0a5a325b5d7261e7d2fbd8c0c5b864cc5e00435cb9a2,2025-02-03T20:15:32.373000
CVE-2024-11135,0,0,b1408e944d5859a70fcb19ff485be68a4c4e7184c7ddac3f9101a4c9744f657d,2025-01-30T18:03:45.843000
CVE-2024-11136,0,0,725bf56498e2623c27a356d77c56c56ec2fbb4238d9582d18b0c73a291d687b6,2024-11-15T13:58:08.913000
CVE-2024-11138,0,0,7a4f991a93172e8f92a25ff85e41fd89c92d700227aa3b95284768518268aadd,2024-12-10T21:11:45.043000
@ -244462,7 +244464,7 @@ CVE-2024-11259,0,0,9646b1c84e05b201fbae9644480c07a1fd89adc65f5074aa5e44f275cf69f
CVE-2024-1126,0,0,2088ba320b0f3d864b4dacf7a42dde73f3534cbb6abd237206f08e3f6b49579d,2025-01-15T18:21:17.073000
CVE-2024-11261,0,0,ebd0147e6a6ab1ab0e631a63b82775c203c78389943f8839aa447a17b71fca13,2024-11-21T23:21:32.573000
CVE-2024-11262,0,0,2fc2d8fe2ec6c0e4d2457bea194bb9fd27c0134f7b30d56376be41870a4428a7,2024-11-21T20:52:29.160000
CVE-2024-11263,0,1,6da3dcf090856c1ff8ddbcb851ae4f60d559550f7e58a797a86bc019886b27d7,2025-02-03T20:09:54.800000
CVE-2024-11263,0,0,6da3dcf090856c1ff8ddbcb851ae4f60d559550f7e58a797a86bc019886b27d7,2025-02-03T20:09:54.800000
CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000
CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2258,2024-12-09T18:15:22.120000
CVE-2024-1127,0,0,64ca0bb18ea16b2fd1f9f1c90b4e9efdaa03cabe0d526d98a06239671c9cf287,2025-01-15T18:22:10.127000
@ -245217,7 +245219,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669
CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000
CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000
CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000
CVE-2024-12085,0,1,9a161213d022d60d671ea3cb4cb11ce33fd8c0478fd9dd236104abdf8ba774f7,2025-02-03T20:15:32.520000
CVE-2024-12085,0,0,9a161213d022d60d671ea3cb4cb11ce33fd8c0478fd9dd236104abdf8ba774f7,2025-02-03T20:15:32.520000
CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000
CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000
CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000
@ -245588,8 +245590,8 @@ CVE-2024-12507,0,0,f098eff6e3ef53742e66474a6ac17418c00af6d9e6800445130b20da01af7
CVE-2024-12508,0,0,21bc7864dfec1ec4afdc6f630d41f80e3589bc17435e07461da258099a6c3dd8,2025-01-17T07:15:26.387000
CVE-2024-12509,0,0,8448cb7b981b452e7bee8263b7d56776b70a911630dc0596718dc3941caa2300,2024-12-20T07:15:12.177000
CVE-2024-1251,0,0,8c0214d9f05a1f50e84514dc27e8bafe56d249b59ef6b0b677b5e947e572faed,2024-11-21T08:50:09.497000
CVE-2024-12510,1,1,a5bc20746d20cee007d6cb84e0ba740c7549182ef4105784cdae871ad0951b14,2025-02-03T20:15:32.690000
CVE-2024-12511,1,1,4498314307985f20d08d6e83a6dc0811c228944a12b2b574b86b03ce4b76a9b7,2025-02-03T20:15:32.797000
CVE-2024-12510,0,0,a5bc20746d20cee007d6cb84e0ba740c7549182ef4105784cdae871ad0951b14,2025-02-03T20:15:32.690000
CVE-2024-12511,0,0,4498314307985f20d08d6e83a6dc0811c228944a12b2b574b86b03ce4b76a9b7,2025-02-03T20:15:32.797000
CVE-2024-12512,0,0,01f6925126ff40e10f9cfc85a87e097de579dd6f4d0a1c38c7ea151cb6164ed7,2025-01-25T08:15:07.810000
CVE-2024-12513,0,0,6393dedffea01c8a6ef2142d1a8a9d6ba57b27f731b145d36f16e844db01eb62,2024-12-18T03:15:26.427000
CVE-2024-12514,0,0,f43a5430cb383b14a2cf8b8af6c6293e976c61736ad57e2dfa43a4cdef30e051,2025-01-09T11:15:14.137000
@ -245843,7 +245845,7 @@ CVE-2024-12854,0,0,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d81
CVE-2024-12855,0,0,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320cc05,2025-01-08T09:15:06.927000
CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
CVE-2024-12859,1,1,98d01c2454f66a38c507471cacb49665e067ce9a160e49756e11100e4f3549c4,2025-02-03T20:15:32.940000
CVE-2024-12859,0,0,98d01c2454f66a38c507471cacb49665e067ce9a160e49756e11100e4f3549c4,2025-02-03T20:15:32.940000
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
CVE-2024-12861,0,0,2e6551729d4e6153dcb30ad0ddedc7b2053441c7fdf06c9991efe154d5e21335,2025-01-31T19:01:20.827000
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
@ -247077,9 +247079,9 @@ CVE-2024-20058,0,0,b1aea78d08cecbe8a6797a2eccae67b4216de9f124a4ec0b1bd505c4bb859
CVE-2024-20059,0,0,3f92e7624e6793baad95bf5c5fda85b21dadfac2599351333cf7d3804b909f8b,2024-11-21T08:51:55.990000
CVE-2024-2006,0,0,2f60560639ffe114ddd455af53cebea4773b7cd759fbea5625bf0cb7baf45d3a,2024-11-21T09:08:47.770000
CVE-2024-20060,0,0,1b6d1c96c2231d4d9ba37c21fcd6bc05cee0dac4de2ebf5068d932765cec69ca,2024-11-21T08:51:56.120000
CVE-2024-20064,0,1,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
CVE-2024-20064,0,0,f1797f19de889df3b42c4b5ef9ef75484488143de4782f4bd3126dc110b5671d,2025-02-03T19:35:24.340000
CVE-2024-20065,0,0,bf074bad299ffa79a3be73371461cbe43be69d6ec7b9d447aba21b460c271103,2024-11-21T08:51:56.390000
CVE-2024-20066,0,1,48f0868b364f74f862b9b1a95f9481326a24c98f8a04d203de9b9786c379840a,2025-02-03T19:33:57.627000
CVE-2024-20066,0,0,48f0868b364f74f862b9b1a95f9481326a24c98f8a04d203de9b9786c379840a,2025-02-03T19:33:57.627000
CVE-2024-20067,0,0,901f3d8ffac01d227dbd399686ef68e66883e2ceabc7974cf4ebf3015fa2b2d3,2024-11-21T08:51:56.720000
CVE-2024-20068,0,0,e8917e7224a78ea2b81bc102a0672a078fe9310aa9002d95585fcb4dcc2eb1c2,2024-11-21T15:15:26.107000
CVE-2024-20069,0,0,cb8b51716d8af44a4da05fa5082284a53d777e13684248400691e0c288b02bcf,2024-11-21T08:51:57.060000
@ -247089,14 +247091,14 @@ CVE-2024-20071,0,0,7884ad25d18168b2699c9e4e19d117fad33de94b53f83ba46627c6cda4ba8
CVE-2024-20072,0,0,31c94c10eeffc138c15dbd92b4664230cac36e81728231bf7fe7256b1ef33559,2024-11-21T08:51:57.607000
CVE-2024-20073,0,0,07f0822b3fd14de0e741854a96fccfd976ccf68d3355a88668c62f284d493e58,2024-11-21T08:51:57.800000
CVE-2024-20074,0,0,7c362ac85e324e731d48cff7cbbbe716d2cf25b771ccc17560cd42052c42fe7f,2024-11-21T08:51:57.973000
CVE-2024-20075,0,1,3711293e47e595a1ac6af15d57409fb5435c6e59ea3e2e0f05a41211f984cbe7,2025-02-03T19:34:38.457000
CVE-2024-20075,0,0,3711293e47e595a1ac6af15d57409fb5435c6e59ea3e2e0f05a41211f984cbe7,2025-02-03T19:34:38.457000
CVE-2024-20076,0,0,fd5819e847bb53da5e6bcc13a92001213a63fd0e827570a579802534c6aa7f6b,2024-11-21T08:51:58.260000
CVE-2024-20077,0,0,07f38d510770e06ff3155be7bc8ba8fbd7cb2bdb66f616fbfcdfe488be9b9594,2024-11-21T08:51:58.440000
CVE-2024-20078,0,0,79776c6378c179dd664c67f9329d451a25e12b18275ba11be1f53c490c002848,2024-11-21T08:51:58.603000
CVE-2024-20079,0,1,efccfd54dbb35585546b823b1e7c97a9b2b8a8083d07de82388fbfe62a1d31e4,2025-02-03T19:36:08.587000
CVE-2024-20079,0,0,efccfd54dbb35585546b823b1e7c97a9b2b8a8083d07de82388fbfe62a1d31e4,2025-02-03T19:36:08.587000
CVE-2024-2008,0,0,7b4dbca5381ca7709b92df0a00c3fd407a2e47be3d31c92bb03e5d8bad60000d,2024-11-21T09:08:48.043000
CVE-2024-20080,0,0,87a81132abb3bb780b0e25bf1bd3d6a2c4adca3372f748129021b75855669772,2024-11-21T08:51:58.920000
CVE-2024-20081,0,1,0abe5a10157013b4527d939c36cd5dd3cec2890adff55e12af201c2da68ed8f5,2025-02-03T19:36:54
CVE-2024-20081,0,0,0abe5a10157013b4527d939c36cd5dd3cec2890adff55e12af201c2da68ed8f5,2025-02-03T19:36:54
CVE-2024-20082,0,0,e794b04f117ee9253c4b40a0306e7b558917bfc285addc7b94df9d6ee490df8e,2024-08-14T15:35:04.003000
CVE-2024-20083,0,0,b768ffcced20a56fd034a3790d36b728b00cb906d06266e2f5b9e06310ec4b67,2024-08-21T18:35:02.057000
CVE-2024-20084,0,0,1058362d86c9c64cbfb3895c1786f1b27cc3480b4e423adb0ee47552df693bc9,2024-10-27T03:35:00.590000
@ -247129,7 +247131,7 @@ CVE-2024-20108,0,0,1396ac71b05c962e52132dffa47ef1234f2c2dca3e32a1fef4c04be9e6eb1
CVE-2024-20109,0,0,36896b5553c838401df867b2d85ccf0af9a3ae622b20b4323a5933ca8ab9ef91,2024-11-04T18:50:05.607000
CVE-2024-2011,0,0,9a5ec92cf66d01c9d41e73e55f014b333e2f85b3899d7384d5dad77eaaadd606,2024-11-21T09:08:48.397000
CVE-2024-20110,0,0,c0c0b57095467e9e578be0254bc5c66d85b22730f1fdbd3e9d9ac09570df9ad2,2024-11-04T18:50:05.607000
CVE-2024-20111,0,1,76201ebcb9615f2901f87955a5ec4cdd3ff22581084daae497d35641d8b8207e,2025-02-03T19:37:37.797000
CVE-2024-20111,0,0,76201ebcb9615f2901f87955a5ec4cdd3ff22581084daae497d35641d8b8207e,2025-02-03T19:37:37.797000
CVE-2024-20112,0,0,90511d9a575981327aa24c3538319319bd2bc6f6cfee6551a9c0c8283f0351c7,2024-11-04T18:50:05.607000
CVE-2024-20113,0,0,ea26508bb2379803f2f8f81c7c67695e3c2dc385c480fbdf13053e0fa941316a,2024-11-04T18:50:05.607000
CVE-2024-20114,0,0,4be3eeb5f32105fd9c961a05295edfb10b3ab5f0b1a478ebc0d480cb037e18a4,2024-11-05T19:58:15.577000
@ -247147,7 +247149,7 @@ CVE-2024-20124,0,0,50a655c8e56f55ef53d789d4c63a8d392a88363f5d64306c93dc9620b3346
CVE-2024-20125,0,0,003a0c3a3b9ddf38da99a8b47462e79051bcf123de4fe606a156f4ac1ec32978,2024-12-03T03:15:04.773000
CVE-2024-20127,0,0,4f5b6e07f1cf122950dbcd8b116d02726448a35cafe00d3cdacf295c0739e6cf,2024-12-02T17:15:09.827000
CVE-2024-20128,0,0,25052607e0f79bd84aa97e3e9edbd33f6226d229c08168150d2c97b326e4867f,2024-12-02T17:15:10.230000
CVE-2024-20129,0,1,4a661ee1df5e19b6252bfb8ddf4a783213eaf2a8e58524efa112b62fb1e3bc34,2025-02-03T19:38:21.213000
CVE-2024-20129,0,0,4a661ee1df5e19b6252bfb8ddf4a783213eaf2a8e58524efa112b62fb1e3bc34,2025-02-03T19:38:21.213000
CVE-2024-2013,0,0,2d1608ffc6046704b03ee6d685b760a5a5d2d260fb3c1ece913c5d36d369916c,2024-11-21T09:08:48.677000
CVE-2024-20130,0,0,9fa9ea386c9ffc0b7d44f01de44883687f2e3b0e78cbaa6fd868b905210c2127,2024-12-02T16:15:07.200000
CVE-2024-20131,0,0,8fd2297574d725ac0fece2f5c68542bb051aeb26cfd676b7d793f5934d342636,2024-12-02T16:15:07.387000
@ -247161,7 +247163,7 @@ CVE-2024-20138,0,0,1264e7fcc71f95b0ae39f37ee36146e7c465bf599e4b07c736bd426b81382
CVE-2024-20139,0,0,434bf1878b4edcc6ee42c87512888b556d261e46d1cb8ef2e233401120fa701b,2024-12-02T16:15:08.770000
CVE-2024-2014,0,0,9c6b7427d7e4ecbb91bf5ac0c5393a05c9efb2a90a5cef1334b8ef37b43c6713,2024-11-21T09:08:48.813000
CVE-2024-20140,0,0,abdefdf55af9c04b39505134bb76fe7fc2020967809a7e6f1b53a61d701fa68a,2025-01-06T15:15:11.600000
CVE-2024-20141,0,1,8c8f54b370f4264985953f185a9523eadfc76d4e5ed1954d6ee1114f5647c8d1,2025-02-03T19:37:54.117000
CVE-2024-20141,0,0,8c8f54b370f4264985953f185a9523eadfc76d4e5ed1954d6ee1114f5647c8d1,2025-02-03T19:37:54.117000
CVE-2024-20142,0,0,dc59ab1a9f5a7658edebd0e5049615cfaed86e3e69126a4033044766d9e225d9,2025-02-03T18:15:33.520000
CVE-2024-20143,0,0,72741489c266087fa52a215cdc5a63a1e8e5c05ba33b72063739424e15100b6a,2025-01-06T15:15:11.753000
CVE-2024-20144,0,0,dd0bde2dc33084db00dc8205beac10e41605c84cd3041697ffc83cea5ab50ed6,2025-01-06T15:15:11.917000
@ -251366,7 +251368,7 @@ CVE-2024-25622,0,0,19331e262c89ec2dfac0643941c141afaa588d6eeb88b76a48e16f43833fb
CVE-2024-25623,0,0,48e2f4ccd4d543a27b4fc18f75087dd34ad823219419c28c095d1e7bff941a65,2024-12-18T22:39:17.437000
CVE-2024-25624,0,0,0ccfb4720ff7648aaed0e46c11a6d045e4a7fb375e62145035dd53d5d8cc5ee8,2024-12-10T15:06:18.390000
CVE-2024-25625,0,0,5cc90678dde97da2589a1a0d3599bc3f52e0625b9e2172e9700aa7de66246445,2024-11-21T09:01:06.387000
CVE-2024-25626,0,1,f02e56290cb5b100e94919272bfbb330213ad132979c2e09c687f6ade453a247,2025-02-03T19:52:09.697000
CVE-2024-25626,0,0,f02e56290cb5b100e94919272bfbb330213ad132979c2e09c687f6ade453a247,2025-02-03T19:52:09.697000
CVE-2024-25627,0,0,7cbce9e513644e3e2bc69141c068497c8530550daae3c8ffcfeb9fb3cc079991,2024-12-18T19:34:36.927000
CVE-2024-25628,0,0,7e120fb8d8628e240dd092a683ce7920f893f4e4925ec5e71fd9cd00ee4291cf,2024-12-18T19:43:00.970000
CVE-2024-25629,0,0,2348b0d2c945acb0e0d5504c41e7dc6d746dcade849f77c5811728b15d0cf086,2024-11-21T09:01:06.910000
@ -251577,7 +251579,7 @@ CVE-2024-25931,0,0,8cbe399f7fd0918aca51288fcf69cd817979574ffe4dbee799b5e808475d8
CVE-2024-25932,0,0,5347ed6760391be270b3034f9a6f35f69064b64a9ff35240e953d7452eb242a6,2024-11-21T09:01:36.037000
CVE-2024-25933,0,0,10c4dcd1d4877c2c5d9d0ce4b63a969433dc4656fa5c7f916b0ffa00f975f7c4,2024-11-21T09:01:36.157000
CVE-2024-25934,0,0,62ea49431b2bed66fcc156f5ea3cdf41723ad0795ba3206bf55318a5498e2cb0,2024-11-21T09:01:36.283000
CVE-2024-25935,0,0,66be2dcb22fbb70c35c4ddb4f21e1f6946a1ef5585b5ff1ae05a77950d584a36,2024-11-21T09:01:36.420000
CVE-2024-25935,0,1,4d6cf250bcacc40f3e7c214dffbd0ceaf73502d44424813822318a8cce9a2e50,2025-02-03T21:58:36.570000
CVE-2024-25936,0,0,883e76a8e3b646c5fa72740a548a845a65d2a06142b661c1322ccee0cc64fa50,2024-11-21T09:01:36.543000
CVE-2024-25937,0,0,ff95c9e0762c8748df9a9a290ad15a2baaab9ad61fd50aa6f8e199feb077d8a3,2025-01-24T18:42:26.510000
CVE-2024-25938,0,0,1d865435e59bdefe0610d67720b1f7a1a1a64e9177daafdb2de5f4c0e3a2169a,2024-11-21T09:01:36.797000
@ -253755,7 +253757,7 @@ CVE-2024-28666,0,0,624b6b2b388bce85a975ce3a777bfae7ed3108996cd956dca2a209f1f4b66
CVE-2024-28667,0,0,7954c82a1b134d6d11512799a170b0f0e3d568e6c2821e6dbe8090b84dd30387,2024-11-21T09:06:43.600000
CVE-2024-28668,0,0,0751eefb865e6994a02e5078d0717f744911cdbf16e6c214b69929aebe673670,2024-11-21T09:06:43.810000
CVE-2024-28669,0,0,fee252bc5a362683de5d6620bf53622d90aae197f4d777ecf6aa8875c3ca93be,2024-11-21T09:06:44.043000
CVE-2024-2867,0,0,e9fe63186091344fa885fc1a43105c337d44be37fe1e54dd9c51912453abc2c3,2024-11-21T09:10:42.893000
CVE-2024-2867,0,1,695fb3cef52f8c43c4514aa63d89e2f41f7dd2846ca1454a5970d54e2aad2119,2025-02-03T21:31:46.770000
CVE-2024-28670,0,0,ab1611ec1ccd2f7d119446b2099a2f6fb91c67e9ea96502c09668ca7e90eeafe,2024-11-21T09:06:44.270000
CVE-2024-28671,0,0,e25733fa67de3d649f7259e16738d845a6db94b940dd14d343831edd5a38fae4,2024-11-21T09:06:44.500000
CVE-2024-28672,0,0,182cb4e0c7a8ffda160916a5cb3c7781dca562943a914d3c5dacdeb9e9903ade,2024-11-21T09:06:44.720000
@ -253988,7 +253990,7 @@ CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911
CVE-2024-28957,0,0,4149b5010d0b1c2568f2f4f291564713cd37dee8d620ca60dda3ebe3092552df,2024-11-21T09:07:16.013000
CVE-2024-2896,0,0,89f8d0b7afd8cee22c5446e1104fb112d58a6865bcf798f3d90494b32b968aed,2025-01-22T17:53:24.233000
CVE-2024-28960,0,0,07be4df1b4177567bcc011207a77201ed2e71e2ecf6eaf000238ed73bba54553,2024-11-21T09:07:16.223000
CVE-2024-28961,0,1,87c9b60b357bf30d7c0405ba8731cde228bc8c4ab3cf58f2969eaa6a20c7e442,2025-02-03T20:52:51.730000
CVE-2024-28961,0,0,87c9b60b357bf30d7c0405ba8731cde228bc8c4ab3cf58f2969eaa6a20c7e442,2025-02-03T20:52:51.730000
CVE-2024-28962,0,0,1722d1439be0e57d00fac6f93bc2a029df89951b0809396a3013f82491cdd038,2024-08-19T17:12:57.750000
CVE-2024-28963,0,0,90af2cbac3489ca5b5031cdff6c6b93c76520044d68bd42eb0cb7f0b415116c7,2024-11-21T09:07:16.740000
CVE-2024-28964,0,0,593986ba5f871f41c1e58cc50f9a477399f293fb88ddff86003e46ad58a192d7,2024-11-21T09:07:16.867000
@ -257393,7 +257395,7 @@ CVE-2024-33535,0,0,7a77f8316da56cdbe7cd912c5793c385d5fedaf3106bb00760d015f13fb43
CVE-2024-33536,0,0,f05490b7bf8644b4a1d589905cd7f3af60266d65bc78f3b7338229a7646bb4ad,2024-08-14T13:18:41.847000
CVE-2024-33537,0,0,0886a242a6730ba370e36101a3c58d0788ccb260b9c1d7fd06af8845e03c863c,2024-11-21T09:17:06.363000
CVE-2024-33538,0,0,6031543c1e8f7332b27767ffba7d7f283b2edc0d54e78085e9719185cf928845,2024-11-21T09:17:06.483000
CVE-2024-33539,0,0,81a0a394dbf1b831d5977accac20e1523af0831a330b2fbfdee3431c944f249c,2024-11-21T09:17:06.603000
CVE-2024-33539,0,1,72c3542aa8d8725beca7d8a6e44230a2c468bc762c740741c2c54a91a6f142de,2025-02-03T21:14:03.657000
CVE-2024-3354,0,0,be734c2fa1e134bd3899eaf134caf3aaa45022e143c25a5165a4c933bcc2b268,2024-11-21T09:29:26.687000
CVE-2024-33540,0,0,757c59563d6d7999151106a5d086f394dda6b9ed32a0a12c94f07a25768805ac,2024-11-21T09:17:06.720000
CVE-2024-33541,0,0,8422811b196b3d6374bcdecea7093e1a6243ebcebb4e62fbeb4cc91e4075157d,2024-11-21T09:17:06.837000
@ -257455,7 +257457,7 @@ CVE-2024-33591,0,0,cc0b3e1a8005fca6bdde429f1645199dae8127265f507aa7135f763d1ea21
CVE-2024-33592,0,0,57a423445817006efdc2e1718fd633c42602896845703c70fa12c3806ac934c2,2024-11-21T09:17:13.040000
CVE-2024-33593,0,0,2ff7dd969b76cfef29da117603d3cf5b5321eb86d16894177faad46f88c22ff9,2024-11-21T09:17:13.160000
CVE-2024-33594,0,0,f93bf31615b7caf94835199d99388290be3f93ee1d582298cdd84b7dede79bc3,2024-11-21T09:17:13.270000
CVE-2024-33595,0,1,a805c420fe87f6ef378281508bcfbf2cc49d09005c6ec73c482bb9de03c7bd33,2025-02-03T20:37:50.263000
CVE-2024-33595,0,0,a805c420fe87f6ef378281508bcfbf2cc49d09005c6ec73c482bb9de03c7bd33,2025-02-03T20:37:50.263000
CVE-2024-33596,0,0,fbaffa0b140a8362b482c3db61edc19b10f44782474d8f4af0258e0ff09787ad,2024-11-21T09:17:13.510000
CVE-2024-33597,0,0,3c9aca69d119f0c73c01703e5a9e2b05680fa7c90b2eafa2f165306223ebe183,2024-11-21T09:17:13.617000
CVE-2024-33598,0,0,d18b88b92de282a6e298e97b6b8298eb03639e013519623be4c3a6ce124261e9,2024-11-21T09:17:13.730000
@ -257678,7 +257680,7 @@ CVE-2024-33907,0,0,621c3e9e0064a0cfba07e2b00ee09c218cb7474799c5ddcba5baa09cf7cfa
CVE-2024-33908,0,0,18e5ba74b5b314f4d44fb68022de92a3f27b318cf379aeb205fcb5dcb49e942e,2024-11-21T09:17:43.157000
CVE-2024-33910,0,0,02e7d7d2c717810e2e6046c8ab909ba55dab8588e7c23d058b758e17103fa1a5,2024-11-21T09:17:43.260000
CVE-2024-33911,0,0,0e3e9910921546cb7570b8065942096c714978a134424a460a960dbda2fdb342,2024-11-21T09:17:43.373000
CVE-2024-33912,0,1,a608e7e465c57121cca07e9663053bedfaf8d84018b404734ba5de93c623d002,2025-02-03T19:05:39.657000
CVE-2024-33912,0,0,a608e7e465c57121cca07e9663053bedfaf8d84018b404734ba5de93c623d002,2025-02-03T19:05:39.657000
CVE-2024-33913,0,0,c3f41653850668bfae1fd42c342538945d3100d9b4dc2c329a882cfcb5828e2e,2024-11-21T09:17:43.583000
CVE-2024-33914,0,0,f1c6db7e65f5d7f5cbf1d0a7aebea997776701c106aa56b55d4efd8ea3417c4d,2024-11-21T09:17:43.687000
CVE-2024-33915,0,0,b5d6ca9802eb50cf7b3fedca8792fbf9297319e0fe0443966abc02517a524960,2024-11-21T09:17:43.793000
@ -257713,7 +257715,7 @@ CVE-2024-33943,0,0,b77919a507f687021ba9148ce1d8c48c43dc95604e7e9ae3b80165ff1ebde
CVE-2024-33944,0,0,8107bdfa110c42a67b370b28b6032c4fedd46fa8830fa43d32b9afa1ea4f4a72,2024-11-21T09:17:46.880000
CVE-2024-33945,0,0,663037eb252c02a075faa18441baa77c7453ddb52ce86148e41de59ef7a2557e,2024-11-21T09:17:47
CVE-2024-33946,0,0,15a2e4d5c082043ccac85e56dcfa5a00eff8040d8c032eb68d6cca9f5c3675a5,2024-11-21T09:17:47.137000
CVE-2024-33947,0,1,6548443175ad59b3402f88becac72c8007201eccd188da523420dc24514a2387,2025-02-03T19:25:22.367000
CVE-2024-33947,0,0,6548443175ad59b3402f88becac72c8007201eccd188da523420dc24514a2387,2025-02-03T19:25:22.367000
CVE-2024-33948,0,0,ccb71dcbfca26fcc7de0ed0cf5158a07c0a9cc5f617c3f5245b95fb2167b8718,2024-11-21T09:17:47.370000
CVE-2024-33949,0,0,12cb4f2e3bb24f978889f08ab3f36c83d607e106b74553bd4e0c7a9e68069485,2024-11-21T09:17:47.487000
CVE-2024-33950,0,0,be55c53a010bcb4dd9f49c253b98364ebff13f86ee8804cadf7051ef43d89130,2024-11-21T09:17:47.593000
@ -258496,6 +258498,8 @@ CVE-2024-34885,0,0,152b0b9e5d3216b5b9a7beaa1f04a898f996e21d92477998a2435b7f0ccb0
CVE-2024-34887,0,0,15bfad19b1d1ed181ea959191d94dc734739bf83ed021b83e2ef5681c9e26ff6,2024-11-06T19:28:15.613000
CVE-2024-3489,0,0,d81ffb51bf0a659f164f0f5b63c8747e7c707bdc92a027d4fc95141a53a81b1b,2025-01-21T20:21:03.310000
CVE-2024-34891,0,0,25cb8e112712853608c2c85751a52cff47c44dea59bc7bfcbbd2c0cf2d3819c2,2024-11-05T17:35:17.710000
CVE-2024-34896,1,1,2f8a155fd996a91a940bcb6e264fbe092c2a0657976e851445c91413f6b43530,2025-02-03T21:15:12.573000
CVE-2024-34897,1,1,84ab9c262ee5310a655523000ad21bc8bb020241fb0320e2f4b356a94ef63f2d,2025-02-03T21:15:12.680000
CVE-2024-34899,0,0,9ecfd3fb5f76f8e91935a0ef479d0a8882ca629447934509efa12eb54a961a89,2024-11-21T09:19:31.127000
CVE-2024-3490,0,0,a44d4e788dbbb31c2d20e7cda7c06080195f41b9c2be3506ebb9ea17f43626d8,2024-11-21T09:29:42.900000
CVE-2024-34905,0,0,59d0bb8ac29776054ec2390b8e9ed63207063a9a715e1e403ae1d1ccb3a38a14,2024-11-21T09:19:31.277000
@ -258641,6 +258645,7 @@ CVE-2024-35173,0,0,6e586b770532bbec70a1a22d51641e5ebb020c65a9dd9f5f046c1c6774686
CVE-2024-35174,0,0,45c1ded6f418eee47f7da5d436a57a8ad12156a76cd16071e103316cd7fdd28a,2024-11-21T09:19:52.110000
CVE-2024-35175,0,0,a179c493e8da23269d894ab04f1e089839bd9ee38680abe3cc23fa7eab44ad84,2024-11-21T09:19:52.233000
CVE-2024-35176,0,0,cd7c06e702b20f7586c9797213d0d169f32a11f320cb23ae0e84f8206d3dc637,2024-11-21T09:19:52.363000
CVE-2024-35177,1,1,6ab509a02c4115271c883ad0d8a5c4bec5ea3e321a7cf9eeee5e83705a55941e,2025-02-03T22:15:27.600000
CVE-2024-35178,0,0,000399d7fb1e4b3382e7019b3b765e8064c80d03de9bbfb2efb7da22ade8bc16,2024-11-21T09:19:52.497000
CVE-2024-35179,0,0,6950f3726be7d42ceff56563ab7a850a3b63c902fafdf64f25e0ab0b9b8f136e,2024-11-21T09:19:52.647000
CVE-2024-3518,0,0,28e40d955975eda60eef469f911f09f2e176e3a34ac0ef0a96203cd6c32e5ea7,2024-11-21T09:29:46.057000
@ -258738,7 +258743,7 @@ CVE-2024-35276,0,0,1937e4da4ebbed6219ab7acef031d83c083e4d1d9f42b35bc42e8cd536e76
CVE-2024-35277,0,0,9b1c46c6fad3b7b9cebb1e68ad6e16a0a56d16503c2cc4664845a580d4c08994,2025-01-31T17:08:01.087000
CVE-2024-35278,0,0,ed7a7296d05909d4bbaa5fc3371c1f92af247b6b0ef38af5a59952281601061c,2025-01-31T17:09:31.407000
CVE-2024-3528,0,0,73792362235e828bd56025419c83c67ec901a0e2b04dfa37d11c551a857b0238,2024-11-21T09:29:47.207000
CVE-2024-35280,0,1,dd11101af525380e833a1f48135fdb75854382d9758352e56925ab58457069e6,2025-02-03T20:55:26.147000
CVE-2024-35280,0,0,dd11101af525380e833a1f48135fdb75854382d9758352e56925ab58457069e6,2025-02-03T20:55:26.147000
CVE-2024-35282,0,0,174e154b42e127fa67b7958222015b753e479a85266f575b2e2ca4b3057942d7,2024-09-20T19:44:17.557000
CVE-2024-35283,0,0,fdb32a776c5efc323466eaba6c259cf3489c6c6ec5c750c58fec77f2eb007c63,2024-11-21T09:20:03.977000
CVE-2024-35284,0,0,277d9a5f01a809bf78700b423f1bf84acc1c72d215de5cf4ec67e6bf8fd3241f,2024-11-21T09:20:04.203000
@ -258851,7 +258856,7 @@ CVE-2024-35431,0,0,1fbcf4f2a9b1d4465bec51b14790fa2c159e2e2d8264716641b679960526d
CVE-2024-35432,0,0,ced9de72c3bbcb4e9eb80bc2fabbb0ed55c2fd0dc103afeb5274fbf689dfadb0,2024-11-21T09:20:20.053000
CVE-2024-35433,0,0,b493ef1c1f660f4525c4b3c861e30fc780cde47e49bfe7f8f859b2235b5ed7e1,2024-11-21T09:20:20.267000
CVE-2024-35434,0,0,0fcffaa00cbc213252ffe7916deef7a46e78adaf94b00c9474f03d7ed84f9b20,2024-11-21T09:20:20.497000
CVE-2024-3544,0,0,9c6c6143f0831488198a7554d5322b81c0db6d917e22681c0cec25c1ee50a7c0,2024-11-21T09:29:50.663000
CVE-2024-3544,0,1,2056c8385985aefccc45ead5e31b0ec097417378af08b30a42b3680f42015625,2025-02-03T21:38:22.117000
CVE-2024-3545,0,0,7b9236373d9ab11af1789b681fa050d76729541f270e002aeefd34c01bf94533,2024-11-21T09:29:50.790000
CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf2407a,2024-12-02T20:15:06.700000
CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000
@ -261704,7 +261709,7 @@ CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409
CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000
CVE-2024-38828,0,0,2b01623940f343417ee92cfdb4f261afb5dfca65f597a90b4769cc03110fea56,2024-11-18T17:11:17.393000
CVE-2024-38829,0,0,6e70b82cf4a08eca299f1ef01398ce598581c72dcb52145f07efeeba754e9484,2024-12-10T15:15:07.593000
CVE-2024-3883,0,1,3c05229bd27210ef7b717a9b70b4fa6a5c33404b1a0d4dfb073ca4ca5e09847f,2025-02-03T20:24:02.197000
CVE-2024-3883,0,0,3c05229bd27210ef7b717a9b70b4fa6a5c33404b1a0d4dfb073ca4ca5e09847f,2025-02-03T20:24:02.197000
CVE-2024-38830,0,0,e8b420777d2e30b087a73e69b065c501d17864d02afe330332d83c0cf0b2fca5,2024-11-26T12:15:18.413000
CVE-2024-38831,0,0,4e296297b435627a62910eef33560dffee11758af4014daf7dacfd30a3846679,2024-11-26T15:15:31.957000
CVE-2024-38832,0,0,0493cf9f013d37851e0f742d469726bd8aa192c3712403ff0f7b7890bf101dc5,2024-12-06T20:15:25.977000
@ -262197,7 +262202,7 @@ CVE-2024-39565,0,0,a43a2fa18dee435a7afd7aa616f891db93192eeeee36531ec4da585ba34ec
CVE-2024-39567,0,0,71539119d2ce1198f19acd4e87a68c7cabdd0a3662eecc27368e9a62e07c5a54,2024-11-21T09:28:01.753000
CVE-2024-39568,0,0,7a4a8537e7aed931a024eab8deb65d1bfefb3706ef563f723bfc76d0f28bdaaf,2024-11-21T09:28:01.897000
CVE-2024-39569,0,0,27fde70ff8632d189acd650877066fad57adb6783aa0ce6f7c3524dbc6b9ee14,2024-11-21T09:28:02.070000
CVE-2024-3957,0,1,5f1004a57c5b1d394b83a93a43bc06c3a9b04a672f2964fea2af6d32c7955a5f,2025-02-03T20:04:49.840000
CVE-2024-3957,0,0,5f1004a57c5b1d394b83a93a43bc06c3a9b04a672f2964fea2af6d32c7955a5f,2025-02-03T20:04:49.840000
CVE-2024-39570,0,0,1b741c3dc53a47054ce07b914b00c432cf2eb0ae31dcef81aac6b0a006a9e6a0,2024-11-21T09:28:02.240000
CVE-2024-39571,0,0,9d109fef17f1ff86885ca7d414f1bbb8b318ca948a992dc7fe88be40d2fb48e2,2024-11-21T09:28:02.400000
CVE-2024-39573,0,0,8c15ddb12dc2ce17c0761f85628693c64102a07acf53afaa71ac55703bb6953f,2024-11-21T09:28:02.550000
@ -262708,7 +262713,7 @@ CVE-2024-40510,0,0,01a4f30105e4141bfbdf735dfe770a9e53e3acbffd49d6de09904f8ea086a
CVE-2024-40511,0,0,559bde25f295eea2f47294178cdd60114ad9f4dfeba09aee5941c614d809c509,2024-09-30T12:45:57.823000
CVE-2024-40512,0,0,d36f48a03ff3dd4f93c813812097a184b347da771d3626b2c3f74ff38cddb70a,2024-09-30T12:45:57.823000
CVE-2024-40513,0,0,67c8ef3a8b60e9f7e7c4abbefb380dbf0a359919da4c1e7bd0c5910f01a661de,2025-02-03T15:15:17.040000
CVE-2024-40514,0,0,24cd42ce15a68daeb1e07304169cd251b4ac0ff1eb95686b861e492991564350,2025-01-16T23:15:07.600000
CVE-2024-40514,0,1,66e5abd13151d57b369b2394d8a1b3d7801d079b9a53630111fabe5275f004a6,2025-02-03T21:15:12.780000
CVE-2024-40515,0,0,02cb86e3e0b377895050d0961542e60a81e71e07527579b9769598689f04005a,2024-11-21T09:31:14.117000
CVE-2024-40516,0,0,d4d687972653b472f242f6a074ac835c001043a1ab0dbc3ea72906e0b080dd33,2024-11-21T09:31:14.310000
CVE-2024-40518,0,0,bbf2d149d5fcc55b5b0dc1b47361a8364a7ddf49f79972030ac300284c5871b5,2024-11-21T09:31:14.500000
@ -263032,7 +263037,7 @@ CVE-2024-40916,0,0,82ebdaf06b20a2269d938b3153cbdb78890cd0db63a1ce97dd0c1bc48550f
CVE-2024-40917,0,0,e5496f490d0c568e9f7e3a5c365e732a46727d19cbef564b8d2a95df2258a823,2025-01-17T14:15:31.457000
CVE-2024-40918,0,0,3738b52e660eff78e57a66cf0344d751dd28f503d25401e493f5e1dfce6c612a,2024-11-21T09:31:51.417000
CVE-2024-40919,0,0,425190dab35c698e3ab52597ab9b6a309984bfab30b5d462c3f238e4a6105603,2025-02-03T15:36:50.240000
CVE-2024-4092,0,1,c9c6dcb4c7346491e1c7d63e26a0f363e8630c348d22faaf5ad4a5a4e276cbdb,2025-02-03T19:37:22.913000
CVE-2024-4092,0,0,c9c6dcb4c7346491e1c7d63e26a0f363e8630c348d22faaf5ad4a5a4e276cbdb,2025-02-03T19:37:22.913000
CVE-2024-40920,0,0,3cb128ae9cb7e0d6a550f4c857aae094743aebcb6d77c93c3092dd0a2d9cd8c6,2024-11-21T09:31:51.670000
CVE-2024-40921,0,0,9d5370b986414dcc036d0ed8ccf7bed4a98c4e9a56c12ef5e7a7009772743c95,2024-11-21T09:31:51.807000
CVE-2024-40922,0,0,51adb2c79fa9bf216d4427e9aed62e8ac8a5b9ca3ed410a7841ad1b8fd35e76f,2024-11-21T09:31:52.607000
@ -263416,7 +263421,7 @@ CVE-2024-41444,0,0,40dc2a2ff5c1d7d012984e5f8e458529a422a415ff1fc824c0d056c0835c5
CVE-2024-41445,0,0,39f65e85a8026950b749bd33850514ea1abf27c7d809b4b0d704f4057a44f5ed,2024-10-01T19:03:27.197000
CVE-2024-4145,0,0,bf30081aa256f27ec5ec45b8e903ae674bd8ea9a8556cad62f5df9c1c025c206,2024-11-21T09:42:16.447000
CVE-2024-41453,0,0,ca223a754854826e8622a14a8b2af6b1993b3c3d5360c8f104b3a028994b74b2,2025-01-16T18:15:22.540000
CVE-2024-41454,0,1,f432be40962662d3e59b91235821ca9087be693716b80eef279aedceae1215eb,2025-02-03T19:15:12.060000
CVE-2024-41454,0,0,f432be40962662d3e59b91235821ca9087be693716b80eef279aedceae1215eb,2025-02-03T19:15:12.060000
CVE-2024-41459,0,0,945e7666277f92adefa4a45ea355c655829c2bacc91d62c763534ab8d13fdaf5,2024-11-21T09:32:40.673000
CVE-2024-4146,0,0,0663ca1946310f885e7b84f94c4d0e50a90d3f22de3a0daeb9adf70314f7435a,2024-11-21T09:42:16.633000
CVE-2024-41460,0,0,680a17cffac82c4d739a25bf30c24e3dd4848de66dc731770f357c7e6681469e,2024-11-21T09:32:40.897000
@ -264404,7 +264409,7 @@ CVE-2024-4264,0,0,a9295252e6ae8012e96f6ab16d3bdbd8ae0aa19058b71f0f60f84b3b14a65d
CVE-2024-42640,0,0,e2483a866051d6ad5491e120ca1e63baafa96b595191cf3ff24d316cd3ae355b,2024-10-15T17:35:04.623000
CVE-2024-42642,0,0,8b9dbd65dd33a84fe9cea5686d35e4d710f2dc020d9e983ec9c75281204c9951,2024-10-24T17:35:08.450000
CVE-2024-42643,0,0,8a7ffe9096c6fc485689357bf740b04bf0699d92b7db10f64f29f9740e899130,2024-10-23T18:35:01.897000
CVE-2024-4265,0,1,63c69a6cee2ab681d27175eb4b27c4a304073c6b651fc7157e33c15128b605d7,2025-02-03T19:26:56.200000
CVE-2024-4265,0,0,63c69a6cee2ab681d27175eb4b27c4a304073c6b651fc7157e33c15128b605d7,2025-02-03T19:26:56.200000
CVE-2024-42657,0,0,aae4bb4de88b679aa9e838d637eb1c44f24a311bee4d0dbccbb5612ac8800d9d,2024-08-20T16:13:12.413000
CVE-2024-42658,0,0,efeed58100a3ac2800edc3ef0a58719dedf6608d6515675634cf3d501a381be7,2024-08-20T16:12:50.290000
CVE-2024-4266,0,0,dd415bb2761565177a8c96bc405ab004c3acce8a957171f3d59dbeb664e1dc5c,2024-11-21T09:42:30.480000
@ -265838,6 +265843,7 @@ CVE-2024-44430,0,0,3721795c76cba90da57f56d458597661e7f72bb635cd84939230dc04ed512
CVE-2024-44439,0,0,532d340c7125d38b3791848ed20a07920e65477c51ca4d64efca5629beabb48a,2024-10-08T16:35:05.540000
CVE-2024-4444,0,0,39fa2450f325301ad817fc86319bbebd1813f8dd3cf2b80a01c74cecff95e276,2025-01-14T21:40:27.670000
CVE-2024-44445,0,0,70e29647242626c5fc3cd02b62378e61567a9538e073b5b0672118158325e4f5,2024-11-21T22:15:07.637000
CVE-2024-44449,1,1,47b864eaa67e3159adbe4b6fa4810c68f694aa0b8ef0226b9f2473a49efe078d,2025-02-03T21:15:12.927000
CVE-2024-4445,0,0,46341af9b6fb502c6f33de80f90e54dcbc98c3195a6f7b6924f2303483fe6e07,2024-11-21T09:42:50.723000
CVE-2024-44450,0,0,e2b00db1a138b66c9c880a204501c6260391eb5150f3adddaf21310d31badd17,2025-01-07T19:15:32.417000
CVE-2024-44459,0,0,6692baff458ff714d53ffedc49b8e8781eaf99012cbbded46425655a64ca52e7,2024-10-30T20:35:29.427000
@ -266382,7 +266388,7 @@ CVE-2024-45326,0,0,8cf2e70ef6584a36126584463aee675c9d52e03d915cd6d7f65314e9c17ce
CVE-2024-45327,0,0,d09034f28dc7eb04e46d8b30e26f6e91afaa4624a6ce1f471921ca0a81a0814b,2025-01-21T21:58:26.373000
CVE-2024-4533,0,0,565c4992f22cce399c7ec79b1c1f5241de1ceb51c7019357739f36b97aa0a0ff,2024-11-21T09:43:03.177000
CVE-2024-45330,0,0,e9c0a42cafd75c39cc2fb6322b0e3eb6100b15258e5462b4bef0ad15a3b44297,2024-10-19T00:41:09.717000
CVE-2024-45331,0,0,c56952b03945794d6d222cd231aa39b12787f4f65a05b3428aec3822b3d506d6,2025-01-16T09:15:06.500000
CVE-2024-45331,0,1,6674a987e07ef5cefafbccbf3dee14b9068d9520dc28ed378470c190db2d6c7f,2025-02-03T21:03:06.133000
CVE-2024-45334,0,0,c1a95be34d5696913864dee9719b7ad805fe7ff8dee6bbd29645a138cdd2805b,2024-10-25T14:41:43.473000
CVE-2024-45335,0,0,df1b52d83b5212b89c08532eb4b3f1fce61dd8609884645d9cc9fbfcae22125a,2024-10-25T14:37:39.387000
CVE-2024-45336,0,0,fe73a42ff3e2ab154f5274280efb95e7cafdf2051c26cad0bfba3d1769494881,2025-01-28T16:15:38.220000
@ -266956,7 +266962,7 @@ CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194
CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000
CVE-2024-46446,0,0,32498f8ed9e97dfaea9d9d29b52aff01ff427c37b0ae17db53d50ecbc649b2b9,2024-10-11T13:04:46.337000
CVE-2024-4645,0,0,ae6fcbc17927f6fb7b15dd7e2cd4ad23d3bc0045e51ea10de74a0f641554c9cd,2024-11-21T09:43:16.590000
CVE-2024-46450,0,0,14c9e64b7af6d48eea92fb8f953cb7965786133f412aab795801a4f9c47027b8,2025-01-16T22:15:39.840000
CVE-2024-46450,0,1,584d1302ac1dc2148fd9744364b99c8a1b26b6993af7f31c4407277e184a87a4,2025-02-03T21:15:13.043000
CVE-2024-46451,0,0,5691c8cee8fae2502da71b898418de27414898c09a161c995aa0a792f136951b,2024-09-17T14:35:31.353000
CVE-2024-46453,0,0,eb16d6a14c6afb2906a10bcd83b48fa20d81c17662bd8c281c8b51af6f96c56d,2024-10-07T13:53:04.767000
CVE-2024-46455,0,0,0b91cb2d456ef57e37eaec00f828b8cebf8d0a48c98cc5abe6b851bbbf1c9130,2024-12-12T02:02:38.990000
@ -268098,6 +268104,7 @@ CVE-2024-47767,0,0,94aadbc9fc16d474275d6aca7a65361d425ec92b8c6014ba3dfdd771cd3b2
CVE-2024-47768,0,0,88ae4f70ab087b8300d230292887e805c01d66e7a5c039ba6592b0b94e773598,2024-11-13T14:55:39.690000
CVE-2024-47769,0,0,0c177c50fe296e854c4d574b21c2d2abde6e70c193e41fa822f8df15acb9f1d0,2024-11-13T15:12:54.033000
CVE-2024-4777,0,0,f5d82bbae979bc4d2f73fd5aa0aa703237c6002a2996292106f7c34b0b91fd70,2025-01-22T16:45:18.820000
CVE-2024-47770,1,1,afe4aa81d02e77cafa99d2e366e838a323f3381c60df009fddf03b20fe0ffaf5,2025-02-03T22:15:27.777000
CVE-2024-47771,0,0,d9e667f8f1c80546a8045e1095310494da0b5c3573a4d135848ba5926d74346b,2024-10-16T16:38:43.170000
CVE-2024-47772,0,0,268d48580bc08bc06a9592581bf7c15b183982df7936e45259c48576c264bf04,2024-10-19T00:58:21.947000
CVE-2024-47773,0,0,2009644e404b2ecafb661ade272442df90db2955e19ee81df643af922d4ed623,2024-10-10T12:56:30.817000
@ -268166,7 +268173,7 @@ CVE-2024-47846,0,0,c9022179ec37ee40991163bc4cce5d4fa49c6b77eda9fa0067bb8fa4a210f
CVE-2024-47847,0,0,b2eba8815e2eaeded97152df9d38e905e18e5feb1489eedc3cf58f4fd768e51e,2024-10-16T16:42:05.567000
CVE-2024-47848,0,0,e6d753ff6a9c2b27d5318c0e58d5684b9ce935a4058835313c44047d27d48dfd,2024-10-07T17:48:28.117000
CVE-2024-47849,0,0,03c49378aaf03dfcd0534d7e954b9ef3c600228150c696f66c6ac0fada5d8849,2024-10-16T16:34:40.490000
CVE-2024-4785,0,1,6eab3e353a6724f0414217b6f01f95af472b3949bd6e2b068a62e0b94f58da31,2025-02-03T20:33:19.783000
CVE-2024-4785,0,0,6eab3e353a6724f0414217b6f01f95af472b3949bd6e2b068a62e0b94f58da31,2025-02-03T20:33:19.783000
CVE-2024-47850,0,0,441f3961f9e4e945afc3ba6c99275c3ca982a87349160ec46e09e3a7a38ca645,2024-11-21T09:40:13.580000
CVE-2024-47854,0,0,a9f09de7f0b5818799d7735e32fab0528117f290764772f98a3e102c722b0ab3,2024-11-26T16:15:15.850000
CVE-2024-47855,0,0,2488ce52c534b254c4fe75f30de0e6a94b0d61e1b79ce7021bafc48eccaf27dc,2024-11-07T20:35:11.733000
@ -268490,7 +268497,7 @@ CVE-2024-48456,0,0,5157f8dd26a6f4dec318ad8d7c80b2cd217ac77f0e9ed233c772d4f65ef0a
CVE-2024-48457,0,0,d6eb8d01e509ef9b22dcdaa634f41366b40afb740c8dfe3efbec542dff95a537,2025-01-07T16:15:35.057000
CVE-2024-48459,0,0,f2ab7e7f3244c10dbfc979fa6bc201608cff2894282b5a96f254cb41fcce18b6,2024-10-29T20:35:32.737000
CVE-2024-4846,0,0,74d9cb500e6ec3c3eeaefc6b52bb41cb76c1e47820ff2b958b0158c620b5f565,2024-11-21T09:43:43.533000
CVE-2024-48460,0,0,9c6a11915e1a14d980c8032256794eb66753933cf88fb0466f6211d8fc8f07e2,2025-01-16T22:15:39.973000
CVE-2024-48460,0,1,34f8ed9ab98ddfc75ca095067339237e8229c3fecc07fb29885848ae665d4986,2025-02-03T21:15:13.217000
CVE-2024-48461,0,0,18aa4511ff3360b386c9bf1fdfd51c3ed737ebfb483f16f5fc9298b5d999091e,2024-11-01T12:57:35.843000
CVE-2024-48463,0,0,a9da886d10211a0daa32ff4570d14cee8d4257ed78c329f02f3658c8bd15f25c,2025-01-16T06:15:26.940000
CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8455,2024-10-30T18:35:15.410000
@ -268594,7 +268601,7 @@ CVE-2024-4875,0,0,ac1a4cd3c3015a7e51b909244836132983e845092f22afd31b06eebb6822f8
CVE-2024-48758,0,0,6d6595f4f9c5157363905a29de4e8aa05d9c595a5b50795bcb679a26374e8aff,2024-10-18T12:53:04.627000
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
CVE-2024-48760,0,0,2c515de9d3808545a7fdee77c025d0a4f76a44cfac1a6b1790d2a3a6eabc5e21,2025-01-23T17:15:13.713000
CVE-2024-48761,0,1,aed3da36bd3ff4fb2a394bac175723ebc25add12580c327e927a6afaaa96b534,2025-02-03T19:15:12.210000
CVE-2024-48761,0,0,aed3da36bd3ff4fb2a394bac175723ebc25add12580c327e927a6afaaa96b534,2025-02-03T19:15:12.210000
CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000
CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000
CVE-2024-48770,0,0,3e66352e1521b9d6543412a56ab61f680bed31dc0a12a74770aeefc4f0bcda78,2024-10-15T17:35:07.440000
@ -268681,13 +268688,13 @@ CVE-2024-48878,0,0,61df8c716ea1a9423d8f98d007fe741d86381fb579c3442ef6d827deee3b2
CVE-2024-4888,0,0,133d57bae18b01966145fd4e4ce13e18e7959193dbb6b4323cb9d35593035efb,2024-11-21T09:43:47.830000
CVE-2024-48881,0,0,b23f95dff65a492953a695b231d4f9344fc7f54af69ded8ea700f43b3702364e,2025-01-31T15:54:29.633000
CVE-2024-48883,0,0,adb8229ac61a0cf6e127a4ecda67bdf63ebce96100cad9493a388f5cd0c90b63,2025-01-13T20:15:28.770000
CVE-2024-48884,0,0,3359ff773d09dec3cb555730b4a6f1a64741d3b148a8a871f573eed309fcf941,2025-01-16T17:15:12.310000
CVE-2024-48885,0,0,da7f0208f0c95fd2f24f647844a7354b8155e6f4c2c3df76ced6f9f588a64496,2025-01-16T09:15:06.737000
CVE-2024-48886,0,0,f1a654d0b24acae0f655db620517eac5f88a03e1413c63f93bf4f53b28192e5a,2025-01-14T14:15:33.027000
CVE-2024-48884,0,1,5d218ebb657c4c25d4bd1dddf60f0bce646e5bbe1e6167cb08df887cb762a53a,2025-02-03T22:18:16.507000
CVE-2024-48885,0,1,f1a5e74246adb6d7bd8e325564baa4055ce18f2e80eed587565e5479d790b2f4,2025-02-03T21:11:41.750000
CVE-2024-48886,0,1,0c43c603ad0a80f9c21978b3b5043d329abd064d0a00462c64b3fb5285dce5fd,2025-02-03T22:16:04.733000
CVE-2024-48889,0,0,8e1bac12eb50f3243e5ec10f0474e909f75dc6516eb6b1b6cee870377808ea68,2024-12-18T15:15:11.713000
CVE-2024-4889,0,0,54e41cd985dde0162870a1a62b42a9fd40bf90446677bc64ce2d3dd7fe90e1b1,2024-11-21T09:43:47.970000
CVE-2024-48890,0,0,1ab9aa34e2dee7c83ce102bb687e8be474b284b9f530d42d9e01ca00b624c9bd,2025-01-14T14:15:33.187000
CVE-2024-48893,0,0,f685b37228cb812a8fb671bf4237846143f7461727ddcdead4141757fa4bd791,2025-01-14T14:15:33.333000
CVE-2024-48890,0,1,e4c2ca148242c15d7451f4a3f4325a96e3aaa804db1c474d5b5964d77366de86,2025-02-03T22:13:42.850000
CVE-2024-48893,0,1,4f56fb1297afed12ceeb17e448071cc4ac40c56f80a066a1a7973c4290bf29b7,2025-02-03T22:12:20.713000
CVE-2024-48895,0,0,2619cbfc056db229022c601c361879a86e8ef7297a78db8864167658fcd89d44,2024-11-21T13:57:24.187000
CVE-2024-48896,0,0,68f9b7eee2d42fd99555582d831f186b3535e450fad14d101fd4d18eb273b831,2024-11-20T14:47:12.777000
CVE-2024-48897,0,0,f3182141722d6be3bdc9aba61fbb38fd1908803d90d823ef2ab33a0e64cdc49a,2024-11-20T14:48:25.373000
@ -270157,9 +270164,9 @@ CVE-2024-50559,0,0,dfa1c4cb23ceb2f70b4684ba6fc94ad535123e84e14b38239e2546f378ae5
CVE-2024-5056,0,0,8fffdd4127619c786aa0989407007469ff9a6aa73bf668207b4ad19c19de1531,2024-11-21T09:46:52.267000
CVE-2024-50560,0,0,849cbb22dc43c9735ca18b0189950c1e8b5ecac4d47888f5bcbc5715b936ca6b,2024-11-13T19:57:26.073000
CVE-2024-50561,0,0,6a51b1f26d5cf18987d57ec188dc14932c4d4312c95a1bfb0fba3e588b50e618,2024-11-13T19:57:56.313000
CVE-2024-50563,0,0,3cb3058b3811bf7ede7a877a75dc542e9a8e220f47a4f871ab56ae9b4b417ff5,2025-01-16T10:15:09.480000
CVE-2024-50564,0,0,4a2a7b51380febe6370791b50e7a15a1842efcd306622119d6977fa863ed9b3d,2025-01-14T14:15:33.490000
CVE-2024-50566,0,0,bfd3951dba82f12232fef18f6a6bbbebb83fdb8ed0afe1245f9953979e379434,2025-01-14T14:15:33.650000
CVE-2024-50563,0,1,b5495e4d9248024f07eadfb97b72f88f39265d3dc21b8de2fb9485f4a9fc5cd8,2025-02-03T21:54:17.977000
CVE-2024-50564,0,1,9f92111f34b8a3f04643692b4b87512c1b9c808d088ae5cb493fe5eba0ae69cd,2025-02-03T22:11:08.317000
CVE-2024-50566,0,1,73abc3a7ec0e89e7710714feab3590ac47ec6fd819b92c2c02e99292bb887750,2025-02-03T22:09:31.510000
CVE-2024-5057,0,0,4e84b19a66dd237677e71f8f6b2954676ecae2fca742ad51c75df8e74bfe774e,2024-09-20T19:31:39.437000
CVE-2024-50570,0,0,2d9dc66724750d347def0458b21203e33f8d848938408b5276fa284db7ba2a64,2024-12-18T15:15:12.660000
CVE-2024-50572,0,0,87b1aa24f79c401027b600910fcd433cb81a62e025ef81c863f015edbd3acb6f,2024-11-13T19:59:16.777000
@ -270220,7 +270227,7 @@ CVE-2024-50652,0,0,2f965c69b573d9e115cdae86c6768d0ed1bea347974fb0bbbfc5caeeb795e
CVE-2024-50653,0,0,c3c2eb452e8edda9530908359ecefe1b49303fe46316e9194f74a85e3734220b,2024-11-20T15:36:20.257000
CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739ca92,2024-11-21T19:15:11.113000
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
CVE-2024-50656,1,1,b6048ec034cf2de098020db8c89c8a2cbaac6142dfc2a566a356a30ba806ea18,2025-02-03T19:15:12.370000
CVE-2024-50656,0,0,b6048ec034cf2de098020db8c89c8a2cbaac6142dfc2a566a356a30ba806ea18,2025-02-03T19:15:12.370000
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
CVE-2024-50658,0,0,dc74515f499285ca9589c261009f1434e39f4df3c1feba74e29bae75532d2d18,2025-01-08T16:15:34.413000
CVE-2024-50659,0,0,070d9cee09db7fd442130a440bc492ee33550ec72e00250b2d953adb8bd85a17,2025-01-08T16:15:34.597000
@ -271195,8 +271202,8 @@ CVE-2024-52331,0,0,5cf69bb827959d336a5028afd5f469c4b331d80891193094491be908c529d
CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000
CVE-2024-52333,0,0,e1bc57a7d739bdd387fb07cc28b3547c00461f3445b0a694a0bfc9660ebe8df6,2025-01-13T16:15:17.990000
CVE-2024-52335,0,0,e1e5dff8245ade7d0df486779ba826bca2b65cb6a4f443a05cb574ac0185e48c,2024-12-06T14:15:21.230000
CVE-2024-52336,0,1,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
CVE-2024-52337,0,1,d2eb07dadd155ebe6f1cef4fe3a2e3193e0824361eb9c47556565f3a1a02b6c0,2025-02-03T20:15:33.273000
CVE-2024-52336,0,0,b6e9b11addff6749adae872dd38056b35e5782b328e6ea56a9be94620e0c21ab,2025-02-03T20:15:33.123000
CVE-2024-52337,0,0,d2eb07dadd155ebe6f1cef4fe3a2e3193e0824361eb9c47556565f3a1a02b6c0,2025-02-03T20:15:33.273000
CVE-2024-52338,0,0,9bcca0f5584def2789a1613da17d1dfa11f003cf9877e634fced8f070cd4a571,2024-11-29T15:15:17.550000
CVE-2024-52339,0,0,8c254a85b0cc7761c2c8f8cf7f1a34f104621eefc5d8f80c80f60233cb82f4fd,2024-11-19T21:57:32.967000
CVE-2024-5234,0,0,3621dd7a9355ab69fb44113adac5d6db321db5bd9e4f974601bbdcdbc1644b98,2024-11-21T09:47:14.493000
@ -271645,9 +271652,9 @@ CVE-2024-52951,0,0,88467df47cc32548afc6312c57f27d2a7d0655e1c934e59eb5eeea7c6be50
CVE-2024-52958,0,0,965d541bdaa048d08984be57ec6ff291abae1c702954dddd32ec7b0108549df9,2024-11-27T06:15:18.590000
CVE-2024-52959,0,0,2eb2157890632ca954f7c150a61a989fe40d967f91d0ca40fadb69eac73b6b64,2024-11-27T06:15:19.083000
CVE-2024-5296,0,0,f4668a62dc8d11409bf71e36f1f99bcc5881901b7026ad13be4beab222eb08c7,2024-11-21T09:47:22.827000
CVE-2024-52963,0,0,ff01669b1598f0bce0b4b90af8cc55f96a203c8a430eccd639efb9c221ab9715,2025-01-14T14:15:33.807000
CVE-2024-52967,0,0,ee495ed0ae82b5386a5a5e29b20d009f38e7fec0fdb15824df2e77e4920e6e29,2025-01-14T14:15:33.967000
CVE-2024-52969,0,0,d48edc4c533d9acd9a260c0e4d555526245a1be1476ba79e29b9502b8c79f01c,2025-01-14T14:15:34.123000
CVE-2024-52963,0,1,ae3a3bc3ff79384440030ff505ca2ca370b023f5f8023877a92497503fa052d6,2025-02-03T21:56:00.043000
CVE-2024-52967,0,1,ff0457e9e50f167599374bf92a5654bd830b20e000ec1663543d1e47a49cfb63,2025-02-03T21:59:09.277000
CVE-2024-52969,0,1,7b7c31017bc020d55866c3b3fcc971134d3b96354f2debd63a54ecbb5572938c,2025-02-03T22:01:44.330000
CVE-2024-5297,0,0,4e7f74d9629bbb9b864fb76b28bd5d406dd3be0c174577372182a6d0a600d934,2024-11-21T09:47:22.990000
CVE-2024-52972,0,0,bd1952b84c87773d87a7a628c33b82c04f120ab1b040d082ef990417beebf08b,2025-01-23T07:15:08.700000
CVE-2024-52973,0,0,4b0162dbe0cc84ae90dcd59a5862af8efd2e82fdabf32f87ed28473f7456d193,2025-01-21T11:15:10.200000
@ -271952,9 +271959,9 @@ CVE-2024-53296,0,0,e28bf767e01b1aaa2164d43f0620bdb3386846f2c98a1468aa6affeb743ed
CVE-2024-53299,0,0,9f86b830eea010b1a445e73d9dbaf9c5c5f6dc050ddebe79e4b7713ae5f50bb1,2025-01-23T18:15:30.777000
CVE-2024-5330,0,0,d644a32144d291678dd5bb7f21b934bb851a049e1a1dcad7ed14bbc2171615fb,2024-11-21T22:46:26.800000
CVE-2024-5331,0,0,ad9f3e021008e1f906a9999a71be6645de37906a8f88b5de79caa7d877855b39,2024-11-21T23:07:26.067000
CVE-2024-53319,0,1,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000
CVE-2024-53319,0,0,504250b0f69d16a3cc3801c2bbde4ee72d07fdb764bdfafa75eaa85885381de2,2025-02-03T20:15:33.430000
CVE-2024-5332,0,0,1bf02601401a5cfa3a271a75853b96cdcfd3e0b6b58677457c39ef4ba15b4069,2024-11-21T09:47:26.403000
CVE-2024-53320,0,0,de3584e4f9d77dddd8f22e3c0aa5fc427b88db6771b98089a3ae5a7a326901b3,2025-01-31T16:15:34.883000
CVE-2024-53320,0,1,c0ab61e5ad040dc2e73e2a9c67587cf91fdaf7884054cb7c117a2b735a98de10,2025-02-03T21:15:13.373000
CVE-2024-5333,0,0,ca365b0ec9b98451e4f093530c18de841de4387827ff042bada205a635c53f76,2024-12-16T17:15:14.070000
CVE-2024-53333,0,0,fec584e947b0ef91060e7974c2bc2800b0a5e22197ac40e517d4bb4ecce04a94,2024-11-25T22:15:18.437000
CVE-2024-53334,0,0,16279143f552729b554e869e900fcdb0e710a67308c49b11d3ac0e3ed52e676d,2024-11-21T21:15:24.810000
@ -271962,8 +271969,8 @@ CVE-2024-53335,0,0,c7b5a8f73d12d44b7820d29b4dc55e553a7dba1e50218bfd0cdeaf78dc12e
CVE-2024-5334,0,0,cb79190d7e117b2165ef511634fe8d33c9e23cab24dd6ad00dc4efad8b756c7c,2024-11-21T09:47:26.523000
CVE-2024-53345,0,0,f122664bf501aa1be2960db7352db8f065380488d2573ffac2bf7a21da16724b,2025-01-07T20:15:29.923000
CVE-2024-5335,0,0,227008637fcf0f08540aa31f6f2f1e0a27300047ea0b90140042ff30c0f0094f,2024-08-21T12:30:33.697000
CVE-2024-53354,0,0,e1b648a6a4be7930b88b2d086e1942a5b20fa37be934512a75fe194bbddd815a,2025-01-31T22:15:09.340000
CVE-2024-53355,0,1,ca5b0e88509e9dfe276e8a1129d2d942bec54d0cf30330b2eaf5af51359d112f,2025-02-03T19:15:12.480000
CVE-2024-53354,0,1,037168b08e181fc45ec0d539f57aec2ef9e07d70617d283e15863c003fb78658,2025-02-03T21:15:13.520000
CVE-2024-53355,0,0,ca5b0e88509e9dfe276e8a1129d2d942bec54d0cf30330b2eaf5af51359d112f,2025-02-03T19:15:12.480000
CVE-2024-53356,0,0,2fd1e2076fbd775edcaf5d4689b90cbce5557883ad8b8cae5caae4b0b5736bc1,2025-02-03T18:15:36.487000
CVE-2024-53357,0,0,5d73d16921abdcf0162ad5d0212c0e48db4937f78179f55ecec148d968b7ce15,2025-02-03T17:15:21.270000
CVE-2024-5336,0,0,3be15ca705f47dea3ffc9a0dd73cdf82724f581c9671519a64e222f9d7a209cc,2024-11-21T09:47:26.713000
@ -271984,7 +271991,7 @@ CVE-2024-53426,0,0,9339130e86a75243ea176c2c1911663d0047bd370b4ea0fccb09719eca2c3
CVE-2024-53429,0,0,eaa70acb2843e8489abf02d5796dd8a314b9b85961845be919325cda159f0f76,2024-12-03T16:15:23.833000
CVE-2024-5343,0,0,a520df0d2c87c5fe35335a1b343c956cc8dcf1b7b7959b5acc51996bdc11fd0c,2024-11-21T09:47:27.647000
CVE-2024-53432,0,0,91200366caef4fd477ae549a4b97936ab0103419821400acdfe9619ad1d645ce,2024-12-04T16:15:26.240000
CVE-2024-53438,0,1,d4b7ce1083106411af815b353970b625a6a3a517c2a135e9bb937be4c90fc83e,2025-02-03T19:15:12.633000
CVE-2024-53438,0,0,d4b7ce1083106411af815b353970b625a6a3a517c2a135e9bb937be4c90fc83e,2025-02-03T19:15:12.633000
CVE-2024-5344,0,0,8f458be972a177773c42d8be4d4a2a3285a02690bc775c46c880075a709e9dd2,2024-11-21T09:47:27.763000
CVE-2024-53441,0,0,15e36cc5d95e47c6196e0366735e3d4fafceb35f2476d36323b8dd3867fef6fc,2024-12-12T02:07:57.850000
CVE-2024-53442,0,0,d228660d56d3a571a361a3c128f6a576835f40179a930e9ca9db1661418723b2,2024-12-11T17:15:19.083000
@ -272022,7 +272029,7 @@ CVE-2024-53537,0,0,d1edfe105b95fc20dfa993a8f81a60afeea48c708dd506bb2a3430a2edc83
CVE-2024-5354,0,0,e179ff0fdd33289a32ca4c68c73a51c0aa8ddee9c94944cd1d4fd7185f36a76c,2024-11-21T09:47:28.997000
CVE-2024-5355,0,0,5ae56d862872a5268a44df2d0e26a54aa307acbf5ff2835727472c989e377b6d,2024-11-21T09:47:29.130000
CVE-2024-53552,0,0,4cbf8fbe1c1d8b81113efcd1116951d33bdd9cbf11887cfd2671d9f28438541a,2024-12-11T16:15:14.373000
CVE-2024-53553,0,0,96586682b18b18abf40cb4975540b6e6024c206d62f7a1515e26de218ae6785b,2025-01-16T23:15:07.700000
CVE-2024-53553,0,1,f76cd837b8044f3ae7bee9c286ff4b43a72406724cd6dd80c83638da1316919f,2025-02-03T21:15:13.667000
CVE-2024-53554,0,0,21a54d7bc341c058102c672add5c6a39faba0998e6b5d3050bab27868ab5983b,2024-11-26T16:15:18.520000
CVE-2024-53555,0,0,98c9cd71300d5c5a0ee8cfe56c2efb641372e5ee4508b44193ca67680ed7c7bd,2024-11-26T21:15:08.560000
CVE-2024-53556,0,0,197a1e9e5d0cdfa43597989d9978403511315370ea045225b596c7a587a5fd41,2024-11-27T17:15:14.917000
@ -272346,7 +272353,7 @@ CVE-2024-54009,0,0,57a4bb8c66b26b4000e58cbef542e2f0e67be86fc478ee09e8a3296c8cd7f
CVE-2024-54010,0,0,e416058a0e43b3161d01186417b7b48190d37daf5d8ae647cfe2dafe7e0f55f3,2025-01-31T18:15:37.577000
CVE-2024-54014,0,0,fef0a2723f6d0eb99b08285b0e1281168729dd64327291d1bbdb15f503c04c5e,2024-12-05T03:15:14.530000
CVE-2024-5402,0,0,369141076231aa822f3b7e1a9c4a08753a10cb13fa106f65751574195737991f,2024-11-21T09:47:34.947000
CVE-2024-54021,0,0,13a0709ef7a4e77dec1177a991cc8b9c7e150472cbf3b901ccd7992c11bb3fd1,2025-01-14T14:15:34.287000
CVE-2024-54021,0,1,a405e55b9f793941d2f8b7e4f87a8497aa7210dc633b21052b904eb2f621ad43,2025-02-03T22:04:26.590000
CVE-2024-5403,0,0,f4e58d907f2a672c85e38960e3074ec1cb3261646ec2ccae3d1a32d0c95159be,2024-11-21T09:47:35.097000
CVE-2024-54030,0,0,07c84f217a6fa368622d2a223843d19c0c7e728e80537c7c260b676bb124b4cd,2025-01-07T08:15:25.760000
CVE-2024-54031,0,0,e561fa8b1140e643c613ddbd502d702389ee48a6a06d0cb85808f49f71337f6f,2025-01-15T13:15:11.203000
@ -272810,7 +272817,7 @@ CVE-2024-5463,0,0,357d166209285de4e8f9b5c7c2d63d7eb415952b3a9d1476d831eb91162afa
CVE-2024-5464,0,0,255f781a5f94f0faf95d7c73d6b2015838426915e8e0274a4b6257e37377ce5d,2024-11-21T09:47:43.990000
CVE-2024-5465,0,0,d854caa252ac359088449fa3628f1e50a198f1dced6d951af90835f292847339,2024-11-21T09:47:44.140000
CVE-2024-5466,0,0,bd8eca91ebf8acc552049523b9652cf94021fa13aaf76627ede5f76950f6758d,2024-12-19T20:21:12.243000
CVE-2024-54660,0,0,edef0c5871f664f8877d185e31c3b8a6ca427240ddfe23726caee85e94e3c9fa,2025-01-16T22:15:40.200000
CVE-2024-54660,0,1,8ecb328311227df4f4ba808c9aa5038fb826cdcbe9b14662d633f31264e20c88,2025-02-03T21:15:13.873000
CVE-2024-54661,0,0,13e4cca9a8df33a1723e5327d2d34e809c611fe62aeebc75663d0c80abb5d0eb,2025-01-07T01:15:06.913000
CVE-2024-54662,0,0,40063869c5984ddcfcaf82116b2fa9ee6b8ef71c24c68deda4080eb1ea805f5c,2024-12-18T16:15:14.220000
CVE-2024-54663,0,0,f5353753ee157eb79c3a456bcb90fa176ea7107dfe149747714f2e06d4f48033,2024-12-31T19:15:47.500000
@ -273085,7 +273092,7 @@ CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c8
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
CVE-2024-55591,0,0,92e19e8d5fbeb8ffc3cb8033dbc9038c812258b0e349023cae68889d8104a7e5,2025-01-23T02:00:02.310000
CVE-2024-55593,0,0,9430bce7692d2c8e6d288cbe72f31d16d74be58a9c07a6a6961fc12e525a7607,2025-01-14T14:15:34.610000
CVE-2024-55593,0,1,4651565ceba3085bb8ca70fe9039d9f6a893a058022ead3391b6c8b5d7155600,2025-02-03T22:06:19.163000
CVE-2024-5560,0,0,201a92ce337d2fd4d85cefc5a8b186dd1f339de19f8ea6d91a69fddcd5fd3ef6,2024-11-21T09:47:55.983000
CVE-2024-55601,0,0,3b6016987278f61ded580e0e03402a0550929e4ad53cc1af6a73ada12213c6f3,2024-12-09T22:15:23.100000
CVE-2024-55602,0,0,396d72563ab4a374ac0c8980e8cee78cbdbdadbfbf983b79309109b631e68a0b,2024-12-10T18:15:43.500000
@ -273563,7 +273570,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d
CVE-2024-5646,0,0,c48b41c63e1dae6ddb1f5f69529911450f8300b5322652ac7b1465148b11ea55,2024-11-21T09:48:05.203000
CVE-2024-5648,0,0,bc73cf61a73f7ebbf93011e7f0eec24203116f4c2ab4460b3b361f438af2c397,2024-11-21T09:48:05.320000
CVE-2024-5649,0,0,92f21873e8ee5bd32fcc22cd04303aa3780b31222c125187737acc3fe33a1fe2,2024-11-21T09:48:05.430000
CVE-2024-56497,0,1,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000
CVE-2024-56497,0,0,a7ecc72de50d553601513fb44c5785a7cd2d4cfbd01028d279dfa23254fa1ea5,2025-02-03T20:49:01.510000
CVE-2024-5650,0,0,e326c3216630004af5368334e17751b93c2144fc6e95ba439673319f24c5efbd,2024-11-21T09:48:05.557000
CVE-2024-56507,0,0,2fcd6aea186081b10138c7efdbe4c6828fb4bc2d016266039f2e51dacfa7b54c,2024-12-27T21:15:08.287000
CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa32e4,2024-12-27T21:15:08.390000
@ -273886,16 +273893,20 @@ CVE-2024-5686,0,0,494008cd50a5cb32ba05dd687e88d5cd5348379ce547e26ef1644b29c16458
CVE-2024-5687,0,0,9369fec80d103c4a22eb73ec3506b871dd90ca5a0f07d3a11cd2907750f40445,2024-11-21T09:48:09.810000
CVE-2024-5688,0,0,59dedd8cf99f47d5410a02cdff5c904f0e85c6f33d87952e208dd952bab09c4a,2024-11-21T09:48:09.993000
CVE-2024-5689,0,0,7954cfa7cab5c9d284e75ff2916a8e3e6c71cab8207a342db66b72c3a9729209,2024-11-21T09:48:10.193000
CVE-2024-56898,1,1,9ae57ff9e729ce7948a9198f3fcb4535abcce7cb095215a11d1908052010d69e,2025-02-03T21:15:14.047000
CVE-2024-5690,0,0,d4d62df1fcd0a6ab34cd7e4b18e0510e69dc46e6ad88d84635741631f871b265,2024-11-21T09:48:10.377000
CVE-2024-56901,1,1,961934b3471c81d03b97682bc04d12f2b6ebd894d3542fa5265fea40c509a10b,2025-02-03T21:15:14.157000
CVE-2024-56902,1,1,609f9bb136b2c4af95bed57c64465a88e9193ce7d7fcc02e9749eebc0e6813ec,2025-02-03T21:15:14.270000
CVE-2024-56903,1,1,c0fde83230cba30dc68b89c58ba19b9d6bc1d05ac23f033fe63f7796558f3aec,2025-02-03T21:15:14.357000
CVE-2024-5691,0,0,0824a888e7eb71279259f37f9283a4aa7c8605aa9b71698472cf4ea15ee83b3c,2024-11-21T09:48:10.503000
CVE-2024-56914,0,0,76cdd8d94ae11c2780ca41310bed1eae7879520cc428bb077f1f775e8c7b9036,2025-01-23T17:15:16.230000
CVE-2024-5692,0,0,4b8f65097356fd8a548c2da4761bef878e098b44587a5b9b21bc347f46db95a8,2024-11-21T09:48:10.633000
CVE-2024-56921,1,1,59308a6a4118b5ed6d8f1b39e741ed93cdb6518178f579e631168f317706958b,2025-02-03T20:15:33.610000
CVE-2024-56921,0,0,59308a6a4118b5ed6d8f1b39e741ed93cdb6518178f579e631168f317706958b,2025-02-03T20:15:33.610000
CVE-2024-56923,0,0,e2647403e0cf85e5fccf746b53a51e00d5aac61312608ca59ffcd83f3ff65dd9,2025-01-28T23:15:08.067000
CVE-2024-56924,0,0,255fb5d959e1f1b6d9220b28e96e646f40e846b04df600718295ece436269b5a,2025-01-23T17:15:16.710000
CVE-2024-5693,0,0,21ec44ee8ed5f9de3ae93fab02d376513f10f0c9f8c82a8733146d6a99b0ff3a,2024-11-21T09:48:10.807000
CVE-2024-5694,0,0,96312914234d61d70e9f2b2f2db102c559d8f68a0c34e1673db920a9b13837b6,2024-11-21T09:48:10.990000
CVE-2024-56946,1,1,b09cc35b9c52557da77cca1a315e54d72326f38f92deee63bd90ec2ea9015464,2025-02-03T20:15:33.743000
CVE-2024-56946,0,0,b09cc35b9c52557da77cca1a315e54d72326f38f92deee63bd90ec2ea9015464,2025-02-03T20:15:33.743000
CVE-2024-56947,0,0,de2dbd42f02c6815b309904992c8d2e0ee10dbda0e015e0471bf9a8137017390,2025-01-28T20:15:51.500000
CVE-2024-56948,0,0,8742881b72f361dc2543476e98570b9c75cf607bb78be3d886dcff581e6d1279,2025-01-28T20:15:51.650000
CVE-2024-56949,0,0,9badb9d193ec802649c03676d00eb21db1a186f3dabe0299b597023b2e5f3799,2025-01-28T20:15:51.797000
@ -273927,7 +273938,7 @@ CVE-2024-56990,0,0,69df5a378059c143fb0394a632fffd1a0d17ff51d4e63a6bcfb36930a4a43
CVE-2024-56997,0,0,b9e3b1a369f281014b3d6ae47db288812e253e2c05f0cfa169a74fad7957b7e9,2025-01-21T20:15:35.757000
CVE-2024-56998,0,0,f5f48efbc8b4fff5f7922bcdd7558331389f08761b2f0b3a0f88eaf8ce382ca8,2025-01-21T20:15:35.937000
CVE-2024-5700,0,0,03b60b2b2d02d40bfad068e0335a335857a618ee5b010c631028ca7b55a329d1,2024-11-21T09:48:11.903000
CVE-2024-57004,1,1,ffd18e6ae33a0cef082ad91a6f38c4b08dbcc9486ac2b2eeefe2f2fe6b1f73c1,2025-02-03T19:15:12.777000
CVE-2024-57004,0,0,ffd18e6ae33a0cef082ad91a6f38c4b08dbcc9486ac2b2eeefe2f2fe6b1f73c1,2025-02-03T19:15:12.777000
CVE-2024-5701,0,0,9915dfee3e359182f9adc135791d10f705664babe0d2fafe943bf47d66747252,2024-11-21T09:48:12.093000
CVE-2024-57011,0,0,e423cf8108eeaccf1a4a6a564034672c57143be7df30237f44f891951f76e1ce,2025-01-16T15:15:13.873000
CVE-2024-57012,0,0,9eeaeb247ea982bbb49160ccdf98082729e7cd26e86494fbb31016855f1607c5,2025-01-16T15:15:14.090000
@ -273959,16 +273970,16 @@ CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51
CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000
CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000
CVE-2024-57095,0,0,34b0fe239993395502715f1a333962d78d9014d2bbef810d2b8502261121cb56,2025-01-24T20:15:33.473000
CVE-2024-57097,1,1,6b71dfad1fb80ad09c345d2411b73a123cb3b3664a2723a2bc0cd9a9c119211c,2025-02-03T20:15:33.897000
CVE-2024-57098,1,1,526c6bd5fc25a9e33d86cb6eb5f9c2f28fc48cd8314a760fa7b874925ceb9371,2025-02-03T20:15:34.013000
CVE-2024-57099,1,1,6862aaeb55106a9d56f138c9c5c35e97d385d30773837f82252148803043a42f,2025-02-03T20:15:34.157000
CVE-2024-57097,0,1,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000
CVE-2024-57098,0,0,526c6bd5fc25a9e33d86cb6eb5f9c2f28fc48cd8314a760fa7b874925ceb9371,2025-02-03T20:15:34.013000
CVE-2024-57099,0,0,6862aaeb55106a9d56f138c9c5c35e97d385d30773837f82252148803043a42f,2025-02-03T20:15:34.157000
CVE-2024-5710,0,0,9b8da5c1d380b97df0420ebc8886a7e69a937a7c44dad142b0c060e78b36a5bf,2024-11-21T09:48:12.877000
CVE-2024-5711,0,0,ee26b23352bc3eb492910cce0ac4d4e0fcc138593b5b885cf10639f27fe76384,2024-11-21T09:48:13.010000
CVE-2024-5712,0,0,d9053a973766129971458824397812ec1e4acf4c6e0c33b032abc440bd305a91,2024-11-21T09:48:13.160000
CVE-2024-5713,0,0,3391d5de33d01a2f3feb723b6a12c2cc29413174b2bdbe5c4e85347aebdc9be5,2024-11-21T09:48:13.273000
CVE-2024-5714,0,0,849fc94b6902757fdfdae1f78ce00df63ab2c5ba63744e880696de74b0f190ce,2024-11-21T09:48:13.440000
CVE-2024-5715,0,0,8c569768d6a890bf6135b49c7618937c530109ec67dd48fa94109e61c60d211f,2024-11-21T09:48:13.567000
CVE-2024-57159,0,1,bea9b261af3163b5fd86d5922e5e2e3ee5fbac4f0e45b7bbf59086d2f729fecf,2025-02-03T19:15:12.880000
CVE-2024-57159,0,0,bea9b261af3163b5fd86d5922e5e2e3ee5fbac4f0e45b7bbf59086d2f729fecf,2025-02-03T19:15:12.880000
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
CVE-2024-57160,0,0,d044a821e4cd7d6f282a359da69fef7f6a3fff09a99b2b7f3d3224dfc169d2b6,2025-01-31T21:15:10.910000
CVE-2024-57161,0,0,0495a61cce9967abce04c38c66d6e333bd202089322d89ea341f73e5c8ecf8ff,2025-01-31T21:15:11.153000
@ -273993,8 +274004,8 @@ CVE-2024-57226,0,0,13241ab5fcad4d8797ceadffb98a698582b96500669617b3e0cb2d147cf0e
CVE-2024-57227,0,0,647d380c097e46d112c6c1fffa7a24d381c637a1d42abe27695321f81f5a0211,2025-01-16T18:15:25.373000
CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c5cd,2025-01-16T18:15:25.703000
CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000
CVE-2024-57237,1,1,a390f960ccf182bd13158080a011b6cda5f49b1e55bf9273343ed86467295bfc,2025-02-03T19:15:13.053000
CVE-2024-57238,1,1,62a444d988b312dab378b304977910d82ff6c4e477b76b6aac960d8b3395fdb0,2025-02-03T19:15:13.177000
CVE-2024-57237,0,0,a390f960ccf182bd13158080a011b6cda5f49b1e55bf9273343ed86467295bfc,2025-02-03T19:15:13.053000
CVE-2024-57238,0,0,62a444d988b312dab378b304977910d82ff6c4e477b76b6aac960d8b3395fdb0,2025-02-03T19:15:13.177000
CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000
CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000
CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000
@ -274031,16 +274042,17 @@ CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba
CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000
CVE-2024-57432,0,0,919d02e0a1b59673a162a8bd045a890978b7d93d202a67f79b5bbe75f3b09109,2025-02-03T17:15:21.883000
CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd3c8,2025-02-03T17:15:22.020000
CVE-2024-57434,0,0,874e15ef2aff82b5f54dab7d50703f5ff0bff116ab1217a9cfc99f88168e235b,2025-01-31T22:15:12.613000
CVE-2024-57435,0,0,b2577210fdc470006361399831465a52f720053bc414a2700c7600ed0e018e83,2025-01-31T22:15:13.103000
CVE-2024-57434,0,1,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000
CVE-2024-57435,0,1,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000
CVE-2024-57436,0,0,282eb6e7074212031e9dd5ef81b2445bf8af0720ec49623ad39893ccbcfafed8,2025-01-29T17:15:28.480000
CVE-2024-57437,0,0,53c9041a084a44e480671d9200a4e0fe3bfef1699e2847a7342d00abb4f9ebf0,2025-01-29T15:15:17.183000
CVE-2024-57438,0,0,a3f3379a583f056a3eceb0974a3a5c5f30e5dd1beddcfe86f2ad82efd2782a16,2025-01-29T15:15:17.283000
CVE-2024-57439,0,0,4cb58a3938fc882d4399a493b10fd8366d3d4345b283844490118a46a57a5249,2025-01-29T17:15:28.650000
CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000
CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000
CVE-2024-57450,1,1,d672f4d4399feef9d4b7e96fe9a32a34f21114f50d942adfac374a01ff7e7330,2025-02-03T20:15:34.253000
CVE-2024-57452,1,1,ab17ba2c958b860fb1e227749065c42543e789b75ec4aef288002bc5421c2347,2025-02-03T20:15:34.373000
CVE-2024-57450,0,0,d672f4d4399feef9d4b7e96fe9a32a34f21114f50d942adfac374a01ff7e7330,2025-02-03T20:15:34.253000
CVE-2024-57451,1,1,25da2c69e1bedb2de75fffcef691d5e5e61c2c7065c349b48d354ab17fd19e5d,2025-02-03T21:15:14.893000
CVE-2024-57452,0,0,ab17ba2c958b860fb1e227749065c42543e789b75ec4aef288002bc5421c2347,2025-02-03T20:15:34.373000
CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000
CVE-2024-57471,0,0,046199a988b5112e867977ad6d82bd57c13f52bc945d9be0e662c5b8b39ac509,2025-01-23T17:15:17.410000
CVE-2024-57473,0,0,5e3e2f533ef78e6f4b74e928a4bd67c4e25caa058e34b8782863e4b551c04e05,2025-01-16T16:15:33.183000
@ -274051,15 +274063,15 @@ CVE-2024-57483,0,0,42f78ad72eefb62ad9fc5fc46850ff2f6a434ca41fcee6006d9831dee74ed
CVE-2024-57487,0,0,7babb41ac17147ce892708b7e46321375976a25b6830def13d44a67b1829677d,2025-01-13T20:15:29.090000
CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13531,2025-01-13T20:15:29.240000
CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000
CVE-2024-57498,1,1,327faaf8069990c5b00393e08a471db79b18cb91105dd96ae1bae790e2e1ded5,2025-02-03T20:15:34.477000
CVE-2024-57498,0,0,327faaf8069990c5b00393e08a471db79b18cb91105dd96ae1bae790e2e1ded5,2025-02-03T20:15:34.477000
CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000
CVE-2024-57509,0,0,c607c9da29bfb31a3cf0e4d4a7622a993cd72daf6b5f7b6cf0694edfad6158b9,2025-01-31T21:15:11.630000
CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000
CVE-2024-57510,0,1,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000
CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000
CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000
CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000
CVE-2024-57519,0,0,1a1af74905cce20abc5596e2722805c77bb23c1788056fac531228633dff1e0a,2025-01-29T15:15:17.483000
CVE-2024-57522,0,1,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000
CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000
CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000
CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000
CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000
@ -274080,7 +274092,7 @@ CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff117
CVE-2024-57556,0,0,bb0c8b6daab6a4685a3c223d5c61804de336ccacfb88de2d986d4a4a234b5bc3,2025-01-24T21:15:10.680000
CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000
CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000
CVE-2024-57575,0,1,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000
CVE-2024-57575,0,0,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000
CVE-2024-57577,0,0,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000
CVE-2024-57578,0,0,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000
CVE-2024-57579,0,0,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000
@ -274095,7 +274107,7 @@ CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b16
CVE-2024-57595,0,0,d5693a2fe10b4abac0b79780793b0dd88de974ed3b2d52993c0faf6b5032403c,2025-01-27T16:15:31.613000
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
CVE-2024-57611,0,1,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000
CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000
CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000
CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000
CVE-2024-57617,0,0,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000
@ -274151,25 +274163,25 @@ CVE-2024-57661,0,0,6d08cb67e58ae875891d256b6bd08dc049d206ee925b20ca33928959aac61
CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaead1f,2025-01-23T17:15:17.830000
CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18
CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000
CVE-2024-57665,0,1,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000
CVE-2024-57669,1,1,d409eadc88b4529018be8ca17f00281cdf8ff74894d368fef3370b5b0f111a8d,2025-02-03T20:15:34.960000
CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000
CVE-2024-57669,0,0,d409eadc88b4529018be8ca17f00281cdf8ff74894d368fef3370b5b0f111a8d,2025-02-03T20:15:34.960000
CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000
CVE-2024-57676,0,1,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000
CVE-2024-57677,0,1,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000
CVE-2024-57678,0,1,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000
CVE-2024-57679,0,1,e071a51ad34b4e4298ac98848d9860614215c6058e4439e5d23edf7585ed7bf2,2025-02-03T20:15:35.577000
CVE-2024-57676,0,0,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000
CVE-2024-57677,0,0,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000
CVE-2024-57678,0,0,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000
CVE-2024-57679,0,0,e071a51ad34b4e4298ac98848d9860614215c6058e4439e5d23edf7585ed7bf2,2025-02-03T20:15:35.577000
CVE-2024-5768,0,0,6c9ff2121591327d1892929b36d619819744c12030a51756837ec582065802b9,2024-11-21T09:48:18.613000
CVE-2024-57680,0,1,3f9879f31e0ddbdc8f00b143bb53346d8eb78f9585e491a569530ce2a7f38df4,2025-02-03T20:15:35.740000
CVE-2024-57681,0,1,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699c05,2025-02-03T20:15:35.907000
CVE-2024-57682,0,1,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
CVE-2024-57683,0,1,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
CVE-2024-57680,0,0,3f9879f31e0ddbdc8f00b143bb53346d8eb78f9585e491a569530ce2a7f38df4,2025-02-03T20:15:35.740000
CVE-2024-57681,0,0,46f40990744fd749d4a9af1e8df7c4b5a0bf9ba88074a44657f2ef0606699c05,2025-02-03T20:15:35.907000
CVE-2024-57682,0,0,ba4697aa7ced6095caedc3387a0a1add163335f15a4c7e96b7b3a02a7a9c468f,2025-02-03T20:15:36.063000
CVE-2024-57683,0,0,90a07d3676c8ceb8f75a6cba51bb9c84a613aace3c1524f48e2a9bfdcd2b0e79,2025-02-03T20:15:36.223000
CVE-2024-57684,0,0,bb9784b081b8abb57890ab5a23ebb4f4e85b9b747d00a9882042baa37a4ca976,2025-01-16T20:15:33.340000
CVE-2024-57686,0,0,bff67f4870fa1a425dfb954d4d6446624978b67b9e08d7ce0318060f20535c1f,2025-01-10T15:15:16.003000
CVE-2024-57687,0,0,3f591284140d188a0181694e131e95eee1c6490731d9aebb4db57934394e9a88,2025-01-10T16:15:29.670000
CVE-2024-5769,0,0,abfeb18ae91d2e4533cdbeb4bf7ad73d20beb760222f23226220c40a5c6d9f91,2025-01-09T11:15:16.127000
CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d0a,2024-11-21T09:48:18.730000
CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000
CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000
CVE-2024-57704,0,1,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
CVE-2024-57719,0,0,643301859a6cc77c578653132f0918510423f22a025f08c288f4c8d7e8730d3b,2025-01-23T15:15:11.920000
CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000
@ -274203,9 +274215,9 @@ CVE-2024-57772,0,0,5c9e3ebdf8909aa581e4be2fe94c325564f1d0feb1a0d39ebfd0677986ed4
CVE-2024-57773,0,0,1472bdb16aea64af8fca7b40bd42060d257a747077a74fb79d13a84acc8a924d,2025-01-21T17:15:16.250000
CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485501,2025-01-21T17:15:16.433000
CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000
CVE-2024-57776,0,1,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000
CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000
CVE-2024-57784,0,0,13e3853bb84451bd96ad42acd016f282a76aebd120900fc78df88a4edeadade0,2025-01-16T23:15:08.213000
CVE-2024-57784,0,1,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000
CVE-2024-57785,0,0,135792af397929898d575e62bc51d4dfce68cd8f2d0c7ad555f4b589f8dc76ad,2025-01-16T23:15:08.317000
CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46fc9,2024-06-12T08:15:51.240000
CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000
@ -274328,7 +274340,7 @@ CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022a
CVE-2024-57965,0,0,beca1a5c4241b8a17f2dc2e6caf9cfcb35d784b0c331b6bcd655a61453686e3e,2025-01-29T10:15:08.113000
CVE-2024-57966,0,0,40e2f22cb22a31ff1abb28cf2e7cdb6b2203c6459f1e312f0ed24484eb3b3c7c,2025-02-03T05:15:10.080000
CVE-2024-57967,0,0,91eb1bfd2e20a3b6504519270fe1735c3bd2ee8a6236093524acc33a3a4157f6,2025-02-03T18:15:37.853000
CVE-2024-57968,1,1,bd4f5a3636572fc02776014d13068e8c1326b225cc640c80d722596667392e5d,2025-02-03T20:15:36.550000
CVE-2024-57968,0,0,bd4f5a3636572fc02776014d13068e8c1326b225cc640c80d722596667392e5d,2025-02-03T20:15:36.550000
CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000
CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000
CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000
@ -276942,7 +276954,7 @@ CVE-2024-8794,0,0,b24016e059cacd35faa72f5043453c9a5987b5a31d25c70b908b4165379261
CVE-2024-8795,0,0,039f0ab0aa3ee80883042c232e961eb1ed22c0504e1aebe7367716484cf5c223,2024-09-26T16:46:55.587000
CVE-2024-8796,0,0,cfeb096d9be350a9d8b58652d1aa1581aa03d71412f47ada7bdf32657eb188f2,2024-09-30T14:10:38.937000
CVE-2024-8797,0,0,ca9c0c02beee7110c7ac2e2c807511497bad347868533650bf39b35e4a13e197,2024-09-27T14:02:23.700000
CVE-2024-8798,0,1,87e203a0f34be4e4602bea5d73fb9478a13759ebf35f432f2415726fcbd76602,2025-02-03T20:13:18.163000
CVE-2024-8798,0,0,87e203a0f34be4e4602bea5d73fb9478a13759ebf35f432f2415726fcbd76602,2025-02-03T20:13:18.163000
CVE-2024-8799,0,0,f5f63f9842eda4e37d16e3a0587518db5a4c87c6136b59cf05197833f6fd2662,2024-10-07T19:22:12.627000
CVE-2024-8800,0,0,284c323dbe986db557a2960bdea255f7fe6a9ec33bd09ee83b41a574a4f95eea,2024-10-08T18:59:42.310000
CVE-2024-8801,0,0,1e0aae29be9c0cb744c09fcf6b871e68e47c8e0119f25e788bcd23b055cde119,2024-09-30T14:23:46.140000
@ -278105,7 +278117,7 @@ CVE-2025-0432,0,0,96716eb8c9d05acc81ec96912ebe6b064fb606be34e0c028359855e734f07b
CVE-2025-0434,0,0,9423e4a9647036afb879cbc64af4784af28d91fab549e68c542c16a9ee7ea8f9,2025-01-15T15:15:14.273000
CVE-2025-0435,0,0,6d6e40a41cd469c8312087bc239581bfd90670921823d0c0e139702d7eee198e,2025-01-15T15:15:14.430000
CVE-2025-0436,0,0,1941a6cad10f95e483c28366f53c7ac5f049d3cbdae2452e2d07517bee4202b8,2025-01-15T15:15:14.620000
CVE-2025-0437,0,1,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000
CVE-2025-0437,0,0,13fe255170db1ac9d25ee4d2027f7e4790c577c7c77e5e9506d3559bc1d4114a,2025-02-03T19:15:13.967000
CVE-2025-0438,0,0,39caf6a5a4788bf8fc0f6b91aa36aaac29a5413ddbad6f8e163db37af52d3ab3,2025-01-15T15:15:14.817000
CVE-2025-0439,0,0,0b06da63dc3bcca461d845db4298a4b15ecf0710d9ba4c4d9523a576764e9836,2025-01-15T15:15:15
CVE-2025-0440,0,0,f9b771ae4043bf8cf99eeaad5bdb101bbcdc5b7cce3f6409b0beeb87f15a5e43,2025-01-15T15:15:15.247000
@ -278357,10 +278369,10 @@ CVE-2025-20631,0,0,41bd5f6770aac6cb8c5b5054e9d7f613bb3ac5a0a94b3b15b3e504232752e
CVE-2025-20632,0,0,2d77a25a03c3f236a5d5f41b49b7085b4a24a3e575edfc367aa2e42674296ff3,2025-02-03T17:15:25.383000
CVE-2025-20633,0,0,ca283995979e4830fdde2b3067424e1afcfed699f49bf96f3b36b2663cbfbf6b,2025-02-03T17:52:49.367000
CVE-2025-20634,0,0,a7b8334cae34280efebb4b6c9cf3578c9469ec3636de93faf80e00f103f3458d,2025-02-03T18:17:55.977000
CVE-2025-20635,0,1,65fe66228d0f30d1cbb4c96eba5c4c20eab6b3488b5e520bb46c7b3b55023b67,2025-02-03T19:31:24.417000
CVE-2025-20636,0,1,6b1cb377acf80eca086d18d547ffd31b4fe2dff2463d36def9e4ca0101d37bc2,2025-02-03T19:39:49.587000
CVE-2025-20635,0,0,65fe66228d0f30d1cbb4c96eba5c4c20eab6b3488b5e520bb46c7b3b55023b67,2025-02-03T19:31:24.417000
CVE-2025-20636,0,0,6b1cb377acf80eca086d18d547ffd31b4fe2dff2463d36def9e4ca0101d37bc2,2025-02-03T19:39:49.587000
CVE-2025-20637,0,0,01e21e716c01df51a52eb39da1f26c221e3ebff427ba1c1f070d11a24095fec6,2025-02-03T17:54:51.210000
CVE-2025-20638,0,1,9e714cc585f02512c5c5fda219a2d683a01596c9aa307760426e5898e59938cc,2025-02-03T19:40:23.927000
CVE-2025-20638,0,0,9e714cc585f02512c5c5fda219a2d683a01596c9aa307760426e5898e59938cc,2025-02-03T19:40:23.927000
CVE-2025-20639,0,0,8fecb2ed6400cd2539c2040114be616b9077331d755b64fbfcf682dd3141d0a6,2025-02-03T18:15:41.977000
CVE-2025-20640,0,0,40ff3414c09b58aa1346613707feda74cde698d5358816ed9981132edb8e2f3a,2025-02-03T18:15:42.190000
CVE-2025-20641,0,0,153c26cc51726ea02952f964a6ba554db7a970cb9d0ddabf4bb6e6564c1ac555,2025-02-03T18:15:42.400000
@ -278695,14 +278707,14 @@ CVE-2025-21661,0,0,0fa8c68f8e644a9e2944a5faceaf5fb67752dd573becbebbb71e40324bd4c
CVE-2025-21662,0,0,a5b1a0271d3432d1de3ee1bda0755a5b6602cc0585dec57fd031d28aaec3d7e4,2025-01-21T13:15:09.847000
CVE-2025-21663,0,0,adf4d90fe890eb7047d924c99b97e4be605c879bb910a835e1b3e6e621f3836a,2025-01-21T13:15:09.947000
CVE-2025-21664,0,0,87fd856e07f552629b0a9eaa9bb54dc5da1a52702744fda35e3dcc449f63ce6a,2025-02-02T11:15:15.697000
CVE-2025-21665,0,1,fb059002f5ce248788ba8e290451855e9eb46e1b2f953588f42101e6529c244b,2025-02-03T19:57:54.933000
CVE-2025-21666,0,1,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4316,2025-02-03T19:59:37.907000
CVE-2025-21667,0,1,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000
CVE-2025-21665,0,0,fb059002f5ce248788ba8e290451855e9eb46e1b2f953588f42101e6529c244b,2025-02-03T19:57:54.933000
CVE-2025-21666,0,0,09a887db3b9a7f1ff5a317bee005091ad62ba5630ef0df2d9565a2ca4f2b4316,2025-02-03T19:59:37.907000
CVE-2025-21667,0,0,1d3421162daba54a5b257dec21046c336ea4d1c2548b277380c64838560bc3f3,2025-02-03T20:00:28.727000
CVE-2025-21668,0,0,8b20b97df5dd2ed7cbbba0cbf3d1ebbd67685e3ecc54b7dd3a7c5749df4931d3,2025-01-31T12:15:27.960000
CVE-2025-21669,0,0,57297746ea6af4232634b5feda860c3a6d2f8b8ad8b40e3f332c512b5ded5f6b,2025-02-02T11:15:15.980000
CVE-2025-21670,0,0,d12c9401cba1e8e9338731815f7b5e159255c5e225990eb8a1877fd4ffbecb00,2025-01-31T12:15:28.160000
CVE-2025-21671,0,0,82055684ba59cdb4ac3ab58ee2cb025fec2afdb765aa94af38cc1c0dc4207a2a,2025-01-31T12:15:28.263000
CVE-2025-21672,0,1,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000
CVE-2025-21672,0,0,cab58e2d04d760da852a8245246140e438babd82d5c91b36a25530a9eb3934b5,2025-02-03T20:04:22.147000
CVE-2025-21673,0,0,9e628820134e026486c4acee1bb676a96b70d1edf2eac2a3aa94349cc89905c5,2025-01-31T12:15:28.463000
CVE-2025-21674,0,0,69194298cd8940d45652dbb676d8c3f7403965bcf926595dfedefd4ad16e7c95,2025-01-31T12:15:28.560000
CVE-2025-21675,0,0,c3bd3ced751194a1431aa53c613e3e5b576f540db0c777b43a76ef120c168980,2025-01-31T12:15:28.677000
@ -278713,7 +278725,8 @@ CVE-2025-21679,0,0,c0a036194b73d5170da4843624623a1fb4b9e085c3ba3466b8d8f2581a1bd
CVE-2025-21680,0,0,b3ddbaaa8dc622ecaf35025de804bcc4011af952e154dc87e5b861a81b1add98,2025-01-31T12:15:29.160000
CVE-2025-21681,0,0,33386cfbe1cd639dc40c49e4251fab4b0a535f237b027c151bda6b0c921455cb,2025-01-31T12:15:29.260000
CVE-2025-21682,0,0,af36b62ce352ba03944473d01a4afdd64cf998543119197419230273df44e036,2025-01-31T12:15:29.363000
CVE-2025-21683,0,1,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
CVE-2025-21683,0,0,eb90b34b8c26cfd5a6fc922b697d6b0c2dfe15c32e6ed59da1ae357c1a3f7802,2025-02-03T20:01:29.163000
CVE-2025-22129,1,1,33e0404310f131287ac9ad09e9894e740e319437070c1354f7ac6457bfb0c49c,2025-02-03T22:15:28.040000
CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000
CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000
CVE-2025-22132,0,0,92f694afc6ce174171da36824da367c743ab8d73a418a3347309264d0570fa9a,2025-01-07T22:15:31.590000
@ -279076,14 +279089,15 @@ CVE-2025-22912,0,0,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaed
CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000
CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000
CVE-2025-22917,0,0,719cb439e4aa013d46c277c9fd9c1581990f1a43ff92759e99b4634c1058cb35,2025-01-29T16:15:43.907000
CVE-2025-22918,1,1,e2d613a5eab7f892f5de317abf0d46cdcd99aac12650adb75272eb6183939977,2025-02-03T21:15:15.400000
CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000
CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000
CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000
CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000
CVE-2025-22964,0,1,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
CVE-2025-22964,0,0,6f4095b29312f46a36413a75c5449d4448cc7574209011a37c7cdb11e5f0802a,2025-02-03T19:15:14.207000
CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000
CVE-2025-22976,0,1,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
CVE-2025-22978,1,1,c0e66c6fb03b619e0a62303a233be14e0f9e5c7efff96484200104b1d2538157,2025-02-03T20:15:36.720000
CVE-2025-22976,0,0,34e44a1193299f2815c5773a405812b482572222a2b2eca4f8d55245112e8b61,2025-02-03T19:15:14.397000
CVE-2025-22978,0,0,c0e66c6fb03b619e0a62303a233be14e0f9e5c7efff96484200104b1d2538157,2025-02-03T20:15:36.720000
CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000
CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000
CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000
@ -279093,8 +279107,8 @@ CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d
CVE-2025-23001,0,0,f86b72eba255cd7891e4129e22491fe49ff2d487b6e537f62dbf55fbfcb1eb17,2025-02-03T17:15:26.960000
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
CVE-2025-23007,0,0,7a82ccd68ff0865dca2d931df3c91220e1f0e4aa623d29dba6dab4a9e33e015f,2025-01-30T14:15:38.300000
CVE-2025-23011,0,1,0ac026798cd262001be0206676fdedf031be9d5d65106916b11a08692a6fcc17,2025-02-03T20:15:36.823000
CVE-2025-23012,0,1,80e79d2dca58dc0de4053922ddf003d61df0dcf631e49251d47ea13fe8bf6a1b,2025-02-03T20:15:36.977000
CVE-2025-23011,0,0,0ac026798cd262001be0206676fdedf031be9d5d65106916b11a08692a6fcc17,2025-02-03T20:15:36.823000
CVE-2025-23012,0,0,80e79d2dca58dc0de4053922ddf003d61df0dcf631e49251d47ea13fe8bf6a1b,2025-02-03T20:15:36.977000
CVE-2025-23013,0,0,41312d3c40b04a23352f5579b00dccd945ae6a58acc9182af7bda141c59bc5af,2025-02-03T10:15:09.250000
CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000
CVE-2025-23018,0,0,56e80d02e024f696b384ef49ed4d211481ba7fbade5b33c2ad0870cd52e237b6,2025-01-29T18:01:47.313000
@ -279169,6 +279183,7 @@ CVE-2025-23206,0,0,7dc609075e2d325da43818b49c297d2a05018960dae87cf88a1c771faf87f
CVE-2025-23207,0,0,a61af6f2707ecd45627a7e7ca479f8fbbb333f7f551bc284878a54328b3225b8,2025-01-17T22:15:29.523000
CVE-2025-23208,0,0,bbf05788b0a0727b64438f71dac7780433656c51584efb22baeb9514bc090286,2025-01-17T23:15:13.107000
CVE-2025-23209,0,0,a2ae850acf3d242275b1a23f48b16552263d960a288c8911fdea38e62d87c1f8,2025-01-18T01:15:07.633000
CVE-2025-23210,1,1,6a4edecdd2be14cc5baf4055756d1a14722e22c08495ddb9aeb51e09b13f4384,2025-02-03T22:15:28.187000
CVE-2025-23211,0,0,a6a11d8dd85a5dbd2e936abcb11edcf0f73f45b37a04f92dc8536feb2b313fd5,2025-01-28T17:15:26.160000
CVE-2025-23212,0,0,eba05a199612019b0b5a609d5960f5c38b362665c405e3d131dbfcf2d2cd93cb,2025-01-28T17:15:26.273000
CVE-2025-23213,0,0,aff38eabb9bd04672d3ed96bb05c973962632a9b4695af8a2793f4269fb88cb5,2025-01-28T16:15:41.217000
@ -279587,6 +279602,7 @@ CVE-2025-24020,0,0,8af21263c34fe60ecd58053859c55a054f32c688226633322d20a805caa3d
CVE-2025-24024,0,0,2eed754b499c2c804003117f998e15abebe8d400a886c780cd3d285697b11dd6,2025-01-21T20:15:46.617000
CVE-2025-24025,0,0,64a82ba00832aea6030e4df8abcdcc543fdbba12bd4c4b98f456103b2c022fe7,2025-01-24T21:15:11.600000
CVE-2025-24027,0,0,7aafd16a9bde691788eff3c983eb76660cc50c899ff68b8c3f8ccfb1cc458ed4,2025-01-22T15:15:27.090000
CVE-2025-24029,1,1,385ccc4a55fe24bfc42e9bba5beb9d3a9d879a7dbc582e7f01a5fdcd43ff103e,2025-02-03T22:15:28.320000
CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
@ -279631,7 +279647,7 @@ CVE-2025-24136,0,0,cfcba9ff821cc628de6fb3887686b8fc52473b5da8776ef5e6f574056e7be
CVE-2025-24137,0,0,04c64c426bacf16b84ebfa21934b389a675da3a154e1b710c9e3a0886823032f,2025-01-28T20:15:56.410000
CVE-2025-24138,0,0,8ba7e2a460f500f479f243de8e5f463ca2f4161b2ff8b847e539449f56fe2683,2025-01-28T16:15:43.077000
CVE-2025-24139,0,0,d6c7fd3e2db2143c5e7584244c4444900037ff452b8e30271343396f1c3cbd36,2025-01-28T16:15:43.230000
CVE-2025-24140,0,1,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc9a3,2025-02-03T20:15:37.090000
CVE-2025-24140,0,0,15468496fa0a9634917bba3f562f5643ce72b83581dd6dd6e92723a4017bc9a3,2025-02-03T20:15:37.090000
CVE-2025-24141,0,0,a4fcae130e4f47999a3a0c91057add2d4aac7b8b215cd49acb885ba09a63aad5,2025-01-30T18:03:08.223000
CVE-2025-24143,0,0,b231b73a80f231535ad8a610ad9396187ff00845bbac56678616fc96c1cff4f5,2025-01-30T18:03:57.780000
CVE-2025-24145,0,0,7f09f4c2ce26328feb2ae7c1f55888f703aed8b1e0464a9dc401981b74d48b00,2025-01-30T18:04:51.137000
@ -279671,6 +279687,8 @@ CVE-2025-24365,0,0,0885a59ea8828e04f21a02f08ea8ac3037ccb68262ab26df85674cf9da4c0
CVE-2025-24367,0,0,0519da00464691193e6161cca54d34f74e93b28b2087f7c83a26c6e3b8f04cba,2025-01-27T19:15:29.440000
CVE-2025-24368,0,0,af7736525efcb0b21a0f340be92a27528f7606ab1a8aa5d024adf94625d201ad,2025-01-27T19:15:29.540000
CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b686c,2025-01-27T23:15:11.310000
CVE-2025-24370,1,1,83743ece71a996b0e21ce17e6c65dea563fc24a45ce8b656cba6b2e14f1a3850,2025-02-03T21:15:15.547000
CVE-2025-24371,1,1,57bc93d515be16c430d092f8c15eb1e2e39f52bd4569d7d2e9ca4ba87102e539,2025-02-03T22:15:28.460000
CVE-2025-24374,0,0,9371a32ae864472b5b2206b647349dfc1f97f02d4f3badf9a98913dbf627626c,2025-01-29T16:15:44.090000
CVE-2025-24376,0,0,734e2f759167b0a0d3f1cd79dd5b39bd42aea80444fe016a65b89320499a50ba,2025-01-30T16:15:31.630000
CVE-2025-24389,0,0,a01d367c2e14347969ed1e747916fa31b486bd94ca0294463ebcf2d13dad8476,2025-01-27T06:15:24.170000
@ -279911,9 +279929,20 @@ CVE-2025-24885,0,0,0a632954017de6517b1f4086dc09ffdb61b42a67962d4ef471217a658992e
CVE-2025-24886,0,0,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000
CVE-2025-24891,0,0,07e08674cd8442d8685f561260fcf45fa0fd7fb9d59fcfb97bcd82467bccf06d,2025-01-31T23:15:08.457000
CVE-2025-24898,0,0,f8bcfc2259fc3d9911e2a852f568ccc91b7d19b0d7df108faeb95d24c0f1edd6,2025-02-03T18:15:43.077000
CVE-2025-24899,1,1,c8babf5cb0e1a1322604a66a391923a801b5adce4a2bd2bc30da99912d6f55d7,2025-02-03T21:15:15.703000
CVE-2025-24901,1,1,85fbd99670cb7152f5a78ddd2f372641c62c288a964885088ec69ea93f6ac6c8,2025-02-03T22:15:28.590000
CVE-2025-24902,1,1,2cc845a297fcacb3d61527c2b8b3a8f2873afb7eb26a19393c280fa4f0f5fe87,2025-02-03T22:15:28.723000
CVE-2025-24905,1,1,535ec92bc6acb3eb33e964542acc8eac8b5c789380b95a7fcb739895115d2463,2025-02-03T22:15:28.840000
CVE-2025-24906,1,1,b6faef0ea9b695012a554192b6a93297c54e48f40988978b0cdab94c59577d08,2025-02-03T22:15:28.963000
CVE-2025-24957,1,1,ea9a23ee106a4b65627ac9dbe94e869d7e64f53ea3940441de0f703152984d30,2025-02-03T22:15:29.087000
CVE-2025-24958,1,1,41151fe3d3b6ab62a73ff1092b814c4678faa886a270ab7e7037435a9a8965d7,2025-02-03T22:15:29.210000
CVE-2025-24959,1,1,3f50c1ad5f7972062b8fc24a1fe63006f07002b7278ef49137dfcb467a189b97,2025-02-03T21:15:15.853000
CVE-2025-24960,1,1,53a5923d99a607347416d0a9045b9aa62d1d0c885f01e9f373c8dc3c2431470d,2025-02-03T21:15:16.020000
CVE-2025-24961,1,1,2cbff65566e3cbf13800376e9c95f30416724a925e1578b879a0d47f85d2926b,2025-02-03T21:15:16.170000
CVE-2025-24962,1,1,cad0fbdcfb05076f806434170502dc17aca55f786aca2318dd6c83afd74eb9b8,2025-02-03T21:15:16.317000
CVE-2025-25062,0,0,d7cd47140e90c99ff5d70fbea50bb5a39373533859e38c36979aba1d23137e6e,2025-02-03T04:15:09.587000
CVE-2025-25063,0,0,8c34659c6a257a89c707c83868a8b18d34ee010ab7504a5a7479117985ac792f,2025-02-03T04:15:09.760000
CVE-2025-25064,1,1,3076e4ff7637d7a7b60e69dd88ee29e96116ff1d59c408ed746bbdb8163cc047,2025-02-03T20:15:37.257000
CVE-2025-25065,1,1,58746094964b936818741b64449bb715aafff8a3479a301f5483d466acca8651,2025-02-03T20:15:37.370000
CVE-2025-25064,0,0,3076e4ff7637d7a7b60e69dd88ee29e96116ff1d59c408ed746bbdb8163cc047,2025-02-03T20:15:37.257000
CVE-2025-25065,0,0,58746094964b936818741b64449bb715aafff8a3479a301f5483d466acca8651,2025-02-03T20:15:37.370000
CVE-2025-25066,0,0,d0c17153a53bf4d9b0d515b1e1a73dc9d8d2f57a6959d34f7f617b813c748218,2025-02-03T06:15:11.373000
CVE-2025-25181,1,1,f7b9cf7b4935e5ecbcd9854aa2796da2ee83f10476b9a7d0dba28c2d5cb813ed,2025-02-03T20:15:37.477000
CVE-2025-25181,0,0,f7b9cf7b4935e5ecbcd9854aa2796da2ee83f10476b9a7d0dba28c2d5cb813ed,2025-02-03T20:15:37.477000

Can't render this file because it is too large.