mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-30T17:00:31.911187+00:00
This commit is contained in:
parent
ad49decda8
commit
ce19d2a50d
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-30759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T21:15:09.147",
|
||||
"lastModified": "2024-11-21T07:03:19.520",
|
||||
"lastModified": "2025-01-30T16:15:26.713",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4568",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-05-01T15:15:09.160",
|
||||
"lastModified": "2024-11-21T07:35:30.647",
|
||||
"lastModified": "2025-01-30T16:15:28.620",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -35,6 +35,26 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -75,6 +95,16 @@
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47874",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.423",
|
||||
"lastModified": "2024-11-21T07:32:26.633",
|
||||
"lastModified": "2025-01-30T16:15:27.560",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47875",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.483",
|
||||
"lastModified": "2024-11-21T07:32:26.780",
|
||||
"lastModified": "2025-01-30T15:15:10.413",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47876",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.537",
|
||||
"lastModified": "2024-11-21T07:32:26.917",
|
||||
"lastModified": "2025-01-30T16:15:27.707",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47877",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.590",
|
||||
"lastModified": "2024-11-21T07:32:27.047",
|
||||
"lastModified": "2025-01-30T16:15:27.900",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-47878",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:10.647",
|
||||
"lastModified": "2024-11-21T07:32:27.203",
|
||||
"lastModified": "2025-01-30T16:15:28.067",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48186",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2023-05-01T15:15:09.083",
|
||||
"lastModified": "2024-11-21T07:32:56.463",
|
||||
"lastModified": "2025-01-30T16:15:28.230",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@lenovo.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
@ -35,6 +35,26 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -75,6 +95,16 @@
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-295"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-48482",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T05:15:27.407",
|
||||
"lastModified": "2024-11-21T07:33:25.177",
|
||||
"lastModified": "2025-01-30T16:15:28.450",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0891",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.513",
|
||||
"lastModified": "2024-11-21T07:38:02.600",
|
||||
"lastModified": "2025-01-30T15:15:11.563",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0924",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.620",
|
||||
"lastModified": "2024-11-21T07:38:06.507",
|
||||
"lastModified": "2025-01-30T15:15:11.770",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1021",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.693",
|
||||
"lastModified": "2024-11-21T07:38:18.083",
|
||||
"lastModified": "2025-01-30T15:15:11.963",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1090",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.753",
|
||||
"lastModified": "2024-11-21T07:38:26.330",
|
||||
"lastModified": "2025-01-30T15:15:12.147",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1125",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.823",
|
||||
"lastModified": "2024-11-21T07:38:30.353",
|
||||
"lastModified": "2025-01-30T15:15:12.337",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1196",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T09:15:09.280",
|
||||
"lastModified": "2024-11-21T07:38:39.120",
|
||||
"lastModified": "2025-01-30T15:15:12.527",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1204",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2023-05-03T21:15:16.707",
|
||||
"lastModified": "2024-11-21T07:38:39.860",
|
||||
"lastModified": "2025-01-30T16:15:28.937",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-347"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -122,6 +152,13 @@
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394745",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1525",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.893",
|
||||
"lastModified": "2024-11-21T07:39:21.797",
|
||||
"lastModified": "2025-01-30T15:15:12.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1546",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:09.957",
|
||||
"lastModified": "2024-11-21T07:39:24.990",
|
||||
"lastModified": "2025-01-30T15:15:13.070",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1554",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.023",
|
||||
"lastModified": "2024-11-21T07:39:25.727",
|
||||
"lastModified": "2025-01-30T15:15:13.240",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1614",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.097",
|
||||
"lastModified": "2024-11-21T07:39:32.633",
|
||||
"lastModified": "2025-01-30T15:15:13.400",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1669",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.180",
|
||||
"lastModified": "2024-11-21T07:39:39.457",
|
||||
"lastModified": "2025-01-30T15:15:13.580",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-502"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1730",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.267",
|
||||
"lastModified": "2024-11-21T07:39:47.050",
|
||||
"lastModified": "2025-01-30T15:15:13.767",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1804",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.337",
|
||||
"lastModified": "2024-11-21T07:39:56.310",
|
||||
"lastModified": "2025-01-30T15:15:13.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1805",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.393",
|
||||
"lastModified": "2024-11-21T07:39:56.407",
|
||||
"lastModified": "2025-01-30T15:15:14.117",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1809",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.453",
|
||||
"lastModified": "2024-11-21T07:39:56.693",
|
||||
"lastModified": "2025-01-30T15:15:14.273",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-276"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1861",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.517",
|
||||
"lastModified": "2024-11-21T07:40:02.440",
|
||||
"lastModified": "2025-01-30T15:15:14.450",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-1911",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-05-02T08:15:10.570",
|
||||
"lastModified": "2024-11-21T07:40:07.673",
|
||||
"lastModified": "2025-01-30T15:15:14.617",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,9 +32,41 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2197",
|
||||
"sourceIdentifier": "security@hashicorp.com",
|
||||
"published": "2023-05-01T20:15:14.597",
|
||||
"lastModified": "2024-11-21T07:58:08.163",
|
||||
"lastModified": "2025-01-30T16:15:29.243",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 2.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -75,6 +95,16 @@
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-326"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-2473",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2023-05-02T13:15:25.090",
|
||||
"lastModified": "2024-11-21T07:58:41.100",
|
||||
"lastModified": "2025-01-30T15:15:14.780",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -15,7 +15,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
@ -35,6 +35,26 @@
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
@ -90,6 +110,16 @@
|
||||
"value": "CWE-407"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-407"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-30639",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-01T22:15:09.770",
|
||||
"lastModified": "2024-11-21T08:00:34.800",
|
||||
"lastModified": "2025-01-30T16:15:29.447",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -65,6 +85,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31207",
|
||||
"sourceIdentifier": "security@checkmk.com",
|
||||
"published": "2023-05-02T09:15:10.120",
|
||||
"lastModified": "2024-11-21T08:01:37.413",
|
||||
"lastModified": "2025-01-30T15:15:15.003",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -52,6 +52,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -75,6 +95,16 @@
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-532"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31435",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-02T20:15:11.187",
|
||||
"lastModified": "2024-11-21T08:01:51.440",
|
||||
"lastModified": "2025-01-30T15:15:15.260",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-6743",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-29T05:16:08.120",
|
||||
"lastModified": "2024-11-21T08:44:27.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:09:46.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,46 +39,106 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.89",
|
||||
"matchCriteriaId": "FC749388-D9B1-457E-A481-8D178261B6F4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_output.class.php#L1765",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/core/plugins/unlimited_elements/elementor/elementor_widget.class.php#L3948",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3010986/unlimited-elements-for-elementor#file6",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25f71a19-85b1-4bc9-b193-d9de2eba81ee?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_output.class.php#L1765",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/core/plugins/unlimited_elements/elementor/elementor_widget.class.php#L3948",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3010986/unlimited-elements-for-elementor#file6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25f71a19-85b1-4bc9-b193-d9de2eba81ee?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0367",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T05:15:34.243",
|
||||
"lastModified": "2024-11-21T08:46:24.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:01:22.873",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.96",
|
||||
"matchCriteriaId": "07BE98C6-9D6E-4ACB-86F3-6DCD19AFF6A7"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045122%40unlimited-elements-for-elementor&new=3045122%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47853750-0bf1-4df3-9c56-c6852543cfad?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045122%40unlimited-elements-for-elementor&new=3045122%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47853750-0bf1-4df3-9c56-c6852543cfad?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0608",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-29T07:15:41.123",
|
||||
"lastModified": "2024-11-21T08:46:59.527",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:52:57.747",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "1.12.9",
|
||||
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/includes/Admin/Ajax.php#L471",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79da7239-0343-465e-8dda-44ff440939c4?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/includes/Admin/Ajax.php#L471",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79da7239-0343-465e-8dda-44ff440939c4?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0609",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-29T07:15:41.713",
|
||||
"lastModified": "2024-11-21T08:46:59.647",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:53:29.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "1.12.9",
|
||||
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/vendor/google/apiclient/examples/index.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97964ebd-be0b-4187-b393-17edf4ba5caf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/vendor/google/apiclient/examples/index.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97964ebd-be0b-4187-b393-17edf4ba5caf?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0913",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-29T07:15:42.120",
|
||||
"lastModified": "2024-11-21T08:47:42.730",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:54:01.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "1.12.9",
|
||||
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/transactions.php#L42",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/592440ab-60ac-419f-b615-e5617460aea9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/transactions.php#L42",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/592440ab-60ac-419f-b615-e5617460aea9?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0952",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:15.823",
|
||||
"lastModified": "2024-11-21T08:47:51.643",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:54:44.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.0",
|
||||
"matchCriteriaId": "6089C3EB-1BF8-4799-BCBC-E2310A7CD93E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3060269/erp/tags/1.13.0/modules/accounting/includes/functions/people.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ba06f9-de51-49ea-87c1-4583e939314b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3060269/erp/tags/1.13.0/modules/accounting/includes/functions/people.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ba06f9-de51-49ea-87c1-4583e939314b?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0956",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-29T07:15:42.480",
|
||||
"lastModified": "2024-11-21T08:47:52.523",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:54:22.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndIncluding": "1.12.9",
|
||||
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/products.php#L387",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e04650-624a-4440-b166-8de0f24bb1dd?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/products.php#L387",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e04650-624a-4440-b166-8de0f24bb1dd?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1173",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-02T17:15:10.393",
|
||||
"lastModified": "2024-11-21T08:49:57.650",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:55:07.793",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,78 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.2",
|
||||
"matchCriteriaId": "57CED3B2-AC13-4814-99D3-430F4874EEBE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/people.php#L262",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071807/erp/trunk/modules/accounting/includes/functions/people.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94772de9-6ab8-45ff-8b56-19b50a81b66f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/people.php#L262",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071807/erp/trunk/modules/accounting/includes/functions/people.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94772de9-6ab8-45ff-8b56-19b50a81b66f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12163",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-30T06:15:29.113",
|
||||
"lastModified": "2025-01-30T06:15:29.113",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:15:29.770",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,38 @@
|
||||
"value": "The goodlayers-core WordPress plugin before 2.1.3 allows users with a subscriber role and above to upload SVGs containing malicious payloads."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ea704054-fb66-4014-89bd-1c61074f64e5/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/ea704054-fb66-4014-89bd-1c61074f64e5/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12400",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-30T06:15:29.223",
|
||||
"lastModified": "2025-01-30T06:15:29.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:15:29.907",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,38 @@
|
||||
"value": "The tourmaster WordPress plugin before 5.3.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3542315c-93c3-41dd-a99e-02a38cfd58fb/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/3542315c-93c3-41dd-a99e-02a38cfd58fb/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12638",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-30T06:15:29.333",
|
||||
"lastModified": "2025-01-30T06:15:29.333",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:15:30.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,38 @@
|
||||
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a6f5b0fe-00a0-4e30-aec6-87882c035beb/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/a6f5b0fe-00a0-4e30-aec6-87882c035beb/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12708",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-30T06:15:29.440",
|
||||
"lastModified": "2025-01-30T06:15:29.440",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:15:30.207",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,38 @@
|
||||
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 7.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8f30a37e-b9d0-467b-a0e3-20dc0a9f2b61/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/8f30a37e-b9d0-467b-a0e3-20dc0a9f2b61/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12709",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-01-30T06:15:29.557",
|
||||
"lastModified": "2025-01-30T06:15:29.557",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:15:30.337",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -11,11 +11,38 @@
|
||||
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d93056f1-1a6e-405f-a094-d4d270393f87/",
|
||||
"source": "contact@wpscan.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/d93056f1-1a6e-405f-a094-d4d270393f87/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,63 +2,15 @@
|
||||
"id": "CVE-2024-13348",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-14T04:15:09.200",
|
||||
"lastModified": "2025-01-14T04:15:09.200",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:15:16.223",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Smart Agenda \u2013 Prise de rendez-vous en ligne plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the smartagenda_options_page_html() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " El complemento Smart Agenda \u2013 Prise de rendez-vous en ligne para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.7 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n smartagenda_options_page_html(). Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22506 Reason: This candidate is a reservation duplicate of CVE-2025-22506. Notes: All CVE users should reference CVE-2025-22506 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/smart-agenda-prise-de-rendez-vous-en-ligne/trunk/smart-agenda.php#L202",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7eeb8bf3-b12f-457b-ac16-b91442b3f47e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20020",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.107",
|
||||
"lastModified": "2024-11-21T08:51:49.063",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T15:07:55.143",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,115 @@
|
||||
"value": "En OPTEE, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08522504; ID del problema: ALPS08522504."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2715:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FA252F20-1BB7-4654-972C-F257F37396A7"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-20022",
|
||||
"sourceIdentifier": "security@mediatek.com",
|
||||
"published": "2024-03-04T03:15:07.150",
|
||||
"lastModified": "2024-11-21T08:51:49.393",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T15:11:44.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,15 +15,260 @@
|
||||
"value": "En lk, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08528255; ID del problema: ALPS08528255."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rdkcentral:rdkb:2022q3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "295DD4FC-E943-412D-A63E-260C0F3887FC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "security@mediatek.com"
|
||||
"source": "security@mediatek.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2140",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T07:15:08.893",
|
||||
"lastModified": "2024-11-21T09:09:06.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:20:30.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2141",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T07:15:09.203",
|
||||
"lastModified": "2024-11-21T09:09:07.003",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:20:56.253",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/uabb-button/includes/frontend.php#L25",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/uabb-button/includes/frontend.php#L25",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2142",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T07:15:09.513",
|
||||
"lastModified": "2024-11-21T09:09:07.130",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:21:11.450",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2143",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T07:15:09.997",
|
||||
"lastModified": "2024-11-21T09:09:07.330",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:21:36.637",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2144",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-30T07:15:10.497",
|
||||
"lastModified": "2024-11-21T09:09:07.537",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:21:55.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.8",
|
||||
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/image-separator/includes/frontend.php#L14",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/image-separator/includes/frontend.php#L14",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
File diff suppressed because it is too large
Load Diff
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25698",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:11.297",
|
||||
"lastModified": "2024-11-21T09:01:14.170",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:18:43.000",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,55 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "11.1",
|
||||
"matchCriteriaId": "078945E5-0E7F-4FC3-BA84-F2D9E215AE8F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25699",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:11.593",
|
||||
"lastModified": "2024-11-21T09:01:14.283",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:23:46.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,72 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "10.8.1",
|
||||
"versionEndIncluding": "11.2",
|
||||
"matchCriteriaId": "C0BE3C00-FF14-477A-BB06-77A561C7ADD5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:arcgis_enterprise:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "11.1",
|
||||
"matchCriteriaId": "5A30EAE2-1517-4DA0-AE43-BA76919E6D21"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-25705",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-04-04T18:15:12.603",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:21:48.907",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,49 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "11.1",
|
||||
"matchCriteriaId": "078945E5-0E7F-4FC3-BA84-F2D9E215AE8F"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Broken Link",
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2645",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-19T23:15:09.560",
|
||||
"lastModified": "2024-11-21T09:10:12.230",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:39:23.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,32 +94,81 @@
|
||||
"value": "CWE-643"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257283",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257283",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257283",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257283",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2646",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-19T23:15:09.883",
|
||||
"lastModified": "2024-11-21T09:10:12.370",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:34:41.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257284",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257284",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257284",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257284",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2662",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-14T15:20:17.423",
|
||||
"lastModified": "2024-11-21T09:10:14.287",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:12:13.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.103",
|
||||
"matchCriteriaId": "4A1EB90D-6577-4084-BF15-E2B7589EB7E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_template_engine.class.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_template_engine.class.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3055",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-14T15:39:50.973",
|
||||
"lastModified": "2024-11-21T09:28:48.053",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:11:40.940",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.105",
|
||||
"matchCriteriaId": "6AF2C93E-F027-440B-B0B6-7410ED97C363"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/tags/1.5.93/inc_php/framework/db.class.php#L238",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3081509%40unlimited-elements-for-elementor%2Ftrunk&old=3076456%40unlimited-elements-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebc0c8e6-a365-4ef7-9c1a-41454855096c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/tags/1.5.93/inc_php/framework/db.class.php#L238",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3081509%40unlimited-elements-for-elementor%2Ftrunk&old=3076456%40unlimited-elements-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebc0c8e6-a365-4ef7-9c1a-41454855096c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3190",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-30T04:15:10.417",
|
||||
"lastModified": "2024-11-21T09:29:06.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:09:08.383",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.108",
|
||||
"matchCriteriaId": "4C4FC725-4FB8-427C-8B35-2D5C32FB3324"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3090199%40unlimited-elements-for-elementor&new=3090199%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78d8ddc9-69ad-4d69-ac23-5a31dfeafd54?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3090199%40unlimited-elements-for-elementor&new=3090199%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78d8ddc9-69ad-4d69-ac23-5a31dfeafd54?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3547",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-14T15:41:48.370",
|
||||
"lastModified": "2024-11-21T09:29:51.093",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:10:54.307",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.103",
|
||||
"matchCriteriaId": "4A1EB90D-6577-4084-BF15-E2B7589EB7E8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f629fc93-84ce-4c33-b1c0-3a3194aac477?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f629fc93-84ce-4c33-b1c0-3a3194aac477?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4385",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:48.577",
|
||||
"lastModified": "2024-11-21T09:42:44.713",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:09:33.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,65 +36,157 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:envothemes:envo_extra:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.17",
|
||||
"matchCriteriaId": "3DE63C3B-E175-4018-9F32-8FF68F3A35C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3080715/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3080715/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,28 +2,101 @@
|
||||
"id": "CVE-2024-44172",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:11.930",
|
||||
"lastModified": "2025-01-27T22:15:11.930",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:47:17.370",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, macOS Sequoia 15. An app may be able to access contacts."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sonoma 14.7.3 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda acceder a los contactos."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7.3",
|
||||
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7.3",
|
||||
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/121238",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122069",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122070",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Release Notes"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4580",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T12:15:13.857",
|
||||
"lastModified": "2024-11-21T09:43:08.940",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:55:44.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,41 +36,115 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.0.6.1",
|
||||
"matchCriteriaId": "475B234F-6D81-4BEC-AAB7-61C68ABAF55F"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087193/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087193/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4609",
|
||||
"sourceIdentifier": "PSIRT@rockwellautomation.com",
|
||||
"published": "2024-05-16T16:15:10.750",
|
||||
"lastModified": "2024-11-21T09:43:12.620",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T15:50:28.557",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -59,6 +59,28 @@
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
@ -71,16 +93,50 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:*",
|
||||
"versionEndExcluding": "11.0",
|
||||
"matchCriteriaId": "0CBD02EA-5D80-4A57-8F55-886C13277815"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html",
|
||||
"source": "PSIRT@rockwellautomation.com"
|
||||
"source": "PSIRT@rockwellautomation.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4634",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-16T11:15:49.153",
|
||||
"lastModified": "2024-11-21T09:43:15.343",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:01:17.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:brainstormforce:elementor_header_\\&_footer_builder:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.29",
|
||||
"matchCriteriaId": "427B7D70-D411-47EA-A4C2-F79E782A7186"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3086402/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3086402/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4779",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-23T10:15:09.943",
|
||||
"lastModified": "2024-11-21T09:43:35.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-30T16:10:38.760",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,22 +39,64 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.5.108",
|
||||
"matchCriteriaId": "4C4FC725-4FB8-427C-8B35-2D5C32FB3324"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3090199/unlimited-elements-for-elementor/trunk/provider/functions_wordpress.class.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b155f8ca-9d09-47d7-a7c2-7744df029c19?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3090199/unlimited-elements-for-elementor/trunk/provider/functions_wordpress.class.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b155f8ca-9d09-47d7-a7c2-7744df029c19?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4891",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-05-18T05:15:46.917",
|
||||
"lastModified": "2024-11-21T09:43:48.267",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T15:45:34.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "4.5.13",
|
||||
"matchCriteriaId": "4E47F5AA-8EA6-43A8-8031-9ECE94DD9A70"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/blocks/AdvancedHeading.php#L115",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087677/",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bcebb3-920b-40cc-aa5c-24a1f729b28d?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/blocks/AdvancedHeading.php#L115",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3087677/",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bcebb3-920b-40cc-aa5c-24a1f729b28d?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-536xx/CVE-2024-53615.json
Normal file
21
CVE-2024/CVE-2024-536xx/CVE-2024-53615.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-53615",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-30T15:15:17.390",
|
||||
"lastModified": "2025-01-30T15:15:17.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A command injection vulnerability in the video thumbnail rendering component of Karl Ward's files.gallery v0.3.0 through 0.11.0 allows remote attackers to execute arbitrary code via a crafted video file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/beune/CVE-2024-53615",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-554xx/CVE-2024-55415.json
Normal file
29
CVE-2024/CVE-2024-554xx/CVE-2024-55415.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-55415",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-30T15:15:17.490",
|
||||
"lastModified": "2025-01-30T15:15:17.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L213",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L44",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
29
CVE-2024/CVE-2024-554xx/CVE-2024-55416.json
Normal file
29
CVE-2024/CVE-2024-554xx/CVE-2024-55416.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2024-55416",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-30T15:15:17.583",
|
||||
"lastModified": "2025-01-30T15:15:17.583",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via /admin/compass. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thedevdojo/voyager/blob/1.6/resources/views/master.blade.php#L132",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L44",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-554xx/CVE-2024-55417.json
Normal file
25
CVE-2024/CVE-2024-554xx/CVE-2024-55417.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-55417",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-30T15:15:17.667",
|
||||
"lastModified": "2025-01-30T15:15:17.667",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerMediaController.php#L238",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8148",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-10-04T18:15:08.633",
|
||||
"lastModified": "2024-10-07T17:48:28.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:20:34.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,45 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FDE382B5-E228-4803-A3FC-B803C7838777"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0DAF61C-E776-4E31-8E39-92636B459A3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2E37361-8569-4023-BC3E-F36E7607CC7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-8149",
|
||||
"sourceIdentifier": "psirt@esri.com",
|
||||
"published": "2024-10-04T18:15:08.833",
|
||||
"lastModified": "2024-10-07T17:48:28.117",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:20:02.563",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,35 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A0DAF61C-E776-4E31-8E39-92636B459A3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2E37361-8569-4023-BC3E-F36E7607CC7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/",
|
||||
"source": "psirt@esri.com"
|
||||
"source": "psirt@esri.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-08xx/CVE-2025-0871.json
Normal file
141
CVE-2025/CVE-2025-08xx/CVE-2025-0871.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-0871",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-30T15:15:18.253",
|
||||
"lastModified": "2025-01-30T15:15:18.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic has been found in Maybecms 1.2. This affects an unknown part of the file /mb/admin/index.php?u=article-edit of the component Add Article. The manipulation of the argument data_info[content] leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Upgradeextension/Maybecms/blob/main/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.294057",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.294057",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.487930",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-08xx/CVE-2025-0872.json
Normal file
145
CVE-2025/CVE-2025-08xx/CVE-2025-0872.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-0872",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-30T16:15:30.737",
|
||||
"lastModified": "2025-01-30T16:15:30.737",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/magic2353112890/cve/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.294066",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.294066",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.487953",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-222xx/CVE-2025-22218.json
Normal file
44
CVE-2025/CVE-2025-222xx/CVE-2025-22218.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-22218",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-01-30T15:15:18.487",
|
||||
"lastModified": "2025-01-30T15:15:18.487",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Aria Operations for Logs contains an information disclosure vulnerability.\u00a0A malicious actor with View Only Admin permissions may be able to read the credentials\u00a0of a VMware product integrated with VMware Aria Operations for Logs"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 8.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-222xx/CVE-2025-22219.json
Normal file
44
CVE-2025/CVE-2025-222xx/CVE-2025-22219.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-22219",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-01-30T16:15:31.013",
|
||||
"lastModified": "2025-01-30T16:15:31.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-222xx/CVE-2025-22220.json
Normal file
44
CVE-2025/CVE-2025-222xx/CVE-2025-22220.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-22220",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-01-30T16:15:31.143",
|
||||
"lastModified": "2025-01-30T16:15:31.143",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Aria Operations for Logs contains a privilege escalation\u00a0vulnerability.\u00a0A malicious actor with non-administrative privileges and network access to Aria Operations for Logs API may be able to perform certain operations in the context of an admin user."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-222xx/CVE-2025-22221.json
Normal file
44
CVE-2025/CVE-2025-222xx/CVE-2025-22221.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-22221",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-01-30T16:15:31.257",
|
||||
"lastModified": "2025-01-30T16:15:31.257",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Aria Operation for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 4.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-222xx/CVE-2025-22222.json
Normal file
44
CVE-2025/CVE-2025-222xx/CVE-2025-22222.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-22222",
|
||||
"sourceIdentifier": "security@vmware.com",
|
||||
"published": "2025-01-30T16:15:31.367",
|
||||
"lastModified": "2025-01-30T16:15:31.367",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "VMware Aria Operations contains an information disclosure vulnerability.\u00a0A malicious user with non-administrative privileges\u00a0may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@vmware.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
|
||||
"source": "security@vmware.com"
|
||||
}
|
||||
]
|
||||
}
|
68
CVE-2025/CVE-2025-232xx/CVE-2025-23216.json
Normal file
68
CVE-2025/CVE-2025-232xx/CVE-2025-23216.json
Normal file
@ -0,0 +1,68 @@
|
||||
{
|
||||
"id": "CVE-2025-23216",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-30T16:15:31.473",
|
||||
"lastModified": "2025-01-30T16:15:31.473",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. A vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository. The vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data. The vulnerability is fixed in v2.13.4, v2.12.10, and v2.11.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-209"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/commit/6f5537bdf15ddbaa0f27a1a678632ff0743e4107",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-47g2-qmh2-749v",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/argoproj/gitops-engine/commit/7e21b91e9d0f64104c8a661f3f390c5e6d73ddca",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-233xx/CVE-2025-23367.json
Normal file
60
CVE-2025/CVE-2025-233xx/CVE-2025-23367.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-23367",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2025-01-30T15:15:18.610",
|
||||
"lastModified": "2025-01-30T15:15:18.610",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "secalert@redhat.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2025-23367",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620",
|
||||
"source": "secalert@redhat.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,20 +2,80 @@
|
||||
"id": "CVE-2025-24153",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.537",
|
||||
"lastModified": "2025-01-27T22:15:19.537",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:55:07.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n con privilegios de superusuario puede ejecutar c\u00f3digo arbitrario con privilegios de kernel."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24156",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:19.710",
|
||||
"lastModified": "2025-01-28T21:15:18.340",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-30T16:43:39.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -40,6 +60,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-190"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,18 +81,59 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "13.7.3",
|
||||
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "14.0",
|
||||
"versionEndExcluding": "14.7.3",
|
||||
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122069",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122070",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,44 +2,159 @@
|
||||
"id": "CVE-2025-24161",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.083",
|
||||
"lastModified": "2025-01-27T22:15:20.083",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:34:58.187",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "17.7.4",
|
||||
"matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.3",
|
||||
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "14.7.3",
|
||||
"matchCriteriaId": "6049E692-EB64-4E7D-A1AC-CEBA288B7A55"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.3",
|
||||
"matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "2.3",
|
||||
"matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "11.3",
|
||||
"matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122067",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122069",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122071",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122072",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122073",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,93 @@
|
||||
"id": "CVE-2025-24169",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.460",
|
||||
"lastModified": "2025-01-27T22:15:20.460",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:24:54.597",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.3, Safari 18.3. A malicious app may be able to bypass browser extension authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de registro con una redacci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y Safari 18.3. Una aplicaci\u00f3n maliciosa podr\u00eda eludir la autenticaci\u00f3n de la extensi\u00f3n del navegador."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.3",
|
||||
"matchCriteriaId": "0384B3A1-9447-4020-A798-38CB2348F67B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122074",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,24 +2,100 @@
|
||||
"id": "CVE-2025-24177",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-27T22:15:20.750",
|
||||
"lastModified": "2025-01-27T22:15:20.750",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-30T16:26:45.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se solucion\u00f3 un problema de desreferencia de puntero nulo con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3, iOS 18.3 y iPadOS 18.3. Un atacante remoto podr\u00eda provocar una denegaci\u00f3n de servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.3",
|
||||
"matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "18.3",
|
||||
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "15.0",
|
||||
"versionEndExcluding": "15.3",
|
||||
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122066",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122068",
|
||||
"source": "product-security@apple.com"
|
||||
"source": "product-security@apple.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-243xx/CVE-2025-24376.json
Normal file
64
CVE-2025/CVE-2025-243xx/CVE-2025-24376.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-24376",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-30T16:15:31.630",
|
||||
"lastModified": "2025-01-30T16:15:31.630",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. By design, AdmissionPolicy and AdmissionPolicyGroup can evaluate only namespaced resources. The resources to be evaluated are determined by the rules provided by the user when defining the policy. There might be Kubernetes namespaced resources that should not be validated by AdmissionPolicy and by the AdmissionPolicyGroup policies because of their sensitive nature. For example, PolicyReport are namespaced resources that contain the list of non compliant objects found inside of a namespace. An attacker can use either an AdmissionPolicy or an AdmissionPolicyGroup to prevent the creation and update of PolicyReport objects to hide non-compliant resources. Moreover, the same attacker might use a mutating AdmissionPolicy to alter the contents of the PolicyReport created inside of the namespace. Starting from the 1.21.0 release, the validation rules applied to AdmissionPolicy and AdmissionPolicyGroup have been tightened to prevent them from validating sensitive types of namespaced resources."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-155"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kubewarden/kubewarden-controller/commit/8124039b5f0c955d0ee8c8ca12d4415282f02d2c",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-fc89-jghx-8pvg",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-247xx/CVE-2025-24784.json
Normal file
60
CVE-2025/CVE-2025-247xx/CVE-2025-24784.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-24784",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-30T16:15:31.780",
|
||||
"lastModified": "2025-01-30T16:15:31.780",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. The policy group feature, added to by the 1.17.0 release. By being namespaced, the AdmissionPolicyGroup has a well constrained impact on cluster resources. Hence, it\u2019s considered safe to allow non-admin users to create and manage these resources in the namespaces they own. Kubewarden policies can be allowed to query the Kubernetes API at evaluation time; these types of policies are called \u201ccontext aware\u201c. Context aware policies can perform list and get operations against a Kubernetes cluster. The queries are done using the ServiceAccount of the Policy Server instance that hosts the policy. That means that access to the cluster is determined by the RBAC rules that apply to that ServiceAccount. The AdmissionPolicyGroup CRD allowed the deployment of context aware policies. This could allow an attacker to obtain information about resources that are out of their reach, by leveraging a higher access to the cluster granted to the ServiceAccount token used to run the policy. The impact of this vulnerability depends on the privileges that have been granted to the ServiceAccount used to run the Policy Server and assumes that users are using the recommended best practices of keeping the Policy Server's ServiceAccount least privileged. By default, the Kubewarden helm chart grants access to the following resources (cluster wide) only: Namespace, Pod, Deployment and Ingress. This vulnerability is fixed in 1.21.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kubewarden/kubewarden-controller/commit/51a88dfbb4c090ce0f76a22d98106518e0824d0b",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-756x-m4mj-q96c",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-248xx/CVE-2025-24883.json
Normal file
82
CVE-2025/CVE-2025-248xx/CVE-2025-24883.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-24883",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-01-30T16:15:31.947",
|
||||
"lastModified": "2025-01-30T16:15:31.947",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-248"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ethereum/go-ethereum/commit/fa9a2ff8687ec9efe57b4b9833d5590d20f8a83f",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-q26p-9cq4-7fc2",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
101
README.md
101
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-30T15:00:24.372810+00:00
|
||||
2025-01-30T17:00:31.911187+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-30T14:58:45.433000+00:00
|
||||
2025-01-30T16:55:07.740000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
279492
|
||||
279508
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `38`
|
||||
Recently added CVEs: `16`
|
||||
|
||||
- [CVE-2024-12822](CVE-2024/CVE-2024-128xx/CVE-2024-12822.json) (`2025-01-30T14:15:33.017`)
|
||||
- [CVE-2024-12861](CVE-2024/CVE-2024-128xx/CVE-2024-12861.json) (`2025-01-30T14:15:33.170`)
|
||||
- [CVE-2024-13349](CVE-2024/CVE-2024-133xx/CVE-2024-13349.json) (`2025-01-30T14:15:33.333`)
|
||||
- [CVE-2024-13380](CVE-2024/CVE-2024-133xx/CVE-2024-13380.json) (`2025-01-30T13:15:09.107`)
|
||||
- [CVE-2024-13400](CVE-2024/CVE-2024-134xx/CVE-2024-13400.json) (`2025-01-30T14:15:33.710`)
|
||||
- [CVE-2024-13460](CVE-2024/CVE-2024-134xx/CVE-2024-13460.json) (`2025-01-30T14:15:34.057`)
|
||||
- [CVE-2024-13466](CVE-2024/CVE-2024-134xx/CVE-2024-13466.json) (`2025-01-30T13:15:09.253`)
|
||||
- [CVE-2024-13512](CVE-2024/CVE-2024-135xx/CVE-2024-13512.json) (`2025-01-30T14:15:34.413`)
|
||||
- [CVE-2024-13549](CVE-2024/CVE-2024-135xx/CVE-2024-13549.json) (`2025-01-30T14:15:34.570`)
|
||||
- [CVE-2024-13596](CVE-2024/CVE-2024-135xx/CVE-2024-13596.json) (`2025-01-30T14:15:34.720`)
|
||||
- [CVE-2024-13646](CVE-2024/CVE-2024-136xx/CVE-2024-13646.json) (`2025-01-30T14:15:34.873`)
|
||||
- [CVE-2024-13652](CVE-2024/CVE-2024-136xx/CVE-2024-13652.json) (`2025-01-30T14:15:35.040`)
|
||||
- [CVE-2024-13661](CVE-2024/CVE-2024-136xx/CVE-2024-13661.json) (`2025-01-30T14:15:35.233`)
|
||||
- [CVE-2024-13664](CVE-2024/CVE-2024-136xx/CVE-2024-13664.json) (`2025-01-30T14:15:35.390`)
|
||||
- [CVE-2024-13670](CVE-2024/CVE-2024-136xx/CVE-2024-13670.json) (`2025-01-30T14:15:35.550`)
|
||||
- [CVE-2024-13671](CVE-2024/CVE-2024-136xx/CVE-2024-13671.json) (`2025-01-30T14:15:35.697`)
|
||||
- [CVE-2024-13700](CVE-2024/CVE-2024-137xx/CVE-2024-13700.json) (`2025-01-30T14:15:35.853`)
|
||||
- [CVE-2024-13705](CVE-2024/CVE-2024-137xx/CVE-2024-13705.json) (`2025-01-30T14:15:36.003`)
|
||||
- [CVE-2024-13707](CVE-2024/CVE-2024-137xx/CVE-2024-13707.json) (`2025-01-30T14:15:36.363`)
|
||||
- [CVE-2024-13715](CVE-2024/CVE-2024-137xx/CVE-2024-13715.json) (`2025-01-30T14:15:36.513`)
|
||||
- [CVE-2024-13720](CVE-2024/CVE-2024-137xx/CVE-2024-13720.json) (`2025-01-30T14:15:36.660`)
|
||||
- [CVE-2024-13742](CVE-2024/CVE-2024-137xx/CVE-2024-13742.json) (`2025-01-30T14:15:36.810`)
|
||||
- [CVE-2024-8494](CVE-2024/CVE-2024-84xx/CVE-2024-8494.json) (`2025-01-30T14:15:36.973`)
|
||||
- [CVE-2025-0869](CVE-2025/CVE-2025-08xx/CVE-2025-0869.json) (`2025-01-30T13:15:10.273`)
|
||||
- [CVE-2025-0870](CVE-2025/CVE-2025-08xx/CVE-2025-0870.json) (`2025-01-30T13:15:10.483`)
|
||||
- [CVE-2024-53615](CVE-2024/CVE-2024-536xx/CVE-2024-53615.json) (`2025-01-30T15:15:17.390`)
|
||||
- [CVE-2024-55415](CVE-2024/CVE-2024-554xx/CVE-2024-55415.json) (`2025-01-30T15:15:17.490`)
|
||||
- [CVE-2024-55416](CVE-2024/CVE-2024-554xx/CVE-2024-55416.json) (`2025-01-30T15:15:17.583`)
|
||||
- [CVE-2024-55417](CVE-2024/CVE-2024-554xx/CVE-2024-55417.json) (`2025-01-30T15:15:17.667`)
|
||||
- [CVE-2025-0871](CVE-2025/CVE-2025-08xx/CVE-2025-0871.json) (`2025-01-30T15:15:18.253`)
|
||||
- [CVE-2025-0872](CVE-2025/CVE-2025-08xx/CVE-2025-0872.json) (`2025-01-30T16:15:30.737`)
|
||||
- [CVE-2025-22218](CVE-2025/CVE-2025-222xx/CVE-2025-22218.json) (`2025-01-30T15:15:18.487`)
|
||||
- [CVE-2025-22219](CVE-2025/CVE-2025-222xx/CVE-2025-22219.json) (`2025-01-30T16:15:31.013`)
|
||||
- [CVE-2025-22220](CVE-2025/CVE-2025-222xx/CVE-2025-22220.json) (`2025-01-30T16:15:31.143`)
|
||||
- [CVE-2025-22221](CVE-2025/CVE-2025-222xx/CVE-2025-22221.json) (`2025-01-30T16:15:31.257`)
|
||||
- [CVE-2025-22222](CVE-2025/CVE-2025-222xx/CVE-2025-22222.json) (`2025-01-30T16:15:31.367`)
|
||||
- [CVE-2025-23216](CVE-2025/CVE-2025-232xx/CVE-2025-23216.json) (`2025-01-30T16:15:31.473`)
|
||||
- [CVE-2025-23367](CVE-2025/CVE-2025-233xx/CVE-2025-23367.json) (`2025-01-30T15:15:18.610`)
|
||||
- [CVE-2025-24376](CVE-2025/CVE-2025-243xx/CVE-2025-24376.json) (`2025-01-30T16:15:31.630`)
|
||||
- [CVE-2025-24784](CVE-2025/CVE-2025-247xx/CVE-2025-24784.json) (`2025-01-30T16:15:31.780`)
|
||||
- [CVE-2025-24883](CVE-2025/CVE-2025-248xx/CVE-2025-24883.json) (`2025-01-30T16:15:31.947`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `27`
|
||||
Recently modified CVEs: `77`
|
||||
|
||||
- [CVE-2024-12409](CVE-2024/CVE-2024-124xx/CVE-2024-12409.json) (`2025-01-30T14:15:32.353`)
|
||||
- [CVE-2024-13453](CVE-2024/CVE-2024-134xx/CVE-2024-13453.json) (`2025-01-30T14:15:33.873`)
|
||||
- [CVE-2024-13706](CVE-2024/CVE-2024-137xx/CVE-2024-13706.json) (`2025-01-30T14:15:36.180`)
|
||||
- [CVE-2024-1625](CVE-2024/CVE-2024-16xx/CVE-2024-1625.json) (`2025-01-30T13:15:09.420`)
|
||||
- [CVE-2024-2648](CVE-2024/CVE-2024-26xx/CVE-2024-2648.json) (`2025-01-30T14:45:12.507`)
|
||||
- [CVE-2024-2649](CVE-2024/CVE-2024-26xx/CVE-2024-2649.json) (`2025-01-30T14:35:30.467`)
|
||||
- [CVE-2024-34031](CVE-2024/CVE-2024-340xx/CVE-2024-34031.json) (`2025-01-30T14:30:40.657`)
|
||||
- [CVE-2024-34032](CVE-2024/CVE-2024-340xx/CVE-2024-34032.json) (`2025-01-30T14:31:00.057`)
|
||||
- [CVE-2024-34033](CVE-2024/CVE-2024-340xx/CVE-2024-34033.json) (`2025-01-30T14:32:24.690`)
|
||||
- [CVE-2024-3501](CVE-2024/CVE-2024-35xx/CVE-2024-3501.json) (`2025-01-30T13:15:09.623`)
|
||||
- [CVE-2024-3502](CVE-2024/CVE-2024-35xx/CVE-2024-3502.json) (`2025-01-30T13:15:09.853`)
|
||||
- [CVE-2024-3621](CVE-2024/CVE-2024-36xx/CVE-2024-3621.json) (`2025-01-30T14:40:31.307`)
|
||||
- [CVE-2024-39354](CVE-2024/CVE-2024-393xx/CVE-2024-39354.json) (`2025-01-30T14:35:18.047`)
|
||||
- [CVE-2024-39605](CVE-2024/CVE-2024-396xx/CVE-2024-39605.json) (`2025-01-30T14:34:40.630`)
|
||||
- [CVE-2024-4148](CVE-2024/CVE-2024-41xx/CVE-2024-4148.json) (`2025-01-30T13:15:10.093`)
|
||||
- [CVE-2024-4712](CVE-2024/CVE-2024-47xx/CVE-2024-4712.json) (`2025-01-30T14:58:45.433`)
|
||||
- [CVE-2024-47131](CVE-2024/CVE-2024-471xx/CVE-2024-47131.json) (`2025-01-30T14:35:10.020`)
|
||||
- [CVE-2024-9672](CVE-2024/CVE-2024-96xx/CVE-2024-9672.json) (`2025-01-30T14:55:08.713`)
|
||||
- [CVE-2025-0741](CVE-2025/CVE-2025-07xx/CVE-2025-0741.json) (`2025-01-30T14:15:37.127`)
|
||||
- [CVE-2025-0742](CVE-2025/CVE-2025-07xx/CVE-2025-0742.json) (`2025-01-30T14:15:37.320`)
|
||||
- [CVE-2025-0743](CVE-2025/CVE-2025-07xx/CVE-2025-0743.json) (`2025-01-30T14:15:37.507`)
|
||||
- [CVE-2025-0744](CVE-2025/CVE-2025-07xx/CVE-2025-0744.json) (`2025-01-30T14:15:37.687`)
|
||||
- [CVE-2025-0745](CVE-2025/CVE-2025-07xx/CVE-2025-0745.json) (`2025-01-30T14:15:37.857`)
|
||||
- [CVE-2025-0747](CVE-2025/CVE-2025-07xx/CVE-2025-0747.json) (`2025-01-30T14:15:38.133`)
|
||||
- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-01-30T14:15:38.300`)
|
||||
- [CVE-2024-2144](CVE-2024/CVE-2024-21xx/CVE-2024-2144.json) (`2025-01-30T15:21:55.593`)
|
||||
- [CVE-2024-22429](CVE-2024/CVE-2024-224xx/CVE-2024-22429.json) (`2025-01-30T15:48:29.167`)
|
||||
- [CVE-2024-25698](CVE-2024/CVE-2024-256xx/CVE-2024-25698.json) (`2025-01-30T16:18:43.000`)
|
||||
- [CVE-2024-25699](CVE-2024/CVE-2024-256xx/CVE-2024-25699.json) (`2025-01-30T16:23:46.597`)
|
||||
- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2025-01-30T16:21:48.907`)
|
||||
- [CVE-2024-2645](CVE-2024/CVE-2024-26xx/CVE-2024-2645.json) (`2025-01-30T15:39:23.947`)
|
||||
- [CVE-2024-2646](CVE-2024/CVE-2024-26xx/CVE-2024-2646.json) (`2025-01-30T15:34:41.863`)
|
||||
- [CVE-2024-2662](CVE-2024/CVE-2024-26xx/CVE-2024-2662.json) (`2025-01-30T16:12:13.900`)
|
||||
- [CVE-2024-3055](CVE-2024/CVE-2024-30xx/CVE-2024-3055.json) (`2025-01-30T16:11:40.940`)
|
||||
- [CVE-2024-3190](CVE-2024/CVE-2024-31xx/CVE-2024-3190.json) (`2025-01-30T16:09:08.383`)
|
||||
- [CVE-2024-3547](CVE-2024/CVE-2024-35xx/CVE-2024-3547.json) (`2025-01-30T16:10:54.307`)
|
||||
- [CVE-2024-4385](CVE-2024/CVE-2024-43xx/CVE-2024-4385.json) (`2025-01-30T16:09:33.727`)
|
||||
- [CVE-2024-44172](CVE-2024/CVE-2024-441xx/CVE-2024-44172.json) (`2025-01-30T16:47:17.370`)
|
||||
- [CVE-2024-4580](CVE-2024/CVE-2024-45xx/CVE-2024-4580.json) (`2025-01-30T15:55:44.283`)
|
||||
- [CVE-2024-4609](CVE-2024/CVE-2024-46xx/CVE-2024-4609.json) (`2025-01-30T15:50:28.557`)
|
||||
- [CVE-2024-4634](CVE-2024/CVE-2024-46xx/CVE-2024-4634.json) (`2025-01-30T16:01:17.150`)
|
||||
- [CVE-2024-4779](CVE-2024/CVE-2024-47xx/CVE-2024-4779.json) (`2025-01-30T16:10:38.760`)
|
||||
- [CVE-2024-4891](CVE-2024/CVE-2024-48xx/CVE-2024-4891.json) (`2025-01-30T15:45:34.377`)
|
||||
- [CVE-2024-8148](CVE-2024/CVE-2024-81xx/CVE-2024-8148.json) (`2025-01-30T16:20:34.150`)
|
||||
- [CVE-2024-8149](CVE-2024/CVE-2024-81xx/CVE-2024-8149.json) (`2025-01-30T16:20:02.563`)
|
||||
- [CVE-2025-24153](CVE-2025/CVE-2025-241xx/CVE-2025-24153.json) (`2025-01-30T16:55:07.740`)
|
||||
- [CVE-2025-24156](CVE-2025/CVE-2025-241xx/CVE-2025-24156.json) (`2025-01-30T16:43:39.593`)
|
||||
- [CVE-2025-24161](CVE-2025/CVE-2025-241xx/CVE-2025-24161.json) (`2025-01-30T16:34:58.187`)
|
||||
- [CVE-2025-24169](CVE-2025/CVE-2025-241xx/CVE-2025-24169.json) (`2025-01-30T16:24:54.597`)
|
||||
- [CVE-2025-24177](CVE-2025/CVE-2025-241xx/CVE-2025-24177.json) (`2025-01-30T16:26:45.687`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
300
_state.csv
300
_state.csv
@ -199125,7 +199125,7 @@ CVE-2022-30755,0,0,2c7408c12e1674abd78d78d67299eeac48e63e7c83939af9bca829a989117
|
||||
CVE-2022-30756,0,0,18e23da3e5e8929c2f5be39475d6e1fc11cbba9844fe0dfb111a0d72475a52e7,2024-11-21T07:03:19.137000
|
||||
CVE-2022-30757,0,0,2d5c8199f18f96a035419654ad0264b5833ba56242cbd4779925f141ab268f0b,2024-11-21T07:03:19.257000
|
||||
CVE-2022-30758,0,0,c755910598d15152cebc091faf48fc8a9f040d215dcc5a3353030803031ab2f0,2024-11-21T07:03:19.377000
|
||||
CVE-2022-30759,0,0,54a6d51afd8c75fdee55937c48b6f12974ff21700d36b3ce603a8c5e9da64d59,2024-11-21T07:03:19.520000
|
||||
CVE-2022-30759,0,1,3d3759ba2512dda79e7fa47c69a3c5ad62f610f5924e22b9d04a271c5336983f,2025-01-30T16:15:26.713000
|
||||
CVE-2022-3076,0,0,4cfe797b7bf9d5b5046fbf5f497a30e9958b45f1617dd7d6dba7bb13f8890c96,2024-11-21T07:18:46.420000
|
||||
CVE-2022-30760,0,0,4aecd0c7a54f5be6bc1f1e1b93d2c49f555805fe14853564db38d7ec4bd066e3,2024-11-21T07:03:19.727000
|
||||
CVE-2022-30763,0,0,287ce3525fc9d7d2c0ce07e52abbf5e3083e4aaeff3ffd02408cd5e87e67ada7,2024-11-21T07:03:19.883000
|
||||
@ -209488,7 +209488,7 @@ CVE-2022-4391,0,0,0ff9a05d52d3aa3de06124191e66973bdd39e57b666a47479eb2bcc2b7872e
|
||||
CVE-2022-43910,0,0,bc61d2b42779fea1fe4b3cf12606acd50183ddcf8c042f7fc0da0e38609033ae,2024-11-21T07:27:21.313000
|
||||
CVE-2022-43914,0,0,3c548d12690cec58c529bd0607f14f1f9e549fb5350d977603a219363d149ed7,2024-11-21T07:27:21.437000
|
||||
CVE-2022-43915,0,0,95003edebc2e438c54ea7d643af0a18ec88ff2cda62b4abb538e153c9051149a,2024-09-21T10:15:04.170000
|
||||
CVE-2022-43916,0,1,3748a9ef0c7f6df2aaf353e1ee5b4fe798026eec9ff1944a9341589e65929a46,2025-01-30T14:15:29.990000
|
||||
CVE-2022-43916,0,0,3748a9ef0c7f6df2aaf353e1ee5b4fe798026eec9ff1944a9341589e65929a46,2025-01-30T14:15:29.990000
|
||||
CVE-2022-43917,0,0,816f682456b6e66e0347743e10013b668c623790e5f5ce86f6345eda01d980aa,2024-11-21T07:27:21.630000
|
||||
CVE-2022-43919,0,0,0180961785dd7055e92f4af184de1616827bbeafac8a7aafaa021d7e8928d765,2024-11-21T07:27:21.753000
|
||||
CVE-2022-4392,0,0,edca1725f3b5a668165560e598881401f25d1f63ae808c1a347f81e7a14b86d1,2024-11-21T07:35:11.077000
|
||||
@ -210645,7 +210645,7 @@ CVE-2022-45672,0,0,4f4f6162278b95befcfc07e7dc681f8c215d350ece32bc4ce0b1b7c62f8fc
|
||||
CVE-2022-45673,0,0,afc92d054d79d72a087ecf07f6b36da4053cc02bbe4384db14d23cdb29ae30d5,2024-11-21T07:29:34.890000
|
||||
CVE-2022-45674,0,0,580031b9954cf940fff84360cd66195abd3dcb8e388dfd965c100f8ba07404fb,2024-11-21T07:29:35.047000
|
||||
CVE-2022-45677,0,0,26c58d9131392eb78a75a3bfa1e15a0611ddf82be3e30747a0078ff0695e7b96,2024-11-21T07:29:35.210000
|
||||
CVE-2022-4568,0,0,57f3ae08da2bcf695d056e095a200b384846a15d5e8f41eb8bcb795619bf7506,2024-11-21T07:35:30.647000
|
||||
CVE-2022-4568,0,1,9ae3dac0625cf805cb7dc84c4cd33fdb2f6ffd34f6815500699d97bbc8cb7d16,2025-01-30T16:15:28.620000
|
||||
CVE-2022-45685,0,0,00c004a5d1bc9bc9ee3a7d4a6dbab72cc8ff47765568898ab640257016353f57,2024-11-21T07:29:35.377000
|
||||
CVE-2022-45688,0,0,e84beb6b5e6221dbe254b4da8056cfcb30e6a47ff988ff305fa753750d577932,2024-11-21T07:29:35.553000
|
||||
CVE-2022-45689,0,0,d279eb426897f1a5c4c640557c1d2cd4d189cd451fee6c89666245857dc180d2,2024-11-21T07:29:35.707000
|
||||
@ -212124,11 +212124,11 @@ CVE-2022-4787,0,0,a775090ad6a19e2397330271e6a9c8c0fcc3ca01e8ee953540eafdc3013ee5
|
||||
CVE-2022-47870,0,0,91c985fec66e47abfef4d4434260c8e54cf563434d64675f1923a881305d72d3,2024-11-21T07:32:26.203000
|
||||
CVE-2022-47872,0,0,7a9e6d48be86642f6e906833e9f14f87dffb1d01d7055f7b112279fc89dc4045,2024-11-21T07:32:26.340000
|
||||
CVE-2022-47873,0,0,a20f81b089755e840fbf9863b86895ed3e7651f714485a3c30efe42d8fa5a686,2024-11-21T07:32:26.497000
|
||||
CVE-2022-47874,0,0,cfafd4934240535b74d277d1a1f6a34e868b97ce6fd406d68bbfd386fa080749,2024-11-21T07:32:26.633000
|
||||
CVE-2022-47875,0,0,5452f740a78c73caa4a657fddea9b236c0ccab2f61a24d95fc04cf4b9ef18229,2024-11-21T07:32:26.780000
|
||||
CVE-2022-47876,0,0,20e65339e4b12003bfe8074da0a3070b01a9d4475680513dd99c3db343e8e56e,2024-11-21T07:32:26.917000
|
||||
CVE-2022-47877,0,0,f4f2fa3f9619bc52600ea7032a7ebd4771ed2cd68feb9a57717103525e5dbea1,2024-11-21T07:32:27.047000
|
||||
CVE-2022-47878,0,0,96bb6067105e74676882f6a527181b82486d927c40bffd915863185ad4f54ac6,2024-11-21T07:32:27.203000
|
||||
CVE-2022-47874,0,1,c0d376f7b1b6877495777165e97b59db361c1c4461171116febdaa80763213c1,2025-01-30T16:15:27.560000
|
||||
CVE-2022-47875,0,1,f19f8f03c90ba4ad96162ee2357fb4daec9ecd82df8fe9f064719ed5dd3c9bfb,2025-01-30T15:15:10.413000
|
||||
CVE-2022-47876,0,1,fac63b993d6bfd89b7e4be4215b63f05effcc86d3db0ae7d640178e54b245a1b,2025-01-30T16:15:27.707000
|
||||
CVE-2022-47877,0,1,0b1de0eb7e502955d2bb7008421a44c1331d179ad7cbd0356d21cd2d5277b52d,2025-01-30T16:15:27.900000
|
||||
CVE-2022-47878,0,1,a7952d6ecc8a2edaecb9f97d906a906fb5d9204d6ecf5083fd86b30c19b9d2dc,2025-01-30T16:15:28.067000
|
||||
CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000
|
||||
CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000
|
||||
CVE-2022-47880,0,0,6912960d6442fdd7ed92092a03e4fe22fbfc3cd1e68d8e2a73464e9293478ab9,2025-01-27T17:15:10.117000
|
||||
@ -212280,7 +212280,7 @@ CVE-2022-48181,0,0,f70e55148fd4de8dc27206db433e82fbca6bacf2648bcff1bd3db6a8345e4
|
||||
CVE-2022-48182,0,0,7e4702a6bb9408ecf54cc582d3f7dadd0d4bce1d07351993ff9166ad23cb0a80,2024-11-21T07:32:56.147000
|
||||
CVE-2022-48183,0,0,2aacd2e8aca664851758ef39ac2e99338d53295a382d0810eb456d15940165dd,2024-11-21T07:32:56.297000
|
||||
CVE-2022-48185,0,0,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
|
||||
CVE-2022-48186,0,0,2fbe42bb51a089c6aae9fdbc1657e6c3ac84b40085be2a6b7092f70fe7d3379d,2024-11-21T07:32:56.463000
|
||||
CVE-2022-48186,0,1,935a07b83ddb92c5ab2aea193d11a85cd6f64365adf02a677e21b9159a08e840,2025-01-30T16:15:28.230000
|
||||
CVE-2022-48187,0,0,ff1590e9a690fb0ae260adde2c69973167f534b3795163c9e5f0527961fbe91f,2023-11-07T03:56:29.847000
|
||||
CVE-2022-48188,0,0,a57e0cbe19f8da8f267f7508bc21b3797021332aa1b6def719261ebe5a5d19e9,2024-11-21T07:32:56.600000
|
||||
CVE-2022-48189,0,0,1494a3b2e7a8494a30009281a6fb460057feec1ba225511a702e798096f899b5,2024-11-21T07:32:56.753000
|
||||
@ -212533,7 +212533,7 @@ CVE-2022-48479,0,0,be4088657a9d04258c6dc407e95a9bbab8a3d6de9c183cfba1a0bcf8a75a7
|
||||
CVE-2022-4848,0,0,2025d1f07e7c6abe39b0a89cabb1f25d6a203d1b0fe8acc9559fd26ef1fd1f2a,2024-11-21T07:36:04.023000
|
||||
CVE-2022-48480,0,0,f2d28daf1ad676191a943d3427a4ffe4dd544f7aa9e10d88fe61667f1ea027a7,2025-01-15T17:15:10.717000
|
||||
CVE-2022-48481,0,0,c38e69565bc722dab603c8923a925c3999184b33cceae3626e62510d5d97227d,2024-11-21T07:33:25.060000
|
||||
CVE-2022-48482,0,0,7ac41b1951b801fb664e658d13833df47cbab31ad3169e90b364ff040e0a3677,2024-11-21T07:33:25.177000
|
||||
CVE-2022-48482,0,1,09e1999cd5d0efaf351609b5ea32876e53ba7e4e0b62927641a410560381e1d3,2025-01-30T16:15:28.450000
|
||||
CVE-2022-48483,0,0,d2bec26748db8a5da63d916cd77a26e7f5ec965ac0c82535ec23b0719f24bb2f,2024-11-21T07:33:25.313000
|
||||
CVE-2022-48486,0,0,f03df4247b68cbed001a4cda633e9152715ecb8aa9328c3e3da84b7b43510f8c,2024-12-17T16:15:22.073000
|
||||
CVE-2022-48487,0,0,847663737d83c8f2831f21b93d19406978bac505b0e2d927ba6bb1a8c413da60,2024-11-21T07:33:25.550000
|
||||
@ -214017,7 +214017,7 @@ CVE-2023-0887,0,0,40c09943859ef31f07f94beb9b0e9b6bac8adb3704c20c6a9f4f9c5bcd04b9
|
||||
CVE-2023-0888,0,0,fafedab3b7be190ad7f74ea49b70d79d3a9003a17b228ca95227190b23915271,2024-11-21T07:38:02.240000
|
||||
CVE-2023-0889,0,0,1830ecc87642a51bbdaaaf166292bdea43e5b0992253a5990eae3a6fafb4acd8,2024-11-21T07:38:02.390000
|
||||
CVE-2023-0890,0,0,4d73273c012484aaeff7fc81fc8e1772c749a2f9ec3c4dda1bb8002d2ae75174,2024-11-21T07:38:02.493000
|
||||
CVE-2023-0891,0,0,60a89adcaa92afb1a3837ace42cb05dfca1ea747a99824908a578c2a7484dc25,2024-11-21T07:38:02.600000
|
||||
CVE-2023-0891,0,1,2517a3cfaf1145900137bff4043c10495e615381f559a2c66ebbcf3cf0de2e7e,2025-01-30T15:15:11.563000
|
||||
CVE-2023-0892,0,0,7f2a62f61960cc567a0195dae725c6e118c7f51907c4c1e9a55492716231c885,2025-01-24T21:15:09.507000
|
||||
CVE-2023-0893,0,0,df438bb69ce370b92d087935b5a942e58daa9c9302b4f8fa3f13002775117f35,2024-11-21T07:38:02.820000
|
||||
CVE-2023-0894,0,0,cdc8e871a9dd03dfafab10acc905a6eb6a6585e70272458b122a3f52ecf925a1,2025-01-29T15:15:11.903000
|
||||
@ -214049,7 +214049,7 @@ CVE-2023-0919,0,0,5305cf677997835fc8e97f12f98585f9abdf4bd59ff72c678671606015005d
|
||||
CVE-2023-0921,0,0,13e7f89125226c2be46f4ff9448cd445661866b8ff54e902081ec06d99e14908,2024-11-21T07:38:06.130000
|
||||
CVE-2023-0922,0,0,94b670c71ad6c5df92066fe0f049322290bc52b352018c4add4f12222ab4bb7a,2024-11-21T07:38:06.260000
|
||||
CVE-2023-0923,0,0,7daaca2b1392cdb563ac6de27eca1f70a13e9211557487fd5d694051f34523c2,2024-11-21T07:38:06.380000
|
||||
CVE-2023-0924,0,0,8c44cd06148f588ef1367baebb8001ba52e9d46c7b355cea830a4de72693aa44,2024-11-21T07:38:06.507000
|
||||
CVE-2023-0924,0,1,c8dd3a3537dd275687782fe4de1a780990056b2847afc93ff1e8f9e9c751f38c,2025-01-30T15:15:11.770000
|
||||
CVE-2023-0925,0,0,e28a97a4ae7f1d44dc7c7c6977b76d9c031188b6d0669741bb545be62d2ef78e,2024-11-21T07:38:06.610000
|
||||
CVE-2023-0926,0,0,053c50d08c9fdd695226ae7e23939730e9470062a0ce2f08babf681227535fee,2024-09-27T01:01:34.407000
|
||||
CVE-2023-0927,0,0,490557fbb08483e38e0786261fa7f58d8e2d73f0e609ca02ae12888c4efde6e9,2024-11-21T07:38:06.903000
|
||||
@ -214141,7 +214141,7 @@ CVE-2023-1017,0,0,04be72a081fa821a9f30aa22682dd50e0cb99b972ad48652379ebc30ec5667
|
||||
CVE-2023-1018,0,0,19457c07f327759818b2b2eed145d207a2b5a63750893ca3eb94a8e4145383c5,2024-11-21T07:38:17.760000
|
||||
CVE-2023-1019,0,0,13321c770340c90a07956bf73dad30c6227553ccdd720c933d8b715985fe70c9,2025-01-24T22:15:32.650000
|
||||
CVE-2023-1020,0,0,73a15efd03deaefd7e63c0a8b19e32a2b679a4d4b785c0e0ae2bb279ecb454a8,2024-11-21T07:38:17.983000
|
||||
CVE-2023-1021,0,0,597056a3fe26439b9afb25e710ae32fbd52269ab76e5f588f603e243da91ff28,2024-11-21T07:38:18.083000
|
||||
CVE-2023-1021,0,1,80acc67ff3d075babffb3394a9528f8547fa5db01c4f597c4b73321d7b9a0a0f,2025-01-30T15:15:11.963000
|
||||
CVE-2023-1022,0,0,0f037b6141e1c28abd39a8923349c21e60c8c8c30cae445c9560c61c11a94857,2024-11-21T07:38:18.187000
|
||||
CVE-2023-1023,0,0,e4867fea73617b9969988d012779e09595869a252fc618f555582dca89f55db8,2024-11-21T07:38:18.310000
|
||||
CVE-2023-1024,0,0,f201ad545e885f805985b1a1bd3d9a443cbfaeadaef59844f648946f5d9e9911,2024-11-21T07:38:18.423000
|
||||
@ -214207,7 +214207,7 @@ CVE-2023-1086,0,0,88f958cd195c9bf703efdb1102b9fdb3d47333293a12d131cae45eb1e45d8b
|
||||
CVE-2023-1087,0,0,1bf076f603a138cbaeddd3d92ecaafe8fa8f46aed4a304e459e14ba09447cb5d,2024-11-21T07:38:26.007000
|
||||
CVE-2023-1088,0,0,5b368a55ce07ac1d06b780775d8740c95a03e48b4833c0cf4d35c043789a6b25,2024-11-21T07:38:26.110000
|
||||
CVE-2023-1089,0,0,aece4f9db6b729d86971ca0a83e6e576e4e8b8198bf1a236076f4e122b97db91,2024-11-21T07:38:26.220000
|
||||
CVE-2023-1090,0,0,c8f394a8f6f808ab2e1ee1d4ab86160e7d5ed1376e4085788a8965cecb1b42fa,2024-11-21T07:38:26.330000
|
||||
CVE-2023-1090,0,1,25ccd715dcee0b5e820863482b71b2db6e4170920235173f327ff4b5f16e78ed,2025-01-30T15:15:12.147000
|
||||
CVE-2023-1091,0,0,9a128be955d385960ee0cec982b4debe4f2b0b70a6b1e923e5650e75a331bbb4,2024-11-21T07:38:26.437000
|
||||
CVE-2023-1092,0,0,c95010b1f4e248f04a2dcca345e3caa5bd3d28bc70fc9801b61bf85c51ca7236,2024-11-21T07:38:26.557000
|
||||
CVE-2023-1093,0,0,013ca17f4d96202a29badf2b31b2bbd22c2221ef8aa1c9a1fba474aca21771e2,2024-11-21T07:38:26.673000
|
||||
@ -214240,7 +214240,7 @@ CVE-2023-1120,0,0,b67431b8801043d2762b77648bf7daebaf783cb74af84def7c793f702bbf01
|
||||
CVE-2023-1121,0,0,648ad857aed412ab295fe1760415bbeb314db5b54caa4785e2f62f8e08764a65,2024-11-21T07:38:30.020000
|
||||
CVE-2023-1122,0,0,662df1661abe841ba899aa885ca33cd9cbbc4ca3be01370afb41f220b945b637,2024-11-21T07:38:30.130000
|
||||
CVE-2023-1124,0,0,00a114e1345472243e7f63bff578020925d0b4230677958280b633a7b72a33a8,2024-11-21T07:38:30.237000
|
||||
CVE-2023-1125,0,0,9e0d8290612231ada36dbac7d52321151b8a7ead3380ed68343b8bd603d1b742,2024-11-21T07:38:30.353000
|
||||
CVE-2023-1125,0,1,0bc566bbdb62dcad8091c8081ce75445a49f94a8b4e6e6d4048f5cf9a816327b,2025-01-30T15:15:12.337000
|
||||
CVE-2023-1126,0,0,76ca00f995398cc356871a49cef73ae78da9b91a23f8d33d6a85a2527e5f7f7f,2024-11-21T07:38:30.473000
|
||||
CVE-2023-1127,0,0,8168835cb911ea2b9760c462e21a4895b18aacd80959a479a7ceb803bce4449c,2024-11-21T07:38:30.587000
|
||||
CVE-2023-1129,0,0,bf0b523a4eb72378ea0896f3afd850d83509d24b6407e1da9929bb0ec03a28d7,2024-11-21T07:38:30.723000
|
||||
@ -214308,14 +214308,14 @@ CVE-2023-1192,0,0,bfa8f5268ba2ac1bf29c3a44f8e698ecb3c10e88265d80473e4f4f400a814a
|
||||
CVE-2023-1193,0,0,e26a2390b19d99c4af76bf87860e924ddae19e1846826c12b2553b6dbfbe934f,2024-11-21T07:38:38.710000
|
||||
CVE-2023-1194,0,0,fe3e573f3c4a0a5795972c1e55b585dfd154191dfcf47b11d4de2a4ec470fde9,2024-11-21T07:38:38.847000
|
||||
CVE-2023-1195,0,0,b678d5607b985ba032a4a1965ad90bccdae593e8264afd26c6fc50484822d431,2024-11-21T07:38:39.007000
|
||||
CVE-2023-1196,0,0,cf95f5aef542b4e95e85df046f2d98bbeb98900b2f469b38e14ddcee4cf9f3b4,2024-11-21T07:38:39.120000
|
||||
CVE-2023-1196,0,1,c8f5779968326d7d81a300e6402c218f9d3653bdc1028fe84c7e3255af4de629,2025-01-30T15:15:12.527000
|
||||
CVE-2023-1197,0,0,86832f5d8e3d2f19e25d554307cda0a38f9c96d8816c29ad3985ff0868049cfb,2024-11-21T07:38:39.223000
|
||||
CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd1f,2024-11-21T07:38:39.327000
|
||||
CVE-2023-1200,0,0,cb5805db4a921d68bdf953c1e086ad953a942ed94e0e68ad6b2ae124e1cf6cd7,2024-11-21T07:38:39.437000
|
||||
CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a96,2024-11-21T07:38:39.553000
|
||||
CVE-2023-1202,0,0,b80fb305eb4d0315b72e4e193b40ab5869024349a33c31de6337de50e387d71c,2024-11-21T07:38:39.653000
|
||||
CVE-2023-1203,0,0,2c91a011fc8bd4ea016cf3e67f1e6f2936594e64abfa5a016428f0a01e709b9b,2024-11-21T07:38:39.760000
|
||||
CVE-2023-1204,0,0,19ea7444022b59172702259fe6139b9bb3632c0f28d770bbb991031804d5b4d0,2024-11-21T07:38:39.860000
|
||||
CVE-2023-1204,0,1,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000
|
||||
CVE-2023-1205,0,0,79721d87fa62d640560ed833c7f7bd2eb94aa422ccee9cd59eb9d37b0e6fe39f,2024-11-21T07:38:39.967000
|
||||
CVE-2023-1206,0,0,61a6d8638c87f97f2726781e2179014defc8f0359aad79a22aeca86d4eb775a3,2024-11-21T07:38:40.070000
|
||||
CVE-2023-1207,0,0,be4a7cb974be7ce9f2ad18230d631fe96a11eb7b0083b1d0ef328f835a67382f,2025-01-24T21:15:09.660000
|
||||
@ -214618,7 +214618,7 @@ CVE-2023-1521,0,0,34ba7a16607d114cc465c9eda0277be53b7130d5847ae48ed5169503b7db47
|
||||
CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33ff,2024-11-21T07:39:21.427000
|
||||
CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000
|
||||
CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000
|
||||
CVE-2023-1525,0,0,b22736357780c69ff905821dd88b88cb1ef1f2532b51391bf30ca90589b5f457,2024-11-21T07:39:21.797000
|
||||
CVE-2023-1525,0,1,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000
|
||||
CVE-2023-1526,0,0,470ef30dc321b08de770a6be8b8f2aa7190eeda7e5a77bf24f511e23d99c3465,2024-11-21T07:39:21.910000
|
||||
CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000
|
||||
CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000
|
||||
@ -214639,13 +214639,13 @@ CVE-2023-1542,0,0,b7be4a9b2b884cae890dae2ba469356a03dc78c283b05769f6fa3e0b0f6ac8
|
||||
CVE-2023-1543,0,0,281b80c66a7eb3dc1baf3cb840de56258f1cec8092b87400877477901d7347e0,2024-11-21T07:39:24.610000
|
||||
CVE-2023-1544,0,0,214abe3bb53649aed45e80d24f71bd9fd00a2556ce29ebe5a2dc07d15d7e1720,2024-11-21T07:39:24.730000
|
||||
CVE-2023-1545,0,0,b9104c7a50d4a10687955a94074e210317ac24b2ed84205a3d03e8a1a248de67,2024-11-21T07:39:24.863000
|
||||
CVE-2023-1546,0,0,1b0ff163ddbd6fb477ad3f4ca4ec5a9e5906f3da82f945eb8e6504974e247c22,2024-11-21T07:39:24.990000
|
||||
CVE-2023-1546,0,1,06f7fef9ed0d8518c6042a3cb575201d1dc30d1c3ed3fc9dda6b87d92e45d8dc,2025-01-30T15:15:13.070000
|
||||
CVE-2023-1547,0,0,d51703ba83bfaa188e57eab64dad2db239343d3fd939596fdc9ec822d8044772,2024-11-21T07:39:25.103000
|
||||
CVE-2023-1548,0,0,3878979d03170c0797cdf166dad43e9909c28272fc216120d5dee70c8a4e2519,2024-11-21T07:39:25.230000
|
||||
CVE-2023-1549,0,0,69aeb5bec56a691e857ec2ad2bff10f83bffccefaa71a64c5e38d5cbe7dd5b79,2025-01-24T21:15:09.820000
|
||||
CVE-2023-1550,0,0,7d2654d2d0bbfb0e9bce9222b64a82d5858f7ad0483bfbe3ca832bb8c7d44cf0,2024-11-21T07:39:25.473000
|
||||
CVE-2023-1552,0,0,5cf9c6f81bbddc991a2e47bcc8698238f7e68c250afa2d186a4edd740986a6d1,2024-11-21T07:39:25.600000
|
||||
CVE-2023-1554,0,0,89131d91aa6dafb039cea9a0ce5a6fea3b27dccdcec384be81eedb4e817a3ed7,2024-11-21T07:39:25.727000
|
||||
CVE-2023-1554,0,1,40dc9db34ac37648c5a45a6ccea56caa22f0d3aeb1086ea552e81132c710f243,2025-01-30T15:15:13.240000
|
||||
CVE-2023-1555,0,0,83d1f3692c7ee304de5e2dd61fdea47e3de63882df92af90f767ef9c77daa5b5,2024-11-21T07:39:25.840000
|
||||
CVE-2023-1556,0,0,6d045497dcab50a75fe1999ac11f40181845ea1c0327bc1cc849d19f015c4db8,2024-11-21T07:39:25.963000
|
||||
CVE-2023-1557,0,0,89ab715bb84b32db1fc105225323836788a8a6455e988a4c407d6e311038b33a,2024-11-21T07:39:26.093000
|
||||
@ -214702,7 +214702,7 @@ CVE-2023-1610,0,0,1d2c3978ee29298de750514ebfba47cff4f8672b966bb54773a2f741b58613
|
||||
CVE-2023-1611,0,0,441fec094c3e2c5f624a61337e71f166acdd20f2f2f8b56512a32d1d2efbef66,2024-11-21T07:39:32.193000
|
||||
CVE-2023-1612,0,0,03ef46a5564cc6e02dc2f30f75a61a0b553ec9734bd77b592e2a6ae4b7d59bbc,2024-11-21T07:39:32.330000
|
||||
CVE-2023-1613,0,0,875add8d1a41114d3df41a1c0c2e18acb80939a4eb7457f8a0cb4e0e343a480d,2024-11-21T07:39:32.480000
|
||||
CVE-2023-1614,0,0,4ebab5520f43d422ad512b6c0bfe5f4b6240ada9e9535c603831559d0d78db2c,2024-11-21T07:39:32.633000
|
||||
CVE-2023-1614,0,1,d3ae64829126ce70f25af4f1742c07af420adc653ca1ecde4695f57868d13a04,2025-01-30T15:15:13.400000
|
||||
CVE-2023-1615,0,0,7b5d50ded2a4ee58a251c8567550dd9c1c469d19394a9a10c86b1c121c7e05f9,2024-11-21T07:39:32.747000
|
||||
CVE-2023-1616,0,0,835fa1eb9a010335047ff0aed4f9f5da1a803f5b7fd6febd43a84af4d9d8ec28,2024-11-21T07:39:32.887000
|
||||
CVE-2023-1617,0,0,1c1201d464ca5118a570419dbaad9ff27bf2700e36b0b157f16f906e1768ead8,2024-11-21T07:39:33.027000
|
||||
@ -214753,7 +214753,7 @@ CVE-2023-1665,0,0,1d3df359bc1f5d4b8798b6f7df301eaa09959155a1e05e483d0acbdc7664f0
|
||||
CVE-2023-1666,0,0,0a6bd042bfce50ece02839147998ce826930595674c07380fe99c25993f1ec40,2024-11-21T07:39:39.030000
|
||||
CVE-2023-1667,0,0,007039c95c2a66e283c8829a0e671b3f5d75acb867d7db6331aefe56e15ddde2,2024-11-21T07:39:39.170000
|
||||
CVE-2023-1668,0,0,7026e054ee0e1ffc09cab5612ac02a2a9656fa9a506d74dfdcbe04798943fef0,2024-11-21T07:39:39.313000
|
||||
CVE-2023-1669,0,0,1ce991c9a4e6bb9f3ac14e1d75a8fe1d54c99b80e814e4897327dfb6410b2181,2024-11-21T07:39:39.457000
|
||||
CVE-2023-1669,0,1,5311d150809ab6943484d0b3367f043531bf3f82c64bcbd57f3439c66b969218,2025-01-30T15:15:13.580000
|
||||
CVE-2023-1670,0,0,c06c533e3f5f4366ef933e56765dccaa403d5072fca5a0c50a257590860253b0,2024-11-21T07:39:39.573000
|
||||
CVE-2023-1671,0,0,ffd3253ede7b7e2fd00316e35b2d726f31e096e4810fa25700d5c280f05a32d0,2025-01-28T22:15:13.780000
|
||||
CVE-2023-1672,0,0,2db498d952eda584270e55192f274b101001777d9a798432e84a793434073e3a,2024-11-21T07:39:39.810000
|
||||
@ -214812,7 +214812,7 @@ CVE-2023-1725,0,0,1288effa581beafdb9450bde3b3f32fd682403352c280c5c67244a1ebce261
|
||||
CVE-2023-1726,0,0,7fe9cd9345f7e9931cf0f62ff9bb89eee878166d348fc6ac03ed9b3d56c38ce2,2024-11-21T07:39:46.657000
|
||||
CVE-2023-1728,0,0,981cd8e8adb9e3b1b6beb4084aec72e09c7d365a70973ab69ebd692e12b4e541,2024-11-21T07:39:46.773000
|
||||
CVE-2023-1729,0,0,92eb91b74efa99fa9a3cece9e91603fc963b68e3a840152763717a0c65fb25c3,2024-11-21T07:39:46.890000
|
||||
CVE-2023-1730,0,0,a697669ac22030700478d7dfa002cb86b5c7d762686e38db8014babf6b522cc3,2024-11-21T07:39:47.050000
|
||||
CVE-2023-1730,0,1,cbdc1cac0dced40449b83d7a491e74ada7c55bcf5cbaf87e5f190daa5b9af814,2025-01-30T15:15:13.767000
|
||||
CVE-2023-1731,0,0,5784a0b3f79ad15253cc740ef758b35d7f8a3ec0b50d0b2952828f2881a1bfcd,2024-11-21T07:39:47.157000
|
||||
CVE-2023-1732,0,0,de42651859dfb2e0d55178bb0ab9bd5f7a767963f3ffb908f0c2fe4c96f97b16,2024-11-21T07:39:47.283000
|
||||
CVE-2023-1733,0,0,fa198ff4b1cf504734811f9fc97304008097009845fe451951387c450a506baa,2024-11-21T07:39:47.407000
|
||||
@ -214885,11 +214885,11 @@ CVE-2023-1800,0,0,192d23711da65eb52594040339d0dddc8a7937f5896cc9b30e913a0b63001b
|
||||
CVE-2023-1801,0,0,d15268dd9e5e4d789138411da6b6c068c4e064e163e7a432ac6f3ada916820cc,2024-11-21T07:39:55.960000
|
||||
CVE-2023-1802,0,0,c8ec5b19a3c825b7ff8a8c361eb522bd793e6b641cffed05144ed8c99585bcde,2024-11-21T07:39:56.090000
|
||||
CVE-2023-1803,0,0,bbf4043b7e6afdb5c270fb467833b24afe9ee14f1d93f39ea5a9110d3f73c6f4,2024-11-21T07:39:56.197000
|
||||
CVE-2023-1804,0,0,fe3db911294ef6c120f5223aac3aca5fd7137cdd289091fef7139a5a902af88b,2024-11-21T07:39:56.310000
|
||||
CVE-2023-1805,0,0,16cab7887afb795773a79aba6506d5fc64c80e01a5cc1caccbe69a2a184c2b54,2024-11-21T07:39:56.407000
|
||||
CVE-2023-1804,0,1,a7c0015d82f7f7b1c250eb9ddd4bf9ac90597379e50599685cf6db30207ba539,2025-01-30T15:15:13.947000
|
||||
CVE-2023-1805,0,1,eb8a153f7e40dea0fe3c37f01f9f001c35153f136583f1506397a926938f9a66,2025-01-30T15:15:14.117000
|
||||
CVE-2023-1806,0,0,158ac74cb4980a215026406678f7042a9e33f2c85ffb68dd055097077fd1f7f8,2024-11-21T07:39:56.500000
|
||||
CVE-2023-1807,0,0,68ce9efa2a73f50c1ae7a0ef58d9480e4bd0cb76c409a3061652425f04a195aa,2024-11-21T07:39:56.597000
|
||||
CVE-2023-1809,0,0,8e7bb67b334831eaba0b398fb83e982ea22d5c156d26c679db9ef050e0c2ead6,2024-11-21T07:39:56.693000
|
||||
CVE-2023-1809,0,1,ed1dfffe81cc9d8652cb87ed35cbf3b70b34117cde3c281b0320c3521f5310bd,2025-01-30T15:15:14.273000
|
||||
CVE-2023-1810,0,0,ceb506c57941a03762177c93a4dab2042b6266cf2ea6bfc90878a5b43f0b70ca,2024-11-21T07:39:56.793000
|
||||
CVE-2023-1811,0,0,45e6e0b55b213f67e65368c1bad75278060ed02bd964c02821f3c0d21d1fa493,2024-11-21T07:39:56.947000
|
||||
CVE-2023-1812,0,0,b0cfe3dc16dcd9613f712ea7398e9d2900d87489ba1a82e507aea1c99683598d,2024-11-21T07:39:57.100000
|
||||
@ -214938,7 +214938,7 @@ CVE-2023-1857,0,0,55cb03a7a1032c1834395536b9eba3913167eecde95bdd4c2ae2f2b93e3dcf
|
||||
CVE-2023-1858,0,0,df7325c01a486bc312639bb1f615f6ac0a26c25e7b26e6a183a5620e96094aac,2024-11-21T07:40:02.093000
|
||||
CVE-2023-1859,0,0,23899e3cee21603963a4dafc4a10f02b1c783b8c627a4a20610ef8a5cd3a5d4a,2024-11-21T07:40:02.217000
|
||||
CVE-2023-1860,0,0,0fa30f56f993b09a5dbcdfce5c677412e754808a246c33f2484aec39e502cdb7,2024-11-21T07:40:02.317000
|
||||
CVE-2023-1861,0,0,612206f51224af831ad0fdf2745d0d542febefecd01e78c4b29905dcb8885cf7,2024-11-21T07:40:02.440000
|
||||
CVE-2023-1861,0,1,8c35216364c24b1fb1c93283a7f8f196219f3c0b44aac8a320b953b081ca1db2,2025-01-30T15:15:14.450000
|
||||
CVE-2023-1862,0,0,9dd720dc34f84918e06a8028dfd464c845d03b0a153324e5c97106c0863423d2,2024-11-21T07:40:02.547000
|
||||
CVE-2023-1863,0,0,d5231e684e16bb2afde2c74e51d9754850a88e89c7b835f9510aaf494f611138,2024-11-21T07:40:02.687000
|
||||
CVE-2023-1864,0,0,e4216bb41d14894ef4ffed9f0c97d06b7fb9c4bd263753e62639bb51783eb104,2024-11-21T07:40:02.813000
|
||||
@ -214987,7 +214987,7 @@ CVE-2023-1907,0,0,7e5d444ed0298ba9f7785c55a14ff0c356de0bcf01ec3878593a7572234eb1
|
||||
CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000
|
||||
CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000
|
||||
CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000
|
||||
CVE-2023-1911,0,0,98e1cbe89d89d3468bc376e026f61535a32ca3c1840cc25a1df841b1cb88d21a,2024-11-21T07:40:07.673000
|
||||
CVE-2023-1911,0,1,eb704646912caf2cb13ded89d1aff664fe96d3f67cd1dd812f9acbe8344bc322,2025-01-30T15:15:14.617000
|
||||
CVE-2023-1912,0,0,05f939601819bead6d6c44549f2bd92588323ddce524d62b1adc585ddc3f93c1,2024-11-21T07:40:07.770000
|
||||
CVE-2023-1913,0,0,12e4ca67ce560b794c6193a20c24adf9efc17ff64d8a9213c3a6e4d06f9fb562,2024-11-21T07:40:07.873000
|
||||
CVE-2023-1915,0,0,d603808ffa37ef3f61dca302f2e39f4b9fa392a0c0cfbe342e9ab6dcdbc07e8b,2025-01-24T21:15:10.150000
|
||||
@ -216851,7 +216851,7 @@ CVE-2023-21966,0,0,033b728493269d0990c7dddaebf35e08208ea87c784ad602211d2dd4d8e75
|
||||
CVE-2023-21967,0,0,4b6d10e255352c9b33d041d9f685e9b10c2606e3da010a7442c06158e0bace1b,2024-11-21T07:44:00.397000
|
||||
CVE-2023-21968,0,0,ae3d4d254449ec54793102b8a940c47617f6a9730eda6b4e3e66e5c5b2d3f917,2024-11-21T07:44:00.860000
|
||||
CVE-2023-21969,0,0,cb7ba56a6928a010e0b4003b0a14e45d0a5505236a9e846beaa7a35697d51477,2024-11-21T07:44:01.003000
|
||||
CVE-2023-2197,0,0,f7d04a4765d3e876db180b26483e69c06da4b918de06220eb16c84a8a33f8d2f,2024-11-21T07:58:08.163000
|
||||
CVE-2023-2197,0,1,09b711e55f2e0967ae13666ce22f2814afe75471c6a3c8eb74869f8160a40a61,2025-01-30T16:15:29.243000
|
||||
CVE-2023-21970,0,0,718b89c1852e0909b0f74dc234a4260b48dc66316ce3d4222a5aff109d327fb3,2024-11-21T07:44:01.120000
|
||||
CVE-2023-21971,0,0,03690154e67f6e285cefb2ad0324c5ef4b276676adca6c284786aba15791c823,2024-11-21T07:44:01.233000
|
||||
CVE-2023-21972,0,0,a6f0a01223db677a00478fb681fbdbafe8066d690ff69cfca79236b0beee137b,2024-11-21T07:44:01.360000
|
||||
@ -219051,7 +219051,7 @@ CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a
|
||||
CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000
|
||||
CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000
|
||||
CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000
|
||||
CVE-2023-2473,0,0,ac19f0dc01831359fe03d48c9b6f659d10eee81ce2e1ac6f08ee0035934a102c,2024-11-21T07:58:41.100000
|
||||
CVE-2023-2473,0,1,8119a7a63f3fd5e1b8b5d85c113baadb93c20a63761e547a95a5358c48715778,2025-01-30T15:15:14.780000
|
||||
CVE-2023-24730,0,0,f41f7ce60b87186a36c799b291e39c363ae59e5aaa71806b34570d06e1757d83,2024-11-21T07:48:20.500000
|
||||
CVE-2023-24731,0,0,8fa5455f55f7771c5580cf6e6cc163bbe6deadec98f097e1e136a45ddc4c91f5,2024-11-21T07:48:20.640000
|
||||
CVE-2023-24732,0,0,ac333993770ae4c975ad2f5e9cc596c859fb3cd3c16fc2f4f786c38ed5ffd9bd,2024-11-21T07:48:20.780000
|
||||
@ -223794,7 +223794,7 @@ CVE-2023-30635,0,0,48785607c1185540c000bd1a754cfb5496165eda7db3f6717e5176e3377d3
|
||||
CVE-2023-30636,0,0,9f3955e9e0014157c6f614a8fe260321b5f1d2db3e6b84fd04d17a254604a6a2,2024-11-21T08:00:34.313000
|
||||
CVE-2023-30637,0,0,d3309f86d3ff6ab1118a488465045aabd0139274566ae9292f827ba9a0c811aa,2024-11-21T08:00:34.480000
|
||||
CVE-2023-30638,0,0,eed5da0918c8f9e7f101b154009adbe189c54fea2597ef330484e451b2740f83,2024-11-21T08:00:34.640000
|
||||
CVE-2023-30639,0,0,16cf2a49697724b11503ba980808c080d02830c1c993a906db22f46932037f9d,2024-11-21T08:00:34.800000
|
||||
CVE-2023-30639,0,1,f0659f9f17d2fdf99632b6597816298161c8f8ab7c39c94381b65f377f21ffd5,2025-01-30T16:15:29.447000
|
||||
CVE-2023-3064,0,0,a03c2d3b358df7f940fda5d6aa5a55337d388bb270a32bc5403fb31d0c2d8f37,2024-11-21T08:16:21.717000
|
||||
CVE-2023-30640,0,0,3cc9fac3cff3272b0c5ffa3f67c4addd073ee5000a8f6a7172b75ea608094984,2024-11-21T08:00:34.947000
|
||||
CVE-2023-30641,0,0,c1e35b7c9ebec37f93adedb37bfc4a166b3cb97fd67c584b5b07fc0e25bb28af,2024-11-21T08:00:35.100000
|
||||
@ -224309,7 +224309,7 @@ CVE-2023-3120,0,0,c2dea732f6565cd3bd06512beb7d3c5ba3f0f39a81ff97f57a2e1ed3c3b2c0
|
||||
CVE-2023-31200,0,0,2efc06994c921521bb3dd14ebfb2e03388a0928840f6489a734561365474811d,2024-11-21T08:01:37.003000
|
||||
CVE-2023-31203,0,0,3fdb4f3b756d4e91eb2d22dd648c10208189dd89fbf2929fa781d7e035482dbc,2024-11-21T08:01:37.117000
|
||||
CVE-2023-31206,0,0,d618d468315f6a331a0b671959393d70aebedb78cea4c1bd4e598d2c34243c1b,2024-11-21T08:01:37.237000
|
||||
CVE-2023-31207,0,0,f65acd7702c117489657be96e3a253482688e0b5a291a24ffd08218044e40945,2024-11-21T08:01:37.413000
|
||||
CVE-2023-31207,0,1,73b7c834e8a4528666b1a65fc7aa0cd97cd69a50fa8be3398d11dc65678d7e51,2025-01-30T15:15:15.003000
|
||||
CVE-2023-31208,0,0,2968e8e3559808ff332a50ed24a53b36512d57e76ff92d7124d13cc5b76f731b,2024-11-21T08:01:37.537000
|
||||
CVE-2023-31209,0,0,c14a93a474b667cef03cbd01835a708782bfe3380ee7c762a012ed814e1241bb,2024-11-21T08:01:37.683000
|
||||
CVE-2023-3121,0,0,0a345442f29ae37b2041795c903465a51be0e941490200ba133d48c616469656,2024-11-21T08:16:30.363000
|
||||
@ -224445,7 +224445,7 @@ CVE-2023-31431,0,0,2ee06596f108ae4a484ab6ecf8f46e41fd0a18058371854dcf2498332469f
|
||||
CVE-2023-31432,0,0,fae79864cd27e13467ea2e1b7f5eeff229eae1e1378562c672a3a93403d26de6,2024-11-21T08:01:51.033000
|
||||
CVE-2023-31433,0,0,e853bdfb7020ea2a92d21da42b82667b28825f1f1af437ed84977203405c3d1f,2024-11-21T08:01:51.163000
|
||||
CVE-2023-31434,0,0,e6466f73c068ca988c4aa0d3014669f830341e3ddc209276de06b361a4f4a9a0,2024-11-21T08:01:51.303000
|
||||
CVE-2023-31435,0,0,37c39b6907f581eb4f26a0dea86921348548633fc814a9b3440ec7a77dd847ad,2024-11-21T08:01:51.440000
|
||||
CVE-2023-31435,0,1,65e5d6464112e0b392144dec6ab15b21601689245cc68278b95d20d48bc3fb0b,2025-01-30T15:15:15.260000
|
||||
CVE-2023-31436,0,0,236b8d7c5c60c87c0a3fa3d17d411ff5711f6da9af190ca4ef240e060af935b0,2024-11-21T08:01:51.587000
|
||||
CVE-2023-31437,0,0,c5e7ed934c3f95337e0d6747d269ce2e9b68f3156ad84cfdd526ed7bfce9f109,2025-01-03T20:15:26.457000
|
||||
CVE-2023-31438,0,0,3726b6e286f72d60d8d2a50ce86e3f9f77d34b7c0ec484f35df8ee9bcadc8009,2024-11-21T08:01:51.953000
|
||||
@ -230721,7 +230721,7 @@ CVE-2023-39465,0,0,7abbdcf23039d9efa24f92da7ba9d80953bac0bfa9c5d7de34b21177f3683
|
||||
CVE-2023-39466,0,0,bb7831f123546104f86d73c5dd1e6005a33579ffb6f8345b1ebbdc69df563165,2024-11-21T08:15:28.803000
|
||||
CVE-2023-39467,0,0,817f908c62b12ffb0fc1ecd473b5e55bb66887b0edee02a427bf2c3ef3c23604,2024-11-21T08:15:28.927000
|
||||
CVE-2023-39468,0,0,ea3d874a3c8ddf52e59332b6a34fb8c85536681068f9b000ea95be8928f3c9ce,2024-11-21T08:15:29.043000
|
||||
CVE-2023-39469,0,1,38c86cd1440138e137b52dacfe1522280b25294e159eacf53335e1484ba1629e,2025-01-30T14:53:12.927000
|
||||
CVE-2023-39469,0,0,38c86cd1440138e137b52dacfe1522280b25294e159eacf53335e1484ba1629e,2025-01-30T14:53:12.927000
|
||||
CVE-2023-3947,0,0,a882b8170091b888362dd968275aa1d03f197bce9f60b79e29e3ff20eeaf98a2,2024-11-21T08:18:23.003000
|
||||
CVE-2023-39470,0,0,ce6409ef0267ddef1aa9b64420d22c73981db36d5f3e4981a8ab237750875895,2025-01-09T15:46:02.227000
|
||||
CVE-2023-39471,0,0,e36e6acbad3c0111cce5d3933ca4f104103e93885f2ea148b492ede0a1e34014,2024-11-21T08:15:29.303000
|
||||
@ -241943,7 +241943,7 @@ CVE-2023-6738,0,0,19562e083dd1b351ed21a1c41e2290684656682f0fb9daccd36f17250b40b5
|
||||
CVE-2023-6740,0,0,be6037f222281390594e4fe7d6af2d858f013b9fa1d87005682f4f2ad8722d37,2024-11-21T08:44:27.517000
|
||||
CVE-2023-6741,0,0,7ac19f7e84a70e9596789a467d841f0553e4532ecc2ea584df7260767b7656ec,2024-11-21T08:44:27.707000
|
||||
CVE-2023-6742,0,0,7843dc0b39cfb9e6165b9d63f0f6748701d6b72cede7b59e9b198274889b13ee,2024-11-21T08:44:27.837000
|
||||
CVE-2023-6743,0,0,a06d6f675e29830cd8389ab90168304cad706dcbff6721ffcdf46ca0d0ad5622,2024-11-21T08:44:27.970000
|
||||
CVE-2023-6743,0,1,0844abe28d95e988543ab375930b4091b925181bfb4a72d8ce09e9f3da0da38e,2025-01-30T16:09:46.757000
|
||||
CVE-2023-6744,0,0,a643f5007d899070921b19df2522416ac8401e0e05f88aab48ebc6ee58ed04b3,2024-11-21T08:44:28.100000
|
||||
CVE-2023-6745,0,0,7d91c89db492297697b1363dbf0159e28f9035d334f43aacbc5390f3e65a746b,2025-01-29T17:27:03.243000
|
||||
CVE-2023-6746,0,0,d7ff11dddecae5300361052ebb0e500954674a7d62babed59f4ffc80fac1fb33,2024-12-16T19:07:48.603000
|
||||
@ -242765,7 +242765,7 @@ CVE-2024-0363,0,0,eab3c7c502b7083f0ededeeadc04aa0b93ac5031608b303c114acc8926d360
|
||||
CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43fc8,2024-11-21T08:46:24.353000
|
||||
CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000
|
||||
CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000
|
||||
CVE-2024-0367,0,0,6ce9d1b61c049100980135114408f548ca36a2ccfb9566ba8d003c8b823e2eae,2024-11-21T08:46:24.907000
|
||||
CVE-2024-0367,0,1,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000
|
||||
CVE-2024-0368,0,0,bfa306a23e7966d1a3c6df3b8acffa6f89a82da259d0056adf68cc23dcc9c766,2024-11-21T08:46:25.077000
|
||||
CVE-2024-0369,0,0,815d4d3c71949ae70cf07ecb35d9ac59749067f82a962ed4f0d9c0bfcb838f2e,2024-11-21T08:46:25.280000
|
||||
CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000
|
||||
@ -242995,8 +242995,8 @@ CVE-2024-0604,0,0,2b3256f7f669d7126f4bbc9a7ac54b0eb175784a7eeed2a05654c10dcc02fd
|
||||
CVE-2024-0605,0,0,06fd9228bf88b19ac6dfa1ba458848cbe23073984ee398c77e65cea2644976fb,2024-11-21T08:46:59.153000
|
||||
CVE-2024-0606,0,0,53f79eebfbe885d8ad157dbee910f37431bf9f4a0163dc066767f58dce428384,2024-11-21T08:46:59.270000
|
||||
CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a05f,2024-11-21T08:46:59.383000
|
||||
CVE-2024-0608,0,0,364ed7c1816141e08551230deeb225e6f9581f28de27c921e03af6d7943a316a,2024-11-21T08:46:59.527000
|
||||
CVE-2024-0609,0,0,fe969d910275d5a3a2703bfbabc3af993e9947034bdebc50e55519d8d7cbf919,2024-11-21T08:46:59.647000
|
||||
CVE-2024-0608,0,1,58c750df7c456adb201a521c740c6c512d380efea9e3834649da3333ff36186f,2025-01-30T15:52:57.747000
|
||||
CVE-2024-0609,0,1,b037adfe873979e9631c500b4662f0f92ea6276d81bb84225d3e18e35b4416aa,2025-01-30T15:53:29.597000
|
||||
CVE-2024-0610,0,0,6306e1925cf8710f0f143c59bb8703a5a17e22b393fe1ea0f1373dd0d8e29e27,2024-11-21T08:46:59.760000
|
||||
CVE-2024-0611,0,0,663347c1724ebcd33ea935e789f8fa6bd6a3de9942c2f6663f2c2af22f7bbc3f,2025-01-07T17:38:50.460000
|
||||
CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f266,2024-11-21T08:46:59.997000
|
||||
@ -243279,7 +243279,7 @@ CVE-2024-0909,0,0,2df0b86a6699f4b850ad3ae7365df4ca9138a2979b10ed0bf8d9c174e516cf
|
||||
CVE-2024-0910,0,0,c5561a043a5bc83184e3cefc3a6bbc1ab0bc8d170cbac0a9063c34556f16a1da,2024-11-21T08:47:41.520000
|
||||
CVE-2024-0911,0,0,871bb636f703dc10fdfaac6ab1323336d49da941bd792f7087928a303d8b67d8,2024-11-21T08:47:42
|
||||
CVE-2024-0912,0,0,4f57efee87c78987c06f7ceab5e4000e0b2d703a66876a27e9fce78c8c5318a2,2024-11-21T08:47:42.203000
|
||||
CVE-2024-0913,0,0,fdd184df3fb1e6ddd459b097472fe6fe272697f536f754bc3e7f7dbf4d3d090e,2024-11-21T08:47:42.730000
|
||||
CVE-2024-0913,0,1,853d68f85dfbd7101b7a6c3285abc665e9f3fe339ad76b0407d1a295091a87ec,2025-01-30T15:54:01.327000
|
||||
CVE-2024-0914,0,0,961b54ff0e9b9f81aa56dcd6cdc24b37952c07f3f53f7085b217ebd09ddf718f,2024-11-21T08:47:42.910000
|
||||
CVE-2024-0916,0,0,5a8012d33f7bb36c9ef1c1bccdc08620475d280f7448052ee484e84c13496a01,2024-11-21T08:47:43.277000
|
||||
CVE-2024-0917,0,0,8ca5d131b4caf0ae73728e0f2737e604dfa40817adb5658d847b612acaa77af7,2025-01-19T03:31:43.843000
|
||||
@ -243314,11 +243314,11 @@ CVE-2024-0947,0,0,b99c5eced5e84d6955edeedc451b3495dbf3f3af8dbed61c73ca7e30c56a7c
|
||||
CVE-2024-0948,0,0,4845e250ccd43e3f128cfd07d04da3a9fb6d5366c88f3bdacca9d62971018c2e,2024-11-21T08:47:50.997000
|
||||
CVE-2024-0949,0,0,04968b18f620830fe77eeab165a15f0ea3ee52710f5bef19817d5eb6fb29a3e9,2024-11-21T08:47:51.233000
|
||||
CVE-2024-0951,0,0,733508666767290a16047193c282990fe9540168baf0743324b31a765b2bf8c1,2024-11-21T08:47:51.480000
|
||||
CVE-2024-0952,0,0,bc9ea3ae1b36b3820ce50fd2f582fd8153bb44ed7946b3a009c2c60233ab51cd,2024-11-21T08:47:51.643000
|
||||
CVE-2024-0952,0,1,119f134b9aa39c67ae12723466c0c426d99408765f098943316563b18d57bbe4,2025-01-30T15:54:44.447000
|
||||
CVE-2024-0953,0,0,4e5d3a1c45342dc8d38179e760f7a87aca49f701a93f9665692636183c6efb71,2024-11-21T08:47:51.820000
|
||||
CVE-2024-0954,0,0,717a5c9403a3a07aa79c1ee4c08e713ee7256149b246efe8ba9171429caaa223,2024-11-21T08:47:52.137000
|
||||
CVE-2024-0955,0,0,b82c47be2ec9da97623c1ad2fda129765b858d770c87f2b3152d69dcecc86ae7,2024-11-21T08:47:52.317000
|
||||
CVE-2024-0956,0,0,7b3137e15bd55d2b64f2359cf411204128ab702c17e12a2922086a72b6ddf168,2024-11-21T08:47:52.523000
|
||||
CVE-2024-0956,0,1,794ff33266072f8241c3273892bc25f7abd1e4544cd7237f977fbc16c8f7c0b4,2025-01-30T15:54:22.557000
|
||||
CVE-2024-0957,0,0,a9bef8b9be2d41d03e06154ef8adefa783079974ab469015f13fc4cb8990d4dd,2024-11-21T08:47:52.707000
|
||||
CVE-2024-0958,0,0,3aa53b191242b950a32bcb21cf8d6e0b144782295a7440504d8e624548be996b,2024-11-21T08:47:52.920000
|
||||
CVE-2024-0959,0,0,54637bdc424270c73101fb55cd51e65b8630fde2a9ebc7835ba4638afe262cb0,2024-11-21T08:47:53.143000
|
||||
@ -243864,7 +243864,7 @@ CVE-2024-10588,0,0,abb174590e2c3805aae308cc65206f91b43bf77d5c69f89364fb1f1e9e31b
|
||||
CVE-2024-10589,0,0,a465c72dfb9796c4cbb3a377d38c4412b33cfea46bd84a3e6cc4285530fa7f7e,2024-11-12T13:56:24.513000
|
||||
CVE-2024-1059,0,0,6fefc7c1fda1a8905ce4d829595396466b2fbe657d1928bc64f36736c82d9d99,2024-11-21T08:49:42.133000
|
||||
CVE-2024-10590,0,0,368b22747597f2cf903dbd41d27e851a11bac9b0648f6e454dffeeee24246697,2024-12-12T05:15:06.807000
|
||||
CVE-2024-10591,1,1,9e8a07171a1d6a2dbd27e5835d8685e7cbfcc5b3034536b2efc49aca95072e14,2025-01-30T14:15:30.737000
|
||||
CVE-2024-10591,0,0,9e8a07171a1d6a2dbd27e5835d8685e7cbfcc5b3034536b2efc49aca95072e14,2025-01-30T14:15:30.737000
|
||||
CVE-2024-10592,0,0,81a047fe949f1b19be41dee2b5903be4f32a8a1dca9e64d7a64a12b198ca91f2,2024-11-18T17:11:17.393000
|
||||
CVE-2024-10593,0,0,e28a99b48969e1a313aba8292fb69cb06a33e577a3b44ed9a086cf36da205fd0,2024-11-13T17:01:16.850000
|
||||
CVE-2024-10594,0,0,200a471d94e4be220f531c5e895c237e0168d2ba1746ee534b8d95f042c55c0a,2024-11-05T17:05:10.533000
|
||||
@ -244091,7 +244091,7 @@ CVE-2024-10842,0,0,6a1bf2d708af31633adcaf31229d3f756d0a973aee6bc08d09ef2355ecb0b
|
||||
CVE-2024-10844,0,0,f5f4e0d5b5f81450d4b277cd5f34ac79ece27a20b2ef20dabc17527d2440f7d7,2024-11-06T22:38:13.800000
|
||||
CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d49362ab,2024-11-06T22:38:03.347000
|
||||
CVE-2024-10846,0,0,adbdfdb091c30393b6913f81c331a44c1331a4a41abb35d44b12909f384f27bb,2025-01-23T16:15:33.533000
|
||||
CVE-2024-10847,1,1,838bae6403cb33b7077a506b43d42ea601f7b8fa53a944d1770799bb015a0e33,2025-01-30T14:15:30.893000
|
||||
CVE-2024-10847,0,0,838bae6403cb33b7077a506b43d42ea601f7b8fa53a944d1770799bb015a0e33,2025-01-30T14:15:30.893000
|
||||
CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000
|
||||
CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000
|
||||
CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000
|
||||
@ -244741,7 +244741,7 @@ CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c205558
|
||||
CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000
|
||||
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
|
||||
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
|
||||
CVE-2024-11583,1,1,f472b01ce6c13e1457606ab4af568bada41f1aeee24a7960df01237e020858b7,2025-01-30T14:15:31.050000
|
||||
CVE-2024-11583,0,0,f472b01ce6c13e1457606ab4af568bada41f1aeee24a7960df01237e020858b7,2025-01-30T14:15:31.050000
|
||||
CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000
|
||||
CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000
|
||||
CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000
|
||||
@ -244757,7 +244757,7 @@ CVE-2024-11597,0,0,02a202263b5ecf26ea23624593cf12d47f7cf0eccc4d2aae83c90ae107800
|
||||
CVE-2024-11598,0,0,4c9ea68ab008ad54c4649b6db219ede4f98d4df1bf8b53deea7aecef314d9926,2025-01-23T20:12:36.087000
|
||||
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
|
||||
CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000
|
||||
CVE-2024-11600,1,1,24df2702d834559ce9e8b4b379bcd0a20f586e8eeaa8c6b28d190f5b82f76dc2,2025-01-30T14:15:31.213000
|
||||
CVE-2024-11600,0,0,24df2702d834559ce9e8b4b379bcd0a20f586e8eeaa8c6b28d190f5b82f76dc2,2025-01-30T14:15:31.213000
|
||||
CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000
|
||||
CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d5c1,2024-12-27T19:15:07.253000
|
||||
CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000
|
||||
@ -244882,7 +244882,7 @@ CVE-2024-11726,0,0,52ec257cc912e0d76c02566a0817a6d6c56aec1da71b6fef622266b2f6521
|
||||
CVE-2024-11727,0,0,74ce7fa8cdfe22d5e7361f3d2dc50d23f9504f53bdcf31e2233dafec5ae3422b,2024-12-12T07:15:09.107000
|
||||
CVE-2024-11728,0,0,6b4bed5fd27460e210abe0c2b9d4d46303cd8332bea3bc720df94689692e5ca9,2024-12-06T10:15:05.853000
|
||||
CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f41d7,2024-12-06T11:15:07.837000
|
||||
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
|
||||
CVE-2024-1173,0,1,33edb1a3e1b2634dd71181b0bb1a8dacccb34381ecfb73de1bf2375ab2540b0e,2025-01-30T15:55:07.793000
|
||||
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
|
||||
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
|
||||
CVE-2024-11733,0,0,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000
|
||||
@ -245208,7 +245208,7 @@ CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e2
|
||||
CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000
|
||||
CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000
|
||||
CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000
|
||||
CVE-2024-12102,1,1,b4e6a99b31e7d21e462104301eccacd88b42aca38a5f10f898d2c359436eaa6b,2025-01-30T14:15:31.377000
|
||||
CVE-2024-12102,0,0,b4e6a99b31e7d21e462104301eccacd88b42aca38a5f10f898d2c359436eaa6b,2025-01-30T14:15:31.377000
|
||||
CVE-2024-12103,0,0,2ab2e8f87386f7081d0b465f2935a38be96d397e85c0b3ea2192a2941673c10d,2024-12-24T10:15:05.820000
|
||||
CVE-2024-12104,0,0,0d36b28173f2490a5f2c2374dcbff849d0f485f022a4491a6010382cd1220d27,2025-01-21T10:15:07.590000
|
||||
CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3cb2,2025-01-08T14:15:25.310000
|
||||
@ -245231,7 +245231,7 @@ CVE-2024-12124,0,0,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae947869789
|
||||
CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000
|
||||
CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000
|
||||
CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000
|
||||
CVE-2024-12129,1,1,f6685d3eef2e4a6d48e8b33e6ef4511a0b221ea71ef34d6d3301b522ad851dfb,2025-01-30T14:15:31.530000
|
||||
CVE-2024-12129,0,0,f6685d3eef2e4a6d48e8b33e6ef4511a0b221ea71ef34d6d3301b522ad851dfb,2025-01-30T14:15:31.530000
|
||||
CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31c5,2025-01-29T16:25:21.947000
|
||||
CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000
|
||||
CVE-2024-12131,0,0,13f02a71aaa32136e25257b1d5a02357f3bae8da21875c47830a0a64cb341eb0,2025-01-07T13:15:06.440000
|
||||
@ -245255,7 +245255,7 @@ CVE-2024-12159,0,0,a32ab90e71369424b90b3e2689249267ea99ad1f074ba09875b9ba6ba23f1
|
||||
CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c781f,2024-03-21T02:51:38.760000
|
||||
CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2538,2024-12-12T09:15:05.220000
|
||||
CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000
|
||||
CVE-2024-12163,0,0,f2907af9c955110c6fa8c424e2a24da47ebc01f1fae6a51ccd6ca53baf88e25e,2025-01-30T06:15:29.113000
|
||||
CVE-2024-12163,0,1,f68ce26901f4452755217e2c50c24c16d3fce2d189de2fc20126ec75a096c8e7,2025-01-30T16:15:29.770000
|
||||
CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000
|
||||
CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000
|
||||
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
|
||||
@ -245265,7 +245265,7 @@ CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e
|
||||
CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000
|
||||
CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000
|
||||
CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000
|
||||
CVE-2024-12177,1,1,27a135e31306aaf57a119cb4065b70820cb413cc8b5194687e60879d6a50dbbb,2025-01-30T14:15:31.700000
|
||||
CVE-2024-12177,0,0,27a135e31306aaf57a119cb4065b70820cb413cc8b5194687e60879d6a50dbbb,2025-01-30T14:15:31.700000
|
||||
CVE-2024-12178,0,0,7f122f679ec44198086d5b8f502378af9440326f09bbe9129d1ad50cea9a44a0,2025-01-29T17:15:27.053000
|
||||
CVE-2024-12179,0,0,79f801543b52988871a97a9ab6a3f239c3393b91f218d80d8c61b3559520eb82,2025-01-29T17:15:27.160000
|
||||
CVE-2024-1218,0,0,c9de9306acde036a45691c4d0b8ae8a7e3f4e2e79b0a0e0c34252fff4844a90b,2025-01-19T02:53:15.150000
|
||||
@ -245348,7 +245348,7 @@ CVE-2024-12264,0,0,e129c73367ffc6e13d3dd51e083cadc63c28a6ddf76a9744461af75a10c38
|
||||
CVE-2024-12265,0,0,4ecaf6258b9c646985803002f662a35d37ddc850eb892429f8568423d5e8ff62,2024-12-12T06:15:24.143000
|
||||
CVE-2024-12266,0,0,909ac121710013990590ae1f8a6d6364fd581e2e3e734e8055f1296c676eb281,2024-12-24T05:15:06.433000
|
||||
CVE-2024-12268,0,0,57b1dbc34c4fad3378e18637f11a9af5fae95800fe2a5a30ffdcb7012568a613,2024-12-24T11:15:07.623000
|
||||
CVE-2024-12269,1,1,3dacabee7f0840c8bb97b1b0f83aa1d1097c1a4d6e6d5a87c2ba0c49bbf47e5d,2025-01-30T14:15:31.857000
|
||||
CVE-2024-12269,0,0,3dacabee7f0840c8bb97b1b0f83aa1d1097c1a4d6e6d5a87c2ba0c49bbf47e5d,2025-01-30T14:15:31.857000
|
||||
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
|
||||
CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000
|
||||
CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000
|
||||
@ -245371,7 +245371,7 @@ CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192e
|
||||
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
|
||||
CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000
|
||||
CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000
|
||||
CVE-2024-12299,1,1,3d1e0b3effd81e0f2bf522b02177a2bb28a9f3d77b4b13a5e2533f2689621cb2,2025-01-30T14:15:32.020000
|
||||
CVE-2024-12299,0,0,3d1e0b3effd81e0f2bf522b02177a2bb28a9f3d77b4b13a5e2533f2689621cb2,2025-01-30T14:15:32.020000
|
||||
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
|
||||
CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000
|
||||
CVE-2024-12302,0,0,2e7f53c232830ebe1e41c432ae300655d2811aa163d5fbfa007adf0b96c594e5,2025-01-06T14:15:08.023000
|
||||
@ -245386,7 +245386,7 @@ CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b60524
|
||||
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
|
||||
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
|
||||
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
|
||||
CVE-2024-12320,1,1,2e0220b54db3ce53c8e28c7cea532974eda37e07565d06a719e50c41583a2e8f,2025-01-30T14:15:32.180000
|
||||
CVE-2024-12320,0,0,2e0220b54db3ce53c8e28c7cea532974eda37e07565d06a719e50c41583a2e8f,2025-01-30T14:15:32.180000
|
||||
CVE-2024-12321,0,0,748f591377b6b8cf6cbb2660f92634f56c6fbfdcecc2cf9954a29294f469c112,2025-01-27T21:15:11.763000
|
||||
CVE-2024-12322,0,0,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000
|
||||
CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000
|
||||
@ -245452,7 +245452,7 @@ CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6
|
||||
CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000
|
||||
CVE-2024-12399,0,0,93b1cedb21d025aa2a7c64672a0deaba138e4d19bf64f3997c97cc28126eb1c9,2025-01-17T10:15:06.697000
|
||||
CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000
|
||||
CVE-2024-12400,0,0,8a8fb219c8377c7d27f8aaf5fc8b1b7bf89ec6ec58a08cb4462aa0bef84734e9,2025-01-30T06:15:29.223000
|
||||
CVE-2024-12400,0,1,f3767528c7140922135374a4da3cbdd155ddd43b7964068ae7992961611421bb,2025-01-30T16:15:29.907000
|
||||
CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000
|
||||
CVE-2024-12402,0,0,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000
|
||||
CVE-2024-12403,0,0,f86e636eddc7cdb9b8bf4adcd4515238330a01facfd5633ebda91511666728a4,2025-01-15T10:15:07.433000
|
||||
@ -245461,7 +245461,7 @@ CVE-2024-12405,0,0,631a04fc890c6ac2fbe1fd822df1e67f289f1ef7b029b11f0950a96d4993c
|
||||
CVE-2024-12406,0,0,3a24bd925fcaee835bc0ee30f7ad38b16626ae1e5c8470fedd28227d3dd60123,2024-12-12T05:15:12.210000
|
||||
CVE-2024-12407,0,0,90207e0ed6e0318c2d7902b5431b42ac4002510e342567216f54a8133c6105ee,2025-01-11T08:15:25.093000
|
||||
CVE-2024-12408,0,0,c9a97800ebdc971055fe039c0934b7c899913355f0545cc6cb71b6253bd484f6,2024-12-21T10:15:08.067000
|
||||
CVE-2024-12409,0,1,bf1d47030cc577bcd654ec48364331cf7dd4c0bca859fde8f426668b7fa2f6a7,2025-01-30T14:15:32.353000
|
||||
CVE-2024-12409,0,0,bf1d47030cc577bcd654ec48364331cf7dd4c0bca859fde8f426668b7fa2f6a7,2025-01-30T14:15:32.353000
|
||||
CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000
|
||||
CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430e47,2024-12-14T05:15:10.437000
|
||||
CVE-2024-12412,0,0,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000
|
||||
@ -245491,14 +245491,14 @@ CVE-2024-12439,0,0,420a25774a9855a1359464fcce67f5e77708758c4ce4e8a4cf01d7827cdef
|
||||
CVE-2024-12440,0,0,cb3f3cdeb28ee128f4e377a1e88fe0d5d8a12f8b5075dc54d11bdf744b0def01,2025-01-07T06:15:16.630000
|
||||
CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000
|
||||
CVE-2024-12443,0,0,f07c0805b285e00ba917c2d7fc7d6d01900a808064fd2463aaf6cc786dd6eda1,2024-12-16T23:15:06.097000
|
||||
CVE-2024-12444,1,1,80cd1cb2d6f171a83f38572e981b4942f00913a860c8eaed3df3099516e773c2,2025-01-30T14:15:32.530000
|
||||
CVE-2024-12444,0,0,80cd1cb2d6f171a83f38572e981b4942f00913a860c8eaed3df3099516e773c2,2025-01-30T14:15:32.530000
|
||||
CVE-2024-12445,0,0,abd0886eb5f566604f350ee11c44534aacbf58aeda080732befada13d508b61f,2025-01-07T05:15:19.083000
|
||||
CVE-2024-12446,0,0,b02d1d791b4cf7afeb09eb0c21565790a25f436f0af246a7f2fa3fcff09dc38c,2024-12-14T07:15:07.040000
|
||||
CVE-2024-12447,0,0,5037bc53ba4fa77c34e124f2cad2eb5580f0278ba0adbdec7fe60ff9c399f942,2024-12-14T05:15:10.670000
|
||||
CVE-2024-12448,0,0,4923580d5a5f99d530db30df1f25529a66e5faa8f94f1d2c65ae42b9f669a340,2024-12-14T05:15:10.873000
|
||||
CVE-2024-12449,0,0,5fcc22f14406311e0fc83130f321673a9681bcd45ccd4b15a7e6df2428ef10f4,2024-12-18T04:15:08.103000
|
||||
CVE-2024-1245,0,0,95e8542ba13fb11ab7fe96b21acceb5168a3d85655e46eadbf4243e255ea26c4,2024-11-21T08:50:08.740000
|
||||
CVE-2024-12451,1,1,969b0b56eefbb42884aadd4325cf37abe694a56459878f489be4825ac2662172,2025-01-30T14:15:32.687000
|
||||
CVE-2024-12451,0,0,969b0b56eefbb42884aadd4325cf37abe694a56459878f489be4825ac2662172,2025-01-30T14:15:32.687000
|
||||
CVE-2024-12453,0,0,76ad3f9c42446921081688745051c38b136a07ee1614804cd400b083fd2b395b,2025-01-07T05:15:19.260000
|
||||
CVE-2024-12454,0,0,8d73661dfeacd698ba1638817b062fe681bc6bd2d9cfe150642a15e6ed3c799a,2024-12-18T10:15:08.117000
|
||||
CVE-2024-12457,0,0,8b6dcd10765fdf34de144f9bc8c49e92cdcb9e82bb357349c5178d12bb4f5cd7,2025-01-07T05:15:19.453000
|
||||
@ -245649,7 +245649,7 @@ CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb
|
||||
CVE-2024-12635,0,0,3c7aa75fcbe7aad344d7ab6a29830b91315b8c91a45f35c3746137d636be222e,2024-12-21T07:15:09.380000
|
||||
CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000
|
||||
CVE-2024-12637,0,0,0a511df96db32a9b14e55f4c161efe09af214577bd9827e9baeb5f267eebf5c8,2025-01-17T07:15:26.773000
|
||||
CVE-2024-12638,0,0,5dce2bbca13ffbcced52a1c47fe15d01e4e2f18249768352fe9dda4a860788cf,2025-01-30T06:15:29.333000
|
||||
CVE-2024-12638,0,1,395841a14d5dc8d7054b6beb62e27e260f6aeb78b3ed6d5dfcb48905a16e21e1,2025-01-30T16:15:30.030000
|
||||
CVE-2024-1264,0,0,0a400b50d7c5417af4540851d66c40fe9607cfb1bbd030ca37354551feca3778,2024-11-21T08:50:11.460000
|
||||
CVE-2024-12641,0,0,6e6b1aa53bd8553222049d57d01527b85aa1b46f94f8dd550c03e6967ee19a5d,2024-12-16T07:15:05.787000
|
||||
CVE-2024-12642,0,0,a401d76248880d01d3fa48196afb4bda331b127bc27a94608f221d11c2863778,2024-12-16T07:15:06.023000
|
||||
@ -245702,8 +245702,8 @@ CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338f
|
||||
CVE-2024-12701,0,0,cd6b08f28311d78389b2479a22ff0ce00f8e2d386b94e3b072290f303be9f2ff,2025-01-04T08:15:06.670000
|
||||
CVE-2024-12703,0,0,c565183eb12abdb4955b338c8bd40c3325b4b163523b9159fd30bcbf11e5936b,2025-01-17T11:15:08.903000
|
||||
CVE-2024-12705,0,0,35bbeaf0ccf51c179b5b23432f4a08b92b558523c47c996d329a2f0b90b85502,2025-01-29T22:15:28.800000
|
||||
CVE-2024-12708,0,0,524be7962f883ad9a0d6d9b36d3c868f692fb50255f949fc2ecccd304cafabbc,2025-01-30T06:15:29.440000
|
||||
CVE-2024-12709,0,0,f897c0b9684a18484cc04977ff44371300c3ef356b44076a227dffe251816075,2025-01-30T06:15:29.557000
|
||||
CVE-2024-12708,0,1,0e0bfdeade6eea221e77c1d3b2af069d34832446a71c8c71d6cd64151bb7cf0a,2025-01-30T16:15:30.207000
|
||||
CVE-2024-12709,0,1,873b9d3d124f79b40a8f64b03c6ab69ee38f8b0335603debb8cd542e2f60d0be,2025-01-30T16:15:30.337000
|
||||
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
|
||||
CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000
|
||||
CVE-2024-12711,0,0,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000
|
||||
@ -245771,8 +245771,8 @@ CVE-2024-12817,0,0,32f9e7e0f8e1095319b7a827501ce7d109efcd2bf6309a60da88244f6164d
|
||||
CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000
|
||||
CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000
|
||||
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
|
||||
CVE-2024-12821,1,1,e588fd0d09947b07d09c8d3f282b63ea0e1f492dc00ee4435ee9c9b82132788c,2025-01-30T14:15:32.843000
|
||||
CVE-2024-12822,1,1,192c28e8527adecfccce851b33e27323e02d5b46aeeffff5461062f4314ed85b,2025-01-30T14:15:33.017000
|
||||
CVE-2024-12821,0,0,e588fd0d09947b07d09c8d3f282b63ea0e1f492dc00ee4435ee9c9b82132788c,2025-01-30T14:15:32.843000
|
||||
CVE-2024-12822,0,0,192c28e8527adecfccce851b33e27323e02d5b46aeeffff5461062f4314ed85b,2025-01-30T14:15:33.017000
|
||||
CVE-2024-12826,0,0,c720c0675605f102a13449f7c719465cad74869404c1c6afa4c9516f512ea0ef,2025-01-25T08:15:08.463000
|
||||
CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000
|
||||
CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000
|
||||
@ -245806,7 +245806,7 @@ CVE-2024-12855,0,0,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320c
|
||||
CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000
|
||||
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
|
||||
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
|
||||
CVE-2024-12861,1,1,8a93d399c32f464da067c6d51dff2d544ffb8ae828286360d6f36cf768b3a2c1,2025-01-30T14:15:33.170000
|
||||
CVE-2024-12861,0,0,8a93d399c32f464da067c6d51dff2d544ffb8ae828286360d6f36cf768b3a2c1,2025-01-30T14:15:33.170000
|
||||
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
|
||||
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
|
||||
CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000
|
||||
@ -246193,8 +246193,8 @@ CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655
|
||||
CVE-2024-13335,0,0,2fcef25251bb68a715e890eb0cf4e30f6ed93385a9d1ce3a44dbe1289f4c0426,2025-01-24T11:15:07.973000
|
||||
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
|
||||
CVE-2024-13340,0,0,22b196622d46a895cf0cf3983511bd49f73945f1fe7c52be27f9e67ce848d4e2,2025-01-23T12:15:27.890000
|
||||
CVE-2024-13348,0,0,e26381eb03e5e67f555cf928c3e9a2305c99dcf3e03e09bd50c1f054f780346b,2025-01-14T04:15:09.200000
|
||||
CVE-2024-13349,1,1,e9920aabc8f336ead23e99b11b815dccb9cedb307a97160583074645e523a983,2025-01-30T14:15:33.333000
|
||||
CVE-2024-13348,0,1,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000
|
||||
CVE-2024-13349,0,0,e9920aabc8f336ead23e99b11b815dccb9cedb307a97160583074645e523a983,2025-01-30T14:15:33.333000
|
||||
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
|
||||
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
|
||||
CVE-2024-13354,0,0,5de8a07beb3503362800c3c9a7e68d19454bfcd982cb7525cd68c521c68ce55c,2025-01-24T11:15:08.887000
|
||||
@ -246211,7 +246211,7 @@ CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc4
|
||||
CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000
|
||||
CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000
|
||||
CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000
|
||||
CVE-2024-13380,1,1,81a0bd543c8ad2f33b447b647e9e896b1cd6a0731d1739ec13c8091622fb149f,2025-01-30T14:15:33.513000
|
||||
CVE-2024-13380,0,0,81a0bd543c8ad2f33b447b647e9e896b1cd6a0731d1739ec13c8091622fb149f,2025-01-30T14:15:33.513000
|
||||
CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000
|
||||
CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000
|
||||
CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000
|
||||
@ -246223,7 +246223,7 @@ CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb4
|
||||
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
|
||||
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
|
||||
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
|
||||
CVE-2024-13400,1,1,34740cf0471b61baf60d00c1f8ff7acf3ccfa0b1eeded6af29d51e1069bf370e,2025-01-30T14:15:33.710000
|
||||
CVE-2024-13400,0,0,34740cf0471b61baf60d00c1f8ff7acf3ccfa0b1eeded6af29d51e1069bf370e,2025-01-30T14:15:33.710000
|
||||
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
|
||||
CVE-2024-13404,0,0,5bb170ff9b5817ff303f75d023f712e8f9e23d487df8a7d634e98e82d104b8cd,2025-01-21T10:15:07.823000
|
||||
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
|
||||
@ -246245,13 +246245,13 @@ CVE-2024-13448,0,0,d06b5093c3b878141c9c6b7291c254e64929eea876294371f5adcd8b69fe2
|
||||
CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6ca0b,2025-01-25T09:15:07.557000
|
||||
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
|
||||
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
|
||||
CVE-2024-13453,0,1,a30e5bf34e8711a8e0bb7b6adbab5cc5e3dddf7156b7a025dca26c806e70c02c,2025-01-30T14:15:33.873000
|
||||
CVE-2024-13453,0,0,a30e5bf34e8711a8e0bb7b6adbab5cc5e3dddf7156b7a025dca26c806e70c02c,2025-01-30T14:15:33.873000
|
||||
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
|
||||
CVE-2024-13457,0,0,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
|
||||
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
|
||||
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
|
||||
CVE-2024-13460,1,1,db165e050b3a29a73040ab80da8c798ae3d9c2c9765ce3807d2cd6e8bf05aa94,2025-01-30T14:15:34.057000
|
||||
CVE-2024-13466,1,1,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b460d,2025-01-30T14:15:34.217000
|
||||
CVE-2024-13460,0,0,db165e050b3a29a73040ab80da8c798ae3d9c2c9765ce3807d2cd6e8bf05aa94,2025-01-30T14:15:34.057000
|
||||
CVE-2024-13466,0,0,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b460d,2025-01-30T14:15:34.217000
|
||||
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
|
||||
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
|
||||
CVE-2024-13470,0,0,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
|
||||
@ -246268,7 +246268,7 @@ CVE-2024-13505,0,0,8cfee4eef351da06016ab9b10f867ee856aa66c9481e93ffeb4ce296549af
|
||||
CVE-2024-13509,0,0,4c3cf81058c47ca7421d51ef89cc6579be2280b06eaef0c8cd85521c081b3f35,2025-01-28T07:15:08.620000
|
||||
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
|
||||
CVE-2024-13511,0,0,3071f1ee4394ed25c0ba5a4414759a0ec6bbc3d07f1733cb6f65493d29a37d83,2025-01-23T10:15:07.253000
|
||||
CVE-2024-13512,1,1,9901431db3e032b1ac3962e6a7a9a2f96d98557516f0a8005f820c741956d1c5,2025-01-30T14:15:34.413000
|
||||
CVE-2024-13512,0,0,9901431db3e032b1ac3962e6a7a9a2f96d98557516f0a8005f820c741956d1c5,2025-01-30T14:15:34.413000
|
||||
CVE-2024-13515,0,0,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000
|
||||
CVE-2024-13516,0,0,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6f3f,2025-01-18T06:15:27.627000
|
||||
CVE-2024-13517,0,0,9d057e77f790f2402e4e040e2e1a67384dda92aec0304812a84e741a1082d2fc,2025-01-18T07:15:09.350000
|
||||
@ -246283,7 +246283,7 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166
|
||||
CVE-2024-13542,0,0,c45a986aa867dcb8c5f485f5d0834964d3d14a785680faca172769f60f73e69e,2025-01-24T11:15:09.377000
|
||||
CVE-2024-13545,0,0,eb269cacc159c45695715c4d7fd9f7f0b3c57dc71f3e2654436421591db65c2f,2025-01-24T09:15:22.797000
|
||||
CVE-2024-13548,0,0,773be214153e433c157dbff720cc5880d3eb87828ad3760ba7d8d4da982d58c8,2025-01-25T08:15:09.687000
|
||||
CVE-2024-13549,1,1,744c0e4f59eaccbdc9f6858968b61e64cbf917a822f872e49d498b3f43268408,2025-01-30T14:15:34.570000
|
||||
CVE-2024-13549,0,0,744c0e4f59eaccbdc9f6858968b61e64cbf917a822f872e49d498b3f43268408,2025-01-30T14:15:34.570000
|
||||
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
|
||||
CVE-2024-13550,0,0,f9981f1deb805f2a60af3da03768fa1b757685b2867a3f144ba6c75ef5863a95,2025-01-25T08:15:09.847000
|
||||
CVE-2024-13551,0,0,c0f32b47678190b67b060d76bcd33ea48dd01585e717a7e931b6ea219ab115cf,2025-01-25T08:15:10.007000
|
||||
@ -246300,7 +246300,7 @@ CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d
|
||||
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
|
||||
CVE-2024-13593,0,0,b2b99499e28187649419ba62667826b9acba964eaeb31ca5bfaaa794d884f32d,2025-01-23T10:15:07.737000
|
||||
CVE-2024-13594,0,0,b89d92c59d6589291d5b3e44e449a8d8620a2bd20dcfac4fc41ec59549c64cba,2025-01-24T11:15:09.667000
|
||||
CVE-2024-13596,1,1,4e2b4c763afce7d18d7b6ddedd830fd1fbe3ac048889bda34a94881079021915,2025-01-30T14:15:34.720000
|
||||
CVE-2024-13596,0,0,4e2b4c763afce7d18d7b6ddedd830fd1fbe3ac048889bda34a94881079021915,2025-01-30T14:15:34.720000
|
||||
CVE-2024-13599,0,0,8416ac4ba24e0470447a5d54bcb4a58d565d7b0165c1a9d0f1a855bfbf0c1c7d,2025-01-25T08:15:10.357000
|
||||
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
|
||||
CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000
|
||||
@ -246308,16 +246308,16 @@ CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336
|
||||
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
|
||||
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
|
||||
CVE-2024-13642,0,0,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
|
||||
CVE-2024-13646,1,1,7d9f7f07c384d55c3692314cc87fc38d16ed6b135f5522994aa1f77e4e23bc96,2025-01-30T14:15:34.873000
|
||||
CVE-2024-13646,0,0,7d9f7f07c384d55c3692314cc87fc38d16ed6b135f5522994aa1f77e4e23bc96,2025-01-30T14:15:34.873000
|
||||
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
|
||||
CVE-2024-13652,1,1,fe24ee8610e9ff652bc87b947e016c0eff2007c8f9f9d6eca3a867bb541f4fad,2025-01-30T14:15:35.040000
|
||||
CVE-2024-13652,0,0,fe24ee8610e9ff652bc87b947e016c0eff2007c8f9f9d6eca3a867bb541f4fad,2025-01-30T14:15:35.040000
|
||||
CVE-2024-13659,0,0,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
|
||||
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
|
||||
CVE-2024-13661,1,1,a45266cda63aebd8d8843fbb6b7a71ae38505222510e18ba03648c96ddb771a8,2025-01-30T14:15:35.233000
|
||||
CVE-2024-13664,1,1,1eb9745d2330cb71866e989696204f297a40dcfb7ab8eb64b8a0bd3e1386b8c3,2025-01-30T14:15:35.390000
|
||||
CVE-2024-13661,0,0,a45266cda63aebd8d8843fbb6b7a71ae38505222510e18ba03648c96ddb771a8,2025-01-30T14:15:35.233000
|
||||
CVE-2024-13664,0,0,1eb9745d2330cb71866e989696204f297a40dcfb7ab8eb64b8a0bd3e1386b8c3,2025-01-30T14:15:35.390000
|
||||
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
|
||||
CVE-2024-13670,1,1,736bf589d2a58d3a8565630672ac5a05df76c82710b1026bd5ab4ad798894ce9,2025-01-30T14:15:35.550000
|
||||
CVE-2024-13671,1,1,ecff1a97cc02fbd7c0ef79d248205f76192e96f9db03556cef8ebffce9703ec0,2025-01-30T14:15:35.697000
|
||||
CVE-2024-13670,0,0,736bf589d2a58d3a8565630672ac5a05df76c82710b1026bd5ab4ad798894ce9,2025-01-30T14:15:35.550000
|
||||
CVE-2024-13671,0,0,ecff1a97cc02fbd7c0ef79d248205f76192e96f9db03556cef8ebffce9703ec0,2025-01-30T14:15:35.697000
|
||||
CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223f0,2024-11-21T08:50:25.737000
|
||||
CVE-2024-13680,0,0,f3164c1a021ffb39e27590d49b20eab131951c6817a6dc8655e0dfc9f53950e4,2025-01-24T07:15:06.930000
|
||||
CVE-2024-13683,0,0,afca8ca5733f1981ab92ff6f92163a36f62ba84bc4cae91c9eb4b4db6612f745,2025-01-24T07:15:08.523000
|
||||
@ -246326,20 +246326,20 @@ CVE-2024-13694,0,0,ebe38224e859cd407ff4de74de6e70b014035e321c635173f5352f302ebed
|
||||
CVE-2024-13696,0,0,1705bcf2f6a6958e20414c0c17b533dd95f6dfcba36bb76e0b9f7d75e553f199,2025-01-29T08:15:19.677000
|
||||
CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000
|
||||
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
|
||||
CVE-2024-13700,1,1,e93679cc2381dce3d317fec9d2523e30db0fb837ead674488152377ff3e938b4,2025-01-30T14:15:35.853000
|
||||
CVE-2024-13705,1,1,1dd4287af53a3c1f03830526761c1a8f0457b5d90304ebaff0a8498bf40e684d,2025-01-30T14:15:36.003000
|
||||
CVE-2024-13706,0,1,896ab8bb2af115d45414847a1b767b393c8983916541b747cee97d71601ce5e0,2025-01-30T14:15:36.180000
|
||||
CVE-2024-13707,1,1,dbc1b5a717c1082149ce8c2cd9992383140a9b7fd71c9758aaaaf161ef561f5e,2025-01-30T14:15:36.363000
|
||||
CVE-2024-13700,0,0,e93679cc2381dce3d317fec9d2523e30db0fb837ead674488152377ff3e938b4,2025-01-30T14:15:35.853000
|
||||
CVE-2024-13705,0,0,1dd4287af53a3c1f03830526761c1a8f0457b5d90304ebaff0a8498bf40e684d,2025-01-30T14:15:36.003000
|
||||
CVE-2024-13706,0,0,896ab8bb2af115d45414847a1b767b393c8983916541b747cee97d71601ce5e0,2025-01-30T14:15:36.180000
|
||||
CVE-2024-13707,0,0,dbc1b5a717c1082149ce8c2cd9992383140a9b7fd71c9758aaaaf161ef561f5e,2025-01-30T14:15:36.363000
|
||||
CVE-2024-13709,0,0,7d11e0e002d231ab97d4c4838853b33e61be12c236e56c435ef75a396b4f88ea,2025-01-25T04:15:07.670000
|
||||
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
|
||||
CVE-2024-13715,1,1,00dd1b14547b61241c2937f99bfb0f10f10898355f9e9d141a2293b8192ae503,2025-01-30T14:15:36.513000
|
||||
CVE-2024-13715,0,0,00dd1b14547b61241c2937f99bfb0f10f10898355f9e9d141a2293b8192ae503,2025-01-30T14:15:36.513000
|
||||
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
|
||||
CVE-2024-13720,1,1,930a6201caacf3179e7308358cbd7fd91fb76d5d924d248613039b01f2eccf5a,2025-01-30T14:15:36.660000
|
||||
CVE-2024-13720,0,0,930a6201caacf3179e7308358cbd7fd91fb76d5d924d248613039b01f2eccf5a,2025-01-30T14:15:36.660000
|
||||
CVE-2024-13721,0,0,1ec94cb9c62b02c9472486b901c3addbef65df476872a8f8db6b902dfdcff790,2025-01-25T06:15:27.860000
|
||||
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
|
||||
CVE-2024-13732,0,0,b775a3a52bd8c32b27fbee5637d183d86ad28923005f664ac49c2fca8b421b84,2025-01-30T09:15:08.363000
|
||||
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
|
||||
CVE-2024-13742,1,1,ccfdf3619ee7777cf156a6ef83438fbc32d42f3488f5fd2e64a4c68390b5df3d,2025-01-30T14:15:36.810000
|
||||
CVE-2024-13742,0,0,ccfdf3619ee7777cf156a6ef83438fbc32d42f3488f5fd2e64a4c68390b5df3d,2025-01-30T14:15:36.810000
|
||||
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
|
||||
CVE-2024-13758,0,0,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
|
||||
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
|
||||
@ -246569,7 +246569,7 @@ CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d529
|
||||
CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f978,2024-11-21T08:50:56.633000
|
||||
CVE-2024-1623,0,0,11acc09d0781037d56051debbc6de791211a8b87ba326c3093f5bc85aad229af,2025-01-23T18:10:39.310000
|
||||
CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000
|
||||
CVE-2024-1625,0,1,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000
|
||||
CVE-2024-1625,0,0,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000
|
||||
CVE-2024-1626,0,0,8db5e9a7288598c466eba03561bceefa6719998255d5bf571d808455a162f36c,2025-01-10T14:32:09.173000
|
||||
CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fbda,2024-11-21T08:50:57.333000
|
||||
CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000
|
||||
@ -246948,9 +246948,9 @@ CVE-2024-20017,0,0,143cf72499435b0ccdd90f084ca0e975d712eb29509f49566d73ef818212c
|
||||
CVE-2024-20018,0,0,84e97c4c5a222e8dbb38a24ffbf139bbf2484e04613f1e5919be9604639b141f,2024-11-21T08:51:48.693000
|
||||
CVE-2024-20019,0,0,0a2ae787333b53137fceb2b1132f066a8a6d0264380966acb5f440a0dead19c2,2024-11-21T08:51:48.877000
|
||||
CVE-2024-2002,0,0,628e0d3d5e70f788a018f71928e7e72a124582165cb8f9452c98e96fa8eaefc4,2024-11-21T09:08:47.130000
|
||||
CVE-2024-20020,0,0,be1599fa7152f8e599ed66e965359aa77f217afcfede8d47469a816dc8aa4e30,2024-11-21T08:51:49.063000
|
||||
CVE-2024-20020,0,1,2bd973d38bfdf711b6af99cf03c5c2cc5b99f8b19617bf2d94211987083b6255,2025-01-30T15:07:55.143000
|
||||
CVE-2024-20021,0,0,63afd4220ffeff0a0d12b5d0e054876129d39d10656a9ff99dbe643098f3cedb,2024-11-21T08:51:49.180000
|
||||
CVE-2024-20022,0,0,bef0a2c37e58ec53b3dfeaebc449697d35e62f52b201b239e66e7834e66724b7,2024-11-21T08:51:49.393000
|
||||
CVE-2024-20022,0,1,6dc25d1e0d27a7926d846c7c2bb03fd84906e5fdec04ecb74006c82a3d0fa0bc,2025-01-30T15:11:44.910000
|
||||
CVE-2024-20023,0,0,09d6edcbccc95f5d43f4f0911970b5de3733ac0546fe0434f5cc8aa81a35f194,2024-11-21T08:51:49.530000
|
||||
CVE-2024-20024,0,0,a558ad6b23645a453221eaf9a9b06c62acf918a03b53e68d526e257656acd7ff,2024-11-21T08:51:49.733000
|
||||
CVE-2024-20025,0,0,3f7a148dd5eb41a7b7c21ede316da08d271973cdda3bca18ea657a87c1e5c1bd,2024-11-21T08:51:49.927000
|
||||
@ -248175,7 +248175,7 @@ CVE-2024-21396,0,0,727d9383842f94260c8a93654a0b746b928a433f4efb51060705e1103b866
|
||||
CVE-2024-21397,0,0,40e279eaf9f3416f16ba8fc80d0f531b4bfb03d96c9778e1fa620adced6a8b53,2024-11-21T08:54:16.640000
|
||||
CVE-2024-21398,0,0,de3fc80fdb08744b424f164fbb17e2bbb34c7453aa78a5d134d918d88ecb9bf9,2025-01-15T22:36:43.943000
|
||||
CVE-2024-21399,0,0,2dffa4cd262da40a519e66ca454cd27c52f2f7a64b9e59220d76cb819a2492a3,2024-11-21T08:54:16.870000
|
||||
CVE-2024-2140,0,0,e04d8580c30dec7817045bce899d8636377de80a0de3c339751faf63ec687f4f,2024-11-21T09:09:06.883000
|
||||
CVE-2024-2140,0,1,f20052e4c895da005a6059150d091c3cf0994709d76e59c360c52385b68f2afd,2025-01-30T15:20:30.003000
|
||||
CVE-2024-21400,0,0,a872873b0bfdbefda2cec5094d48212a53bd41a16367483affa57e5731e64d1b,2024-11-29T20:52:31.103000
|
||||
CVE-2024-21401,0,0,97de1eccda66d8a475a753375f0cd8717f46b6500cfb869172b1239d32eab1ed,2024-11-21T08:54:17.110000
|
||||
CVE-2024-21402,0,0,1912d6bac77f538eeca0523ea2d091d6eff59c0ca3736c8afe1a3aa82c7d68eb,2024-11-21T08:54:17.230000
|
||||
@ -248186,7 +248186,7 @@ CVE-2024-21406,0,0,c3c5e6f5abd31ba504c5e779a20922c9520fef7dad2cf137662a3736daac3
|
||||
CVE-2024-21407,0,0,61ca144d76c93aa5467e49bd9c2efd72d906e8b334691cc56a48356a7e8e1044,2024-11-21T08:54:17.900000
|
||||
CVE-2024-21408,0,0,a6229327b01f5c72f23988c3a60a0a48d9605f36b6855597610f5db381fdcfcb,2024-11-21T08:54:18.060000
|
||||
CVE-2024-21409,0,0,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000
|
||||
CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000
|
||||
CVE-2024-2141,0,1,9e81dc4008e280636b3df3b06832bc47e054ab7f464649607ad8242783bd7cc7,2025-01-30T15:20:56.253000
|
||||
CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000
|
||||
CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000
|
||||
CVE-2024-21412,0,0,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000
|
||||
@ -248197,7 +248197,7 @@ CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb1
|
||||
CVE-2024-21417,0,0,b241f9d83014e4a156b41d2c2f0ed30e2be20a18f3cb27885bff56d4c78a5183,2025-01-09T13:59:37.857000
|
||||
CVE-2024-21418,0,0,f32851cbbca0a03afdc0a119babc5fa51c261b1380e1a035fd467fecb985d1cb,2024-12-27T18:05:13.933000
|
||||
CVE-2024-21419,0,0,3cb3fdb5be67b19326a793bdd9f0d7cc48c79a6f3fd2ccef4d9014d402593d28,2024-11-29T20:52:29.267000
|
||||
CVE-2024-2142,0,0,c318dba0209d3ec013e13acbf3bb96f3ae1d78956d6f11ffc31b2eb03a294c49,2024-11-21T09:09:07.130000
|
||||
CVE-2024-2142,0,1,faeeccdaf6766103e7b666b6819c55aaa570edff29e7156551ec7a9de8a60d7c,2025-01-30T15:21:11.450000
|
||||
CVE-2024-21420,0,0,a004a088ff4068dab42258a5056ff38772eed2377a2d08b691f3a79d4ff39e33,2024-11-21T08:54:19.540000
|
||||
CVE-2024-21421,0,0,ed338fff59f35749ce3716067c14685623c753eb75dba216ba03a5b62655ebda,2024-12-27T18:25:29.033000
|
||||
CVE-2024-21423,0,0,bbea988a7d7bfb2f2ac99b02f22f42892d890b4d73ce38691772d73165b4186d,2024-11-29T20:42:08.630000
|
||||
@ -248207,7 +248207,7 @@ CVE-2024-21426,0,0,50edf6306cb1ce5b303e08364d4006ec275603628e75970c0fb1acf0db53b
|
||||
CVE-2024-21427,0,0,a17e3791f8438ee030d81372ddcf2e380b43f955c75cddb04d75263db9989f15,2024-11-29T20:49:42.757000
|
||||
CVE-2024-21428,0,0,34beec50e3cbf79fef40742e3e1fc1c696f99190f8ce8c604dcca2e0eb4f2cca,2025-01-15T22:33:02.860000
|
||||
CVE-2024-21429,0,0,6ceebfbd2f821b5be335f2f5c5cc08e1d66066dc65ad7b0f02fd03874ac1f2be,2024-11-29T20:43:50.370000
|
||||
CVE-2024-2143,0,0,3f8800ab3ee439af10c3f3686e880417f53a8822e9ac1646c1e898d83a40b724,2024-11-21T09:09:07.330000
|
||||
CVE-2024-2143,0,1,2e0df445e05dcc8db1b7ee50ceeecaf62c0d67e7dee92b74fc5043c63a1f7565,2025-01-30T15:21:36.637000
|
||||
CVE-2024-21430,0,0,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000
|
||||
CVE-2024-21431,0,0,adb271f7c07729890dc0e6600645b6eea17bdcd896aadfcebe92e54de18d6777,2024-11-29T20:44:56.373000
|
||||
CVE-2024-21432,0,0,383166da4d90f1ee1cfef67e6d182aa84566741c3c0e128fe9520b1f9369cb02,2024-11-29T20:47:25.987000
|
||||
@ -248218,7 +248218,7 @@ CVE-2024-21436,0,0,5eed3e6af9847f92e1b36108240fcc8a30d91a03697ae2b0fdc413088ef0b
|
||||
CVE-2024-21437,0,0,622e7d75d7c7f7a80a23c7264df5282bdd22befa79257665765ec77214ad0cde,2024-12-27T18:25:57.807000
|
||||
CVE-2024-21438,0,0,a304c7403d7aa6a0a77fd43806349c8dea20cced63446529948d3e95a30dc3db,2024-12-05T03:25:34.603000
|
||||
CVE-2024-21439,0,0,9320239109a42b88071c25ce9913b2b37fbc0d8847236f5446fd193b2f3753ea,2024-12-27T18:26:02.907000
|
||||
CVE-2024-2144,0,0,bd55c3e242215167621c383bf5dd406306578bd4f4401f4b644791f5fe39f163,2024-11-21T09:09:07.537000
|
||||
CVE-2024-2144,0,1,b1696af9f52b8ae77b04f58e1abe7eb42b00167240787e306bc52a61ece70360,2025-01-30T15:21:55.593000
|
||||
CVE-2024-21440,0,0,b962607bd47829e7db36fec7ce783c1b45bc4d93670f7045bf73725a43f545b1,2024-12-05T03:25:52.233000
|
||||
CVE-2024-21441,0,0,49a659cad7252864e7256a5aa7d62f80cd4df957e3e9d7a812d4a8e134a3be0e,2024-12-05T03:15:20.800000
|
||||
CVE-2024-21442,0,0,e33f04825343ab789d0034882ebb9e4ece99f0ebb7e7b69c95eec54b9d9a6ddb,2025-01-07T21:18:53.787000
|
||||
@ -249113,7 +249113,7 @@ CVE-2024-22424,0,0,4b7731f367a9920bfa6d63196c7586a414c888a9627b4f71343b10d0c0047
|
||||
CVE-2024-22425,0,0,a0b995a155ecd51d340a6103a0e4a3382cbd366ea3ab720f068b304cc436009b,2025-01-23T16:51:37.177000
|
||||
CVE-2024-22426,0,0,be3b3fc731ba3847ca8704dd6340da9558e51859e5b7009ac88fbb11c3f7944c,2025-01-23T16:50:56.417000
|
||||
CVE-2024-22428,0,0,97ba898ef03ad044243eee9a2a9f3bf000186b10e7cf1418a4f66ab0f1d4a391,2024-11-21T08:56:16.260000
|
||||
CVE-2024-22429,0,0,6ad2f8dc5d40032c5a1e997acf2f56cb7ed858b91fddf1268e6e136032103c12,2024-11-21T08:56:16.417000
|
||||
CVE-2024-22429,0,1,34ad03a3d5f67917de50fbb46797d7e66617bca54d9e60e6a1232520965070ec,2025-01-30T15:48:29.167000
|
||||
CVE-2024-2243,0,0,4a950216376586fd89744a66774761bf5d4c11f51d4189b3526d8eb951a7fd99,2024-11-21T09:09:20.247000
|
||||
CVE-2024-22430,0,0,2a1810568056a6f511044de4d96182217762c178be8ffbe452986b5f6211be74,2024-11-21T08:56:16.563000
|
||||
CVE-2024-22432,0,0,7cb6d348f7ecaed11c214049cfb0cf875f7744a8cbc5b3ed3f17adfd508a21ab,2024-11-21T08:56:16.710000
|
||||
@ -251323,15 +251323,15 @@ CVE-2024-25694,0,0,9aea7ed506f3e75701da5f8d91f5126ddb9fc6039a2cfaf95eafeb4edbb1a
|
||||
CVE-2024-25695,0,0,dd69ada188cfe555126eccfc8160d5342bb635827d40f664117ae84700fdfe7e,2025-01-08T14:32:59.223000
|
||||
CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb6a2,2025-01-08T14:30:29.987000
|
||||
CVE-2024-25697,0,0,a267efec5273910cac3ec9498c584553301da7dd464ae170402e82473ed69618,2025-01-08T14:22:09.017000
|
||||
CVE-2024-25698,0,0,19eb454e81d3c195c657f5c68a39132668f17dce0e38c56018a5f756122188c5,2024-11-21T09:01:14.170000
|
||||
CVE-2024-25699,0,0,a504f29e6715a9f4cf15669b900042e866e6989406ef2bfa7e7be1669e7997b8,2024-11-21T09:01:14.283000
|
||||
CVE-2024-25698,0,1,d8153d0a5f5447d2ed8050d1aff648edef1b78164d821441b8ecfff2f9f3ddd0,2025-01-30T16:18:43
|
||||
CVE-2024-25699,0,1,2adecc9e6c7b1072773d72f427349412dc90e94c4e67f251b1aa2cd7cacf3e08,2025-01-30T16:23:46.597000
|
||||
CVE-2024-2570,0,0,8904be72da1cc04949bb577192b9c0d2e6811b77e6cbf72d6c39d9361754ea4c,2024-11-21T09:10:02.120000
|
||||
CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000
|
||||
CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc54d,2024-10-16T21:00:36.173000
|
||||
CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000
|
||||
CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000
|
||||
CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000
|
||||
CVE-2024-25705,0,0,4c85f2126ead3ce3c0774776e6bb6841f004ed364727d984d7e62e5cc1e3ce5b,2024-10-10T12:57:21.987000
|
||||
CVE-2024-25705,0,1,9a2e1e8760ef10c25bc8bdd61bcca108ac124e06272934d80d0a1be5be3ebc2e,2025-01-30T16:21:48.907000
|
||||
CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000
|
||||
CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000
|
||||
CVE-2024-25708,0,0,a2958d3769e146c03c05682b4b008d9ff8709a1d2a61e12cc9267215854777c9,2025-01-23T18:27:58.827000
|
||||
@ -251896,12 +251896,12 @@ CVE-2024-2641,0,0,70a70be0b042731ccdc73536925161bf9a9aa50cb2b7e715353e185314654c
|
||||
CVE-2024-2642,0,0,52ad972556cc065c34954675f727e5508f8caab5590185ce6cde82cc71dc74fb,2024-11-21T09:10:11.963000
|
||||
CVE-2024-2644,0,0,68b8aac1e80f4d0f9bc1ed0fdb2ec8b978b6cf57d03ff491e5dc225f67fd465f,2024-11-21T09:10:12.093000
|
||||
CVE-2024-26445,0,0,a574b3250dab9ff47aa2b0031e8d31dbf726d4dcf250f9b570a9d5423bbb84ae,2024-11-21T09:02:25.660000
|
||||
CVE-2024-2645,0,0,8d4d4eb0ccdc53037fcdc0c86a30f22978cd8e3cab40d5a9983812e8147e09f2,2024-11-21T09:10:12.230000
|
||||
CVE-2024-2645,0,1,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000
|
||||
CVE-2024-26450,0,0,44fde4f373d5569241d50bdb30df7d9eed39fdf74554bc5181d04d6ee81e71ae,2024-12-04T21:15:22.447000
|
||||
CVE-2024-26454,0,0,321d01563e466eb4bb44077770adb4efe3794d2388e227e244b5e1fbc07fe1bc,2024-11-21T09:02:25.983000
|
||||
CVE-2024-26455,0,0,b602a39340aa0a08d22bea95d20335091929597e145ac5852ed224ca96f28c13,2024-11-21T09:02:26.130000
|
||||
CVE-2024-26458,0,0,a84cafdaaeb4711178a2af3a2fb066cefb77307207efb491034cc325fa3b809d,2024-12-06T21:15:06.280000
|
||||
CVE-2024-2646,0,0,4dfbc1a355ed2a49460adae5fb4d41fc9685e53cdf8f791cf296dcfc3cc667f4,2024-11-21T09:10:12.370000
|
||||
CVE-2024-2646,0,1,151ae367ea355c28dc7616a7c62a3d01bd09810a6ddedafdaea0609aace977ef,2025-01-30T15:34:41.863000
|
||||
CVE-2024-26461,0,0,88cfb89c75caa3fbb98958498da2cadb2df05ab5f4cd5d1d1f54ba1cb18b653a,2024-11-21T09:02:26.477000
|
||||
CVE-2024-26462,0,0,59061cbd0e0ef528389a9179ee133da7a4327898f7c01148c16af923d1832991,2024-11-21T09:02:27.010000
|
||||
CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000
|
||||
@ -251917,13 +251917,13 @@ CVE-2024-26472,0,0,886a2fc774cca6e7209753367afa5a190bb62651cd1c25e70722074ee2126
|
||||
CVE-2024-26473,0,0,00fce609accad83d07750bd45b1342c1c6ea4b9d7793b3dfa144586b59ed3298,2024-11-21T09:02:28.697000
|
||||
CVE-2024-26475,0,0,0139d49d19a67dbd279a84d67de73593691348dff5def951bdb44243f5237645,2025-01-23T19:19:58.217000
|
||||
CVE-2024-26476,0,0,8d9df15e765bbf5a9750f7a0d9952d7d99b32a5699906b57f431687265856ba9,2024-11-21T09:02:29.043000
|
||||
CVE-2024-2648,0,1,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000
|
||||
CVE-2024-2648,0,0,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000
|
||||
CVE-2024-26481,0,0,27cd2dd704778bc0c175f0416f8065c950331ff365164eeacdcc041662290a87,2024-11-21T09:02:29.270000
|
||||
CVE-2024-26482,0,0,d5197da6409ecd6e992ef12cae051a9fa963c093a6102783a8853c0f5a5a7603,2024-11-21T09:02:29.480000
|
||||
CVE-2024-26483,0,0,c59a993a5964f48545747ef2268eb7fa595ac26729264347074806473fe6b6f5,2024-11-21T09:02:29.690000
|
||||
CVE-2024-26484,0,0,64a21bd08323ab7879d0b6b9b7d5f94dfd1a274690483cc7221c08a4f0e267ba,2024-11-21T09:02:29.907000
|
||||
CVE-2024-26489,0,0,4ba681f8802ea2313b82597fc4402aaa8b2cc7cfa96e804d58a078246f0f48df,2024-11-21T09:02:30.127000
|
||||
CVE-2024-2649,0,1,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5a1,2025-01-30T14:35:30.467000
|
||||
CVE-2024-2649,0,0,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5a1,2025-01-30T14:35:30.467000
|
||||
CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae4de,2024-11-21T09:02:30.263000
|
||||
CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000
|
||||
CVE-2024-26492,0,0,9627b0f85e6c71953ddc8ad575684843b848841f59336ebddbc7ed81a95e3765,2024-11-21T09:02:30.693000
|
||||
@ -251996,7 +251996,7 @@ CVE-2024-26616,0,0,d3c13b186980b14f4d8626d0c527f78394756d9c40071b7da5f1973da6f30
|
||||
CVE-2024-26617,0,0,111cb4359671b535aadd933a1100c9999bd2632f9a23d4dc9bf642a8974880ee,2024-12-12T15:34:40.053000
|
||||
CVE-2024-26618,0,0,3be46d8e494c76778ce26f489ff9887dc160c7e4937984d288af7894c48c4bab,2024-11-21T09:02:42.047000
|
||||
CVE-2024-26619,0,0,47ef9d76f9826a5a5e8ba4e9250a722df14dc33a348ae160fc1d23110278689d,2024-12-12T15:19:41.967000
|
||||
CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000
|
||||
CVE-2024-2662,0,1,400eea2126d6937fee3bff1c429ac8ac91b4221435dbfd3a6d3af1ca7d680318,2025-01-30T16:12:13.900000
|
||||
CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000
|
||||
CVE-2024-26621,0,0,2cef5f3b9034b09be05aedbba02c8c8e6662a458df7f1f7360f9cc5779521c1d,2025-01-16T17:11:37.050000
|
||||
CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000
|
||||
@ -255145,7 +255145,7 @@ CVE-2024-30545,0,0,9fc1519b1df9cef49e003c31844226b87a8a0876e6364f49bd01371911fac
|
||||
CVE-2024-30546,0,0,682d8bf45e6a08218a5a3a2da6b1491ce652cde21b3fc1369e6ec13bc346b6de,2024-11-21T09:12:09.073000
|
||||
CVE-2024-30548,0,0,f693c6a877ff0dcdf6fe4ef2a958123b8947204e837af80130e7a6521588b872,2024-11-21T09:12:09.200000
|
||||
CVE-2024-30549,0,0,00e28713a877ec4005bbaa382f6309b5fbab46d15b113d2b825dbae08bdb2ce6,2024-11-21T09:12:09.330000
|
||||
CVE-2024-3055,0,0,67946cd23a7eea138e5f43e8c6ea561d14725d81862c72954ebac488f2ac859d,2024-11-21T09:28:48.053000
|
||||
CVE-2024-3055,0,1,80848d3ebe6c9d2dc11053b924adec8e053b2e76ed033beed24a77e64207f08e,2025-01-30T16:11:40.940000
|
||||
CVE-2024-30550,0,0,b1012a09324820a2f5d1c5129a5f2c426e3a5ba9be88ba49aab751fbaf16a1e5,2024-11-21T09:12:09.457000
|
||||
CVE-2024-30551,0,0,1e6b51a7a6c6332aac1197822ceff35a8c0ec56590e5297f09a269ea4cdb1fbc,2024-11-21T09:12:09.580000
|
||||
CVE-2024-30552,0,0,8d0f5a765b1705cd4ae9297b1fa6993b0afb84b835e645e1c32dd013ea0499fd,2024-11-21T09:12:09.710000
|
||||
@ -256062,7 +256062,7 @@ CVE-2024-31895,0,0,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638e
|
||||
CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000
|
||||
CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000
|
||||
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
|
||||
CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000
|
||||
CVE-2024-3190,0,1,acb939305a3c103ea90b729158b96bbb213cfee2d2e362ac5c55eb275ba4dc51,2025-01-30T16:09:08.383000
|
||||
CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000
|
||||
CVE-2024-31903,0,0,f1559924e9af14a36520fa16f97e50e9463ab7aedc8dee1206ec2eaf945f2191,2025-01-22T16:15:29.030000
|
||||
CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000
|
||||
@ -257696,9 +257696,9 @@ CVE-2024-34028,0,0,934507f74a9980c1b522d6c06e1c5c313c6c6350eb055bcfd2ba2fe531c55
|
||||
CVE-2024-34029,0,0,28955cadb2652f3ed8715b1105f4f2b127c3a074a158620f14abf34f2332bab0,2024-11-21T09:17:56.890000
|
||||
CVE-2024-3403,0,0,35c375acdcdc96d67dcf90a24b47f970416839cdfccc78da387631d90f23c467,2024-11-21T09:29:31.520000
|
||||
CVE-2024-34030,0,0,0f42953a89d194a36318ed8d4be50bf3efbe42245c9b26de406722e8c8b045aa,2024-11-21T09:17:57.040000
|
||||
CVE-2024-34031,0,1,965adb0dd9870fa0b70e6becb0de24e260a730e143f6cdb53f9f644c7ba714ea,2025-01-30T14:30:40.657000
|
||||
CVE-2024-34032,0,1,cf001237ea53caa629b039a4334f22486fffbbd4d7a0f05ad3f6e68b3e09e5da,2025-01-30T14:31:00.057000
|
||||
CVE-2024-34033,0,1,cfe0d057081e1aeef658525f7464f9137fd5e9e218807cc56ad4ed4afd0c6cc4,2025-01-30T14:32:24.690000
|
||||
CVE-2024-34031,0,0,965adb0dd9870fa0b70e6becb0de24e260a730e143f6cdb53f9f644c7ba714ea,2025-01-30T14:30:40.657000
|
||||
CVE-2024-34032,0,0,cf001237ea53caa629b039a4334f22486fffbbd4d7a0f05ad3f6e68b3e09e5da,2025-01-30T14:31:00.057000
|
||||
CVE-2024-34033,0,0,cfe0d057081e1aeef658525f7464f9137fd5e9e218807cc56ad4ed4afd0c6cc4,2025-01-30T14:32:24.690000
|
||||
CVE-2024-3404,0,0,6fea713d49223c11c4a6ed8171c383bae0a065dce7cd39ac6527df87319a6bb9,2024-11-21T09:29:31.663000
|
||||
CVE-2024-34043,0,0,53d43ce8307f8de15478a2599f8c8bc215f7ec8b04c173f3e969cef0b4ee49c1,2024-11-21T09:17:57.623000
|
||||
CVE-2024-34044,0,0,f53b421c4d735b77bf8a81755242f7d2e02484d8eb0a14198eaff9e938f44722,2024-11-21T09:17:57.840000
|
||||
@ -258452,11 +258452,11 @@ CVE-2024-34995,0,0,abdbc2aef2da3b42556f78c65bc0781f5009a8f6a0313dafe6f17b909e933
|
||||
CVE-2024-34997,0,0,13f21ea417fd3af13763e4f3faf7aae4d611bc2d0b48b03ccb7937233e7fb8db,2024-11-21T09:19:41.353000
|
||||
CVE-2024-3500,0,0,3c8bc608b6ad5e8f952884ade0c885304cb5cb379f598ad860c126e127175de1,2025-01-08T21:22:53.997000
|
||||
CVE-2024-35009,0,0,2e273427408b1e1fff4030ac74819540f868ad5b2d28acdf5d8d3e4f221aab8e,2024-11-21T09:19:41.613000
|
||||
CVE-2024-3501,0,1,f4737690dd45584486a5a75d133f44e500cdc76d274dc726cca7c804123e35cb,2025-01-30T13:15:09.623000
|
||||
CVE-2024-3501,0,0,f4737690dd45584486a5a75d133f44e500cdc76d274dc726cca7c804123e35cb,2025-01-30T13:15:09.623000
|
||||
CVE-2024-35010,0,0,a6fc656a98892420eeec5799d99fa4ae7352dad5dd7951f64589362d56d6fd9a,2024-11-21T09:19:41.840000
|
||||
CVE-2024-35011,0,0,6fbc8e4762f1f23d80dfde1dccb1be21bc0d0de89b3d4c7d0c638d99ca7df9cc,2024-11-21T09:19:42.063000
|
||||
CVE-2024-35012,0,0,09d5778d94487c3678d23588ac340e064e0e40aca49c79890be60be1fd21649d,2024-11-21T09:19:42.283000
|
||||
CVE-2024-3502,0,1,a7280c3857b4138ce49c8810182d5b46e81d48c020fb62a446f961806b2eb539,2025-01-30T13:15:09.853000
|
||||
CVE-2024-3502,0,0,a7280c3857b4138ce49c8810182d5b46e81d48c020fb62a446f961806b2eb539,2025-01-30T13:15:09.853000
|
||||
CVE-2024-35039,0,0,d0bf9d904b3952876ffbbc691411e97a258b409c33150c668ef23d079b6a80c6,2024-11-21T09:19:42.510000
|
||||
CVE-2024-3504,0,0,1e76ca030a65692dbb6d630449e59791e5c57b83588b9e0692b4e2aa7884c7fa,2024-11-21T09:29:44.783000
|
||||
CVE-2024-35048,0,0,135119f59dfaf319a97db7bd2c1bc169012c9a11400da34d4bae48ab413bd01a,2024-11-21T09:19:42.657000
|
||||
@ -258754,7 +258754,7 @@ CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf24
|
||||
CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000
|
||||
CVE-2024-35468,0,0,f078143d20bd8ff2771314faaf608d4d85c29a73695f1655b68a13225fe33a65,2024-11-21T09:20:20.703000
|
||||
CVE-2024-35469,0,0,0ef71f4f233abf9594f964e6d6d590e07f6ef6267c7172573dd2c7cca486f5e2,2024-11-21T09:20:20.920000
|
||||
CVE-2024-3547,0,0,f5af4505cc68e332dbe87237b388cb16d45882ab9a7699d3d6cf785c002f20ed,2024-11-21T09:29:51.093000
|
||||
CVE-2024-3547,0,1,cc056654da60c64ae530f1e9165baa2d5681414032cb22b0d41cad3bf8efb850,2025-01-30T16:10:54.307000
|
||||
CVE-2024-35474,0,0,91de302607cb6d61e5f0d4983bba35c5730030dc688e50f61b2a92614151d2c3,2024-11-21T09:20:21.160000
|
||||
CVE-2024-35475,0,0,9a47997de7f86bb21a8527bce163a4eff44ce6966a5cecc9f4051aaddc7238e5,2024-11-21T09:20:21.310000
|
||||
CVE-2024-3548,0,0,64d728af28809c7e405f88cc2b9445430ea7fcba331c3ebc611e9b0849f0df00,2024-11-21T09:29:51.210000
|
||||
@ -259420,7 +259420,7 @@ CVE-2024-36206,0,0,80d8234ef9c6bbf40d892a823223fec5560241514c3334c39936574bce7c5
|
||||
CVE-2024-36207,0,0,97754cbc5525fac7ef6a21b3f3ebf448e3ed21aabff25273a14aff4b4c12e5e5,2024-11-21T09:21:51.197000
|
||||
CVE-2024-36208,0,0,c4eecf6ab69be8779f67ed9d5e55351422fda141959722d8e5af2566cf2bf646,2024-11-21T09:21:51.330000
|
||||
CVE-2024-36209,0,0,99358c2058f85b33b116911164d15902e2fdeef917f179babf878a264ea065e7,2024-11-21T09:21:51.500000
|
||||
CVE-2024-3621,0,1,6c5f746a8c5f61fb085d25f3f8ea0de4a3a14e65caedc7f830e83750eb82ff04,2025-01-30T14:40:31.307000
|
||||
CVE-2024-3621,0,0,6c5f746a8c5f61fb085d25f3f8ea0de4a3a14e65caedc7f830e83750eb82ff04,2025-01-30T14:40:31.307000
|
||||
CVE-2024-36210,0,0,2bba668221ea04965eab93a2aa296fc5711b6edd8069872767c318f84ba10d03,2024-11-21T09:21:51.637000
|
||||
CVE-2024-36211,0,0,784af734068ca60317237d50f3dbfed33b6b5fde134f8f711fc7d8491ed4e0dc,2024-11-21T09:21:51.777000
|
||||
CVE-2024-36212,0,0,3ed1af9fdf30b719f5729eceb4dd46100ca00a37ece33082567447eb53f1548f,2024-11-21T09:21:51.920000
|
||||
@ -261875,7 +261875,7 @@ CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864
|
||||
CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000
|
||||
CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000
|
||||
CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000
|
||||
CVE-2024-39354,0,1,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000
|
||||
CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000
|
||||
CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000
|
||||
CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000
|
||||
CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000
|
||||
@ -262118,7 +262118,7 @@ CVE-2024-39601,0,0,92d2b69fbd2e8bc149b176391e3e16765df166d2a97846f11f4915fdfd474
|
||||
CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b383,2025-01-14T16:15:31.540000
|
||||
CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000
|
||||
CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000
|
||||
CVE-2024-39605,0,1,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000
|
||||
CVE-2024-39605,0,0,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000
|
||||
CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000
|
||||
CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000
|
||||
CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000
|
||||
@ -263316,7 +263316,7 @@ CVE-2024-41468,0,0,10bf02a4bb290678b06592c8c1b3227ccfabee3baa4072ea0f6b7fc4b45e9
|
||||
CVE-2024-41473,0,0,29d4e7b54fb4126a361ecc042f6a7b31e6afda88ff19b4c6fc756b4a5212f348,2024-11-21T09:32:42.720000
|
||||
CVE-2024-41475,0,0,b8be933a7b93d0c1cf4b6c4176e5022fbe4f2cb5fba128f6278ff8ebfcb5d463,2024-09-18T18:51:25.513000
|
||||
CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa3c3,2024-08-12T14:35:13.627000
|
||||
CVE-2024-4148,0,1,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000
|
||||
CVE-2024-4148,0,0,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000
|
||||
CVE-2024-41481,0,0,6eb5de345a9525c442ab97a24184da0c8a5a6c01c4d00868ab2a9512a25cc800,2024-08-13T14:51:33.017000
|
||||
CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84172,2024-08-13T14:51:43.163000
|
||||
CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000
|
||||
@ -265234,7 +265234,7 @@ CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3
|
||||
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
|
||||
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
|
||||
CVE-2024-43849,0,0,bb2f13ce55d02e025d8b5df3a85c28012dc63944edc5a60786100663bd1bf49f,2024-10-24T16:02:21.587000
|
||||
CVE-2024-4385,0,0,ee902bcd5a550a2f573e4df8318a99cea196cb23cdfb957746f674c4983835b0,2024-11-21T09:42:44.713000
|
||||
CVE-2024-4385,0,1,6b321f47210a4f402aa206dba55236d60e4f3bf998d01a619d9e932d532b4d1c,2025-01-30T16:09:33.727000
|
||||
CVE-2024-43850,0,0,5026c93dc45245fc690dfe704ae40ea697f74bbd447206e9ac7891250f89dda9,2024-09-30T13:57:33.400000
|
||||
CVE-2024-43851,0,0,946449cde7c43100052b7fc9053f5f755974a4dba660acc98fbea6da7c92d49a,2024-10-24T16:07:41.687000
|
||||
CVE-2024-43852,0,0,bcad036330e4766c8ab5dff7cca3995c28fcfe68ecb4abd33b1fd81a51a3287b,2024-08-20T19:32:55.747000
|
||||
@ -265553,7 +265553,7 @@ CVE-2024-44169,0,0,8e659cce58d9a53d0497d3730dec7575b8a3d2351d4de051efdd53f958a4e
|
||||
CVE-2024-4417,0,0,4e3d6204cd6966eb0d27497c2863f9921840677a5ed28df1c16d852d537c8a4f,2024-11-21T09:42:47.380000
|
||||
CVE-2024-44170,0,0,4d2a800695872f7abc00b41c3e1d9ae1548d65569627bdeeb9ef0e31c2a1724b,2024-09-30T19:48:51.767000
|
||||
CVE-2024-44171,0,0,61d23c156cb013a8a8af9a10b8da0c4d43b13a26cab640993f3b36fb5e09e5ab,2024-09-24T16:22:38.880000
|
||||
CVE-2024-44172,0,0,6ff5fd7f36da624a8e4d5ae9fe38d09821bf81d42d627f5a88b0bfd7c0aec890,2025-01-27T22:15:11.930000
|
||||
CVE-2024-44172,0,1,8e0bb5dfd74c12dff365254bfb56b3a0129d5f37916ebdae4759c31610a23b80,2025-01-30T16:47:17.370000
|
||||
CVE-2024-44174,0,0,9fef131a05569228953753a69bb54c67406d2be203d34e38f490d828de204009,2024-10-30T16:35:20.507000
|
||||
CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12daa4,2024-10-30T17:14:55.127000
|
||||
CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000
|
||||
@ -266580,7 +266580,7 @@ CVE-2024-45796,0,0,01c9127a9e7d6e535a3a930242bf9f9d5c2a1cbeadfdf8175a5c8fb0bb4be
|
||||
CVE-2024-45797,0,0,c84e8443a269bae84796aec501500e8480ed1330037de3edec788de410762008,2024-10-18T12:53:04.627000
|
||||
CVE-2024-45798,0,0,490269bd2a7e8e2136a585b277298e0fd2793ca29324d9ef69308a44b095e7bb,2024-09-20T12:30:51.220000
|
||||
CVE-2024-45799,0,0,c852979390ddd115fddc3999a7a2b4ed741b1339f638a70d3124dee7d6c96413,2024-09-20T12:31:20.110000
|
||||
CVE-2024-4580,0,0,ce0dc46af980686b05509ea0289987cd8a505fa2732d379052b61894fdb89144,2024-11-21T09:43:08.940000
|
||||
CVE-2024-4580,0,1,df067ac1e886d8dc479c776ad840ff90bab8aa03d23a01baeb5e01d13144d370,2025-01-30T15:55:44.283000
|
||||
CVE-2024-45800,0,0,4167c45d50337de65fd2604084d1d9f0801e36db06bae66cff5994f6ce8e5eaa,2024-09-20T12:31:20.110000
|
||||
CVE-2024-45801,0,0,7bd2125c176a54840b4a07da0d08e9005539420f0eaa027e673835a41ea39c26,2024-09-20T12:31:20.110000
|
||||
CVE-2024-45802,0,0,5118eb720598f0b5f0f7955d1553146171ca853fc8c195ed65b55673cb27fbb0,2025-01-03T12:15:26.117000
|
||||
@ -266731,7 +266731,7 @@ CVE-2024-46084,0,0,83705853e72627ee7c2534dabfa677423187cc3cb58e1b6278bdb9f958c7d
|
||||
CVE-2024-46085,0,0,235827898b42a9e561ca9f6fb3d66ddfe29920ecb7a133538f1a4710b1062288,2024-09-20T12:30:51.220000
|
||||
CVE-2024-46086,0,0,db65165feccd5cb075ac96f210c77557e2fa2e1d4ad8dc2351e61d2dfab7f1ef,2024-09-25T17:08:41.937000
|
||||
CVE-2024-46088,0,0,cebef494058af71996a2bd2599de3e728bb9445ff54a8925f9eb5974360a8dfe,2024-10-15T12:58:51.050000
|
||||
CVE-2024-4609,0,0,e500fdda1cf040f009fe5352a5194e07aa9d25ccfb8ce7352f7c21225eb70de3,2024-11-21T09:43:12.620000
|
||||
CVE-2024-4609,0,1,0d30c3b2f29c5240f0aac26aff26d3fd4c6b27605cceeb00f758ad3112e29b82,2025-01-30T15:50:28.557000
|
||||
CVE-2024-46097,0,0,81923f5d4d8e5055b162d76d680c8f22ce08e7aa6381b7cf7beec6a443dacf5f,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4610,0,0,f50600a6c6829b515e589c2ef59552849dc680c9e925131563e15658aa25578f,2024-11-27T19:29:04.697000
|
||||
CVE-2024-46101,0,0,e753d2c1bb092894837b23e0471205bf34ea95c90d6464840efb9cbd99474750,2024-09-26T13:32:55.343000
|
||||
@ -266796,7 +266796,7 @@ CVE-2024-4633,0,0,4be9efb7395c528b05dc39db0f29be9d9debe80ebcf8638d7ee15d2174982f
|
||||
CVE-2024-46330,0,0,fb0912248c72cdb890e148fb8d15fc4a24d9dfffc5c218fc836550de7cd4ecb0,2024-09-30T12:46:20.237000
|
||||
CVE-2024-46331,0,0,6291a6cdf65b126a104c517cdbb8a547242f83239cadbf67a03f4d15648664f1,2024-09-30T12:45:57.823000
|
||||
CVE-2024-46333,0,0,c870313be8293ae808f6f74cc79ece6e4d82dedcd46cf642a068e85f3720b28d,2024-09-30T12:45:57.823000
|
||||
CVE-2024-4634,0,0,5b054bd144b9176362ee5c6f20d9184237b3f1751e5cc99bd16dbf550697f8a4,2024-11-21T09:43:15.343000
|
||||
CVE-2024-4634,0,1,eb60703eaec3c1cb33741c607a7e9d8ef61e689c7df21581c70bdd061bd8fc33,2025-01-30T16:01:17.150000
|
||||
CVE-2024-46340,0,0,509c04c6b928f13979254f73eb53c9343eb60f2e6a3bd03e83c81e5d4021163a,2025-01-28T23:15:07.487000
|
||||
CVE-2024-46341,0,0,0b54e207dfc51f9d880626aceceecaf4c92e14fd4888ec8d3b9add5932056882,2024-12-11T15:15:10.090000
|
||||
CVE-2024-4635,0,0,87f43db3808bf2002a7413b8e77f45922cac81f6b6e7149135bfc36fd2d70fdd,2024-11-21T09:43:15.457000
|
||||
@ -267377,7 +267377,7 @@ CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40
|
||||
CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000
|
||||
CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000
|
||||
CVE-2024-47119,0,0,822d29d557ac8a46a432d9833d3741afebbd1611ae551e680e9265032df20c37,2024-12-18T16:15:13.110000
|
||||
CVE-2024-4712,0,1,72c05213aa50046f03c2ceead2ea0141808f5bcda36c2be58d2e87fc20f17f56,2025-01-30T14:58:45.433000
|
||||
CVE-2024-4712,0,0,72c05213aa50046f03c2ceead2ea0141808f5bcda36c2be58d2e87fc20f17f56,2025-01-30T14:58:45.433000
|
||||
CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000
|
||||
CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000
|
||||
CVE-2024-47123,0,0,5653f27850e6d35409f08b28cacb03a0f8d3e59c1152fcc0a7ddcb50ea8eb316,2024-11-21T17:15:16.473000
|
||||
@ -267389,7 +267389,7 @@ CVE-2024-47128,0,0,65759f80a9ff2e996983784301775be8d3d67c43668184bead5522ffb06db
|
||||
CVE-2024-47129,0,0,21ab298568b77c231224ddece70855941d2bceaa4599c817bac87f2708ef4742,2024-10-17T18:15:06.930000
|
||||
CVE-2024-4713,0,0,b4955fe6b5819902c5b4de23942cae46515c7959c7f9cea3df2810ef17b3f66a,2024-11-21T09:43:25.970000
|
||||
CVE-2024-47130,0,0,aa210527789d3142a26190221a1f00d05f6fb48f13f743e00fe050e6aed804e6,2024-10-17T18:15:07.130000
|
||||
CVE-2024-47131,0,1,5a043d3c6427bec05dcf5dbf8b3fb5126f4b062616151b30537188bd73082d58,2025-01-30T14:35:10.020000
|
||||
CVE-2024-47131,0,0,5a043d3c6427bec05dcf5dbf8b3fb5126f4b062616151b30537188bd73082d58,2025-01-30T14:35:10.020000
|
||||
CVE-2024-47133,0,0,732f4b3ccc248a886bb57b758e9499b4fde95dbd65c8663f4fa49932f5353704,2024-12-18T07:15:07.703000
|
||||
CVE-2024-47134,0,0,731bb1f9c493297a05be84d72e8728d365811c3cf823fc1f39f880a39ec0564a,2024-10-16T13:50:32.607000
|
||||
CVE-2024-47135,0,0,0f0243de033a38c800d27683079832eaf8a01f0f9426503f7ac2abba9f3ef240,2024-10-15T18:21:04.813000
|
||||
@ -267983,7 +267983,7 @@ CVE-2024-47781,0,0,ac3343a5bdfe2b42fa2baeb94dc64f26c6cd35309487275f571da09df8ca4
|
||||
CVE-2024-47782,0,0,aea12cd12b139670528cb559076d430b505402dadabc98ae5bd0b14d0824b1de,2024-11-14T18:19:34.127000
|
||||
CVE-2024-47783,0,0,a479c1d46c5300cdfd4b0953e47a352189557dfa1e1f57f0b45d3a57b4f5aec2,2024-11-13T23:13:25.367000
|
||||
CVE-2024-47789,0,0,4e41e3af7c3971f8658317523511cc8ea6d0da3f22708f230815441b517be231,2024-10-14T11:15:11.797000
|
||||
CVE-2024-4779,0,0,2e1aaf861b56995420e2ecd41fb05fbeff0136f0ff02e8684e6cad712f3005ea,2024-11-21T09:43:35.870000
|
||||
CVE-2024-4779,0,1,8c24b442d011991b1c83a32cd89d83eb925ddd5f67de8dc98121dafc7963437c,2025-01-30T16:10:38.760000
|
||||
CVE-2024-47790,0,0,0033caa01d3b380ade4380efa296858b7b158eabdc29e84feb2d5832c0b983fa,2024-10-14T11:15:11.930000
|
||||
CVE-2024-47791,0,0,15000555053c296919902f42e8781945f23bfee06473820c84acf5fc428f2c99,2024-12-10T19:44:43.937000
|
||||
CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000
|
||||
@ -268565,7 +268565,7 @@ CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952
|
||||
CVE-2024-48903,0,0,9c89803e6726410301aaff247c42234fa7c4ad2b19e692a9182ae81ee0c051d9,2024-10-23T15:12:34.673000
|
||||
CVE-2024-48904,0,0,35d8cc445681b5e4ff1fcbbfd5a27253a724d76e1a2a2d6acebb5b7ec5903547,2024-10-23T15:12:34.673000
|
||||
CVE-2024-48909,0,0,5af217867017b45645b1cd88e9368407196c63b062f42cfaf011c832caa8e595,2024-10-17T17:56:11.130000
|
||||
CVE-2024-4891,0,0,51e6040bc4f90200a2c089840fe47a75168e50b1b672efc53fbd9785b6e7594e,2024-11-21T09:43:48.267000
|
||||
CVE-2024-4891,0,1,da144f5b8eac6a1bb02dce3640ba1147c865a134b9c516618c4c8a80a71defd2,2025-01-30T15:45:34.377000
|
||||
CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000
|
||||
CVE-2024-48911,0,0,55b7a5a266268268213060e2c0d21ae7b031d3c5984450b459efb48b395401c8,2024-10-17T21:13:37.147000
|
||||
CVE-2024-48912,0,0,c126261c0e22c041d80daa93d1a490f776182219e98126fc7e02d842adc655a4,2025-01-10T19:37:41.063000
|
||||
@ -271885,6 +271885,7 @@ CVE-2024-53604,0,0,19e77dbbd22cf0c536f2182ed04fcfa937399395f3ae572f74b753c8357c9
|
||||
CVE-2024-53605,0,0,8ecdd923e7f721b070d2ccfb4ecaf0eaa48031e234017ed413d81c0a92c94d84,2024-12-04T18:15:15.810000
|
||||
CVE-2024-5361,0,0,ad73d990c4bd9b694be52243b80a81244f1190d0986e7eec73b93a7337fd4e1e,2024-11-21T09:47:29.953000
|
||||
CVE-2024-53614,0,0,e0f021daad18a863a0efc93b4705ca0ebff1779316d0f9947e46818dacd2e7b5,2024-12-04T17:15:15.310000
|
||||
CVE-2024-53615,1,1,76beb71a50d4cfca6dce41294cae4a1370c6eeea303a2d1f791c05587b2982db,2025-01-30T15:15:17.390000
|
||||
CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b37d9,2024-12-02T20:15:07.710000
|
||||
CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000
|
||||
CVE-2024-5362,0,0,ad218d3bc95842e117fa458c49bff7d460d472a119fc1f559f5852b4e012b5a8,2024-11-21T09:47:30.090000
|
||||
@ -272841,6 +272842,9 @@ CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e
|
||||
CVE-2024-55412,0,0,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000
|
||||
CVE-2024-55413,0,0,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000
|
||||
CVE-2024-55414,0,0,0d97009591fcf6c0b34e60fb7a805f4c6f9d80da2e217dde940ef3fa78396336,2025-01-08T16:15:35.883000
|
||||
CVE-2024-55415,1,1,e45b76c72cb21be89d474a4bec24dfe8e9045fcf763c54d6f2d233f7cf01f85d,2025-01-30T15:15:17.490000
|
||||
CVE-2024-55416,1,1,916405c0350122128e79fbfd247ac7ba7f5fec226ebd0db591359b5db74cfe3d,2025-01-30T15:15:17.583000
|
||||
CVE-2024-55417,1,1,c4f74f3880fc19276a9d9941e49048b8067e6a9a86e3dc3998f5ca920a416fa3,2025-01-30T15:15:17.667000
|
||||
CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000
|
||||
CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000
|
||||
CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000
|
||||
@ -276205,8 +276209,8 @@ CVE-2024-8144,0,0,696edcb2bb311965c748dca1b652d460d37d41665bb332ac8c5789a18b7571
|
||||
CVE-2024-8145,0,0,5b5516a02e82f1a24921fba53f44ff719cb4889853174576c8c5cf18949cdb17,2024-09-18T15:34:47.007000
|
||||
CVE-2024-8146,0,0,3c38a8bf86aa5143d343a4e058bbc1c1d9adb80751bb2e546e609de9556fc1e2,2024-09-24T17:00:38.933000
|
||||
CVE-2024-8147,0,0,946ab893ddf9a675ac292ab1826a8652381a7ca069f4a6e6887c36e74d1a22f4,2024-09-11T18:37:20.670000
|
||||
CVE-2024-8148,0,0,19050abc6a02329d1598540a38d3be670def7449d84f72f465f7712bc4e64706,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8149,0,0,1b6da2ce517da81789eb4b04009f8c3dff7d9b5880f014dc3d2d33a48b558a75,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8148,0,1,b11f6d458a5c2f184e6b06287d9079a61d6bddf8a0405723705b807ca0f63708,2025-01-30T16:20:34.150000
|
||||
CVE-2024-8149,0,1,e5829772fade038e0e9e84ed0d873110a6cd6806a0a803d906ea385de6069066,2025-01-30T16:20:02.563000
|
||||
CVE-2024-8150,0,0,b20f5342ff1470679bbc0ab15ce3d915aeb3002367f334c834e9ac120b5cd845,2024-09-12T21:01:57.790000
|
||||
CVE-2024-8151,0,0,61072cd2dcf67db24ffebac51f604a71bd486239310714fab754dd0fa4ebef4b,2024-08-26T19:07:54.247000
|
||||
CVE-2024-8152,0,0,384333635aed066971b397f054838e616b07dd646d7f4b75acf4f33ae9eb4767,2024-08-26T19:06:30.997000
|
||||
@ -276493,7 +276497,7 @@ CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4d
|
||||
CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000
|
||||
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
|
||||
CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000
|
||||
CVE-2024-8494,1,1,0d19e0e4615d4d4f344ea75ed41d19ebde950527d3f7fe31c0774e6c6dea42ed,2025-01-30T14:15:36.973000
|
||||
CVE-2024-8494,0,0,0d19e0e4615d4d4f344ea75ed41d19ebde950527d3f7fe31c0774e6c6dea42ed,2025-01-30T14:15:36.973000
|
||||
CVE-2024-8495,0,0,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000
|
||||
CVE-2024-8496,0,0,ab865babe0d164049e1365545a634298d8f9eeb65fa574e795c6818555b64d40,2024-12-13T19:42:40.417000
|
||||
CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000
|
||||
@ -277457,7 +277461,7 @@ CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b3676507860927
|
||||
CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa03544,2024-11-28T09:15:05.710000
|
||||
CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000
|
||||
CVE-2024-9672,0,1,327a8471aafd6c747031a7b4ba4de124462bd8b2abfe091b37818952b24ea92e,2025-01-30T14:55:08.713000
|
||||
CVE-2024-9672,0,0,327a8471aafd6c747031a7b4ba4de124462bd8b2abfe091b37818952b24ea92e,2025-01-30T14:55:08.713000
|
||||
CVE-2024-9673,0,0,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000
|
||||
CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000
|
||||
@ -278031,13 +278035,13 @@ CVE-2025-0734,0,0,2b0fbea7bc08e89f2b572e3c6521a570d94025a1015e33909cf99289b07379
|
||||
CVE-2025-0736,0,0,2fbf9a82d2eb84a70c138a527dc373077f185d1a8eb3dfa65a9134c893f72229,2025-01-28T09:15:09.543000
|
||||
CVE-2025-0739,0,0,06db79985b3ffc9ce679a6b1532d26dde689388e80d0abf5747f95fe2433e285,2025-01-30T11:15:11.607000
|
||||
CVE-2025-0740,0,0,6070ddeff96009c0ce06c222e5a51193e82b3688197e9979a0b1546db6a4a197,2025-01-30T11:15:11.763000
|
||||
CVE-2025-0741,0,1,11f8d45217ed192e75aebac16701edf8ae2757fdbcc3df572b4e673f04ad7e83,2025-01-30T14:15:37.127000
|
||||
CVE-2025-0742,0,1,e706bf0d6b618f0ebe427501e895e0fa5538cc27bace9eaa3ce7235425ba2299,2025-01-30T14:15:37.320000
|
||||
CVE-2025-0743,0,1,429ebae93d41afa1d6712ed6205096ae558266dfda3a52a35e5c21cd61484e33,2025-01-30T14:15:37.507000
|
||||
CVE-2025-0744,0,1,d566dadf0f75ebb6d83db5ac73568871507920ba33f544bd8fbcf889d711706e,2025-01-30T14:15:37.687000
|
||||
CVE-2025-0745,0,1,7a673391c7e643b07ad96875e22fdb777a481cad36bf7e1522890846f0544049,2025-01-30T14:15:37.857000
|
||||
CVE-2025-0741,0,0,11f8d45217ed192e75aebac16701edf8ae2757fdbcc3df572b4e673f04ad7e83,2025-01-30T14:15:37.127000
|
||||
CVE-2025-0742,0,0,e706bf0d6b618f0ebe427501e895e0fa5538cc27bace9eaa3ce7235425ba2299,2025-01-30T14:15:37.320000
|
||||
CVE-2025-0743,0,0,429ebae93d41afa1d6712ed6205096ae558266dfda3a52a35e5c21cd61484e33,2025-01-30T14:15:37.507000
|
||||
CVE-2025-0744,0,0,d566dadf0f75ebb6d83db5ac73568871507920ba33f544bd8fbcf889d711706e,2025-01-30T14:15:37.687000
|
||||
CVE-2025-0745,0,0,7a673391c7e643b07ad96875e22fdb777a481cad36bf7e1522890846f0544049,2025-01-30T14:15:37.857000
|
||||
CVE-2025-0746,0,0,82f05cf4ac1b3bbdc81944686720f25863230e2cd080d0ac3a95fb013a5f8b26,2025-01-30T12:15:28.113000
|
||||
CVE-2025-0747,0,1,d36204131870c5d714f2df51bb514cb05f2fddc9c83df51a6ac35b9a2d128679,2025-01-30T14:15:38.133000
|
||||
CVE-2025-0747,0,0,d36204131870c5d714f2df51bb514cb05f2fddc9c83df51a6ac35b9a2d128679,2025-01-30T14:15:38.133000
|
||||
CVE-2025-0750,0,0,f0dcf8db3f28c907442c44817e918052a296a00a1a12376f3cb7890aea55adf6,2025-01-28T10:15:09.317000
|
||||
CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c062b,2025-01-27T20:15:34.587000
|
||||
CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae1520b,2025-01-28T10:15:09.493000
|
||||
@ -278078,8 +278082,10 @@ CVE-2025-0849,0,0,2080b1314603620cb3f8746fb1f255655b1b7caaf0a70104b6b1966e3468cb
|
||||
CVE-2025-0851,0,0,49552e625992bdb3a412aeacb5ef8fcb2bb7c90acfd6cc180846494a5bc52610,2025-01-29T22:15:30.463000
|
||||
CVE-2025-0860,0,0,57eb159251c47f86690502a6468f7bb73145fb297d274d97d9f0ac6ac7ddded6,2025-01-30T10:15:08.723000
|
||||
CVE-2025-0861,0,0,62f8d40ca04d4b5490a690c9c53c17fca5090134b2a22ca70beef3bfaf8e9ef0,2025-01-30T10:15:08.907000
|
||||
CVE-2025-0869,1,1,c00b626e4282f826353e23285ea2a2e2d9f7821ad3a302556c07cfef2c902385,2025-01-30T13:15:10.273000
|
||||
CVE-2025-0870,1,1,79959c76a1134388ccab8c308daae5a53c58c280cf4118b2d0f5c928e2079866,2025-01-30T13:15:10.483000
|
||||
CVE-2025-0869,0,0,c00b626e4282f826353e23285ea2a2e2d9f7821ad3a302556c07cfef2c902385,2025-01-30T13:15:10.273000
|
||||
CVE-2025-0870,0,0,79959c76a1134388ccab8c308daae5a53c58c280cf4118b2d0f5c928e2079866,2025-01-30T13:15:10.483000
|
||||
CVE-2025-0871,1,1,24dddddb7292c73ee5114bcb016776d1fe668a27680ab7f838511f0d6460093b,2025-01-30T15:15:18.253000
|
||||
CVE-2025-0872,1,1,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000
|
||||
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
|
||||
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
@ -278454,6 +278460,11 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8
|
||||
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
|
||||
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
|
||||
CVE-2025-22217,0,0,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000
|
||||
CVE-2025-22218,1,1,836ab65655ed2b3f519b6fee527b320c95f0b22b468f06c5346ef7ce0ca0c595,2025-01-30T15:15:18.487000
|
||||
CVE-2025-22219,1,1,45a9d478146875c58c04215315d263d7929148968ff42c1529a986918c1732fe,2025-01-30T16:15:31.013000
|
||||
CVE-2025-22220,1,1,b65749e0f949850b6f1851b9f4c71868ce52b00a0ef348e0e967f54a0e5efca6,2025-01-30T16:15:31.143000
|
||||
CVE-2025-22221,1,1,14b811ced27407dc9bda7c232bdce11f670b0b99078460e6a2a0aff6fbcca024,2025-01-30T16:15:31.257000
|
||||
CVE-2025-22222,1,1,88427fbd6b71746a7cac38ab28182f0393978cf8d8f60352e5bba62689c94a83,2025-01-30T16:15:31.367000
|
||||
CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000
|
||||
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
|
||||
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
|
||||
@ -278772,7 +278783,7 @@ CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c597
|
||||
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
|
||||
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
|
||||
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
|
||||
CVE-2025-23007,0,1,717722792f7937fb38469f7870413e56349c6bd035f1a66db88bc1b767b46c1a,2025-01-30T14:15:38.300000
|
||||
CVE-2025-23007,0,0,717722792f7937fb38469f7870413e56349c6bd035f1a66db88bc1b767b46c1a,2025-01-30T14:15:38.300000
|
||||
CVE-2025-23011,0,0,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000
|
||||
CVE-2025-23012,0,0,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000
|
||||
CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000
|
||||
@ -278852,6 +278863,7 @@ CVE-2025-23211,0,0,b01b3d1eaa389abc74d10a53464a452db8c48b8e46d369d0635594b6a3f9c
|
||||
CVE-2025-23212,0,0,5d60c49ffd32521a5482891d50382e894e871b53bc8376be27f61b9b217ff0da,2025-01-28T17:15:26.273000
|
||||
CVE-2025-23213,0,0,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000
|
||||
CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000
|
||||
CVE-2025-23216,1,1,00b505d4b9b9843f71db2ff599b87d4f422e7f80537e6f7097d7f130a64ef994,2025-01-30T16:15:31.473000
|
||||
CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000
|
||||
CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000
|
||||
CVE-2025-23220,0,0,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000
|
||||
@ -278861,6 +278873,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
|
||||
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
|
||||
CVE-2025-23362,0,0,1b94e2fb0c40adc071aa869f9b4973eb9cf09ca0af55a23699e64fa6aa0684ff,2025-01-29T02:15:27.910000
|
||||
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
|
||||
CVE-2025-23367,1,1,8708284fa63d75792ac7858f9eb29d032b34975a20c7fa3ef097e90ea50ebea7,2025-01-30T15:15:18.610000
|
||||
CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
|
||||
CVE-2025-23374,0,0,36c3b1c296397ec3c6fcd57ba11be579fc8474e390570baba348f95e84355229,2025-01-30T05:15:10.787000
|
||||
CVE-2025-23385,0,0,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000
|
||||
@ -279284,20 +279297,20 @@ CVE-2025-24149,0,0,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeec
|
||||
CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000
|
||||
CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
|
||||
CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000
|
||||
CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000
|
||||
CVE-2025-24153,0,1,6fdd0aa3380e03c1389e7e0c8530b480f9fc0d41d434b351af8e0b611cf2489d,2025-01-30T16:55:07.740000
|
||||
CVE-2025-24154,0,0,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000
|
||||
CVE-2025-24156,0,0,fa2a466c11edf05a7c6f3e83d316724d46ff61cd4c8bf9cbb9507c6b0faaced6,2025-01-28T21:15:18.340000
|
||||
CVE-2025-24156,0,1,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
|
||||
CVE-2025-24158,0,0,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000
|
||||
CVE-2025-24159,0,0,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000
|
||||
CVE-2025-24160,0,0,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000
|
||||
CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000
|
||||
CVE-2025-24161,0,1,0dc82d4ed236c2395f820344cded25249cabb2da3e61d73e4c0edae2679b581a,2025-01-30T16:34:58.187000
|
||||
CVE-2025-24162,0,0,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000
|
||||
CVE-2025-24163,0,0,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000
|
||||
CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000
|
||||
CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000
|
||||
CVE-2025-24169,0,1,6d755845d64c6951c077fbd505366a52b470f5f801a7504189b5dfcb4650feb0,2025-01-30T16:24:54.597000
|
||||
CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000
|
||||
CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
|
||||
CVE-2025-24177,0,0,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000
|
||||
CVE-2025-24177,0,1,7093231474cd37fc1206cb86983fb697c3827c42e0c7d917cda4d55518409c14,2025-01-30T16:26:45.687000
|
||||
CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
|
||||
CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
|
||||
CVE-2025-24354,0,0,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000
|
||||
@ -279315,6 +279328,7 @@ CVE-2025-24367,0,0,2dde85784ec9629d596d7bcf8877ef61ab7a77a4d03b902c93b772a1e0c8b
|
||||
CVE-2025-24368,0,0,761affe4f81311650725b2d0afa011960bd8f2b1d46ad3a802c200945d7bb31c,2025-01-27T19:15:29.540000
|
||||
CVE-2025-24369,0,0,9730b81a70e801fabbb471b0ad4e9b27e118e3371046e937665a429126c9ea18,2025-01-27T23:15:11.310000
|
||||
CVE-2025-24374,0,0,f578e447307218a84c1c03c82fb88e32f22e0777305e270f4df7c9481dc24824,2025-01-29T16:15:44.090000
|
||||
CVE-2025-24376,1,1,fdfcaaceb7f300707afe1e393da8fab2e94652198889e87ddac2bbec7e0b5dbd,2025-01-30T16:15:31.630000
|
||||
CVE-2025-24389,0,0,703cd148aa55fffbc38e036ef55c06da66449ab5152579e3986444865088b5ce,2025-01-27T06:15:24.170000
|
||||
CVE-2025-24390,0,0,31dccc33f27efa697a88d53c2bd0e3339846722442ec6537bda6f0c65832dee4,2025-01-27T06:15:24.313000
|
||||
CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000
|
||||
@ -279476,6 +279490,7 @@ CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534a
|
||||
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
|
||||
CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000
|
||||
CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
|
||||
CVE-2025-24784,1,1,25bed7670662071e6ec26a875dcb49a75daf84ce22dc70c7d3e927d82decaaaa,2025-01-30T16:15:31.780000
|
||||
CVE-2025-24788,0,0,9dfdfa5e99f57b63746ea63896160006e5500c55a971a5995049b070a1ee2779,2025-01-29T21:15:21.140000
|
||||
CVE-2025-24789,0,0,07ef1e1d39436ec939bd0e158cad0bd40252fff55c1f48589ea340fb94248f10,2025-01-29T18:15:47.030000
|
||||
CVE-2025-24790,0,0,e41ba34b6b8f6cb8c6d3b3540fe2ede95268f20b3e1f5fd5c812ee77d4df7d59,2025-01-29T18:15:47.207000
|
||||
@ -279490,4 +279505,5 @@ CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b
|
||||
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000
|
||||
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000
|
||||
CVE-2025-24882,0,0,a23ce05efaa4af8c3630627536762c229213516f16a0fddf8927088c78e2a99f,2025-01-29T18:15:47.570000
|
||||
CVE-2025-24883,1,1,e4977be39a4935cccc31d44b4babca335570d7230803a869c62284a8184b38eb,2025-01-30T16:15:31.947000
|
||||
CVE-2025-24884,0,0,a1ca36a099d9726efc182c133a664383454ee2f707a06a51fc353abfffeb9263,2025-01-29T21:15:21.667000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user