Auto-Update: 2025-01-30T17:00:31.911187+00:00

This commit is contained in:
cad-safe-bot 2025-01-30 17:04:00 +00:00
parent ad49decda8
commit ce19d2a50d
95 changed files with 6592 additions and 552 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-30759",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T21:15:09.147",
"lastModified": "2024-11-21T07:03:19.520",
"lastModified": "2025-01-30T16:15:26.713",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-4568",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2023-05-01T15:15:09.160",
"lastModified": "2024-11-21T07:35:30.647",
"lastModified": "2025-01-30T16:15:28.620",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -35,6 +35,26 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -75,6 +95,16 @@
"value": "CWE-276"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47874",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.423",
"lastModified": "2024-11-21T07:32:26.633",
"lastModified": "2025-01-30T16:15:27.560",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47875",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.483",
"lastModified": "2024-11-21T07:32:26.780",
"lastModified": "2025-01-30T15:15:10.413",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47876",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.537",
"lastModified": "2024-11-21T07:32:26.917",
"lastModified": "2025-01-30T16:15:27.707",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47877",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.590",
"lastModified": "2024-11-21T07:32:27.047",
"lastModified": "2025-01-30T16:15:27.900",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-47878",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:10.647",
"lastModified": "2024-11-21T07:32:27.203",
"lastModified": "2025-01-30T16:15:28.067",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-434"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48186",
"sourceIdentifier": "psirt@lenovo.com",
"published": "2023-05-01T15:15:09.083",
"lastModified": "2024-11-21T07:32:56.463",
"lastModified": "2025-01-30T16:15:28.230",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "psirt@lenovo.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
@ -35,6 +35,26 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -75,6 +95,16 @@
"value": "CWE-295"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-48482",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T05:15:27.407",
"lastModified": "2024-11-21T07:33:25.177",
"lastModified": "2025-01-30T16:15:28.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-22"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0891",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.513",
"lastModified": "2024-11-21T07:38:02.600",
"lastModified": "2025-01-30T15:15:11.563",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0924",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.620",
"lastModified": "2024-11-21T07:38:06.507",
"lastModified": "2025-01-30T15:15:11.770",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1021",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.693",
"lastModified": "2024-11-21T07:38:18.083",
"lastModified": "2025-01-30T15:15:11.963",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1090",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.753",
"lastModified": "2024-11-21T07:38:26.330",
"lastModified": "2025-01-30T15:15:12.147",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1125",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.823",
"lastModified": "2024-11-21T07:38:30.353",
"lastModified": "2025-01-30T15:15:12.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1196",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T09:15:09.280",
"lastModified": "2024-11-21T07:38:39.120",
"lastModified": "2025-01-30T15:15:12.527",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1204",
"sourceIdentifier": "cve@gitlab.com",
"published": "2023-05-03T21:15:16.707",
"lastModified": "2024-11-21T07:38:39.860",
"lastModified": "2025-01-30T16:15:28.937",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
],
"configurations": [
@ -122,6 +152,13 @@
"tags": [
"Permissions Required"
]
},
{
"url": "https://gitlab.com/gitlab-org/gitlab/-/issues/394745",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Broken Link"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1525",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.893",
"lastModified": "2024-11-21T07:39:21.797",
"lastModified": "2025-01-30T15:15:12.910",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1546",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:09.957",
"lastModified": "2024-11-21T07:39:24.990",
"lastModified": "2025-01-30T15:15:13.070",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1554",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.023",
"lastModified": "2024-11-21T07:39:25.727",
"lastModified": "2025-01-30T15:15:13.240",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1614",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.097",
"lastModified": "2024-11-21T07:39:32.633",
"lastModified": "2025-01-30T15:15:13.400",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1669",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.180",
"lastModified": "2024-11-21T07:39:39.457",
"lastModified": "2025-01-30T15:15:13.580",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1730",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.267",
"lastModified": "2024-11-21T07:39:47.050",
"lastModified": "2025-01-30T15:15:13.767",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1804",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.337",
"lastModified": "2024-11-21T07:39:56.310",
"lastModified": "2025-01-30T15:15:13.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1805",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.393",
"lastModified": "2024-11-21T07:39:56.407",
"lastModified": "2025-01-30T15:15:14.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1809",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.453",
"lastModified": "2024-11-21T07:39:56.693",
"lastModified": "2025-01-30T15:15:14.273",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-276"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1861",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.517",
"lastModified": "2024-11-21T07:40:02.440",
"lastModified": "2025-01-30T15:15:14.450",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-1911",
"sourceIdentifier": "contact@wpscan.com",
"published": "2023-05-02T08:15:10.570",
"lastModified": "2024-11-21T07:40:07.673",
"lastModified": "2025-01-30T15:15:14.617",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,9 +32,41 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-639"
}
]
}
],
"configurations": [
{
"nodes": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2197",
"sourceIdentifier": "security@hashicorp.com",
"published": "2023-05-01T20:15:14.597",
"lastModified": "2024-11-21T07:58:08.163",
"lastModified": "2025-01-30T16:15:29.243",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -52,6 +52,26 @@
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 2.5,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
@ -75,6 +95,16 @@
"value": "CWE-326"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-326"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-2473",
"sourceIdentifier": "cna@vuldb.com",
"published": "2023-05-02T13:15:25.090",
"lastModified": "2024-11-21T07:58:41.100",
"lastModified": "2025-01-30T15:15:14.780",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -15,7 +15,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
@ -35,6 +35,26 @@
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"cvssData": {
"version": "3.1",
@ -90,6 +110,16 @@
"value": "CWE-407"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-407"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-30639",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-01T22:15:09.770",
"lastModified": "2024-11-21T08:00:34.800",
"lastModified": "2025-01-30T16:15:29.447",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -52,6 +52,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -65,6 +85,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31207",
"sourceIdentifier": "security@checkmk.com",
"published": "2023-05-02T09:15:10.120",
"lastModified": "2024-11-21T08:01:37.413",
"lastModified": "2025-01-30T15:15:15.003",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -52,6 +52,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -75,6 +95,16 @@
"value": "CWE-532"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31435",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-02T20:15:11.187",
"lastModified": "2024-11-21T08:01:51.440",
"lastModified": "2025-01-30T15:15:15.260",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-863"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-6743",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-29T05:16:08.120",
"lastModified": "2024-11-21T08:44:27.970",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:09:46.757",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,46 +39,106 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.89",
"matchCriteriaId": "FC749388-D9B1-457E-A481-8D178261B6F4"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_output.class.php#L1765",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/core/plugins/unlimited_elements/elementor/elementor_widget.class.php#L3948",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3010986/unlimited-elements-for-elementor#file6",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25f71a19-85b1-4bc9-b193-d9de2eba81ee?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_output.class.php#L1765",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/core/plugins/unlimited_elements/elementor/elementor_widget.class.php#L3948",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3010986/unlimited-elements-for-elementor#file6",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3015166/unlimited-elements-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/25f71a19-85b1-4bc9-b193-d9de2eba81ee?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0367",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T05:15:34.243",
"lastModified": "2024-11-21T08:46:24.907",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:01:22.873",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndIncluding": "1.5.96",
"matchCriteriaId": "07BE98C6-9D6E-4ACB-86F3-6DCD19AFF6A7"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045122%40unlimited-elements-for-elementor&new=3045122%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47853750-0bf1-4df3-9c56-c6852543cfad?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3045122%40unlimited-elements-for-elementor&new=3045122%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/47853750-0bf1-4df3-9c56-c6852543cfad?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0608",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:41.123",
"lastModified": "2024-11-21T08:46:59.527",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:52:57.747",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndIncluding": "1.12.9",
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/includes/Admin/Ajax.php#L471",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79da7239-0343-465e-8dda-44ff440939c4?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/includes/Admin/Ajax.php#L471",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/79da7239-0343-465e-8dda-44ff440939c4?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0609",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:41.713",
"lastModified": "2024-11-21T08:46:59.647",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:53:29.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndIncluding": "1.12.9",
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/vendor/google/apiclient/examples/index.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97964ebd-be0b-4187-b393-17edf4ba5caf?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/vendor/google/apiclient/examples/index.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97964ebd-be0b-4187-b393-17edf4ba5caf?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0913",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:42.120",
"lastModified": "2024-11-21T08:47:42.730",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:54:01.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndIncluding": "1.12.9",
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/transactions.php#L42",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/592440ab-60ac-419f-b615-e5617460aea9?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/transactions.php#L42",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/592440ab-60ac-419f-b615-e5617460aea9?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0952",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:15.823",
"lastModified": "2024-11-21T08:47:51.643",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:54:44.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.13.0",
"matchCriteriaId": "6089C3EB-1BF8-4799-BCBC-E2310A7CD93E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3060269/erp/tags/1.13.0/modules/accounting/includes/functions/people.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ba06f9-de51-49ea-87c1-4583e939314b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3060269/erp/tags/1.13.0/modules/accounting/includes/functions/people.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f3ba06f9-de51-49ea-87c1-4583e939314b?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0956",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-29T07:15:42.480",
"lastModified": "2024-11-21T08:47:52.523",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:54:22.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndIncluding": "1.12.9",
"matchCriteriaId": "878C0454-F505-4871-8780-37D33CE027DE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/products.php#L387",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e04650-624a-4440-b166-8de0f24bb1dd?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/products.php#L387",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4e04650-624a-4440-b166-8de0f24bb1dd?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1173",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-02T17:15:10.393",
"lastModified": "2024-11-21T08:49:57.650",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:55:07.793",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wedevs:wp_erp:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "1.13.2",
"matchCriteriaId": "57CED3B2-AC13-4814-99D3-430F4874EEBE"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/people.php#L262",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3071807/erp/trunk/modules/accounting/includes/functions/people.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94772de9-6ab8-45ff-8b56-19b50a81b66f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/erp/trunk/modules/accounting/includes/functions/people.php#L262",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3071807/erp/trunk/modules/accounting/includes/functions/people.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/94772de9-6ab8-45ff-8b56-19b50a81b66f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12163",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-30T06:15:29.113",
"lastModified": "2025-01-30T06:15:29.113",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:15:29.770",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,38 @@
"value": "The goodlayers-core WordPress plugin before 2.1.3 allows users with a subscriber role and above to upload SVGs containing malicious payloads."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/ea704054-fb66-4014-89bd-1c61074f64e5/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/ea704054-fb66-4014-89bd-1c61074f64e5/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12400",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-30T06:15:29.223",
"lastModified": "2025-01-30T06:15:29.223",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:15:29.907",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,38 @@
"value": "The tourmaster WordPress plugin before 5.3.5 does not escape generated URLs before outputting them in attributes, leading to Reflected Cross-Site Scripting."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/3542315c-93c3-41dd-a99e-02a38cfd58fb/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/3542315c-93c3-41dd-a99e-02a38cfd58fb/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12638",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-30T06:15:29.333",
"lastModified": "2025-01-30T06:15:29.333",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:15:30.030",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,38 @@
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/a6f5b0fe-00a0-4e30-aec6-87882c035beb/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/a6f5b0fe-00a0-4e30-aec6-87882c035beb/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12708",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-30T06:15:29.440",
"lastModified": "2025-01-30T06:15:29.440",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:15:30.207",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,38 @@
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not validate and escape some of its shortcode attributes before outputting them back in a page/post where the shortcode is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/8f30a37e-b9d0-467b-a0e3-20dc0a9f2b61/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/8f30a37e-b9d0-467b-a0e3-20dc0a9f2b61/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12709",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-30T06:15:29.557",
"lastModified": "2025-01-30T06:15:29.557",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:15:30.337",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -11,11 +11,38 @@
"value": "The Bulk Me Now! WordPress plugin through 2.0 does not have CSRF checks in some places, which could allow attackers to make logged in users perform unwanted actions via CSRF attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/d93056f1-1a6e-405f-a094-d4d270393f87/",
"source": "contact@wpscan.com"
},
{
"url": "https://wpscan.com/vulnerability/d93056f1-1a6e-405f-a094-d4d270393f87/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,63 +2,15 @@
"id": "CVE-2024-13348",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-14T04:15:09.200",
"lastModified": "2025-01-14T04:15:09.200",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:15:16.223",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Smart Agenda \u2013 Prise de rendez-vous en ligne plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.7. This is due to missing or incorrect nonce validation on the smartagenda_options_page_html() function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": " El complemento Smart Agenda \u2013 Prise de rendez-vous en ligne para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 4.7 incluida. Esto se debe a una validaci\u00f3n de nonce incorrecta o faltante en la funci\u00f3n smartagenda_options_page_html(). Esto permite que atacantes no autenticados actualicen configuraciones e inyecten scripts web maliciosos a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar al administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22506 Reason: This candidate is a reservation duplicate of CVE-2025-22506. Notes: All CVE users should reference CVE-2025-22506 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/smart-agenda-prise-de-rendez-vous-en-ligne/trunk/smart-agenda.php#L202",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7eeb8bf3-b12f-457b-ac16-b91442b3f47e?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20020",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.107",
"lastModified": "2024-11-21T08:51:49.063",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T15:07:55.143",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,115 @@
"value": "En OPTEE, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda conducir a la divulgaci\u00f3n de informaci\u00f3n local con privilegios de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08522504; ID del problema: ALPS08522504."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:-:*:*:*:*:*:*",
"matchCriteriaId": "08A26AC2-409E-499A-B0D5-8C2B5038947D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt2713:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7D1135F9-E38C-4308-BD32-A4D83959282E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt2715:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA252F20-1BB7-4654-972C-F257F37396A7"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8173:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4452EFCF-5733-40A0-8726-F8E33E569411"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA3D4A45-38EE-4125-AE67-89D1C707F95A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ED210E64-6CE7-42B1-849E-68C0E22521F6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B774B7D7-B7DD-43A0-833F-7E39DF82CA60"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D98FBE1C-D57B-49D9-9C4E-8A133A0C1C89"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20022",
"sourceIdentifier": "security@mediatek.com",
"published": "2024-03-04T03:15:07.150",
"lastModified": "2024-11-21T08:51:49.393",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T15:11:44.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -15,15 +15,260 @@
"value": "En lk, existe una posible escalada de privilegios debido a una verificaci\u00f3n de los l\u00edmites faltantes. Esto podr\u00eda conducir a una escalada local de privilegios con permisos de ejecuci\u00f3n de System necesarios. La interacci\u00f3n del usuario no es necesaria para la explotaci\u00f3n. ID de parche: ALPS08528255; ID del problema: ALPS08528255."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rdkcentral:rdkb:2022q3:*:*:*:*:*:*:*",
"matchCriteriaId": "295DD4FC-E943-412D-A63E-260C0F3887FC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
"matchCriteriaId": "879FFD0C-9B38-4CAA-B057-1086D794D469"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2700BCC5-634D-4EC6-AB67-5B678D5F951D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:*",
"matchCriteriaId": "4FA469E2-9E63-4C9A-8EBA-10C8C870063A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
"matchCriteriaId": "F0133207-2EED-4625-854F-8DB7770D5BF7"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9C2A1118-B5F7-4EF5-B329-0887B5F3430E"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19A63103-C708-48EC-B44D-5E465A6B79C5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
"matchCriteriaId": "89AFEE24-7AAD-4EDB-8C3E-EDBA3240730A"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
"matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68CF4A7A-3136-4C4C-A795-81323896BE11"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3E2B84-DAFE-4E11-B23B-026F719475F5"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:*",
"matchCriteriaId": "171D1C08-F055-44C0-913C-AA2B73AF5B72"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BA9131F6-F167-4FD7-8FBF-B372CBBCF46F"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA72CCD1-DEA2-48EB-8781-04CFDD41AAEE"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7DE6B2-66D9-4A3E-B15F-D56505559255"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1A76806D-A4E3-466A-90CB-E9FFE478E7A0"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:*",
"matchCriteriaId": "793B7F88-79E7-4031-8AD0-35C9BFD073C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*",
"matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6C9AB4D2-0EDD-4D5E-9393-F535CA2F24C4"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:*",
"matchCriteriaId": "152F6606-FA23-4530-AA07-419866B74CB3"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AACF35D-27E0-49AF-A667-13585C8B8071"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*",
"matchCriteriaId": "533284E5-C3AF-48D3-A287-993099DB2E41"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CD2C3EC-B62D-4616-964F-FDBE5B14A449"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE933AD9-3A6F-421B-8AB3-C45F8DEA9548"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2B469BF4-5961-42E9-814B-1BE06D182E45"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:*",
"matchCriteriaId": "637CAAD2-DCC0-4F81-B781-5D0536844CA8"
}
]
}
]
}
],
"references": [
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
"source": "security@mediatek.com"
"source": "security@mediatek.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://corp.mediatek.com/product-security-bulletin/March-2024",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2140",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T07:15:08.893",
"lastModified": "2024-11-21T09:09:06.883",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:20:30.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c6c35f-1095-4897-b4a6-e7b295c187de?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2141",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T07:15:09.203",
"lastModified": "2024-11-21T09:09:07.003",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:20:56.253",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/uabb-button/includes/frontend.php#L25",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/uabb-button/includes/frontend.php#L25",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/61c3a517-70c8-4fc2-b8d6-1dcb2ad811d8?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2142",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T07:15:09.513",
"lastModified": "2024-11-21T09:09:07.130",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:21:11.450",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/info-table/includes/frontend.php#L29",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8b6c6e10-3feb-4ecd-a17a-81e15c471d3d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2143",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T07:15:09.997",
"lastModified": "2024-11-21T09:09:07.330",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:21:36.637",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2b290f4c-293d-41d5-b43e-b9c5c350552b?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2144",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-30T07:15:10.497",
"lastModified": "2024-11-21T09:09:07.537",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:21:55.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:ultimate_addons_for_beaver_builder:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "1.5.8",
"matchCriteriaId": "BECAFA41-D603-410D-86C2-E8B0404C76D9"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/image-separator/includes/frontend.php#L14",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-beaver-builder-lite/trunk/modules/image-separator/includes/frontend.php#L14",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3056561%40ultimate-addons-for-beaver-builder-lite&new=3056561%40ultimate-addons-for-beaver-builder-lite&sfp_email=&sfph_mail=#file2",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/552c0810-9687-4a66-91a4-e34228552a15?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25698",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:11.297",
"lastModified": "2024-11-21T09:01:14.170",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:18:43.000",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,14 +71,55 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.1",
"matchCriteriaId": "078945E5-0E7F-4FC3-BA84-F2D9E215AE8F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25699",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:11.593",
"lastModified": "2024-11-21T09:01:14.283",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:23:46.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9
}
]
},
@ -51,14 +71,72 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.8.1",
"versionEndIncluding": "11.2",
"matchCriteriaId": "C0BE3C00-FF14-477A-BB06-77A561C7ADD5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
},
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:arcgis_enterprise:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.1",
"matchCriteriaId": "5A30EAE2-1517-4DA0-AE43-BA76919E6D21"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25705",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-04-04T18:15:12.603",
"lastModified": "2024-10-10T12:57:21.987",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:21:48.907",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,49 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:*:*:*:*:*:*:*:*",
"versionEndIncluding": "11.1",
"matchCriteriaId": "078945E5-0E7F-4FC3-BA84-F2D9E215AE8F"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-2/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Broken Link",
"Not Applicable"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2645",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-19T23:15:09.560",
"lastModified": "2024-11-21T09:10:12.230",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:39:23.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
],
"cvssMetricV2": [
@ -74,32 +94,81 @@
"value": "CWE-643"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-91"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257283",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257283",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-laddfirewall.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257283",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2646",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-03-19T23:15:09.883",
"lastModified": "2024-11-21T09:10:12.370",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:34:41.863",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,30 +96,69 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257284",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257284",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-index.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.257284",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.257284",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2662",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:20:17.423",
"lastModified": "2024-11-21T09:10:14.287",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:12:13.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.103",
"matchCriteriaId": "4A1EB90D-6577-4084-BF15-E2B7589EB7E8"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_template_engine.class.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_template_engine.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/58492dbb-b9e0-4477-b85d-ace06dba954c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3055",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:39:50.973",
"lastModified": "2024-11-21T09:28:48.053",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:11:40.940",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.105",
"matchCriteriaId": "6AF2C93E-F027-440B-B0B6-7410ED97C363"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/tags/1.5.93/inc_php/framework/db.class.php#L238",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3081509%40unlimited-elements-for-elementor%2Ftrunk&old=3076456%40unlimited-elements-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebc0c8e6-a365-4ef7-9c1a-41454855096c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/tags/1.5.93/inc_php/framework/db.class.php#L238",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3081509%40unlimited-elements-for-elementor%2Ftrunk&old=3076456%40unlimited-elements-for-elementor%2Ftrunk&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ebc0c8e6-a365-4ef7-9c1a-41454855096c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3190",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-30T04:15:10.417",
"lastModified": "2024-11-21T09:29:06.810",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:09:08.383",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.108",
"matchCriteriaId": "4C4FC725-4FB8-427C-8B35-2D5C32FB3324"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3090199%40unlimited-elements-for-elementor&new=3090199%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78d8ddc9-69ad-4d69-ac23-5a31dfeafd54?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3090199%40unlimited-elements-for-elementor&new=3090199%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/78d8ddc9-69ad-4d69-ac23-5a31dfeafd54?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3547",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-14T15:41:48.370",
"lastModified": "2024-11-21T09:29:51.093",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:10:54.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.103",
"matchCriteriaId": "4A1EB90D-6577-4084-BF15-E2B7589EB7E8"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f629fc93-84ce-4c33-b1c0-3a3194aac477?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3071404/unlimited-elements-for-elementor/trunk/inc_php/unitecreator_settings_output.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f629fc93-84ce-4c33-b1c0-3a3194aac477?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4385",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-16T11:15:48.577",
"lastModified": "2024-11-21T09:42:44.713",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:09:33.727",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,65 +36,157 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:envothemes:envo_extra:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.8.17",
"matchCriteriaId": "3DE63C3B-E175-4018-9F32-8FF68F3A35C3"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3080715/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/button/button.php#L679",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/counter/counter.php#L754",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/icon-box/icon-box.php#L909",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/team/team.php#L1189",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/envo-extra/trunk/lib/elementor/widgets/testimonial/testimonial.php#L899",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3080715/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/83d78ff7-bd59-431e-b579-156e23ede053?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,28 +2,101 @@
"id": "CVE-2024-44172",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:11.930",
"lastModified": "2025-01-27T22:15:11.930",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:47:17.370",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A privacy issue was addressed with improved private data redaction for log entries. This issue is fixed in macOS Ventura 13.7.3, macOS Sonoma 14.7.3, macOS Sequoia 15. An app may be able to access contacts."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de privacidad mejorando la redacci\u00f3n de datos privados en las entradas de registro. Este problema se solucion\u00f3 en macOS Ventura 13.7.3, macOS Sonoma 14.7.3 y macOS Sequoia 15. Es posible que una aplicaci\u00f3n pueda acceder a los contactos."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/121238",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Release Notes"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4580",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-16T12:15:13.857",
"lastModified": "2024-11-21T09:43:08.940",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:55:44.283",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,41 +36,115 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "2.0.6.1",
"matchCriteriaId": "475B234F-6D81-4BEC-AAB7-61C68ABAF55F"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087193/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1546",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L1068",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087193/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e3ac84-dd82-42b0-80b9-c876731170d5?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4609",
"sourceIdentifier": "PSIRT@rockwellautomation.com",
"published": "2024-05-16T16:15:10.750",
"lastModified": "2024-11-21T09:43:12.620",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T15:50:28.557",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -59,6 +59,28 @@
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
@ -71,16 +93,50 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:rockwellautomation:factorytalk_view:*:*:*:*:se:*:*:*",
"versionEndExcluding": "11.0",
"matchCriteriaId": "0CBD02EA-5D80-4A57-8F55-886C13277815"
}
]
}
]
}
],
"references": [
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html",
"source": "PSIRT@rockwellautomation.com"
"source": "PSIRT@rockwellautomation.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.rockwellautomation.com/en-us/support/advisory.SD1670.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4634",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-16T11:15:49.153",
"lastModified": "2024-11-21T09:43:15.343",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:01:17.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:brainstormforce:elementor_header_\\&_footer_builder:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.6.29",
"matchCriteriaId": "427B7D70-D411-47EA-A4C2-F79E782A7186"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3086402/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.28/inc/widgets-manager/class-widgets-loader.php#L156",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3086402/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f44bb823-bbf3-413b-82b5-a351609270bf?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4779",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-23T10:15:09.943",
"lastModified": "2024-11-21T09:43:35.870",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-30T16:10:38.760",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,22 +39,64 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.5.108",
"matchCriteriaId": "4C4FC725-4FB8-427C-8B35-2D5C32FB3324"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3090199/unlimited-elements-for-elementor/trunk/provider/functions_wordpress.class.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b155f8ca-9d09-47d7-a7c2-7744df029c19?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3090199/unlimited-elements-for-elementor/trunk/provider/functions_wordpress.class.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b155f8ca-9d09-47d7-a7c2-7744df029c19?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-4891",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-05-18T05:15:46.917",
"lastModified": "2024-11-21T09:43:48.267",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T15:45:34.377",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*",
"versionEndExcluding": "4.5.13",
"matchCriteriaId": "4E47F5AA-8EA6-43A8-8031-9ECE94DD9A70"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/blocks/AdvancedHeading.php#L115",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087677/",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bcebb3-920b-40cc-aa5c-24a1f729b28d?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/essential-blocks/trunk/blocks/AdvancedHeading.php#L115",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3087677/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e1bcebb3-920b-40cc-aa5c-24a1f729b28d?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2024-53615",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-30T15:15:17.390",
"lastModified": "2025-01-30T15:15:17.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in the video thumbnail rendering component of Karl Ward's files.gallery v0.3.0 through 0.11.0 allows remote attackers to execute arbitrary code via a crafted video file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/beune/CVE-2024-53615",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-55415",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-30T15:15:17.490",
"lastModified": "2025-01-30T15:15:17.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DevDojo Voyager through 1.8.0 is vulnerable to path traversal at the /admin/compass."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L213",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L44",
"source": "cve@mitre.org"
},
{
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2024-55416",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-30T15:15:17.583",
"lastModified": "2025-01-30T15:15:17.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DevDojo Voyager through version 1.8.0 is vulnerable to reflected XSS via /admin/compass. By manipulating an authenticated user to click on a link, arbitrary Javascript can be executed."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thedevdojo/voyager/blob/1.6/resources/views/master.blade.php#L132",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerCompassController.php#L44",
"source": "cve@mitre.org"
},
{
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2024-55417",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-30T15:15:17.667",
"lastModified": "2025-01-30T15:15:17.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "DevDojo Voyager through version 1.8.0 is vulnerable to bypassing the file type verification when an authenticated user uploads a file via /admin/media/upload. An authenticated user can upload a web shell causing arbitrary code execution on the server."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/thedevdojo/voyager/blob/1.6/src/Http/Controllers/VoyagerMediaController.php#L238",
"source": "cve@mitre.org"
},
{
"url": "https://www.sonarsource.com/blog/the-tainted-voyage-uncovering-voyagers-vulnerabilities/",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8148",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-10-04T18:15:08.633",
"lastModified": "2024-10-07T17:48:28.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:20:34.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FDE382B5-E228-4803-A3FC-B803C7838777"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0DAF61C-E776-4E31-8E39-92636B459A3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E37361-8569-4023-BC3E-F36E7607CC7D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-8149",
"sourceIdentifier": "psirt@esri.com",
"published": "2024-10-04T18:15:08.833",
"lastModified": "2024-10-07T17:48:28.117",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:20:02.563",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
@ -51,10 +71,35 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A0DAF61C-E776-4E31-8E39-92636B459A3E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F2E37361-8569-4023-BC3E-F36E7607CC7D"
}
]
}
]
}
],
"references": [
{
"url": "https://www.esri.com/arcgis-blog/products/trust-arcgis/administration/portal-for-arcgis-security-2024-update-2-released/",
"source": "psirt@esri.com"
"source": "psirt@esri.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-0871",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T15:15:18.253",
"lastModified": "2025-01-30T15:15:18.253",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in Maybecms 1.2. This affects an unknown part of the file /mb/admin/index.php?u=article-edit of the component Add Article. The manipulation of the argument data_info[content] leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/Upgradeextension/Maybecms/blob/main/README.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.294057",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.294057",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.487930",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0872",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-30T16:15:30.737",
"lastModified": "2025-01-30T16:15:30.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/magic2353112890/cve/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://itsourcecode.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.294066",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.294066",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.487953",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22218",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-30T15:15:18.487",
"lastModified": "2025-01-30T15:15:18.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations for Logs contains an information disclosure vulnerability.\u00a0A malicious actor with View Only Admin permissions may be able to read the credentials\u00a0of a VMware product integrated with VMware Aria Operations for Logs"
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22219",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-30T16:15:31.013",
"lastModified": "2025-01-30T16:15:31.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22220",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-30T16:15:31.143",
"lastModified": "2025-01-30T16:15:31.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations for Logs contains a privilege escalation\u00a0vulnerability.\u00a0A malicious actor with non-administrative privileges and network access to Aria Operations for Logs API may be able to perform certain operations in the context of an admin user."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22221",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-30T16:15:31.257",
"lastModified": "2025-01-30T16:15:31.257",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operation for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 4.2
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-22222",
"sourceIdentifier": "security@vmware.com",
"published": "2025-01-30T16:15:31.367",
"lastModified": "2025-01-30T16:15:31.367",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations contains an information disclosure vulnerability.\u00a0A malicious user with non-administrative privileges\u00a0may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 4.0
}
]
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"source": "security@vmware.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-23216",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-30T16:15:31.473",
"lastModified": "2025-01-30T16:15:31.473",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Argo CD is a declarative, GitOps continuous delivery tool for Kubernetes. A vulnerability was discovered in Argo CD that exposed secret values in error messages and the diff view when an invalid Kubernetes Secret resource was synced from a repository. The vulnerability assumes the user has write access to the repository and can exploit it, either intentionally or unintentionally, by committing an invalid Secret to repository and triggering a Sync. Once exploited, any user with read access to Argo CD can view the exposed secret data. The vulnerability is fixed in v2.13.4, v2.12.10, and v2.11.13."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-200"
},
{
"lang": "en",
"value": "CWE-209"
}
]
}
],
"references": [
{
"url": "https://github.com/argoproj/argo-cd/commit/6f5537bdf15ddbaa0f27a1a678632ff0743e4107",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/argo-cd/security/advisories/GHSA-47g2-qmh2-749v",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/argoproj/gitops-engine/commit/7e21b91e9d0f64104c8a661f3f390c5e6d73ddca",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23367",
"sourceIdentifier": "secalert@redhat.com",
"published": "2025-01-30T15:15:18.610",
"lastModified": "2025-01-30T15:15:18.610",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "secalert@redhat.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://access.redhat.com/security/cve/CVE-2025-23367",
"source": "secalert@redhat.com"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620",
"source": "secalert@redhat.com"
}
]
}

View File

@ -2,20 +2,80 @@
"id": "CVE-2025-24153",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.537",
"lastModified": "2025-01-27T22:15:19.537",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:55:07.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A buffer overflow issue was addressed with improved memory handling. This issue is fixed in macOS Sequoia 15.3. An app with root privileges may be able to execute arbitrary code with kernel privileges."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de desbordamiento de b\u00fafer mejorando la gesti\u00f3n de la memoria. Este problema se solucion\u00f3 en macOS Sequoia 15.3. Una aplicaci\u00f3n con privilegios de superusuario puede ejecutar c\u00f3digo arbitrario con privilegios de kernel."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-24156",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:19.710",
"lastModified": "2025-01-28T21:15:18.340",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-30T16:43:39.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,18 +81,59 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "13.7.3",
"matchCriteriaId": "A12642CB-69CC-4C6E-A2C2-CA8AE736EE88"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "14.0",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "9C523C7E-B1CF-454B-8AFD-B462C5120D9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122070",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,44 +2,159 @@
"id": "CVE-2025-24161",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.083",
"lastModified": "2025-01-27T22:15:20.083",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:34:58.187",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The issue was addressed with improved checks. This issue is fixed in iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 and iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3, tvOS 18.3. Parsing a file may lead to an unexpected app termination."
},
{
"lang": "es",
"value": "El problema se solucion\u00f3 con comprobaciones mejoradas. Este problema se solucion\u00f3 en iPadOS 17.7.4, macOS Sonoma 14.7.3, visionOS 2.3, iOS 18.3 y iPadOS 18.3, macOS Sequoia 15.3, watchOS 11.3 y tvOS 18.3. El an\u00e1lisis de un archivo puede provocar el cierre inesperado de la aplicaci\u00f3n."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "17.7.4",
"matchCriteriaId": "27995710-C1F5-4919-8168-E2B59D7F698C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "14.7.3",
"matchCriteriaId": "6049E692-EB64-4E7D-A1AC-CEBA288B7A55"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.3",
"matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "11.3",
"matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122067",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122069",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122071",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122072",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122073",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,24 +2,93 @@
"id": "CVE-2025-24169",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.460",
"lastModified": "2025-01-27T22:15:20.460",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:24:54.597",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A logging issue was addressed with improved data redaction. This issue is fixed in macOS Sequoia 15.3, Safari 18.3. A malicious app may be able to bypass browser extension authentication."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de registro con una redacci\u00f3n de datos mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3 y Safari 18.3. Una aplicaci\u00f3n maliciosa podr\u00eda eludir la autenticaci\u00f3n de la extensi\u00f3n del navegador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "0384B3A1-9447-4020-A798-38CB2348F67B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionEndExcluding": "15.3",
"matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122074",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,24 +2,100 @@
"id": "CVE-2025-24177",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-27T22:15:20.750",
"lastModified": "2025-01-27T22:15:20.750",
"vulnStatus": "Received",
"lastModified": "2025-01-30T16:26:45.687",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A null pointer dereference was addressed with improved input validation. This issue is fixed in macOS Sequoia 15.3, iOS 18.3 and iPadOS 18.3. A remote attacker may be able to cause a denial-of-service."
},
{
"lang": "es",
"value": "Se solucion\u00f3 un problema de desreferencia de puntero nulo con una validaci\u00f3n de entrada mejorada. Este problema se solucion\u00f3 en macOS Sequoia 15.3, iOS 18.3 y iPadOS 18.3. Un atacante remoto podr\u00eda provocar una denegaci\u00f3n de servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*",
"versionEndExcluding": "18.3",
"matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "15.0",
"versionEndExcluding": "15.3",
"matchCriteriaId": "33FE4A81-3E35-4934-ABBB-4531E8E249AF"
}
]
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122066",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://support.apple.com/en-us/122068",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2025-24376",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-30T16:15:31.630",
"lastModified": "2025-01-30T16:15:31.630",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. By design, AdmissionPolicy and AdmissionPolicyGroup can evaluate only namespaced resources. The resources to be evaluated are determined by the rules provided by the user when defining the policy. There might be Kubernetes namespaced resources that should not be validated by AdmissionPolicy and by the AdmissionPolicyGroup policies because of their sensitive nature. For example, PolicyReport are namespaced resources that contain the list of non compliant objects found inside of a namespace. An attacker can use either an AdmissionPolicy or an AdmissionPolicyGroup to prevent the creation and update of PolicyReport objects to hide non-compliant resources. Moreover, the same attacker might use a mutating AdmissionPolicy to alter the contents of the PolicyReport created inside of the namespace. Starting from the 1.21.0 release, the validation rules applied to AdmissionPolicy and AdmissionPolicyGroup have been tightened to prevent them from validating sensitive types of namespaced resources."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-155"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/kubewarden/kubewarden-controller/commit/8124039b5f0c955d0ee8c8ca12d4415282f02d2c",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-fc89-jghx-8pvg",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-24784",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-30T16:15:31.780",
"lastModified": "2025-01-30T16:15:31.780",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "kubewarden-controller is a Kubernetes controller that allows you to dynamically register Kubewarden admission policies. The policy group feature, added to by the 1.17.0 release. By being namespaced, the AdmissionPolicyGroup has a well constrained impact on cluster resources. Hence, it\u2019s considered safe to allow non-admin users to create and manage these resources in the namespaces they own. Kubewarden policies can be allowed to query the Kubernetes API at evaluation time; these types of policies are called \u201ccontext aware\u201c. Context aware policies can perform list and get operations against a Kubernetes cluster. The queries are done using the ServiceAccount of the Policy Server instance that hosts the policy. That means that access to the cluster is determined by the RBAC rules that apply to that ServiceAccount. The AdmissionPolicyGroup CRD allowed the deployment of context aware policies. This could allow an attacker to obtain information about resources that are out of their reach, by leveraging a higher access to the cluster granted to the ServiceAccount token used to run the policy. The impact of this vulnerability depends on the privileges that have been granted to the ServiceAccount used to run the Policy Server and assumes that users are using the recommended best practices of keeping the Policy Server's ServiceAccount least privileged. By default, the Kubewarden helm chart grants access to the following resources (cluster wide) only: Namespace, Pod, Deployment and Ingress. This vulnerability is fixed in 1.21.0."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://github.com/kubewarden/kubewarden-controller/commit/51a88dfbb4c090ce0f76a22d98106518e0824d0b",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/kubewarden/kubewarden-controller/security/advisories/GHSA-756x-m4mj-q96c",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,82 @@
{
"id": "CVE-2025-24883",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-01-30T16:15:31.947",
"lastModified": "2025-01-30T16:15:31.947",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "go-ethereum (geth) is a golang execution layer implementation of the Ethereum protocol. A vulnerable node can be forced to shutdown/crash using a specially crafted message. This vulnerability is fixed in 1.14.13."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-248"
}
]
}
],
"references": [
{
"url": "https://github.com/ethereum/go-ethereum/commit/fa9a2ff8687ec9efe57b4b9833d5590d20f8a83f",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/ethereum/go-ethereum/security/advisories/GHSA-q26p-9cq4-7fc2",
"source": "security-advisories@github.com"
}
]
}

101
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-30T15:00:24.372810+00:00
2025-01-30T17:00:31.911187+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-30T14:58:45.433000+00:00
2025-01-30T16:55:07.740000+00:00
```
### Last Data Feed Release
@ -33,69 +33,60 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
279492
279508
```
### CVEs added in the last Commit
Recently added CVEs: `38`
Recently added CVEs: `16`
- [CVE-2024-12822](CVE-2024/CVE-2024-128xx/CVE-2024-12822.json) (`2025-01-30T14:15:33.017`)
- [CVE-2024-12861](CVE-2024/CVE-2024-128xx/CVE-2024-12861.json) (`2025-01-30T14:15:33.170`)
- [CVE-2024-13349](CVE-2024/CVE-2024-133xx/CVE-2024-13349.json) (`2025-01-30T14:15:33.333`)
- [CVE-2024-13380](CVE-2024/CVE-2024-133xx/CVE-2024-13380.json) (`2025-01-30T13:15:09.107`)
- [CVE-2024-13400](CVE-2024/CVE-2024-134xx/CVE-2024-13400.json) (`2025-01-30T14:15:33.710`)
- [CVE-2024-13460](CVE-2024/CVE-2024-134xx/CVE-2024-13460.json) (`2025-01-30T14:15:34.057`)
- [CVE-2024-13466](CVE-2024/CVE-2024-134xx/CVE-2024-13466.json) (`2025-01-30T13:15:09.253`)
- [CVE-2024-13512](CVE-2024/CVE-2024-135xx/CVE-2024-13512.json) (`2025-01-30T14:15:34.413`)
- [CVE-2024-13549](CVE-2024/CVE-2024-135xx/CVE-2024-13549.json) (`2025-01-30T14:15:34.570`)
- [CVE-2024-13596](CVE-2024/CVE-2024-135xx/CVE-2024-13596.json) (`2025-01-30T14:15:34.720`)
- [CVE-2024-13646](CVE-2024/CVE-2024-136xx/CVE-2024-13646.json) (`2025-01-30T14:15:34.873`)
- [CVE-2024-13652](CVE-2024/CVE-2024-136xx/CVE-2024-13652.json) (`2025-01-30T14:15:35.040`)
- [CVE-2024-13661](CVE-2024/CVE-2024-136xx/CVE-2024-13661.json) (`2025-01-30T14:15:35.233`)
- [CVE-2024-13664](CVE-2024/CVE-2024-136xx/CVE-2024-13664.json) (`2025-01-30T14:15:35.390`)
- [CVE-2024-13670](CVE-2024/CVE-2024-136xx/CVE-2024-13670.json) (`2025-01-30T14:15:35.550`)
- [CVE-2024-13671](CVE-2024/CVE-2024-136xx/CVE-2024-13671.json) (`2025-01-30T14:15:35.697`)
- [CVE-2024-13700](CVE-2024/CVE-2024-137xx/CVE-2024-13700.json) (`2025-01-30T14:15:35.853`)
- [CVE-2024-13705](CVE-2024/CVE-2024-137xx/CVE-2024-13705.json) (`2025-01-30T14:15:36.003`)
- [CVE-2024-13707](CVE-2024/CVE-2024-137xx/CVE-2024-13707.json) (`2025-01-30T14:15:36.363`)
- [CVE-2024-13715](CVE-2024/CVE-2024-137xx/CVE-2024-13715.json) (`2025-01-30T14:15:36.513`)
- [CVE-2024-13720](CVE-2024/CVE-2024-137xx/CVE-2024-13720.json) (`2025-01-30T14:15:36.660`)
- [CVE-2024-13742](CVE-2024/CVE-2024-137xx/CVE-2024-13742.json) (`2025-01-30T14:15:36.810`)
- [CVE-2024-8494](CVE-2024/CVE-2024-84xx/CVE-2024-8494.json) (`2025-01-30T14:15:36.973`)
- [CVE-2025-0869](CVE-2025/CVE-2025-08xx/CVE-2025-0869.json) (`2025-01-30T13:15:10.273`)
- [CVE-2025-0870](CVE-2025/CVE-2025-08xx/CVE-2025-0870.json) (`2025-01-30T13:15:10.483`)
- [CVE-2024-53615](CVE-2024/CVE-2024-536xx/CVE-2024-53615.json) (`2025-01-30T15:15:17.390`)
- [CVE-2024-55415](CVE-2024/CVE-2024-554xx/CVE-2024-55415.json) (`2025-01-30T15:15:17.490`)
- [CVE-2024-55416](CVE-2024/CVE-2024-554xx/CVE-2024-55416.json) (`2025-01-30T15:15:17.583`)
- [CVE-2024-55417](CVE-2024/CVE-2024-554xx/CVE-2024-55417.json) (`2025-01-30T15:15:17.667`)
- [CVE-2025-0871](CVE-2025/CVE-2025-08xx/CVE-2025-0871.json) (`2025-01-30T15:15:18.253`)
- [CVE-2025-0872](CVE-2025/CVE-2025-08xx/CVE-2025-0872.json) (`2025-01-30T16:15:30.737`)
- [CVE-2025-22218](CVE-2025/CVE-2025-222xx/CVE-2025-22218.json) (`2025-01-30T15:15:18.487`)
- [CVE-2025-22219](CVE-2025/CVE-2025-222xx/CVE-2025-22219.json) (`2025-01-30T16:15:31.013`)
- [CVE-2025-22220](CVE-2025/CVE-2025-222xx/CVE-2025-22220.json) (`2025-01-30T16:15:31.143`)
- [CVE-2025-22221](CVE-2025/CVE-2025-222xx/CVE-2025-22221.json) (`2025-01-30T16:15:31.257`)
- [CVE-2025-22222](CVE-2025/CVE-2025-222xx/CVE-2025-22222.json) (`2025-01-30T16:15:31.367`)
- [CVE-2025-23216](CVE-2025/CVE-2025-232xx/CVE-2025-23216.json) (`2025-01-30T16:15:31.473`)
- [CVE-2025-23367](CVE-2025/CVE-2025-233xx/CVE-2025-23367.json) (`2025-01-30T15:15:18.610`)
- [CVE-2025-24376](CVE-2025/CVE-2025-243xx/CVE-2025-24376.json) (`2025-01-30T16:15:31.630`)
- [CVE-2025-24784](CVE-2025/CVE-2025-247xx/CVE-2025-24784.json) (`2025-01-30T16:15:31.780`)
- [CVE-2025-24883](CVE-2025/CVE-2025-248xx/CVE-2025-24883.json) (`2025-01-30T16:15:31.947`)
### CVEs modified in the last Commit
Recently modified CVEs: `27`
Recently modified CVEs: `77`
- [CVE-2024-12409](CVE-2024/CVE-2024-124xx/CVE-2024-12409.json) (`2025-01-30T14:15:32.353`)
- [CVE-2024-13453](CVE-2024/CVE-2024-134xx/CVE-2024-13453.json) (`2025-01-30T14:15:33.873`)
- [CVE-2024-13706](CVE-2024/CVE-2024-137xx/CVE-2024-13706.json) (`2025-01-30T14:15:36.180`)
- [CVE-2024-1625](CVE-2024/CVE-2024-16xx/CVE-2024-1625.json) (`2025-01-30T13:15:09.420`)
- [CVE-2024-2648](CVE-2024/CVE-2024-26xx/CVE-2024-2648.json) (`2025-01-30T14:45:12.507`)
- [CVE-2024-2649](CVE-2024/CVE-2024-26xx/CVE-2024-2649.json) (`2025-01-30T14:35:30.467`)
- [CVE-2024-34031](CVE-2024/CVE-2024-340xx/CVE-2024-34031.json) (`2025-01-30T14:30:40.657`)
- [CVE-2024-34032](CVE-2024/CVE-2024-340xx/CVE-2024-34032.json) (`2025-01-30T14:31:00.057`)
- [CVE-2024-34033](CVE-2024/CVE-2024-340xx/CVE-2024-34033.json) (`2025-01-30T14:32:24.690`)
- [CVE-2024-3501](CVE-2024/CVE-2024-35xx/CVE-2024-3501.json) (`2025-01-30T13:15:09.623`)
- [CVE-2024-3502](CVE-2024/CVE-2024-35xx/CVE-2024-3502.json) (`2025-01-30T13:15:09.853`)
- [CVE-2024-3621](CVE-2024/CVE-2024-36xx/CVE-2024-3621.json) (`2025-01-30T14:40:31.307`)
- [CVE-2024-39354](CVE-2024/CVE-2024-393xx/CVE-2024-39354.json) (`2025-01-30T14:35:18.047`)
- [CVE-2024-39605](CVE-2024/CVE-2024-396xx/CVE-2024-39605.json) (`2025-01-30T14:34:40.630`)
- [CVE-2024-4148](CVE-2024/CVE-2024-41xx/CVE-2024-4148.json) (`2025-01-30T13:15:10.093`)
- [CVE-2024-4712](CVE-2024/CVE-2024-47xx/CVE-2024-4712.json) (`2025-01-30T14:58:45.433`)
- [CVE-2024-47131](CVE-2024/CVE-2024-471xx/CVE-2024-47131.json) (`2025-01-30T14:35:10.020`)
- [CVE-2024-9672](CVE-2024/CVE-2024-96xx/CVE-2024-9672.json) (`2025-01-30T14:55:08.713`)
- [CVE-2025-0741](CVE-2025/CVE-2025-07xx/CVE-2025-0741.json) (`2025-01-30T14:15:37.127`)
- [CVE-2025-0742](CVE-2025/CVE-2025-07xx/CVE-2025-0742.json) (`2025-01-30T14:15:37.320`)
- [CVE-2025-0743](CVE-2025/CVE-2025-07xx/CVE-2025-0743.json) (`2025-01-30T14:15:37.507`)
- [CVE-2025-0744](CVE-2025/CVE-2025-07xx/CVE-2025-0744.json) (`2025-01-30T14:15:37.687`)
- [CVE-2025-0745](CVE-2025/CVE-2025-07xx/CVE-2025-0745.json) (`2025-01-30T14:15:37.857`)
- [CVE-2025-0747](CVE-2025/CVE-2025-07xx/CVE-2025-0747.json) (`2025-01-30T14:15:38.133`)
- [CVE-2025-23007](CVE-2025/CVE-2025-230xx/CVE-2025-23007.json) (`2025-01-30T14:15:38.300`)
- [CVE-2024-2144](CVE-2024/CVE-2024-21xx/CVE-2024-2144.json) (`2025-01-30T15:21:55.593`)
- [CVE-2024-22429](CVE-2024/CVE-2024-224xx/CVE-2024-22429.json) (`2025-01-30T15:48:29.167`)
- [CVE-2024-25698](CVE-2024/CVE-2024-256xx/CVE-2024-25698.json) (`2025-01-30T16:18:43.000`)
- [CVE-2024-25699](CVE-2024/CVE-2024-256xx/CVE-2024-25699.json) (`2025-01-30T16:23:46.597`)
- [CVE-2024-25705](CVE-2024/CVE-2024-257xx/CVE-2024-25705.json) (`2025-01-30T16:21:48.907`)
- [CVE-2024-2645](CVE-2024/CVE-2024-26xx/CVE-2024-2645.json) (`2025-01-30T15:39:23.947`)
- [CVE-2024-2646](CVE-2024/CVE-2024-26xx/CVE-2024-2646.json) (`2025-01-30T15:34:41.863`)
- [CVE-2024-2662](CVE-2024/CVE-2024-26xx/CVE-2024-2662.json) (`2025-01-30T16:12:13.900`)
- [CVE-2024-3055](CVE-2024/CVE-2024-30xx/CVE-2024-3055.json) (`2025-01-30T16:11:40.940`)
- [CVE-2024-3190](CVE-2024/CVE-2024-31xx/CVE-2024-3190.json) (`2025-01-30T16:09:08.383`)
- [CVE-2024-3547](CVE-2024/CVE-2024-35xx/CVE-2024-3547.json) (`2025-01-30T16:10:54.307`)
- [CVE-2024-4385](CVE-2024/CVE-2024-43xx/CVE-2024-4385.json) (`2025-01-30T16:09:33.727`)
- [CVE-2024-44172](CVE-2024/CVE-2024-441xx/CVE-2024-44172.json) (`2025-01-30T16:47:17.370`)
- [CVE-2024-4580](CVE-2024/CVE-2024-45xx/CVE-2024-4580.json) (`2025-01-30T15:55:44.283`)
- [CVE-2024-4609](CVE-2024/CVE-2024-46xx/CVE-2024-4609.json) (`2025-01-30T15:50:28.557`)
- [CVE-2024-4634](CVE-2024/CVE-2024-46xx/CVE-2024-4634.json) (`2025-01-30T16:01:17.150`)
- [CVE-2024-4779](CVE-2024/CVE-2024-47xx/CVE-2024-4779.json) (`2025-01-30T16:10:38.760`)
- [CVE-2024-4891](CVE-2024/CVE-2024-48xx/CVE-2024-4891.json) (`2025-01-30T15:45:34.377`)
- [CVE-2024-8148](CVE-2024/CVE-2024-81xx/CVE-2024-8148.json) (`2025-01-30T16:20:34.150`)
- [CVE-2024-8149](CVE-2024/CVE-2024-81xx/CVE-2024-8149.json) (`2025-01-30T16:20:02.563`)
- [CVE-2025-24153](CVE-2025/CVE-2025-241xx/CVE-2025-24153.json) (`2025-01-30T16:55:07.740`)
- [CVE-2025-24156](CVE-2025/CVE-2025-241xx/CVE-2025-24156.json) (`2025-01-30T16:43:39.593`)
- [CVE-2025-24161](CVE-2025/CVE-2025-241xx/CVE-2025-24161.json) (`2025-01-30T16:34:58.187`)
- [CVE-2025-24169](CVE-2025/CVE-2025-241xx/CVE-2025-24169.json) (`2025-01-30T16:24:54.597`)
- [CVE-2025-24177](CVE-2025/CVE-2025-241xx/CVE-2025-24177.json) (`2025-01-30T16:26:45.687`)
## Download and Usage

View File

@ -199125,7 +199125,7 @@ CVE-2022-30755,0,0,2c7408c12e1674abd78d78d67299eeac48e63e7c83939af9bca829a989117
CVE-2022-30756,0,0,18e23da3e5e8929c2f5be39475d6e1fc11cbba9844fe0dfb111a0d72475a52e7,2024-11-21T07:03:19.137000
CVE-2022-30757,0,0,2d5c8199f18f96a035419654ad0264b5833ba56242cbd4779925f141ab268f0b,2024-11-21T07:03:19.257000
CVE-2022-30758,0,0,c755910598d15152cebc091faf48fc8a9f040d215dcc5a3353030803031ab2f0,2024-11-21T07:03:19.377000
CVE-2022-30759,0,0,54a6d51afd8c75fdee55937c48b6f12974ff21700d36b3ce603a8c5e9da64d59,2024-11-21T07:03:19.520000
CVE-2022-30759,0,1,3d3759ba2512dda79e7fa47c69a3c5ad62f610f5924e22b9d04a271c5336983f,2025-01-30T16:15:26.713000
CVE-2022-3076,0,0,4cfe797b7bf9d5b5046fbf5f497a30e9958b45f1617dd7d6dba7bb13f8890c96,2024-11-21T07:18:46.420000
CVE-2022-30760,0,0,4aecd0c7a54f5be6bc1f1e1b93d2c49f555805fe14853564db38d7ec4bd066e3,2024-11-21T07:03:19.727000
CVE-2022-30763,0,0,287ce3525fc9d7d2c0ce07e52abbf5e3083e4aaeff3ffd02408cd5e87e67ada7,2024-11-21T07:03:19.883000
@ -209488,7 +209488,7 @@ CVE-2022-4391,0,0,0ff9a05d52d3aa3de06124191e66973bdd39e57b666a47479eb2bcc2b7872e
CVE-2022-43910,0,0,bc61d2b42779fea1fe4b3cf12606acd50183ddcf8c042f7fc0da0e38609033ae,2024-11-21T07:27:21.313000
CVE-2022-43914,0,0,3c548d12690cec58c529bd0607f14f1f9e549fb5350d977603a219363d149ed7,2024-11-21T07:27:21.437000
CVE-2022-43915,0,0,95003edebc2e438c54ea7d643af0a18ec88ff2cda62b4abb538e153c9051149a,2024-09-21T10:15:04.170000
CVE-2022-43916,0,1,3748a9ef0c7f6df2aaf353e1ee5b4fe798026eec9ff1944a9341589e65929a46,2025-01-30T14:15:29.990000
CVE-2022-43916,0,0,3748a9ef0c7f6df2aaf353e1ee5b4fe798026eec9ff1944a9341589e65929a46,2025-01-30T14:15:29.990000
CVE-2022-43917,0,0,816f682456b6e66e0347743e10013b668c623790e5f5ce86f6345eda01d980aa,2024-11-21T07:27:21.630000
CVE-2022-43919,0,0,0180961785dd7055e92f4af184de1616827bbeafac8a7aafaa021d7e8928d765,2024-11-21T07:27:21.753000
CVE-2022-4392,0,0,edca1725f3b5a668165560e598881401f25d1f63ae808c1a347f81e7a14b86d1,2024-11-21T07:35:11.077000
@ -210645,7 +210645,7 @@ CVE-2022-45672,0,0,4f4f6162278b95befcfc07e7dc681f8c215d350ece32bc4ce0b1b7c62f8fc
CVE-2022-45673,0,0,afc92d054d79d72a087ecf07f6b36da4053cc02bbe4384db14d23cdb29ae30d5,2024-11-21T07:29:34.890000
CVE-2022-45674,0,0,580031b9954cf940fff84360cd66195abd3dcb8e388dfd965c100f8ba07404fb,2024-11-21T07:29:35.047000
CVE-2022-45677,0,0,26c58d9131392eb78a75a3bfa1e15a0611ddf82be3e30747a0078ff0695e7b96,2024-11-21T07:29:35.210000
CVE-2022-4568,0,0,57f3ae08da2bcf695d056e095a200b384846a15d5e8f41eb8bcb795619bf7506,2024-11-21T07:35:30.647000
CVE-2022-4568,0,1,9ae3dac0625cf805cb7dc84c4cd33fdb2f6ffd34f6815500699d97bbc8cb7d16,2025-01-30T16:15:28.620000
CVE-2022-45685,0,0,00c004a5d1bc9bc9ee3a7d4a6dbab72cc8ff47765568898ab640257016353f57,2024-11-21T07:29:35.377000
CVE-2022-45688,0,0,e84beb6b5e6221dbe254b4da8056cfcb30e6a47ff988ff305fa753750d577932,2024-11-21T07:29:35.553000
CVE-2022-45689,0,0,d279eb426897f1a5c4c640557c1d2cd4d189cd451fee6c89666245857dc180d2,2024-11-21T07:29:35.707000
@ -212124,11 +212124,11 @@ CVE-2022-4787,0,0,a775090ad6a19e2397330271e6a9c8c0fcc3ca01e8ee953540eafdc3013ee5
CVE-2022-47870,0,0,91c985fec66e47abfef4d4434260c8e54cf563434d64675f1923a881305d72d3,2024-11-21T07:32:26.203000
CVE-2022-47872,0,0,7a9e6d48be86642f6e906833e9f14f87dffb1d01d7055f7b112279fc89dc4045,2024-11-21T07:32:26.340000
CVE-2022-47873,0,0,a20f81b089755e840fbf9863b86895ed3e7651f714485a3c30efe42d8fa5a686,2024-11-21T07:32:26.497000
CVE-2022-47874,0,0,cfafd4934240535b74d277d1a1f6a34e868b97ce6fd406d68bbfd386fa080749,2024-11-21T07:32:26.633000
CVE-2022-47875,0,0,5452f740a78c73caa4a657fddea9b236c0ccab2f61a24d95fc04cf4b9ef18229,2024-11-21T07:32:26.780000
CVE-2022-47876,0,0,20e65339e4b12003bfe8074da0a3070b01a9d4475680513dd99c3db343e8e56e,2024-11-21T07:32:26.917000
CVE-2022-47877,0,0,f4f2fa3f9619bc52600ea7032a7ebd4771ed2cd68feb9a57717103525e5dbea1,2024-11-21T07:32:27.047000
CVE-2022-47878,0,0,96bb6067105e74676882f6a527181b82486d927c40bffd915863185ad4f54ac6,2024-11-21T07:32:27.203000
CVE-2022-47874,0,1,c0d376f7b1b6877495777165e97b59db361c1c4461171116febdaa80763213c1,2025-01-30T16:15:27.560000
CVE-2022-47875,0,1,f19f8f03c90ba4ad96162ee2357fb4daec9ecd82df8fe9f064719ed5dd3c9bfb,2025-01-30T15:15:10.413000
CVE-2022-47876,0,1,fac63b993d6bfd89b7e4be4215b63f05effcc86d3db0ae7d640178e54b245a1b,2025-01-30T16:15:27.707000
CVE-2022-47877,0,1,0b1de0eb7e502955d2bb7008421a44c1331d179ad7cbd0356d21cd2d5277b52d,2025-01-30T16:15:27.900000
CVE-2022-47878,0,1,a7952d6ecc8a2edaecb9f97d906a906fb5d9204d6ecf5083fd86b30c19b9d2dc,2025-01-30T16:15:28.067000
CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000
CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000
CVE-2022-47880,0,0,6912960d6442fdd7ed92092a03e4fe22fbfc3cd1e68d8e2a73464e9293478ab9,2025-01-27T17:15:10.117000
@ -212280,7 +212280,7 @@ CVE-2022-48181,0,0,f70e55148fd4de8dc27206db433e82fbca6bacf2648bcff1bd3db6a8345e4
CVE-2022-48182,0,0,7e4702a6bb9408ecf54cc582d3f7dadd0d4bce1d07351993ff9166ad23cb0a80,2024-11-21T07:32:56.147000
CVE-2022-48183,0,0,2aacd2e8aca664851758ef39ac2e99338d53295a382d0810eb456d15940165dd,2024-11-21T07:32:56.297000
CVE-2022-48185,0,0,9451f4ac867155c4c8d32d4210d33c6d7b338c30a64c818a3837462f1bf550e7,2024-07-29T20:15:03.250000
CVE-2022-48186,0,0,2fbe42bb51a089c6aae9fdbc1657e6c3ac84b40085be2a6b7092f70fe7d3379d,2024-11-21T07:32:56.463000
CVE-2022-48186,0,1,935a07b83ddb92c5ab2aea193d11a85cd6f64365adf02a677e21b9159a08e840,2025-01-30T16:15:28.230000
CVE-2022-48187,0,0,ff1590e9a690fb0ae260adde2c69973167f534b3795163c9e5f0527961fbe91f,2023-11-07T03:56:29.847000
CVE-2022-48188,0,0,a57e0cbe19f8da8f267f7508bc21b3797021332aa1b6def719261ebe5a5d19e9,2024-11-21T07:32:56.600000
CVE-2022-48189,0,0,1494a3b2e7a8494a30009281a6fb460057feec1ba225511a702e798096f899b5,2024-11-21T07:32:56.753000
@ -212533,7 +212533,7 @@ CVE-2022-48479,0,0,be4088657a9d04258c6dc407e95a9bbab8a3d6de9c183cfba1a0bcf8a75a7
CVE-2022-4848,0,0,2025d1f07e7c6abe39b0a89cabb1f25d6a203d1b0fe8acc9559fd26ef1fd1f2a,2024-11-21T07:36:04.023000
CVE-2022-48480,0,0,f2d28daf1ad676191a943d3427a4ffe4dd544f7aa9e10d88fe61667f1ea027a7,2025-01-15T17:15:10.717000
CVE-2022-48481,0,0,c38e69565bc722dab603c8923a925c3999184b33cceae3626e62510d5d97227d,2024-11-21T07:33:25.060000
CVE-2022-48482,0,0,7ac41b1951b801fb664e658d13833df47cbab31ad3169e90b364ff040e0a3677,2024-11-21T07:33:25.177000
CVE-2022-48482,0,1,09e1999cd5d0efaf351609b5ea32876e53ba7e4e0b62927641a410560381e1d3,2025-01-30T16:15:28.450000
CVE-2022-48483,0,0,d2bec26748db8a5da63d916cd77a26e7f5ec965ac0c82535ec23b0719f24bb2f,2024-11-21T07:33:25.313000
CVE-2022-48486,0,0,f03df4247b68cbed001a4cda633e9152715ecb8aa9328c3e3da84b7b43510f8c,2024-12-17T16:15:22.073000
CVE-2022-48487,0,0,847663737d83c8f2831f21b93d19406978bac505b0e2d927ba6bb1a8c413da60,2024-11-21T07:33:25.550000
@ -214017,7 +214017,7 @@ CVE-2023-0887,0,0,40c09943859ef31f07f94beb9b0e9b6bac8adb3704c20c6a9f4f9c5bcd04b9
CVE-2023-0888,0,0,fafedab3b7be190ad7f74ea49b70d79d3a9003a17b228ca95227190b23915271,2024-11-21T07:38:02.240000
CVE-2023-0889,0,0,1830ecc87642a51bbdaaaf166292bdea43e5b0992253a5990eae3a6fafb4acd8,2024-11-21T07:38:02.390000
CVE-2023-0890,0,0,4d73273c012484aaeff7fc81fc8e1772c749a2f9ec3c4dda1bb8002d2ae75174,2024-11-21T07:38:02.493000
CVE-2023-0891,0,0,60a89adcaa92afb1a3837ace42cb05dfca1ea747a99824908a578c2a7484dc25,2024-11-21T07:38:02.600000
CVE-2023-0891,0,1,2517a3cfaf1145900137bff4043c10495e615381f559a2c66ebbcf3cf0de2e7e,2025-01-30T15:15:11.563000
CVE-2023-0892,0,0,7f2a62f61960cc567a0195dae725c6e118c7f51907c4c1e9a55492716231c885,2025-01-24T21:15:09.507000
CVE-2023-0893,0,0,df438bb69ce370b92d087935b5a942e58daa9c9302b4f8fa3f13002775117f35,2024-11-21T07:38:02.820000
CVE-2023-0894,0,0,cdc8e871a9dd03dfafab10acc905a6eb6a6585e70272458b122a3f52ecf925a1,2025-01-29T15:15:11.903000
@ -214049,7 +214049,7 @@ CVE-2023-0919,0,0,5305cf677997835fc8e97f12f98585f9abdf4bd59ff72c678671606015005d
CVE-2023-0921,0,0,13e7f89125226c2be46f4ff9448cd445661866b8ff54e902081ec06d99e14908,2024-11-21T07:38:06.130000
CVE-2023-0922,0,0,94b670c71ad6c5df92066fe0f049322290bc52b352018c4add4f12222ab4bb7a,2024-11-21T07:38:06.260000
CVE-2023-0923,0,0,7daaca2b1392cdb563ac6de27eca1f70a13e9211557487fd5d694051f34523c2,2024-11-21T07:38:06.380000
CVE-2023-0924,0,0,8c44cd06148f588ef1367baebb8001ba52e9d46c7b355cea830a4de72693aa44,2024-11-21T07:38:06.507000
CVE-2023-0924,0,1,c8dd3a3537dd275687782fe4de1a780990056b2847afc93ff1e8f9e9c751f38c,2025-01-30T15:15:11.770000
CVE-2023-0925,0,0,e28a97a4ae7f1d44dc7c7c6977b76d9c031188b6d0669741bb545be62d2ef78e,2024-11-21T07:38:06.610000
CVE-2023-0926,0,0,053c50d08c9fdd695226ae7e23939730e9470062a0ce2f08babf681227535fee,2024-09-27T01:01:34.407000
CVE-2023-0927,0,0,490557fbb08483e38e0786261fa7f58d8e2d73f0e609ca02ae12888c4efde6e9,2024-11-21T07:38:06.903000
@ -214141,7 +214141,7 @@ CVE-2023-1017,0,0,04be72a081fa821a9f30aa22682dd50e0cb99b972ad48652379ebc30ec5667
CVE-2023-1018,0,0,19457c07f327759818b2b2eed145d207a2b5a63750893ca3eb94a8e4145383c5,2024-11-21T07:38:17.760000
CVE-2023-1019,0,0,13321c770340c90a07956bf73dad30c6227553ccdd720c933d8b715985fe70c9,2025-01-24T22:15:32.650000
CVE-2023-1020,0,0,73a15efd03deaefd7e63c0a8b19e32a2b679a4d4b785c0e0ae2bb279ecb454a8,2024-11-21T07:38:17.983000
CVE-2023-1021,0,0,597056a3fe26439b9afb25e710ae32fbd52269ab76e5f588f603e243da91ff28,2024-11-21T07:38:18.083000
CVE-2023-1021,0,1,80acc67ff3d075babffb3394a9528f8547fa5db01c4f597c4b73321d7b9a0a0f,2025-01-30T15:15:11.963000
CVE-2023-1022,0,0,0f037b6141e1c28abd39a8923349c21e60c8c8c30cae445c9560c61c11a94857,2024-11-21T07:38:18.187000
CVE-2023-1023,0,0,e4867fea73617b9969988d012779e09595869a252fc618f555582dca89f55db8,2024-11-21T07:38:18.310000
CVE-2023-1024,0,0,f201ad545e885f805985b1a1bd3d9a443cbfaeadaef59844f648946f5d9e9911,2024-11-21T07:38:18.423000
@ -214207,7 +214207,7 @@ CVE-2023-1086,0,0,88f958cd195c9bf703efdb1102b9fdb3d47333293a12d131cae45eb1e45d8b
CVE-2023-1087,0,0,1bf076f603a138cbaeddd3d92ecaafe8fa8f46aed4a304e459e14ba09447cb5d,2024-11-21T07:38:26.007000
CVE-2023-1088,0,0,5b368a55ce07ac1d06b780775d8740c95a03e48b4833c0cf4d35c043789a6b25,2024-11-21T07:38:26.110000
CVE-2023-1089,0,0,aece4f9db6b729d86971ca0a83e6e576e4e8b8198bf1a236076f4e122b97db91,2024-11-21T07:38:26.220000
CVE-2023-1090,0,0,c8f394a8f6f808ab2e1ee1d4ab86160e7d5ed1376e4085788a8965cecb1b42fa,2024-11-21T07:38:26.330000
CVE-2023-1090,0,1,25ccd715dcee0b5e820863482b71b2db6e4170920235173f327ff4b5f16e78ed,2025-01-30T15:15:12.147000
CVE-2023-1091,0,0,9a128be955d385960ee0cec982b4debe4f2b0b70a6b1e923e5650e75a331bbb4,2024-11-21T07:38:26.437000
CVE-2023-1092,0,0,c95010b1f4e248f04a2dcca345e3caa5bd3d28bc70fc9801b61bf85c51ca7236,2024-11-21T07:38:26.557000
CVE-2023-1093,0,0,013ca17f4d96202a29badf2b31b2bbd22c2221ef8aa1c9a1fba474aca21771e2,2024-11-21T07:38:26.673000
@ -214240,7 +214240,7 @@ CVE-2023-1120,0,0,b67431b8801043d2762b77648bf7daebaf783cb74af84def7c793f702bbf01
CVE-2023-1121,0,0,648ad857aed412ab295fe1760415bbeb314db5b54caa4785e2f62f8e08764a65,2024-11-21T07:38:30.020000
CVE-2023-1122,0,0,662df1661abe841ba899aa885ca33cd9cbbc4ca3be01370afb41f220b945b637,2024-11-21T07:38:30.130000
CVE-2023-1124,0,0,00a114e1345472243e7f63bff578020925d0b4230677958280b633a7b72a33a8,2024-11-21T07:38:30.237000
CVE-2023-1125,0,0,9e0d8290612231ada36dbac7d52321151b8a7ead3380ed68343b8bd603d1b742,2024-11-21T07:38:30.353000
CVE-2023-1125,0,1,0bc566bbdb62dcad8091c8081ce75445a49f94a8b4e6e6d4048f5cf9a816327b,2025-01-30T15:15:12.337000
CVE-2023-1126,0,0,76ca00f995398cc356871a49cef73ae78da9b91a23f8d33d6a85a2527e5f7f7f,2024-11-21T07:38:30.473000
CVE-2023-1127,0,0,8168835cb911ea2b9760c462e21a4895b18aacd80959a479a7ceb803bce4449c,2024-11-21T07:38:30.587000
CVE-2023-1129,0,0,bf0b523a4eb72378ea0896f3afd850d83509d24b6407e1da9929bb0ec03a28d7,2024-11-21T07:38:30.723000
@ -214308,14 +214308,14 @@ CVE-2023-1192,0,0,bfa8f5268ba2ac1bf29c3a44f8e698ecb3c10e88265d80473e4f4f400a814a
CVE-2023-1193,0,0,e26a2390b19d99c4af76bf87860e924ddae19e1846826c12b2553b6dbfbe934f,2024-11-21T07:38:38.710000
CVE-2023-1194,0,0,fe3e573f3c4a0a5795972c1e55b585dfd154191dfcf47b11d4de2a4ec470fde9,2024-11-21T07:38:38.847000
CVE-2023-1195,0,0,b678d5607b985ba032a4a1965ad90bccdae593e8264afd26c6fc50484822d431,2024-11-21T07:38:39.007000
CVE-2023-1196,0,0,cf95f5aef542b4e95e85df046f2d98bbeb98900b2f469b38e14ddcee4cf9f3b4,2024-11-21T07:38:39.120000
CVE-2023-1196,0,1,c8f5779968326d7d81a300e6402c218f9d3653bdc1028fe84c7e3255af4de629,2025-01-30T15:15:12.527000
CVE-2023-1197,0,0,86832f5d8e3d2f19e25d554307cda0a38f9c96d8816c29ad3985ff0868049cfb,2024-11-21T07:38:39.223000
CVE-2023-1198,0,0,007352a77f8be86abc9014a5228157699faa100b2d96c0aa11fbfdebb3b2fd1f,2024-11-21T07:38:39.327000
CVE-2023-1200,0,0,cb5805db4a921d68bdf953c1e086ad953a942ed94e0e68ad6b2ae124e1cf6cd7,2024-11-21T07:38:39.437000
CVE-2023-1201,0,0,f4764263a23a32d0db12c78e0cf32f66698f52de21b5dd3f805ae2d534552a96,2024-11-21T07:38:39.553000
CVE-2023-1202,0,0,b80fb305eb4d0315b72e4e193b40ab5869024349a33c31de6337de50e387d71c,2024-11-21T07:38:39.653000
CVE-2023-1203,0,0,2c91a011fc8bd4ea016cf3e67f1e6f2936594e64abfa5a016428f0a01e709b9b,2024-11-21T07:38:39.760000
CVE-2023-1204,0,0,19ea7444022b59172702259fe6139b9bb3632c0f28d770bbb991031804d5b4d0,2024-11-21T07:38:39.860000
CVE-2023-1204,0,1,c2aa540d011907285fafc8b079b7b56473284d8f0c49ffb1b78642f39b244f98,2025-01-30T16:15:28.937000
CVE-2023-1205,0,0,79721d87fa62d640560ed833c7f7bd2eb94aa422ccee9cd59eb9d37b0e6fe39f,2024-11-21T07:38:39.967000
CVE-2023-1206,0,0,61a6d8638c87f97f2726781e2179014defc8f0359aad79a22aeca86d4eb775a3,2024-11-21T07:38:40.070000
CVE-2023-1207,0,0,be4a7cb974be7ce9f2ad18230d631fe96a11eb7b0083b1d0ef328f835a67382f,2025-01-24T21:15:09.660000
@ -214618,7 +214618,7 @@ CVE-2023-1521,0,0,34ba7a16607d114cc465c9eda0277be53b7130d5847ae48ed5169503b7db47
CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33ff,2024-11-21T07:39:21.427000
CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000
CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000
CVE-2023-1525,0,0,b22736357780c69ff905821dd88b88cb1ef1f2532b51391bf30ca90589b5f457,2024-11-21T07:39:21.797000
CVE-2023-1525,0,1,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000
CVE-2023-1526,0,0,470ef30dc321b08de770a6be8b8f2aa7190eeda7e5a77bf24f511e23d99c3465,2024-11-21T07:39:21.910000
CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000
CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000
@ -214639,13 +214639,13 @@ CVE-2023-1542,0,0,b7be4a9b2b884cae890dae2ba469356a03dc78c283b05769f6fa3e0b0f6ac8
CVE-2023-1543,0,0,281b80c66a7eb3dc1baf3cb840de56258f1cec8092b87400877477901d7347e0,2024-11-21T07:39:24.610000
CVE-2023-1544,0,0,214abe3bb53649aed45e80d24f71bd9fd00a2556ce29ebe5a2dc07d15d7e1720,2024-11-21T07:39:24.730000
CVE-2023-1545,0,0,b9104c7a50d4a10687955a94074e210317ac24b2ed84205a3d03e8a1a248de67,2024-11-21T07:39:24.863000
CVE-2023-1546,0,0,1b0ff163ddbd6fb477ad3f4ca4ec5a9e5906f3da82f945eb8e6504974e247c22,2024-11-21T07:39:24.990000
CVE-2023-1546,0,1,06f7fef9ed0d8518c6042a3cb575201d1dc30d1c3ed3fc9dda6b87d92e45d8dc,2025-01-30T15:15:13.070000
CVE-2023-1547,0,0,d51703ba83bfaa188e57eab64dad2db239343d3fd939596fdc9ec822d8044772,2024-11-21T07:39:25.103000
CVE-2023-1548,0,0,3878979d03170c0797cdf166dad43e9909c28272fc216120d5dee70c8a4e2519,2024-11-21T07:39:25.230000
CVE-2023-1549,0,0,69aeb5bec56a691e857ec2ad2bff10f83bffccefaa71a64c5e38d5cbe7dd5b79,2025-01-24T21:15:09.820000
CVE-2023-1550,0,0,7d2654d2d0bbfb0e9bce9222b64a82d5858f7ad0483bfbe3ca832bb8c7d44cf0,2024-11-21T07:39:25.473000
CVE-2023-1552,0,0,5cf9c6f81bbddc991a2e47bcc8698238f7e68c250afa2d186a4edd740986a6d1,2024-11-21T07:39:25.600000
CVE-2023-1554,0,0,89131d91aa6dafb039cea9a0ce5a6fea3b27dccdcec384be81eedb4e817a3ed7,2024-11-21T07:39:25.727000
CVE-2023-1554,0,1,40dc9db34ac37648c5a45a6ccea56caa22f0d3aeb1086ea552e81132c710f243,2025-01-30T15:15:13.240000
CVE-2023-1555,0,0,83d1f3692c7ee304de5e2dd61fdea47e3de63882df92af90f767ef9c77daa5b5,2024-11-21T07:39:25.840000
CVE-2023-1556,0,0,6d045497dcab50a75fe1999ac11f40181845ea1c0327bc1cc849d19f015c4db8,2024-11-21T07:39:25.963000
CVE-2023-1557,0,0,89ab715bb84b32db1fc105225323836788a8a6455e988a4c407d6e311038b33a,2024-11-21T07:39:26.093000
@ -214702,7 +214702,7 @@ CVE-2023-1610,0,0,1d2c3978ee29298de750514ebfba47cff4f8672b966bb54773a2f741b58613
CVE-2023-1611,0,0,441fec094c3e2c5f624a61337e71f166acdd20f2f2f8b56512a32d1d2efbef66,2024-11-21T07:39:32.193000
CVE-2023-1612,0,0,03ef46a5564cc6e02dc2f30f75a61a0b553ec9734bd77b592e2a6ae4b7d59bbc,2024-11-21T07:39:32.330000
CVE-2023-1613,0,0,875add8d1a41114d3df41a1c0c2e18acb80939a4eb7457f8a0cb4e0e343a480d,2024-11-21T07:39:32.480000
CVE-2023-1614,0,0,4ebab5520f43d422ad512b6c0bfe5f4b6240ada9e9535c603831559d0d78db2c,2024-11-21T07:39:32.633000
CVE-2023-1614,0,1,d3ae64829126ce70f25af4f1742c07af420adc653ca1ecde4695f57868d13a04,2025-01-30T15:15:13.400000
CVE-2023-1615,0,0,7b5d50ded2a4ee58a251c8567550dd9c1c469d19394a9a10c86b1c121c7e05f9,2024-11-21T07:39:32.747000
CVE-2023-1616,0,0,835fa1eb9a010335047ff0aed4f9f5da1a803f5b7fd6febd43a84af4d9d8ec28,2024-11-21T07:39:32.887000
CVE-2023-1617,0,0,1c1201d464ca5118a570419dbaad9ff27bf2700e36b0b157f16f906e1768ead8,2024-11-21T07:39:33.027000
@ -214753,7 +214753,7 @@ CVE-2023-1665,0,0,1d3df359bc1f5d4b8798b6f7df301eaa09959155a1e05e483d0acbdc7664f0
CVE-2023-1666,0,0,0a6bd042bfce50ece02839147998ce826930595674c07380fe99c25993f1ec40,2024-11-21T07:39:39.030000
CVE-2023-1667,0,0,007039c95c2a66e283c8829a0e671b3f5d75acb867d7db6331aefe56e15ddde2,2024-11-21T07:39:39.170000
CVE-2023-1668,0,0,7026e054ee0e1ffc09cab5612ac02a2a9656fa9a506d74dfdcbe04798943fef0,2024-11-21T07:39:39.313000
CVE-2023-1669,0,0,1ce991c9a4e6bb9f3ac14e1d75a8fe1d54c99b80e814e4897327dfb6410b2181,2024-11-21T07:39:39.457000
CVE-2023-1669,0,1,5311d150809ab6943484d0b3367f043531bf3f82c64bcbd57f3439c66b969218,2025-01-30T15:15:13.580000
CVE-2023-1670,0,0,c06c533e3f5f4366ef933e56765dccaa403d5072fca5a0c50a257590860253b0,2024-11-21T07:39:39.573000
CVE-2023-1671,0,0,ffd3253ede7b7e2fd00316e35b2d726f31e096e4810fa25700d5c280f05a32d0,2025-01-28T22:15:13.780000
CVE-2023-1672,0,0,2db498d952eda584270e55192f274b101001777d9a798432e84a793434073e3a,2024-11-21T07:39:39.810000
@ -214812,7 +214812,7 @@ CVE-2023-1725,0,0,1288effa581beafdb9450bde3b3f32fd682403352c280c5c67244a1ebce261
CVE-2023-1726,0,0,7fe9cd9345f7e9931cf0f62ff9bb89eee878166d348fc6ac03ed9b3d56c38ce2,2024-11-21T07:39:46.657000
CVE-2023-1728,0,0,981cd8e8adb9e3b1b6beb4084aec72e09c7d365a70973ab69ebd692e12b4e541,2024-11-21T07:39:46.773000
CVE-2023-1729,0,0,92eb91b74efa99fa9a3cece9e91603fc963b68e3a840152763717a0c65fb25c3,2024-11-21T07:39:46.890000
CVE-2023-1730,0,0,a697669ac22030700478d7dfa002cb86b5c7d762686e38db8014babf6b522cc3,2024-11-21T07:39:47.050000
CVE-2023-1730,0,1,cbdc1cac0dced40449b83d7a491e74ada7c55bcf5cbaf87e5f190daa5b9af814,2025-01-30T15:15:13.767000
CVE-2023-1731,0,0,5784a0b3f79ad15253cc740ef758b35d7f8a3ec0b50d0b2952828f2881a1bfcd,2024-11-21T07:39:47.157000
CVE-2023-1732,0,0,de42651859dfb2e0d55178bb0ab9bd5f7a767963f3ffb908f0c2fe4c96f97b16,2024-11-21T07:39:47.283000
CVE-2023-1733,0,0,fa198ff4b1cf504734811f9fc97304008097009845fe451951387c450a506baa,2024-11-21T07:39:47.407000
@ -214885,11 +214885,11 @@ CVE-2023-1800,0,0,192d23711da65eb52594040339d0dddc8a7937f5896cc9b30e913a0b63001b
CVE-2023-1801,0,0,d15268dd9e5e4d789138411da6b6c068c4e064e163e7a432ac6f3ada916820cc,2024-11-21T07:39:55.960000
CVE-2023-1802,0,0,c8ec5b19a3c825b7ff8a8c361eb522bd793e6b641cffed05144ed8c99585bcde,2024-11-21T07:39:56.090000
CVE-2023-1803,0,0,bbf4043b7e6afdb5c270fb467833b24afe9ee14f1d93f39ea5a9110d3f73c6f4,2024-11-21T07:39:56.197000
CVE-2023-1804,0,0,fe3db911294ef6c120f5223aac3aca5fd7137cdd289091fef7139a5a902af88b,2024-11-21T07:39:56.310000
CVE-2023-1805,0,0,16cab7887afb795773a79aba6506d5fc64c80e01a5cc1caccbe69a2a184c2b54,2024-11-21T07:39:56.407000
CVE-2023-1804,0,1,a7c0015d82f7f7b1c250eb9ddd4bf9ac90597379e50599685cf6db30207ba539,2025-01-30T15:15:13.947000
CVE-2023-1805,0,1,eb8a153f7e40dea0fe3c37f01f9f001c35153f136583f1506397a926938f9a66,2025-01-30T15:15:14.117000
CVE-2023-1806,0,0,158ac74cb4980a215026406678f7042a9e33f2c85ffb68dd055097077fd1f7f8,2024-11-21T07:39:56.500000
CVE-2023-1807,0,0,68ce9efa2a73f50c1ae7a0ef58d9480e4bd0cb76c409a3061652425f04a195aa,2024-11-21T07:39:56.597000
CVE-2023-1809,0,0,8e7bb67b334831eaba0b398fb83e982ea22d5c156d26c679db9ef050e0c2ead6,2024-11-21T07:39:56.693000
CVE-2023-1809,0,1,ed1dfffe81cc9d8652cb87ed35cbf3b70b34117cde3c281b0320c3521f5310bd,2025-01-30T15:15:14.273000
CVE-2023-1810,0,0,ceb506c57941a03762177c93a4dab2042b6266cf2ea6bfc90878a5b43f0b70ca,2024-11-21T07:39:56.793000
CVE-2023-1811,0,0,45e6e0b55b213f67e65368c1bad75278060ed02bd964c02821f3c0d21d1fa493,2024-11-21T07:39:56.947000
CVE-2023-1812,0,0,b0cfe3dc16dcd9613f712ea7398e9d2900d87489ba1a82e507aea1c99683598d,2024-11-21T07:39:57.100000
@ -214938,7 +214938,7 @@ CVE-2023-1857,0,0,55cb03a7a1032c1834395536b9eba3913167eecde95bdd4c2ae2f2b93e3dcf
CVE-2023-1858,0,0,df7325c01a486bc312639bb1f615f6ac0a26c25e7b26e6a183a5620e96094aac,2024-11-21T07:40:02.093000
CVE-2023-1859,0,0,23899e3cee21603963a4dafc4a10f02b1c783b8c627a4a20610ef8a5cd3a5d4a,2024-11-21T07:40:02.217000
CVE-2023-1860,0,0,0fa30f56f993b09a5dbcdfce5c677412e754808a246c33f2484aec39e502cdb7,2024-11-21T07:40:02.317000
CVE-2023-1861,0,0,612206f51224af831ad0fdf2745d0d542febefecd01e78c4b29905dcb8885cf7,2024-11-21T07:40:02.440000
CVE-2023-1861,0,1,8c35216364c24b1fb1c93283a7f8f196219f3c0b44aac8a320b953b081ca1db2,2025-01-30T15:15:14.450000
CVE-2023-1862,0,0,9dd720dc34f84918e06a8028dfd464c845d03b0a153324e5c97106c0863423d2,2024-11-21T07:40:02.547000
CVE-2023-1863,0,0,d5231e684e16bb2afde2c74e51d9754850a88e89c7b835f9510aaf494f611138,2024-11-21T07:40:02.687000
CVE-2023-1864,0,0,e4216bb41d14894ef4ffed9f0c97d06b7fb9c4bd263753e62639bb51783eb104,2024-11-21T07:40:02.813000
@ -214987,7 +214987,7 @@ CVE-2023-1907,0,0,7e5d444ed0298ba9f7785c55a14ff0c356de0bcf01ec3878593a7572234eb1
CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000
CVE-2023-1909,0,0,e49817fc9d0a21e868f8dcf99cb6ba1f1e8637a8a1ac71c8aea4dcba2d56a97b,2024-11-21T07:40:07.440000
CVE-2023-1910,0,0,37c041e704ac5ae2514337a89fa66ad555ee848903b68628fbb411ed56a08fa9,2024-11-25T16:47:33.943000
CVE-2023-1911,0,0,98e1cbe89d89d3468bc376e026f61535a32ca3c1840cc25a1df841b1cb88d21a,2024-11-21T07:40:07.673000
CVE-2023-1911,0,1,eb704646912caf2cb13ded89d1aff664fe96d3f67cd1dd812f9acbe8344bc322,2025-01-30T15:15:14.617000
CVE-2023-1912,0,0,05f939601819bead6d6c44549f2bd92588323ddce524d62b1adc585ddc3f93c1,2024-11-21T07:40:07.770000
CVE-2023-1913,0,0,12e4ca67ce560b794c6193a20c24adf9efc17ff64d8a9213c3a6e4d06f9fb562,2024-11-21T07:40:07.873000
CVE-2023-1915,0,0,d603808ffa37ef3f61dca302f2e39f4b9fa392a0c0cfbe342e9ab6dcdbc07e8b,2025-01-24T21:15:10.150000
@ -216851,7 +216851,7 @@ CVE-2023-21966,0,0,033b728493269d0990c7dddaebf35e08208ea87c784ad602211d2dd4d8e75
CVE-2023-21967,0,0,4b6d10e255352c9b33d041d9f685e9b10c2606e3da010a7442c06158e0bace1b,2024-11-21T07:44:00.397000
CVE-2023-21968,0,0,ae3d4d254449ec54793102b8a940c47617f6a9730eda6b4e3e66e5c5b2d3f917,2024-11-21T07:44:00.860000
CVE-2023-21969,0,0,cb7ba56a6928a010e0b4003b0a14e45d0a5505236a9e846beaa7a35697d51477,2024-11-21T07:44:01.003000
CVE-2023-2197,0,0,f7d04a4765d3e876db180b26483e69c06da4b918de06220eb16c84a8a33f8d2f,2024-11-21T07:58:08.163000
CVE-2023-2197,0,1,09b711e55f2e0967ae13666ce22f2814afe75471c6a3c8eb74869f8160a40a61,2025-01-30T16:15:29.243000
CVE-2023-21970,0,0,718b89c1852e0909b0f74dc234a4260b48dc66316ce3d4222a5aff109d327fb3,2024-11-21T07:44:01.120000
CVE-2023-21971,0,0,03690154e67f6e285cefb2ad0324c5ef4b276676adca6c284786aba15791c823,2024-11-21T07:44:01.233000
CVE-2023-21972,0,0,a6f0a01223db677a00478fb681fbdbafe8066d690ff69cfca79236b0beee137b,2024-11-21T07:44:01.360000
@ -219051,7 +219051,7 @@ CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a
CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000
CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000
CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000
CVE-2023-2473,0,0,ac19f0dc01831359fe03d48c9b6f659d10eee81ce2e1ac6f08ee0035934a102c,2024-11-21T07:58:41.100000
CVE-2023-2473,0,1,8119a7a63f3fd5e1b8b5d85c113baadb93c20a63761e547a95a5358c48715778,2025-01-30T15:15:14.780000
CVE-2023-24730,0,0,f41f7ce60b87186a36c799b291e39c363ae59e5aaa71806b34570d06e1757d83,2024-11-21T07:48:20.500000
CVE-2023-24731,0,0,8fa5455f55f7771c5580cf6e6cc163bbe6deadec98f097e1e136a45ddc4c91f5,2024-11-21T07:48:20.640000
CVE-2023-24732,0,0,ac333993770ae4c975ad2f5e9cc596c859fb3cd3c16fc2f4f786c38ed5ffd9bd,2024-11-21T07:48:20.780000
@ -223794,7 +223794,7 @@ CVE-2023-30635,0,0,48785607c1185540c000bd1a754cfb5496165eda7db3f6717e5176e3377d3
CVE-2023-30636,0,0,9f3955e9e0014157c6f614a8fe260321b5f1d2db3e6b84fd04d17a254604a6a2,2024-11-21T08:00:34.313000
CVE-2023-30637,0,0,d3309f86d3ff6ab1118a488465045aabd0139274566ae9292f827ba9a0c811aa,2024-11-21T08:00:34.480000
CVE-2023-30638,0,0,eed5da0918c8f9e7f101b154009adbe189c54fea2597ef330484e451b2740f83,2024-11-21T08:00:34.640000
CVE-2023-30639,0,0,16cf2a49697724b11503ba980808c080d02830c1c993a906db22f46932037f9d,2024-11-21T08:00:34.800000
CVE-2023-30639,0,1,f0659f9f17d2fdf99632b6597816298161c8f8ab7c39c94381b65f377f21ffd5,2025-01-30T16:15:29.447000
CVE-2023-3064,0,0,a03c2d3b358df7f940fda5d6aa5a55337d388bb270a32bc5403fb31d0c2d8f37,2024-11-21T08:16:21.717000
CVE-2023-30640,0,0,3cc9fac3cff3272b0c5ffa3f67c4addd073ee5000a8f6a7172b75ea608094984,2024-11-21T08:00:34.947000
CVE-2023-30641,0,0,c1e35b7c9ebec37f93adedb37bfc4a166b3cb97fd67c584b5b07fc0e25bb28af,2024-11-21T08:00:35.100000
@ -224309,7 +224309,7 @@ CVE-2023-3120,0,0,c2dea732f6565cd3bd06512beb7d3c5ba3f0f39a81ff97f57a2e1ed3c3b2c0
CVE-2023-31200,0,0,2efc06994c921521bb3dd14ebfb2e03388a0928840f6489a734561365474811d,2024-11-21T08:01:37.003000
CVE-2023-31203,0,0,3fdb4f3b756d4e91eb2d22dd648c10208189dd89fbf2929fa781d7e035482dbc,2024-11-21T08:01:37.117000
CVE-2023-31206,0,0,d618d468315f6a331a0b671959393d70aebedb78cea4c1bd4e598d2c34243c1b,2024-11-21T08:01:37.237000
CVE-2023-31207,0,0,f65acd7702c117489657be96e3a253482688e0b5a291a24ffd08218044e40945,2024-11-21T08:01:37.413000
CVE-2023-31207,0,1,73b7c834e8a4528666b1a65fc7aa0cd97cd69a50fa8be3398d11dc65678d7e51,2025-01-30T15:15:15.003000
CVE-2023-31208,0,0,2968e8e3559808ff332a50ed24a53b36512d57e76ff92d7124d13cc5b76f731b,2024-11-21T08:01:37.537000
CVE-2023-31209,0,0,c14a93a474b667cef03cbd01835a708782bfe3380ee7c762a012ed814e1241bb,2024-11-21T08:01:37.683000
CVE-2023-3121,0,0,0a345442f29ae37b2041795c903465a51be0e941490200ba133d48c616469656,2024-11-21T08:16:30.363000
@ -224445,7 +224445,7 @@ CVE-2023-31431,0,0,2ee06596f108ae4a484ab6ecf8f46e41fd0a18058371854dcf2498332469f
CVE-2023-31432,0,0,fae79864cd27e13467ea2e1b7f5eeff229eae1e1378562c672a3a93403d26de6,2024-11-21T08:01:51.033000
CVE-2023-31433,0,0,e853bdfb7020ea2a92d21da42b82667b28825f1f1af437ed84977203405c3d1f,2024-11-21T08:01:51.163000
CVE-2023-31434,0,0,e6466f73c068ca988c4aa0d3014669f830341e3ddc209276de06b361a4f4a9a0,2024-11-21T08:01:51.303000
CVE-2023-31435,0,0,37c39b6907f581eb4f26a0dea86921348548633fc814a9b3440ec7a77dd847ad,2024-11-21T08:01:51.440000
CVE-2023-31435,0,1,65e5d6464112e0b392144dec6ab15b21601689245cc68278b95d20d48bc3fb0b,2025-01-30T15:15:15.260000
CVE-2023-31436,0,0,236b8d7c5c60c87c0a3fa3d17d411ff5711f6da9af190ca4ef240e060af935b0,2024-11-21T08:01:51.587000
CVE-2023-31437,0,0,c5e7ed934c3f95337e0d6747d269ce2e9b68f3156ad84cfdd526ed7bfce9f109,2025-01-03T20:15:26.457000
CVE-2023-31438,0,0,3726b6e286f72d60d8d2a50ce86e3f9f77d34b7c0ec484f35df8ee9bcadc8009,2024-11-21T08:01:51.953000
@ -230721,7 +230721,7 @@ CVE-2023-39465,0,0,7abbdcf23039d9efa24f92da7ba9d80953bac0bfa9c5d7de34b21177f3683
CVE-2023-39466,0,0,bb7831f123546104f86d73c5dd1e6005a33579ffb6f8345b1ebbdc69df563165,2024-11-21T08:15:28.803000
CVE-2023-39467,0,0,817f908c62b12ffb0fc1ecd473b5e55bb66887b0edee02a427bf2c3ef3c23604,2024-11-21T08:15:28.927000
CVE-2023-39468,0,0,ea3d874a3c8ddf52e59332b6a34fb8c85536681068f9b000ea95be8928f3c9ce,2024-11-21T08:15:29.043000
CVE-2023-39469,0,1,38c86cd1440138e137b52dacfe1522280b25294e159eacf53335e1484ba1629e,2025-01-30T14:53:12.927000
CVE-2023-39469,0,0,38c86cd1440138e137b52dacfe1522280b25294e159eacf53335e1484ba1629e,2025-01-30T14:53:12.927000
CVE-2023-3947,0,0,a882b8170091b888362dd968275aa1d03f197bce9f60b79e29e3ff20eeaf98a2,2024-11-21T08:18:23.003000
CVE-2023-39470,0,0,ce6409ef0267ddef1aa9b64420d22c73981db36d5f3e4981a8ab237750875895,2025-01-09T15:46:02.227000
CVE-2023-39471,0,0,e36e6acbad3c0111cce5d3933ca4f104103e93885f2ea148b492ede0a1e34014,2024-11-21T08:15:29.303000
@ -241943,7 +241943,7 @@ CVE-2023-6738,0,0,19562e083dd1b351ed21a1c41e2290684656682f0fb9daccd36f17250b40b5
CVE-2023-6740,0,0,be6037f222281390594e4fe7d6af2d858f013b9fa1d87005682f4f2ad8722d37,2024-11-21T08:44:27.517000
CVE-2023-6741,0,0,7ac19f7e84a70e9596789a467d841f0553e4532ecc2ea584df7260767b7656ec,2024-11-21T08:44:27.707000
CVE-2023-6742,0,0,7843dc0b39cfb9e6165b9d63f0f6748701d6b72cede7b59e9b198274889b13ee,2024-11-21T08:44:27.837000
CVE-2023-6743,0,0,a06d6f675e29830cd8389ab90168304cad706dcbff6721ffcdf46ca0d0ad5622,2024-11-21T08:44:27.970000
CVE-2023-6743,0,1,0844abe28d95e988543ab375930b4091b925181bfb4a72d8ce09e9f3da0da38e,2025-01-30T16:09:46.757000
CVE-2023-6744,0,0,a643f5007d899070921b19df2522416ac8401e0e05f88aab48ebc6ee58ed04b3,2024-11-21T08:44:28.100000
CVE-2023-6745,0,0,7d91c89db492297697b1363dbf0159e28f9035d334f43aacbc5390f3e65a746b,2025-01-29T17:27:03.243000
CVE-2023-6746,0,0,d7ff11dddecae5300361052ebb0e500954674a7d62babed59f4ffc80fac1fb33,2024-12-16T19:07:48.603000
@ -242765,7 +242765,7 @@ CVE-2024-0363,0,0,eab3c7c502b7083f0ededeeadc04aa0b93ac5031608b303c114acc8926d360
CVE-2024-0364,0,0,fc5e9c4d5b92f36d5cb37600d7a577e9db411985fc8c6664aa14c93002f43fc8,2024-11-21T08:46:24.353000
CVE-2024-0365,0,0,db88c9e9808866db89f901a78edcf457fc6a3e088c30d92a89eeb5dbd7ac5b6a,2024-11-21T08:46:24.493000
CVE-2024-0366,0,0,d9a8bcb4396969d09c13425c35f8a459ee3d209f50fb7952a9047948dbedc093,2024-11-21T08:46:24.730000
CVE-2024-0367,0,0,6ce9d1b61c049100980135114408f548ca36a2ccfb9566ba8d003c8b823e2eae,2024-11-21T08:46:24.907000
CVE-2024-0367,0,1,0a5c92f994d7e7b665499a1831b012939ef81fa4760bd4e5b44d22048017d521,2025-01-30T16:01:22.873000
CVE-2024-0368,0,0,bfa306a23e7966d1a3c6df3b8acffa6f89a82da259d0056adf68cc23dcc9c766,2024-11-21T08:46:25.077000
CVE-2024-0369,0,0,815d4d3c71949ae70cf07ecb35d9ac59749067f82a962ed4f0d9c0bfcb838f2e,2024-11-21T08:46:25.280000
CVE-2024-0370,0,0,7cda05e6b3807d2a3af714ded0fdf5f41498392f61b03ee727ac2cbb0138b4d4,2024-11-21T08:46:25.467000
@ -242995,8 +242995,8 @@ CVE-2024-0604,0,0,2b3256f7f669d7126f4bbc9a7ac54b0eb175784a7eeed2a05654c10dcc02fd
CVE-2024-0605,0,0,06fd9228bf88b19ac6dfa1ba458848cbe23073984ee398c77e65cea2644976fb,2024-11-21T08:46:59.153000
CVE-2024-0606,0,0,53f79eebfbe885d8ad157dbee910f37431bf9f4a0163dc066767f58dce428384,2024-11-21T08:46:59.270000
CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a05f,2024-11-21T08:46:59.383000
CVE-2024-0608,0,0,364ed7c1816141e08551230deeb225e6f9581f28de27c921e03af6d7943a316a,2024-11-21T08:46:59.527000
CVE-2024-0609,0,0,fe969d910275d5a3a2703bfbabc3af993e9947034bdebc50e55519d8d7cbf919,2024-11-21T08:46:59.647000
CVE-2024-0608,0,1,58c750df7c456adb201a521c740c6c512d380efea9e3834649da3333ff36186f,2025-01-30T15:52:57.747000
CVE-2024-0609,0,1,b037adfe873979e9631c500b4662f0f92ea6276d81bb84225d3e18e35b4416aa,2025-01-30T15:53:29.597000
CVE-2024-0610,0,0,6306e1925cf8710f0f143c59bb8703a5a17e22b393fe1ea0f1373dd0d8e29e27,2024-11-21T08:46:59.760000
CVE-2024-0611,0,0,663347c1724ebcd33ea935e789f8fa6bd6a3de9942c2f6663f2c2af22f7bbc3f,2025-01-07T17:38:50.460000
CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f266,2024-11-21T08:46:59.997000
@ -243279,7 +243279,7 @@ CVE-2024-0909,0,0,2df0b86a6699f4b850ad3ae7365df4ca9138a2979b10ed0bf8d9c174e516cf
CVE-2024-0910,0,0,c5561a043a5bc83184e3cefc3a6bbc1ab0bc8d170cbac0a9063c34556f16a1da,2024-11-21T08:47:41.520000
CVE-2024-0911,0,0,871bb636f703dc10fdfaac6ab1323336d49da941bd792f7087928a303d8b67d8,2024-11-21T08:47:42
CVE-2024-0912,0,0,4f57efee87c78987c06f7ceab5e4000e0b2d703a66876a27e9fce78c8c5318a2,2024-11-21T08:47:42.203000
CVE-2024-0913,0,0,fdd184df3fb1e6ddd459b097472fe6fe272697f536f754bc3e7f7dbf4d3d090e,2024-11-21T08:47:42.730000
CVE-2024-0913,0,1,853d68f85dfbd7101b7a6c3285abc665e9f3fe339ad76b0407d1a295091a87ec,2025-01-30T15:54:01.327000
CVE-2024-0914,0,0,961b54ff0e9b9f81aa56dcd6cdc24b37952c07f3f53f7085b217ebd09ddf718f,2024-11-21T08:47:42.910000
CVE-2024-0916,0,0,5a8012d33f7bb36c9ef1c1bccdc08620475d280f7448052ee484e84c13496a01,2024-11-21T08:47:43.277000
CVE-2024-0917,0,0,8ca5d131b4caf0ae73728e0f2737e604dfa40817adb5658d847b612acaa77af7,2025-01-19T03:31:43.843000
@ -243314,11 +243314,11 @@ CVE-2024-0947,0,0,b99c5eced5e84d6955edeedc451b3495dbf3f3af8dbed61c73ca7e30c56a7c
CVE-2024-0948,0,0,4845e250ccd43e3f128cfd07d04da3a9fb6d5366c88f3bdacca9d62971018c2e,2024-11-21T08:47:50.997000
CVE-2024-0949,0,0,04968b18f620830fe77eeab165a15f0ea3ee52710f5bef19817d5eb6fb29a3e9,2024-11-21T08:47:51.233000
CVE-2024-0951,0,0,733508666767290a16047193c282990fe9540168baf0743324b31a765b2bf8c1,2024-11-21T08:47:51.480000
CVE-2024-0952,0,0,bc9ea3ae1b36b3820ce50fd2f582fd8153bb44ed7946b3a009c2c60233ab51cd,2024-11-21T08:47:51.643000
CVE-2024-0952,0,1,119f134b9aa39c67ae12723466c0c426d99408765f098943316563b18d57bbe4,2025-01-30T15:54:44.447000
CVE-2024-0953,0,0,4e5d3a1c45342dc8d38179e760f7a87aca49f701a93f9665692636183c6efb71,2024-11-21T08:47:51.820000
CVE-2024-0954,0,0,717a5c9403a3a07aa79c1ee4c08e713ee7256149b246efe8ba9171429caaa223,2024-11-21T08:47:52.137000
CVE-2024-0955,0,0,b82c47be2ec9da97623c1ad2fda129765b858d770c87f2b3152d69dcecc86ae7,2024-11-21T08:47:52.317000
CVE-2024-0956,0,0,7b3137e15bd55d2b64f2359cf411204128ab702c17e12a2922086a72b6ddf168,2024-11-21T08:47:52.523000
CVE-2024-0956,0,1,794ff33266072f8241c3273892bc25f7abd1e4544cd7237f977fbc16c8f7c0b4,2025-01-30T15:54:22.557000
CVE-2024-0957,0,0,a9bef8b9be2d41d03e06154ef8adefa783079974ab469015f13fc4cb8990d4dd,2024-11-21T08:47:52.707000
CVE-2024-0958,0,0,3aa53b191242b950a32bcb21cf8d6e0b144782295a7440504d8e624548be996b,2024-11-21T08:47:52.920000
CVE-2024-0959,0,0,54637bdc424270c73101fb55cd51e65b8630fde2a9ebc7835ba4638afe262cb0,2024-11-21T08:47:53.143000
@ -243864,7 +243864,7 @@ CVE-2024-10588,0,0,abb174590e2c3805aae308cc65206f91b43bf77d5c69f89364fb1f1e9e31b
CVE-2024-10589,0,0,a465c72dfb9796c4cbb3a377d38c4412b33cfea46bd84a3e6cc4285530fa7f7e,2024-11-12T13:56:24.513000
CVE-2024-1059,0,0,6fefc7c1fda1a8905ce4d829595396466b2fbe657d1928bc64f36736c82d9d99,2024-11-21T08:49:42.133000
CVE-2024-10590,0,0,368b22747597f2cf903dbd41d27e851a11bac9b0648f6e454dffeeee24246697,2024-12-12T05:15:06.807000
CVE-2024-10591,1,1,9e8a07171a1d6a2dbd27e5835d8685e7cbfcc5b3034536b2efc49aca95072e14,2025-01-30T14:15:30.737000
CVE-2024-10591,0,0,9e8a07171a1d6a2dbd27e5835d8685e7cbfcc5b3034536b2efc49aca95072e14,2025-01-30T14:15:30.737000
CVE-2024-10592,0,0,81a047fe949f1b19be41dee2b5903be4f32a8a1dca9e64d7a64a12b198ca91f2,2024-11-18T17:11:17.393000
CVE-2024-10593,0,0,e28a99b48969e1a313aba8292fb69cb06a33e577a3b44ed9a086cf36da205fd0,2024-11-13T17:01:16.850000
CVE-2024-10594,0,0,200a471d94e4be220f531c5e895c237e0168d2ba1746ee534b8d95f042c55c0a,2024-11-05T17:05:10.533000
@ -244091,7 +244091,7 @@ CVE-2024-10842,0,0,6a1bf2d708af31633adcaf31229d3f756d0a973aee6bc08d09ef2355ecb0b
CVE-2024-10844,0,0,f5f4e0d5b5f81450d4b277cd5f34ac79ece27a20b2ef20dabc17527d2440f7d7,2024-11-06T22:38:13.800000
CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d49362ab,2024-11-06T22:38:03.347000
CVE-2024-10846,0,0,adbdfdb091c30393b6913f81c331a44c1331a4a41abb35d44b12909f384f27bb,2025-01-23T16:15:33.533000
CVE-2024-10847,1,1,838bae6403cb33b7077a506b43d42ea601f7b8fa53a944d1770799bb015a0e33,2025-01-30T14:15:30.893000
CVE-2024-10847,0,0,838bae6403cb33b7077a506b43d42ea601f7b8fa53a944d1770799bb015a0e33,2025-01-30T14:15:30.893000
CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000
CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000
CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000
@ -244741,7 +244741,7 @@ CVE-2024-11579,0,0,a0e8ebe7e9d438299b2b08bfdc182fcceaa66df7c647d83ef69f75c205558
CVE-2024-1158,0,0,cc758ded81eb4716575c03ddb54fc317f50917a2b43ee2a36cb438fc8fb74732,2024-11-21T08:49:55.723000
CVE-2024-11580,0,0,2902a2896d70a09162eab174719b1f937a00063abe723be1bb8861e8aaeb5891,2024-12-20T17:35:39.513000
CVE-2024-11581,0,0,54519437e00f96c23a8c70641ca6b3fe6fa4bcc79e1443a9a5c2a0ca7b114449,2024-12-20T17:32:03.967000
CVE-2024-11583,1,1,f472b01ce6c13e1457606ab4af568bada41f1aeee24a7960df01237e020858b7,2025-01-30T14:15:31.050000
CVE-2024-11583,0,0,f472b01ce6c13e1457606ab4af568bada41f1aeee24a7960df01237e020858b7,2025-01-30T14:15:31.050000
CVE-2024-11585,0,0,d73bc146050e187d4f7b957a4961cb8470ba9ebdf69a5843cdfa9e686c284b8e,2024-12-06T06:15:22.723000
CVE-2024-11586,0,0,acbb89c7a73edeb9af616fbe1a7bbf2dff72a4d1c23f19e17196df7c7df36053,2024-11-25T18:15:10.123000
CVE-2024-11587,0,0,81baaf77887a06e025fa560b05def938c80026d91eed087e0a42822793b3fe0a,2024-11-22T21:15:27.747000
@ -244757,7 +244757,7 @@ CVE-2024-11597,0,0,02a202263b5ecf26ea23624593cf12d47f7cf0eccc4d2aae83c90ae107800
CVE-2024-11598,0,0,4c9ea68ab008ad54c4649b6db219ede4f98d4df1bf8b53deea7aecef314d9926,2025-01-23T20:12:36.087000
CVE-2024-11599,0,0,a26c993827526d1af73bfe90f868b9bfb9a722b6b2267b567215827aef919d86,2024-11-28T10:15:06.657000
CVE-2024-1160,0,0,12b04de1fea0a3119efc89b33ba5d2f3d172880f1becfa13297009e56b4efb45,2024-11-21T08:49:55.987000
CVE-2024-11600,1,1,24df2702d834559ce9e8b4b379bcd0a20f586e8eeaa8c6b28d190f5b82f76dc2,2025-01-30T14:15:31.213000
CVE-2024-11600,0,0,24df2702d834559ce9e8b4b379bcd0a20f586e8eeaa8c6b28d190f5b82f76dc2,2025-01-30T14:15:31.213000
CVE-2024-11601,0,0,51a555e6d26623f2054da12f000d146e4e1662608f2c3f75f4d4bafe7cada303,2024-11-22T06:15:19.830000
CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d5c1,2024-12-27T19:15:07.253000
CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000
@ -244882,7 +244882,7 @@ CVE-2024-11726,0,0,52ec257cc912e0d76c02566a0817a6d6c56aec1da71b6fef622266b2f6521
CVE-2024-11727,0,0,74ce7fa8cdfe22d5e7361f3d2dc50d23f9504f53bdcf31e2233dafec5ae3422b,2024-12-12T07:15:09.107000
CVE-2024-11728,0,0,6b4bed5fd27460e210abe0c2b9d4d46303cd8332bea3bc720df94689692e5ca9,2024-12-06T10:15:05.853000
CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f41d7,2024-12-06T11:15:07.837000
CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000
CVE-2024-1173,0,1,33edb1a3e1b2634dd71181b0bb1a8dacccb34381ecfb73de1bf2375ab2540b0e,2025-01-30T15:55:07.793000
CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000
CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000
CVE-2024-11733,0,0,95cac917a7c172e334d8c411bd7e32914cf640694af4ffd3d3de8eaf57fddbb7,2025-01-03T23:15:06.313000
@ -245208,7 +245208,7 @@ CVE-2024-12099,0,0,82c97da21165b875b9d77b9a11ed031ee03fad8a14b90d2e80c74afeac6e2
CVE-2024-1210,0,0,f5a9389cac94cbfcfa3f0d961d1ea27115bf7afa331ce2988db15dbaf2efdf76,2024-11-21T08:50:02.867000
CVE-2024-12100,0,0,5d9bee140d619efc5bcb5724e98abb1747cc29824dfdae10a66de74940256d24,2024-12-24T06:15:32.830000
CVE-2024-12101,0,0,cf6330eb409e982923b4b0b78cc8d64ad396889b9513f5530cedf911c9fe2802,2024-12-03T16:15:20.910000
CVE-2024-12102,1,1,b4e6a99b31e7d21e462104301eccacd88b42aca38a5f10f898d2c359436eaa6b,2025-01-30T14:15:31.377000
CVE-2024-12102,0,0,b4e6a99b31e7d21e462104301eccacd88b42aca38a5f10f898d2c359436eaa6b,2025-01-30T14:15:31.377000
CVE-2024-12103,0,0,2ab2e8f87386f7081d0b465f2935a38be96d397e85c0b3ea2192a2941673c10d,2024-12-24T10:15:05.820000
CVE-2024-12104,0,0,0d36b28173f2490a5f2c2374dcbff849d0f485f022a4491a6010382cd1220d27,2025-01-21T10:15:07.590000
CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3cb2,2025-01-08T14:15:25.310000
@ -245231,7 +245231,7 @@ CVE-2024-12124,0,0,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae947869789
CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000
CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000
CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000
CVE-2024-12129,1,1,f6685d3eef2e4a6d48e8b33e6ef4511a0b221ea71ef34d6d3301b522ad851dfb,2025-01-30T14:15:31.530000
CVE-2024-12129,0,0,f6685d3eef2e4a6d48e8b33e6ef4511a0b221ea71ef34d6d3301b522ad851dfb,2025-01-30T14:15:31.530000
CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31c5,2025-01-29T16:25:21.947000
CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000
CVE-2024-12131,0,0,13f02a71aaa32136e25257b1d5a02357f3bae8da21875c47830a0a64cb341eb0,2025-01-07T13:15:06.440000
@ -245255,7 +245255,7 @@ CVE-2024-12159,0,0,a32ab90e71369424b90b3e2689249267ea99ad1f074ba09875b9ba6ba23f1
CVE-2024-1216,0,0,2ac4284b62a708a705b7ab9ac6ff4ec2f3952b584d951b1f83e5c9b3524c781f,2024-03-21T02:51:38.760000
CVE-2024-12160,0,0,2c6191a6a825b29c030b8d3eb20fe09ec5c665c03e8080de9d738d6bc79c2538,2024-12-12T09:15:05.220000
CVE-2024-12162,0,0,74000f06bf15c8250a3d3772859e4a16bab71460bbdb53ca978f73d57f64b12c,2024-12-12T05:15:11.750000
CVE-2024-12163,0,0,f2907af9c955110c6fa8c424e2a24da47ebc01f1fae6a51ccd6ca53baf88e25e,2025-01-30T06:15:29.113000
CVE-2024-12163,0,1,f68ce26901f4452755217e2c50c24c16d3fce2d189de2fc20126ec75a096c8e7,2025-01-30T16:15:29.770000
CVE-2024-12165,0,0,565f6113f161726a36dcd8f87106f931ffa1dad23df770638714143fb4529a90,2024-12-07T02:15:18.790000
CVE-2024-12166,0,0,318717b4a3842e9291a2442fedeb1198ccbbca486552d6b1e9ef8aa65b1bfc3e,2024-12-07T02:15:18.923000
CVE-2024-12167,0,0,648fdeb771c33890685bfca6029b01ac44a17697a1725a67472f5321f6e1f66d,2024-12-07T02:15:19.057000
@ -245265,7 +245265,7 @@ CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e
CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000
CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000
CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000
CVE-2024-12177,1,1,27a135e31306aaf57a119cb4065b70820cb413cc8b5194687e60879d6a50dbbb,2025-01-30T14:15:31.700000
CVE-2024-12177,0,0,27a135e31306aaf57a119cb4065b70820cb413cc8b5194687e60879d6a50dbbb,2025-01-30T14:15:31.700000
CVE-2024-12178,0,0,7f122f679ec44198086d5b8f502378af9440326f09bbe9129d1ad50cea9a44a0,2025-01-29T17:15:27.053000
CVE-2024-12179,0,0,79f801543b52988871a97a9ab6a3f239c3393b91f218d80d8c61b3559520eb82,2025-01-29T17:15:27.160000
CVE-2024-1218,0,0,c9de9306acde036a45691c4d0b8ae8a7e3f4e2e79b0a0e0c34252fff4844a90b,2025-01-19T02:53:15.150000
@ -245348,7 +245348,7 @@ CVE-2024-12264,0,0,e129c73367ffc6e13d3dd51e083cadc63c28a6ddf76a9744461af75a10c38
CVE-2024-12265,0,0,4ecaf6258b9c646985803002f662a35d37ddc850eb892429f8568423d5e8ff62,2024-12-12T06:15:24.143000
CVE-2024-12266,0,0,909ac121710013990590ae1f8a6d6364fd581e2e3e734e8055f1296c676eb281,2024-12-24T05:15:06.433000
CVE-2024-12268,0,0,57b1dbc34c4fad3378e18637f11a9af5fae95800fe2a5a30ffdcb7012568a613,2024-12-24T11:15:07.623000
CVE-2024-12269,1,1,3dacabee7f0840c8bb97b1b0f83aa1d1097c1a4d6e6d5a87c2ba0c49bbf47e5d,2025-01-30T14:15:31.857000
CVE-2024-12269,0,0,3dacabee7f0840c8bb97b1b0f83aa1d1097c1a4d6e6d5a87c2ba0c49bbf47e5d,2025-01-30T14:15:31.857000
CVE-2024-1227,0,0,2b74966c63acb4b53db9100814c0ea98b900c2b18de594c13a326b21bfb265c8,2024-11-21T08:50:06.103000
CVE-2024-12270,0,0,a59b36ad08a62409fa966fc5cef53e6796ba20371cadd9c7e001162bc2771bae,2024-12-07T10:15:06.200000
CVE-2024-12271,0,0,e756524ee3996486f46fc9dfb0848744c8a90daec55e50296545ffd31d194dcb,2024-12-12T13:15:07.570000
@ -245371,7 +245371,7 @@ CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192e
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000
CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000
CVE-2024-12299,1,1,3d1e0b3effd81e0f2bf522b02177a2bb28a9f3d77b4b13a5e2533f2689621cb2,2025-01-30T14:15:32.020000
CVE-2024-12299,0,0,3d1e0b3effd81e0f2bf522b02177a2bb28a9f3d77b4b13a5e2533f2689621cb2,2025-01-30T14:15:32.020000
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000
CVE-2024-12302,0,0,2e7f53c232830ebe1e41c432ae300655d2811aa163d5fbfa007adf0b96c594e5,2025-01-06T14:15:08.023000
@ -245386,7 +245386,7 @@ CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b60524
CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000
CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
CVE-2024-12320,1,1,2e0220b54db3ce53c8e28c7cea532974eda37e07565d06a719e50c41583a2e8f,2025-01-30T14:15:32.180000
CVE-2024-12320,0,0,2e0220b54db3ce53c8e28c7cea532974eda37e07565d06a719e50c41583a2e8f,2025-01-30T14:15:32.180000
CVE-2024-12321,0,0,748f591377b6b8cf6cbb2660f92634f56c6fbfdcecc2cf9954a29294f469c112,2025-01-27T21:15:11.763000
CVE-2024-12322,0,0,84247a031ea6a724314932d42a7460599ae4e2c971abe58241a0cfedf89e325e,2025-01-07T05:15:18.063000
CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000
@ -245452,7 +245452,7 @@ CVE-2024-12397,0,0,661288be67552f431f0a0bf144bed2d313b12b592e50cdc78451d7c1272f6
CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000
CVE-2024-12399,0,0,93b1cedb21d025aa2a7c64672a0deaba138e4d19bf64f3997c97cc28126eb1c9,2025-01-17T10:15:06.697000
CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000
CVE-2024-12400,0,0,8a8fb219c8377c7d27f8aaf5fc8b1b7bf89ec6ec58a08cb4462aa0bef84734e9,2025-01-30T06:15:29.223000
CVE-2024-12400,0,1,f3767528c7140922135374a4da3cbdd155ddd43b7964068ae7992961611421bb,2025-01-30T16:15:29.907000
CVE-2024-12401,0,0,ba741c7b51198b95eba245807f65253a1c54ea777ddd918337cd97bd144396fe,2024-12-12T09:15:05.790000
CVE-2024-12402,0,0,36e3ce185be6b6d4714b97d0b9e949abc75eb52a2fa273901aa2b4c0f962b168,2025-01-07T04:15:07.990000
CVE-2024-12403,0,0,f86e636eddc7cdb9b8bf4adcd4515238330a01facfd5633ebda91511666728a4,2025-01-15T10:15:07.433000
@ -245461,7 +245461,7 @@ CVE-2024-12405,0,0,631a04fc890c6ac2fbe1fd822df1e67f289f1ef7b029b11f0950a96d4993c
CVE-2024-12406,0,0,3a24bd925fcaee835bc0ee30f7ad38b16626ae1e5c8470fedd28227d3dd60123,2024-12-12T05:15:12.210000
CVE-2024-12407,0,0,90207e0ed6e0318c2d7902b5431b42ac4002510e342567216f54a8133c6105ee,2025-01-11T08:15:25.093000
CVE-2024-12408,0,0,c9a97800ebdc971055fe039c0934b7c899913355f0545cc6cb71b6253bd484f6,2024-12-21T10:15:08.067000
CVE-2024-12409,0,1,bf1d47030cc577bcd654ec48364331cf7dd4c0bca859fde8f426668b7fa2f6a7,2025-01-30T14:15:32.353000
CVE-2024-12409,0,0,bf1d47030cc577bcd654ec48364331cf7dd4c0bca859fde8f426668b7fa2f6a7,2025-01-30T14:15:32.353000
CVE-2024-1241,0,0,ba82bb77c28ed45b324839e72710669d8c2af006c45eeed23dee90a28ff67ea8,2024-11-21T08:50:08.490000
CVE-2024-12411,0,0,fca8eab422ceda64b215d958b150a7f03625a9aa9df8afa22fe2b27e73430e47,2024-12-14T05:15:10.437000
CVE-2024-12412,0,0,73803094a00fe18ec7862bec4f3d5df80208f9d752aff4dcb1f7ac4bf52a33cb,2025-01-11T08:15:25.320000
@ -245491,14 +245491,14 @@ CVE-2024-12439,0,0,420a25774a9855a1359464fcce67f5e77708758c4ce4e8a4cf01d7827cdef
CVE-2024-12440,0,0,cb3f3cdeb28ee128f4e377a1e88fe0d5d8a12f8b5075dc54d11bdf744b0def01,2025-01-07T06:15:16.630000
CVE-2024-12441,0,0,60177bfa0d9dcd79729d5ab6a51352067dd3b55deb7861fd956eb7f2cdfb3058,2024-12-12T05:15:12.703000
CVE-2024-12443,0,0,f07c0805b285e00ba917c2d7fc7d6d01900a808064fd2463aaf6cc786dd6eda1,2024-12-16T23:15:06.097000
CVE-2024-12444,1,1,80cd1cb2d6f171a83f38572e981b4942f00913a860c8eaed3df3099516e773c2,2025-01-30T14:15:32.530000
CVE-2024-12444,0,0,80cd1cb2d6f171a83f38572e981b4942f00913a860c8eaed3df3099516e773c2,2025-01-30T14:15:32.530000
CVE-2024-12445,0,0,abd0886eb5f566604f350ee11c44534aacbf58aeda080732befada13d508b61f,2025-01-07T05:15:19.083000
CVE-2024-12446,0,0,b02d1d791b4cf7afeb09eb0c21565790a25f436f0af246a7f2fa3fcff09dc38c,2024-12-14T07:15:07.040000
CVE-2024-12447,0,0,5037bc53ba4fa77c34e124f2cad2eb5580f0278ba0adbdec7fe60ff9c399f942,2024-12-14T05:15:10.670000
CVE-2024-12448,0,0,4923580d5a5f99d530db30df1f25529a66e5faa8f94f1d2c65ae42b9f669a340,2024-12-14T05:15:10.873000
CVE-2024-12449,0,0,5fcc22f14406311e0fc83130f321673a9681bcd45ccd4b15a7e6df2428ef10f4,2024-12-18T04:15:08.103000
CVE-2024-1245,0,0,95e8542ba13fb11ab7fe96b21acceb5168a3d85655e46eadbf4243e255ea26c4,2024-11-21T08:50:08.740000
CVE-2024-12451,1,1,969b0b56eefbb42884aadd4325cf37abe694a56459878f489be4825ac2662172,2025-01-30T14:15:32.687000
CVE-2024-12451,0,0,969b0b56eefbb42884aadd4325cf37abe694a56459878f489be4825ac2662172,2025-01-30T14:15:32.687000
CVE-2024-12453,0,0,76ad3f9c42446921081688745051c38b136a07ee1614804cd400b083fd2b395b,2025-01-07T05:15:19.260000
CVE-2024-12454,0,0,8d73661dfeacd698ba1638817b062fe681bc6bd2d9cfe150642a15e6ed3c799a,2024-12-18T10:15:08.117000
CVE-2024-12457,0,0,8b6dcd10765fdf34de144f9bc8c49e92cdcb9e82bb357349c5178d12bb4f5cd7,2025-01-07T05:15:19.453000
@ -245649,7 +245649,7 @@ CVE-2024-12633,0,0,aa2de65b34cad526fad2ad4462ad560794d8e7fd2121b7b4323cbcbfceffb
CVE-2024-12635,0,0,3c7aa75fcbe7aad344d7ab6a29830b91315b8c91a45f35c3746137d636be222e,2024-12-21T07:15:09.380000
CVE-2024-12636,0,0,42a82168ce07b7a4b358fd4a7a39c0f3a390399d55754f2ae0215aa2892ce194,2024-12-25T05:15:08.067000
CVE-2024-12637,0,0,0a511df96db32a9b14e55f4c161efe09af214577bd9827e9baeb5f267eebf5c8,2025-01-17T07:15:26.773000
CVE-2024-12638,0,0,5dce2bbca13ffbcced52a1c47fe15d01e4e2f18249768352fe9dda4a860788cf,2025-01-30T06:15:29.333000
CVE-2024-12638,0,1,395841a14d5dc8d7054b6beb62e27e260f6aeb78b3ed6d5dfcb48905a16e21e1,2025-01-30T16:15:30.030000
CVE-2024-1264,0,0,0a400b50d7c5417af4540851d66c40fe9607cfb1bbd030ca37354551feca3778,2024-11-21T08:50:11.460000
CVE-2024-12641,0,0,6e6b1aa53bd8553222049d57d01527b85aa1b46f94f8dd550c03e6967ee19a5d,2024-12-16T07:15:05.787000
CVE-2024-12642,0,0,a401d76248880d01d3fa48196afb4bda331b127bc27a94608f221d11c2863778,2024-12-16T07:15:06.023000
@ -245702,8 +245702,8 @@ CVE-2024-12700,0,0,c161ba4e53ce97164ad141dae69781306c514830255596765fa43a667338f
CVE-2024-12701,0,0,cd6b08f28311d78389b2479a22ff0ce00f8e2d386b94e3b072290f303be9f2ff,2025-01-04T08:15:06.670000
CVE-2024-12703,0,0,c565183eb12abdb4955b338c8bd40c3325b4b163523b9159fd30bcbf11e5936b,2025-01-17T11:15:08.903000
CVE-2024-12705,0,0,35bbeaf0ccf51c179b5b23432f4a08b92b558523c47c996d329a2f0b90b85502,2025-01-29T22:15:28.800000
CVE-2024-12708,0,0,524be7962f883ad9a0d6d9b36d3c868f692fb50255f949fc2ecccd304cafabbc,2025-01-30T06:15:29.440000
CVE-2024-12709,0,0,f897c0b9684a18484cc04977ff44371300c3ef356b44076a227dffe251816075,2025-01-30T06:15:29.557000
CVE-2024-12708,0,1,0e0bfdeade6eea221e77c1d3b2af069d34832446a71c8c71d6cd64151bb7cf0a,2025-01-30T16:15:30.207000
CVE-2024-12709,0,1,873b9d3d124f79b40a8f64b03c6ab69ee38f8b0335603debb8cd542e2f60d0be,2025-01-30T16:15:30.337000
CVE-2024-1271,0,0,d5b27a7a2ae180d57194d51f3421939a6fa1fd034c14866b136beeb3b91200c4,2024-11-19T20:15:30.007000
CVE-2024-12710,0,0,47453914e1b74979b7cb104fe22d1ae9255e40512305ca5e5237f17f98821657,2024-12-24T05:15:07.193000
CVE-2024-12711,0,0,9b677fb642029180fdaa553160a64c71aa90c9b6592fc5efc1139f03e5c4de5f,2025-01-07T12:15:24.503000
@ -245771,8 +245771,8 @@ CVE-2024-12817,0,0,32f9e7e0f8e1095319b7a827501ce7d109efcd2bf6309a60da88244f6164d
CVE-2024-12818,0,0,84584f689c6c77a45a4884a21e812302b20927c35cf898200120c33746d2aaa2,2025-01-15T10:15:07.803000
CVE-2024-12819,0,0,d67b85742967f9e166e23a2e5c4440d086b3b3988f6b73108d4bee255219b06d,2025-01-09T11:15:15.657000
CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000
CVE-2024-12821,1,1,e588fd0d09947b07d09c8d3f282b63ea0e1f492dc00ee4435ee9c9b82132788c,2025-01-30T14:15:32.843000
CVE-2024-12822,1,1,192c28e8527adecfccce851b33e27323e02d5b46aeeffff5461062f4314ed85b,2025-01-30T14:15:33.017000
CVE-2024-12821,0,0,e588fd0d09947b07d09c8d3f282b63ea0e1f492dc00ee4435ee9c9b82132788c,2025-01-30T14:15:32.843000
CVE-2024-12822,0,0,192c28e8527adecfccce851b33e27323e02d5b46aeeffff5461062f4314ed85b,2025-01-30T14:15:33.017000
CVE-2024-12826,0,0,c720c0675605f102a13449f7c719465cad74869404c1c6afa4c9516f512ea0ef,2025-01-25T08:15:08.463000
CVE-2024-12828,0,0,a29f7d175d08af9e9a3e3b2d9a239843d4c47c7b84f9529c7b9ddf19ae5c7fea,2024-12-30T17:15:07.717000
CVE-2024-12829,0,0,b6def8373fb939ecec35d929ec57c311d0480519af7a0919a5038b5b832e9ed5,2025-01-03T17:46:48.507000
@ -245806,7 +245806,7 @@ CVE-2024-12855,0,0,a46d762f03387b8afb1e9185d9de027ca31f0ae538ce006a6a77ed552320c
CVE-2024-12856,0,0,9babd12091bd3794c40f556b84241a138bc1e45b107552b0272431ce40e98129,2024-12-27T18:15:23.677000
CVE-2024-12857,0,0,ef7076837ea8a02d79d9d26c8f73cc7fa350cecedb358a5c02f6632362e827cc,2025-01-24T19:18:01.417000
CVE-2024-1286,0,0,3a37afba636befcbf537a255eb60a76fe80040636283609c3669d2692aee914a,2024-11-21T08:50:14.037000
CVE-2024-12861,1,1,8a93d399c32f464da067c6d51dff2d544ffb8ae828286360d6f36cf768b3a2c1,2025-01-30T14:15:33.170000
CVE-2024-12861,0,0,8a93d399c32f464da067c6d51dff2d544ffb8ae828286360d6f36cf768b3a2c1,2025-01-30T14:15:33.170000
CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a004,2024-12-20T20:15:22.740000
CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000
CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000
@ -246193,8 +246193,8 @@ CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655
CVE-2024-13335,0,0,2fcef25251bb68a715e890eb0cf4e30f6ed93385a9d1ce3a44dbe1289f4c0426,2025-01-24T11:15:07.973000
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
CVE-2024-13340,0,0,22b196622d46a895cf0cf3983511bd49f73945f1fe7c52be27f9e67ce848d4e2,2025-01-23T12:15:27.890000
CVE-2024-13348,0,0,e26381eb03e5e67f555cf928c3e9a2305c99dcf3e03e09bd50c1f054f780346b,2025-01-14T04:15:09.200000
CVE-2024-13349,1,1,e9920aabc8f336ead23e99b11b815dccb9cedb307a97160583074645e523a983,2025-01-30T14:15:33.333000
CVE-2024-13348,0,1,e7356b4b7de40bfcab5dcbdec8635d94ba57c9cc43546ece560a6873afe1ba28,2025-01-30T15:15:16.223000
CVE-2024-13349,0,0,e9920aabc8f336ead23e99b11b815dccb9cedb307a97160583074645e523a983,2025-01-30T14:15:33.333000
CVE-2024-1335,0,0,82fb69da532892baa7a81804ae338bd46e69a8bbbad77be8c22b678b91bcc8f9,2024-12-31T16:50:11.167000
CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508284,2025-01-15T10:15:07.993000
CVE-2024-13354,0,0,5de8a07beb3503362800c3c9a7e68d19454bfcd982cb7525cd68c521c68ce55c,2025-01-24T11:15:08.887000
@ -246211,7 +246211,7 @@ CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc4
CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000
CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000
CVE-2024-1338,0,0,dc2761903a1c29795472be9ec50c80e554c7222ddc44792707b7eb37ea2462f8,2024-12-31T16:51:41.113000
CVE-2024-13380,1,1,81a0bd543c8ad2f33b447b647e9e896b1cd6a0731d1739ec13c8091622fb149f,2025-01-30T14:15:33.513000
CVE-2024-13380,0,0,81a0bd543c8ad2f33b447b647e9e896b1cd6a0731d1739ec13c8091622fb149f,2025-01-30T14:15:33.513000
CVE-2024-13385,0,0,341bf9c15400cae53ddc0851921970fc70795f9f5473739da6d466eaaa0f96aa,2025-01-18T07:15:08.463000
CVE-2024-13386,0,0,6ff136adf169af3d89231135a7ce4b15faa5760d31440cb4c68dca430369b948,2025-01-17T07:15:27.300000
CVE-2024-13387,0,0,4fa5b6a4b1e6e7fbc2f3075a5d8980b29e2968b35b02e0f8e5098804434c72ad,2025-01-16T10:15:09.103000
@ -246223,7 +246223,7 @@ CVE-2024-13393,0,0,6c538726beb67e787d4cc0c97ae28498348fafb8453c26bd442a25ec75fb4
CVE-2024-13394,0,0,2f438b906efb781207eeefa07105a693bc0286f21e9f9257684cfec9ce3d8d32,2025-01-15T06:15:16.150000
CVE-2024-13398,0,0,1cf1394b81ba2d9f5d04722bdb6d4c350d6d6a7eb8c0a059d873a1872c1d84e5,2025-01-17T05:15:08.613000
CVE-2024-1340,0,0,779cbb4786989b99b13d0df5bfadd47a6bb17fb76227d8a826f245b565dc9020,2024-11-21T08:50:22.180000
CVE-2024-13400,1,1,34740cf0471b61baf60d00c1f8ff7acf3ccfa0b1eeded6af29d51e1069bf370e,2025-01-30T14:15:33.710000
CVE-2024-13400,0,0,34740cf0471b61baf60d00c1f8ff7acf3ccfa0b1eeded6af29d51e1069bf370e,2025-01-30T14:15:33.710000
CVE-2024-13401,0,0,5efe32d869945c8cf2c8e98762f61d5eb40d85526a7f385be1d59dce88509538,2025-01-17T05:15:09.077000
CVE-2024-13404,0,0,5bb170ff9b5817ff303f75d023f712e8f9e23d487df8a7d634e98e82d104b8cd,2025-01-21T10:15:07.823000
CVE-2024-13406,0,0,3a9e7471bf5857762896fdd475ef755ed514b70430254f571b98831752a93703,2025-01-24T21:20:06.183000
@ -246245,13 +246245,13 @@ CVE-2024-13448,0,0,d06b5093c3b878141c9c6b7291c254e64929eea876294371f5adcd8b69fe2
CVE-2024-13449,0,0,b603466190e6e620bd51a093bef2226b1aa9a640893cd2b54c10f03577e6ca0b,2025-01-25T09:15:07.557000
CVE-2024-1345,0,0,7c212e7b361746cfecf33f6e4ed924489ff6a3a938083dd73fe4da2b7b4649da,2024-11-21T08:50:22.667000
CVE-2024-13450,0,0,6d0c6e9ad465925bb0f00b48f72e6f84db20d9e217507e863ef423d4f9e1193a,2025-01-25T09:15:07.733000
CVE-2024-13453,0,1,a30e5bf34e8711a8e0bb7b6adbab5cc5e3dddf7156b7a025dca26c806e70c02c,2025-01-30T14:15:33.873000
CVE-2024-13453,0,0,a30e5bf34e8711a8e0bb7b6adbab5cc5e3dddf7156b7a025dca26c806e70c02c,2025-01-30T14:15:33.873000
CVE-2024-13454,0,0,14313d18c59abf0795f9e65c924b2232675b3f5fcf8c69fe1d32af5f5cac5a65,2025-01-21T20:15:30.793000
CVE-2024-13457,0,0,ee21f13468edd90777973ef610f3f5c579a070972ee0693035f0f1c680be9101,2025-01-30T07:15:07.067000
CVE-2024-13458,0,0,a0d55037d220aaf8fdb1343c6a981e032ff9c796368506b8230ae875396a583f,2025-01-25T08:15:09.337000
CVE-2024-1346,0,0,67674c75c08ebc67974102102d05a3921f8c61d1fe386fe7de33f2c37b3bc24d,2024-11-21T08:50:22.793000
CVE-2024-13460,1,1,db165e050b3a29a73040ab80da8c798ae3d9c2c9765ce3807d2cd6e8bf05aa94,2025-01-30T14:15:34.057000
CVE-2024-13466,1,1,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b460d,2025-01-30T14:15:34.217000
CVE-2024-13460,0,0,db165e050b3a29a73040ab80da8c798ae3d9c2c9765ce3807d2cd6e8bf05aa94,2025-01-30T14:15:34.057000
CVE-2024-13466,0,0,653560f144409636354c1af48613afa8ec813df2848486a87387de21636b460d,2025-01-30T14:15:34.217000
CVE-2024-13467,0,0,bcd6474463b1a69c9a46d9b4d6f6f02b302b85f9777a4b31585c7467fbf3f38a,2025-01-25T08:15:09.520000
CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626ad,2024-12-11T19:24:26.643000
CVE-2024-13470,0,0,cd366f2d848ecaaaa8e2a5a38b4333677f61cb3a569faf0b3b65023a656393a3,2025-01-30T08:15:26.690000
@ -246268,7 +246268,7 @@ CVE-2024-13505,0,0,8cfee4eef351da06016ab9b10f867ee856aa66c9481e93ffeb4ce296549af
CVE-2024-13509,0,0,4c3cf81058c47ca7421d51ef89cc6579be2280b06eaef0c8cd85521c081b3f35,2025-01-28T07:15:08.620000
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
CVE-2024-13511,0,0,3071f1ee4394ed25c0ba5a4414759a0ec6bbc3d07f1733cb6f65493d29a37d83,2025-01-23T10:15:07.253000
CVE-2024-13512,1,1,9901431db3e032b1ac3962e6a7a9a2f96d98557516f0a8005f820c741956d1c5,2025-01-30T14:15:34.413000
CVE-2024-13512,0,0,9901431db3e032b1ac3962e6a7a9a2f96d98557516f0a8005f820c741956d1c5,2025-01-30T14:15:34.413000
CVE-2024-13515,0,0,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000
CVE-2024-13516,0,0,5ffb65a61f80c9c94522737749ad7061abe4071a127f73ee8fe2d406cf9b6f3f,2025-01-18T06:15:27.627000
CVE-2024-13517,0,0,9d057e77f790f2402e4e040e2e1a67384dda92aec0304812a84e741a1082d2fc,2025-01-18T07:15:09.350000
@ -246283,7 +246283,7 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166
CVE-2024-13542,0,0,c45a986aa867dcb8c5f485f5d0834964d3d14a785680faca172769f60f73e69e,2025-01-24T11:15:09.377000
CVE-2024-13545,0,0,eb269cacc159c45695715c4d7fd9f7f0b3c57dc71f3e2654436421591db65c2f,2025-01-24T09:15:22.797000
CVE-2024-13548,0,0,773be214153e433c157dbff720cc5880d3eb87828ad3760ba7d8d4da982d58c8,2025-01-25T08:15:09.687000
CVE-2024-13549,1,1,744c0e4f59eaccbdc9f6858968b61e64cbf917a822f872e49d498b3f43268408,2025-01-30T14:15:34.570000
CVE-2024-13549,0,0,744c0e4f59eaccbdc9f6858968b61e64cbf917a822f872e49d498b3f43268408,2025-01-30T14:15:34.570000
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
CVE-2024-13550,0,0,f9981f1deb805f2a60af3da03768fa1b757685b2867a3f144ba6c75ef5863a95,2025-01-25T08:15:09.847000
CVE-2024-13551,0,0,c0f32b47678190b67b060d76bcd33ea48dd01585e717a7e931b6ea219ab115cf,2025-01-25T08:15:10.007000
@ -246300,7 +246300,7 @@ CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d
CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000
CVE-2024-13593,0,0,b2b99499e28187649419ba62667826b9acba964eaeb31ca5bfaaa794d884f32d,2025-01-23T10:15:07.737000
CVE-2024-13594,0,0,b89d92c59d6589291d5b3e44e449a8d8620a2bd20dcfac4fc41ec59549c64cba,2025-01-24T11:15:09.667000
CVE-2024-13596,1,1,4e2b4c763afce7d18d7b6ddedd830fd1fbe3ac048889bda34a94881079021915,2025-01-30T14:15:34.720000
CVE-2024-13596,0,0,4e2b4c763afce7d18d7b6ddedd830fd1fbe3ac048889bda34a94881079021915,2025-01-30T14:15:34.720000
CVE-2024-13599,0,0,8416ac4ba24e0470447a5d54bcb4a58d565d7b0165c1a9d0f1a855bfbf0c1c7d,2025-01-25T08:15:10.357000
CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000
CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000
@ -246308,16 +246308,16 @@ CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336
CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000
CVE-2024-1364,0,0,47f33fd19586ab96196a2cb0337c2030aca42f1bd8c4ab84cfa2e52c3dbe5e59,2024-11-21T08:50:25.223000
CVE-2024-13642,0,0,305a541671cd97a16b24d4e91a357de627282533e6d955bf781fd96606eff81c,2025-01-30T07:15:08.700000
CVE-2024-13646,1,1,7d9f7f07c384d55c3692314cc87fc38d16ed6b135f5522994aa1f77e4e23bc96,2025-01-30T14:15:34.873000
CVE-2024-13646,0,0,7d9f7f07c384d55c3692314cc87fc38d16ed6b135f5522994aa1f77e4e23bc96,2025-01-30T14:15:34.873000
CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000
CVE-2024-13652,1,1,fe24ee8610e9ff652bc87b947e016c0eff2007c8f9f9d6eca3a867bb541f4fad,2025-01-30T14:15:35.040000
CVE-2024-13652,0,0,fe24ee8610e9ff652bc87b947e016c0eff2007c8f9f9d6eca3a867bb541f4fad,2025-01-30T14:15:35.040000
CVE-2024-13659,0,0,2ab949cac371b153f030d675a94a51cc0bb444218e14414679e2bc62713fba54,2025-01-24T06:15:26.557000
CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000
CVE-2024-13661,1,1,a45266cda63aebd8d8843fbb6b7a71ae38505222510e18ba03648c96ddb771a8,2025-01-30T14:15:35.233000
CVE-2024-13664,1,1,1eb9745d2330cb71866e989696204f297a40dcfb7ab8eb64b8a0bd3e1386b8c3,2025-01-30T14:15:35.390000
CVE-2024-13661,0,0,a45266cda63aebd8d8843fbb6b7a71ae38505222510e18ba03648c96ddb771a8,2025-01-30T14:15:35.233000
CVE-2024-13664,0,0,1eb9745d2330cb71866e989696204f297a40dcfb7ab8eb64b8a0bd3e1386b8c3,2025-01-30T14:15:35.390000
CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5c8,2024-11-21T08:50:25.600000
CVE-2024-13670,1,1,736bf589d2a58d3a8565630672ac5a05df76c82710b1026bd5ab4ad798894ce9,2025-01-30T14:15:35.550000
CVE-2024-13671,1,1,ecff1a97cc02fbd7c0ef79d248205f76192e96f9db03556cef8ebffce9703ec0,2025-01-30T14:15:35.697000
CVE-2024-13670,0,0,736bf589d2a58d3a8565630672ac5a05df76c82710b1026bd5ab4ad798894ce9,2025-01-30T14:15:35.550000
CVE-2024-13671,0,0,ecff1a97cc02fbd7c0ef79d248205f76192e96f9db03556cef8ebffce9703ec0,2025-01-30T14:15:35.697000
CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223f0,2024-11-21T08:50:25.737000
CVE-2024-13680,0,0,f3164c1a021ffb39e27590d49b20eab131951c6817a6dc8655e0dfc9f53950e4,2025-01-24T07:15:06.930000
CVE-2024-13683,0,0,afca8ca5733f1981ab92ff6f92163a36f62ba84bc4cae91c9eb4b4db6612f745,2025-01-24T07:15:08.523000
@ -246326,20 +246326,20 @@ CVE-2024-13694,0,0,ebe38224e859cd407ff4de74de6e70b014035e321c635173f5352f302ebed
CVE-2024-13696,0,0,1705bcf2f6a6958e20414c0c17b533dd95f6dfcba36bb76e0b9f7d75e553f199,2025-01-29T08:15:19.677000
CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000
CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000
CVE-2024-13700,1,1,e93679cc2381dce3d317fec9d2523e30db0fb837ead674488152377ff3e938b4,2025-01-30T14:15:35.853000
CVE-2024-13705,1,1,1dd4287af53a3c1f03830526761c1a8f0457b5d90304ebaff0a8498bf40e684d,2025-01-30T14:15:36.003000
CVE-2024-13706,0,1,896ab8bb2af115d45414847a1b767b393c8983916541b747cee97d71601ce5e0,2025-01-30T14:15:36.180000
CVE-2024-13707,1,1,dbc1b5a717c1082149ce8c2cd9992383140a9b7fd71c9758aaaaf161ef561f5e,2025-01-30T14:15:36.363000
CVE-2024-13700,0,0,e93679cc2381dce3d317fec9d2523e30db0fb837ead674488152377ff3e938b4,2025-01-30T14:15:35.853000
CVE-2024-13705,0,0,1dd4287af53a3c1f03830526761c1a8f0457b5d90304ebaff0a8498bf40e684d,2025-01-30T14:15:36.003000
CVE-2024-13706,0,0,896ab8bb2af115d45414847a1b767b393c8983916541b747cee97d71601ce5e0,2025-01-30T14:15:36.180000
CVE-2024-13707,0,0,dbc1b5a717c1082149ce8c2cd9992383140a9b7fd71c9758aaaaf161ef561f5e,2025-01-30T14:15:36.363000
CVE-2024-13709,0,0,7d11e0e002d231ab97d4c4838853b33e61be12c236e56c435ef75a396b4f88ea,2025-01-25T04:15:07.670000
CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000
CVE-2024-13715,1,1,00dd1b14547b61241c2937f99bfb0f10f10898355f9e9d141a2293b8192ae503,2025-01-30T14:15:36.513000
CVE-2024-13715,0,0,00dd1b14547b61241c2937f99bfb0f10f10898355f9e9d141a2293b8192ae503,2025-01-30T14:15:36.513000
CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000
CVE-2024-13720,1,1,930a6201caacf3179e7308358cbd7fd91fb76d5d924d248613039b01f2eccf5a,2025-01-30T14:15:36.660000
CVE-2024-13720,0,0,930a6201caacf3179e7308358cbd7fd91fb76d5d924d248613039b01f2eccf5a,2025-01-30T14:15:36.660000
CVE-2024-13721,0,0,1ec94cb9c62b02c9472486b901c3addbef65df476872a8f8db6b902dfdcff790,2025-01-25T06:15:27.860000
CVE-2024-1373,0,0,fe1a60358155e50861f1a17ac7fa6b7d28a7605ff8e98d9097ab1950f180ef33,2024-03-11T10:15:49.383000
CVE-2024-13732,0,0,b775a3a52bd8c32b27fbee5637d183d86ad28923005f664ac49c2fca8b421b84,2025-01-30T09:15:08.363000
CVE-2024-1374,0,0,8b967aad89e76e7b7285732fb028781ee942f5f6a3c1468dd34bb1833f269dd3,2024-11-21T08:50:26.443000
CVE-2024-13742,1,1,ccfdf3619ee7777cf156a6ef83438fbc32d42f3488f5fd2e64a4c68390b5df3d,2025-01-30T14:15:36.810000
CVE-2024-13742,0,0,ccfdf3619ee7777cf156a6ef83438fbc32d42f3488f5fd2e64a4c68390b5df3d,2025-01-30T14:15:36.810000
CVE-2024-1375,0,0,be19da9eb494f4d8787330f2f78fc8aabab79724cc539fca66a358b2ab7e8ba7,2024-11-21T08:50:26.593000
CVE-2024-13758,0,0,a097fd11965a28b272757c9dfc06c78d140777aeb26eb25ec8fe43c25c2e8873,2025-01-30T09:15:08.547000
CVE-2024-1376,0,0,34411a3106e4c74f2617f4da0b50ff6e7d812385caea8af0b8361fb64d6e9d04,2024-11-21T08:50:26.737000
@ -246569,7 +246569,7 @@ CVE-2024-1621,0,0,212b3fca00d5946f120096ca5a7a0afc1b2cac9a26b845aa6388948724d529
CVE-2024-1622,0,0,641704d79708c5027cc525cdcdef74d012d3f37e9becbffc2cb36bf8a804f978,2024-11-21T08:50:56.633000
CVE-2024-1623,0,0,11acc09d0781037d56051debbc6de791211a8b87ba326c3093f5bc85aad229af,2025-01-23T18:10:39.310000
CVE-2024-1624,0,0,b1f0918bec96549f8bbfed4a1ac0caeb704927103c0fd16a821022d931105e93,2024-11-21T08:50:56.927000
CVE-2024-1625,0,1,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000
CVE-2024-1625,0,0,36cda0a7b3481cf41435ed5b0227a3fcad5024561ee555ea020abf68435e7cfb,2025-01-30T13:15:09.420000
CVE-2024-1626,0,0,8db5e9a7288598c466eba03561bceefa6719998255d5bf571d808455a162f36c,2025-01-10T14:32:09.173000
CVE-2024-1628,0,0,462aaf7a2aba24826516994be48daf03675e0663819d4ebb8cdd24916637fbda,2024-11-21T08:50:57.333000
CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4d9,2024-11-21T08:50:57.473000
@ -246948,9 +246948,9 @@ CVE-2024-20017,0,0,143cf72499435b0ccdd90f084ca0e975d712eb29509f49566d73ef818212c
CVE-2024-20018,0,0,84e97c4c5a222e8dbb38a24ffbf139bbf2484e04613f1e5919be9604639b141f,2024-11-21T08:51:48.693000
CVE-2024-20019,0,0,0a2ae787333b53137fceb2b1132f066a8a6d0264380966acb5f440a0dead19c2,2024-11-21T08:51:48.877000
CVE-2024-2002,0,0,628e0d3d5e70f788a018f71928e7e72a124582165cb8f9452c98e96fa8eaefc4,2024-11-21T09:08:47.130000
CVE-2024-20020,0,0,be1599fa7152f8e599ed66e965359aa77f217afcfede8d47469a816dc8aa4e30,2024-11-21T08:51:49.063000
CVE-2024-20020,0,1,2bd973d38bfdf711b6af99cf03c5c2cc5b99f8b19617bf2d94211987083b6255,2025-01-30T15:07:55.143000
CVE-2024-20021,0,0,63afd4220ffeff0a0d12b5d0e054876129d39d10656a9ff99dbe643098f3cedb,2024-11-21T08:51:49.180000
CVE-2024-20022,0,0,bef0a2c37e58ec53b3dfeaebc449697d35e62f52b201b239e66e7834e66724b7,2024-11-21T08:51:49.393000
CVE-2024-20022,0,1,6dc25d1e0d27a7926d846c7c2bb03fd84906e5fdec04ecb74006c82a3d0fa0bc,2025-01-30T15:11:44.910000
CVE-2024-20023,0,0,09d6edcbccc95f5d43f4f0911970b5de3733ac0546fe0434f5cc8aa81a35f194,2024-11-21T08:51:49.530000
CVE-2024-20024,0,0,a558ad6b23645a453221eaf9a9b06c62acf918a03b53e68d526e257656acd7ff,2024-11-21T08:51:49.733000
CVE-2024-20025,0,0,3f7a148dd5eb41a7b7c21ede316da08d271973cdda3bca18ea657a87c1e5c1bd,2024-11-21T08:51:49.927000
@ -248175,7 +248175,7 @@ CVE-2024-21396,0,0,727d9383842f94260c8a93654a0b746b928a433f4efb51060705e1103b866
CVE-2024-21397,0,0,40e279eaf9f3416f16ba8fc80d0f531b4bfb03d96c9778e1fa620adced6a8b53,2024-11-21T08:54:16.640000
CVE-2024-21398,0,0,de3fc80fdb08744b424f164fbb17e2bbb34c7453aa78a5d134d918d88ecb9bf9,2025-01-15T22:36:43.943000
CVE-2024-21399,0,0,2dffa4cd262da40a519e66ca454cd27c52f2f7a64b9e59220d76cb819a2492a3,2024-11-21T08:54:16.870000
CVE-2024-2140,0,0,e04d8580c30dec7817045bce899d8636377de80a0de3c339751faf63ec687f4f,2024-11-21T09:09:06.883000
CVE-2024-2140,0,1,f20052e4c895da005a6059150d091c3cf0994709d76e59c360c52385b68f2afd,2025-01-30T15:20:30.003000
CVE-2024-21400,0,0,a872873b0bfdbefda2cec5094d48212a53bd41a16367483affa57e5731e64d1b,2024-11-29T20:52:31.103000
CVE-2024-21401,0,0,97de1eccda66d8a475a753375f0cd8717f46b6500cfb869172b1239d32eab1ed,2024-11-21T08:54:17.110000
CVE-2024-21402,0,0,1912d6bac77f538eeca0523ea2d091d6eff59c0ca3736c8afe1a3aa82c7d68eb,2024-11-21T08:54:17.230000
@ -248186,7 +248186,7 @@ CVE-2024-21406,0,0,c3c5e6f5abd31ba504c5e779a20922c9520fef7dad2cf137662a3736daac3
CVE-2024-21407,0,0,61ca144d76c93aa5467e49bd9c2efd72d906e8b334691cc56a48356a7e8e1044,2024-11-21T08:54:17.900000
CVE-2024-21408,0,0,a6229327b01f5c72f23988c3a60a0a48d9605f36b6855597610f5db381fdcfcb,2024-11-21T08:54:18.060000
CVE-2024-21409,0,0,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000
CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000
CVE-2024-2141,0,1,9e81dc4008e280636b3df3b06832bc47e054ab7f464649607ad8242783bd7cc7,2025-01-30T15:20:56.253000
CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000
CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000
CVE-2024-21412,0,0,fe6d0090a3119f8d25267196b6a07a7c56807e1de815457f2dcf42a8c64f6c87,2024-11-29T15:25:25.097000
@ -248197,7 +248197,7 @@ CVE-2024-21416,0,0,93f002464d825de469964fa8d43a5472864f4628746c95028532cc0c5cfb1
CVE-2024-21417,0,0,b241f9d83014e4a156b41d2c2f0ed30e2be20a18f3cb27885bff56d4c78a5183,2025-01-09T13:59:37.857000
CVE-2024-21418,0,0,f32851cbbca0a03afdc0a119babc5fa51c261b1380e1a035fd467fecb985d1cb,2024-12-27T18:05:13.933000
CVE-2024-21419,0,0,3cb3fdb5be67b19326a793bdd9f0d7cc48c79a6f3fd2ccef4d9014d402593d28,2024-11-29T20:52:29.267000
CVE-2024-2142,0,0,c318dba0209d3ec013e13acbf3bb96f3ae1d78956d6f11ffc31b2eb03a294c49,2024-11-21T09:09:07.130000
CVE-2024-2142,0,1,faeeccdaf6766103e7b666b6819c55aaa570edff29e7156551ec7a9de8a60d7c,2025-01-30T15:21:11.450000
CVE-2024-21420,0,0,a004a088ff4068dab42258a5056ff38772eed2377a2d08b691f3a79d4ff39e33,2024-11-21T08:54:19.540000
CVE-2024-21421,0,0,ed338fff59f35749ce3716067c14685623c753eb75dba216ba03a5b62655ebda,2024-12-27T18:25:29.033000
CVE-2024-21423,0,0,bbea988a7d7bfb2f2ac99b02f22f42892d890b4d73ce38691772d73165b4186d,2024-11-29T20:42:08.630000
@ -248207,7 +248207,7 @@ CVE-2024-21426,0,0,50edf6306cb1ce5b303e08364d4006ec275603628e75970c0fb1acf0db53b
CVE-2024-21427,0,0,a17e3791f8438ee030d81372ddcf2e380b43f955c75cddb04d75263db9989f15,2024-11-29T20:49:42.757000
CVE-2024-21428,0,0,34beec50e3cbf79fef40742e3e1fc1c696f99190f8ce8c604dcca2e0eb4f2cca,2025-01-15T22:33:02.860000
CVE-2024-21429,0,0,6ceebfbd2f821b5be335f2f5c5cc08e1d66066dc65ad7b0f02fd03874ac1f2be,2024-11-29T20:43:50.370000
CVE-2024-2143,0,0,3f8800ab3ee439af10c3f3686e880417f53a8822e9ac1646c1e898d83a40b724,2024-11-21T09:09:07.330000
CVE-2024-2143,0,1,2e0df445e05dcc8db1b7ee50ceeecaf62c0d67e7dee92b74fc5043c63a1f7565,2025-01-30T15:21:36.637000
CVE-2024-21430,0,0,0c82706eb5221197af87e1f265a82dd4b412c443a76d8a68cabb9de79ab86d7a,2024-11-29T20:44:32.717000
CVE-2024-21431,0,0,adb271f7c07729890dc0e6600645b6eea17bdcd896aadfcebe92e54de18d6777,2024-11-29T20:44:56.373000
CVE-2024-21432,0,0,383166da4d90f1ee1cfef67e6d182aa84566741c3c0e128fe9520b1f9369cb02,2024-11-29T20:47:25.987000
@ -248218,7 +248218,7 @@ CVE-2024-21436,0,0,5eed3e6af9847f92e1b36108240fcc8a30d91a03697ae2b0fdc413088ef0b
CVE-2024-21437,0,0,622e7d75d7c7f7a80a23c7264df5282bdd22befa79257665765ec77214ad0cde,2024-12-27T18:25:57.807000
CVE-2024-21438,0,0,a304c7403d7aa6a0a77fd43806349c8dea20cced63446529948d3e95a30dc3db,2024-12-05T03:25:34.603000
CVE-2024-21439,0,0,9320239109a42b88071c25ce9913b2b37fbc0d8847236f5446fd193b2f3753ea,2024-12-27T18:26:02.907000
CVE-2024-2144,0,0,bd55c3e242215167621c383bf5dd406306578bd4f4401f4b644791f5fe39f163,2024-11-21T09:09:07.537000
CVE-2024-2144,0,1,b1696af9f52b8ae77b04f58e1abe7eb42b00167240787e306bc52a61ece70360,2025-01-30T15:21:55.593000
CVE-2024-21440,0,0,b962607bd47829e7db36fec7ce783c1b45bc4d93670f7045bf73725a43f545b1,2024-12-05T03:25:52.233000
CVE-2024-21441,0,0,49a659cad7252864e7256a5aa7d62f80cd4df957e3e9d7a812d4a8e134a3be0e,2024-12-05T03:15:20.800000
CVE-2024-21442,0,0,e33f04825343ab789d0034882ebb9e4ece99f0ebb7e7b69c95eec54b9d9a6ddb,2025-01-07T21:18:53.787000
@ -249113,7 +249113,7 @@ CVE-2024-22424,0,0,4b7731f367a9920bfa6d63196c7586a414c888a9627b4f71343b10d0c0047
CVE-2024-22425,0,0,a0b995a155ecd51d340a6103a0e4a3382cbd366ea3ab720f068b304cc436009b,2025-01-23T16:51:37.177000
CVE-2024-22426,0,0,be3b3fc731ba3847ca8704dd6340da9558e51859e5b7009ac88fbb11c3f7944c,2025-01-23T16:50:56.417000
CVE-2024-22428,0,0,97ba898ef03ad044243eee9a2a9f3bf000186b10e7cf1418a4f66ab0f1d4a391,2024-11-21T08:56:16.260000
CVE-2024-22429,0,0,6ad2f8dc5d40032c5a1e997acf2f56cb7ed858b91fddf1268e6e136032103c12,2024-11-21T08:56:16.417000
CVE-2024-22429,0,1,34ad03a3d5f67917de50fbb46797d7e66617bca54d9e60e6a1232520965070ec,2025-01-30T15:48:29.167000
CVE-2024-2243,0,0,4a950216376586fd89744a66774761bf5d4c11f51d4189b3526d8eb951a7fd99,2024-11-21T09:09:20.247000
CVE-2024-22430,0,0,2a1810568056a6f511044de4d96182217762c178be8ffbe452986b5f6211be74,2024-11-21T08:56:16.563000
CVE-2024-22432,0,0,7cb6d348f7ecaed11c214049cfb0cf875f7744a8cbc5b3ed3f17adfd508a21ab,2024-11-21T08:56:16.710000
@ -251323,15 +251323,15 @@ CVE-2024-25694,0,0,9aea7ed506f3e75701da5f8d91f5126ddb9fc6039a2cfaf95eafeb4edbb1a
CVE-2024-25695,0,0,dd69ada188cfe555126eccfc8160d5342bb635827d40f664117ae84700fdfe7e,2025-01-08T14:32:59.223000
CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb6a2,2025-01-08T14:30:29.987000
CVE-2024-25697,0,0,a267efec5273910cac3ec9498c584553301da7dd464ae170402e82473ed69618,2025-01-08T14:22:09.017000
CVE-2024-25698,0,0,19eb454e81d3c195c657f5c68a39132668f17dce0e38c56018a5f756122188c5,2024-11-21T09:01:14.170000
CVE-2024-25699,0,0,a504f29e6715a9f4cf15669b900042e866e6989406ef2bfa7e7be1669e7997b8,2024-11-21T09:01:14.283000
CVE-2024-25698,0,1,d8153d0a5f5447d2ed8050d1aff648edef1b78164d821441b8ecfff2f9f3ddd0,2025-01-30T16:18:43
CVE-2024-25699,0,1,2adecc9e6c7b1072773d72f427349412dc90e94c4e67f251b1aa2cd7cacf3e08,2025-01-30T16:23:46.597000
CVE-2024-2570,0,0,8904be72da1cc04949bb577192b9c0d2e6811b77e6cbf72d6c39d9361754ea4c,2024-11-21T09:10:02.120000
CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000
CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc54d,2024-10-16T21:00:36.173000
CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000
CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000
CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000
CVE-2024-25705,0,0,4c85f2126ead3ce3c0774776e6bb6841f004ed364727d984d7e62e5cc1e3ce5b,2024-10-10T12:57:21.987000
CVE-2024-25705,0,1,9a2e1e8760ef10c25bc8bdd61bcca108ac124e06272934d80d0a1be5be3ebc2e,2025-01-30T16:21:48.907000
CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000
CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000
CVE-2024-25708,0,0,a2958d3769e146c03c05682b4b008d9ff8709a1d2a61e12cc9267215854777c9,2025-01-23T18:27:58.827000
@ -251896,12 +251896,12 @@ CVE-2024-2641,0,0,70a70be0b042731ccdc73536925161bf9a9aa50cb2b7e715353e185314654c
CVE-2024-2642,0,0,52ad972556cc065c34954675f727e5508f8caab5590185ce6cde82cc71dc74fb,2024-11-21T09:10:11.963000
CVE-2024-2644,0,0,68b8aac1e80f4d0f9bc1ed0fdb2ec8b978b6cf57d03ff491e5dc225f67fd465f,2024-11-21T09:10:12.093000
CVE-2024-26445,0,0,a574b3250dab9ff47aa2b0031e8d31dbf726d4dcf250f9b570a9d5423bbb84ae,2024-11-21T09:02:25.660000
CVE-2024-2645,0,0,8d4d4eb0ccdc53037fcdc0c86a30f22978cd8e3cab40d5a9983812e8147e09f2,2024-11-21T09:10:12.230000
CVE-2024-2645,0,1,6fb823d4a9b88e90db41973fcb8e2b731f2971c605b6e0b00e416d679a1621d0,2025-01-30T15:39:23.947000
CVE-2024-26450,0,0,44fde4f373d5569241d50bdb30df7d9eed39fdf74554bc5181d04d6ee81e71ae,2024-12-04T21:15:22.447000
CVE-2024-26454,0,0,321d01563e466eb4bb44077770adb4efe3794d2388e227e244b5e1fbc07fe1bc,2024-11-21T09:02:25.983000
CVE-2024-26455,0,0,b602a39340aa0a08d22bea95d20335091929597e145ac5852ed224ca96f28c13,2024-11-21T09:02:26.130000
CVE-2024-26458,0,0,a84cafdaaeb4711178a2af3a2fb066cefb77307207efb491034cc325fa3b809d,2024-12-06T21:15:06.280000
CVE-2024-2646,0,0,4dfbc1a355ed2a49460adae5fb4d41fc9685e53cdf8f791cf296dcfc3cc667f4,2024-11-21T09:10:12.370000
CVE-2024-2646,0,1,151ae367ea355c28dc7616a7c62a3d01bd09810a6ddedafdaea0609aace977ef,2025-01-30T15:34:41.863000
CVE-2024-26461,0,0,88cfb89c75caa3fbb98958498da2cadb2df05ab5f4cd5d1d1f54ba1cb18b653a,2024-11-21T09:02:26.477000
CVE-2024-26462,0,0,59061cbd0e0ef528389a9179ee133da7a4327898f7c01148c16af923d1832991,2024-11-21T09:02:27.010000
CVE-2024-26464,0,0,4ab3cf87be607a3f2e4c00e75552541f89691b136bdc5e46f36bd1de5e4f294e,2024-02-28T15:15:09.390000
@ -251917,13 +251917,13 @@ CVE-2024-26472,0,0,886a2fc774cca6e7209753367afa5a190bb62651cd1c25e70722074ee2126
CVE-2024-26473,0,0,00fce609accad83d07750bd45b1342c1c6ea4b9d7793b3dfa144586b59ed3298,2024-11-21T09:02:28.697000
CVE-2024-26475,0,0,0139d49d19a67dbd279a84d67de73593691348dff5def951bdb44243f5237645,2025-01-23T19:19:58.217000
CVE-2024-26476,0,0,8d9df15e765bbf5a9750f7a0d9952d7d99b32a5699906b57f431687265856ba9,2024-11-21T09:02:29.043000
CVE-2024-2648,0,1,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000
CVE-2024-2648,0,0,fd75622a3bc55c9dc91d2a9870fe12b1e82fa9ee0edd8a43c661dad7ea4c7d6e,2025-01-30T14:45:12.507000
CVE-2024-26481,0,0,27cd2dd704778bc0c175f0416f8065c950331ff365164eeacdcc041662290a87,2024-11-21T09:02:29.270000
CVE-2024-26482,0,0,d5197da6409ecd6e992ef12cae051a9fa963c093a6102783a8853c0f5a5a7603,2024-11-21T09:02:29.480000
CVE-2024-26483,0,0,c59a993a5964f48545747ef2268eb7fa595ac26729264347074806473fe6b6f5,2024-11-21T09:02:29.690000
CVE-2024-26484,0,0,64a21bd08323ab7879d0b6b9b7d5f94dfd1a274690483cc7221c08a4f0e267ba,2024-11-21T09:02:29.907000
CVE-2024-26489,0,0,4ba681f8802ea2313b82597fc4402aaa8b2cc7cfa96e804d58a078246f0f48df,2024-11-21T09:02:30.127000
CVE-2024-2649,0,1,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5a1,2025-01-30T14:35:30.467000
CVE-2024-2649,0,0,e43b84cba989fa0abf3c519960415eee06d835d3499e6540f75ffa391d3fb5a1,2025-01-30T14:35:30.467000
CVE-2024-26490,0,0,5d881f1c01fce0a8d045898f401c1fdce23d0fcbcfe7be54413530239baae4de,2024-11-21T09:02:30.263000
CVE-2024-26491,0,0,c21263bce7ab5e4914f382cea90ce616eec96f5c4ee3ce13ab73daf3ca946d29,2024-11-21T09:02:30.480000
CVE-2024-26492,0,0,9627b0f85e6c71953ddc8ad575684843b848841f59336ebddbc7ed81a95e3765,2024-11-21T09:02:30.693000
@ -251996,7 +251996,7 @@ CVE-2024-26616,0,0,d3c13b186980b14f4d8626d0c527f78394756d9c40071b7da5f1973da6f30
CVE-2024-26617,0,0,111cb4359671b535aadd933a1100c9999bd2632f9a23d4dc9bf642a8974880ee,2024-12-12T15:34:40.053000
CVE-2024-26618,0,0,3be46d8e494c76778ce26f489ff9887dc160c7e4937984d288af7894c48c4bab,2024-11-21T09:02:42.047000
CVE-2024-26619,0,0,47ef9d76f9826a5a5e8ba4e9250a722df14dc33a348ae160fc1d23110278689d,2024-12-12T15:19:41.967000
CVE-2024-2662,0,0,1c2424fe7ba1293a1a8d258761d5193dbd4dbf056c7fc12b13f4e9af64b90758,2024-11-21T09:10:14.287000
CVE-2024-2662,0,1,400eea2126d6937fee3bff1c429ac8ac91b4221435dbfd3a6d3af1ca7d680318,2025-01-30T16:12:13.900000
CVE-2024-26620,0,0,5c124f9203e78c511ecea4b65d08b8416fe0d09aedbc7125a2416556c4b83f7a,2024-11-21T09:02:42.407000
CVE-2024-26621,0,0,2cef5f3b9034b09be05aedbba02c8c8e6662a458df7f1f7360f9cc5779521c1d,2025-01-16T17:11:37.050000
CVE-2024-26622,0,0,44771474d96e6a32e262a8e82c8d605514616358779ded6b7654a20fc0c2a12a,2024-12-11T17:36:15.267000
@ -255145,7 +255145,7 @@ CVE-2024-30545,0,0,9fc1519b1df9cef49e003c31844226b87a8a0876e6364f49bd01371911fac
CVE-2024-30546,0,0,682d8bf45e6a08218a5a3a2da6b1491ce652cde21b3fc1369e6ec13bc346b6de,2024-11-21T09:12:09.073000
CVE-2024-30548,0,0,f693c6a877ff0dcdf6fe4ef2a958123b8947204e837af80130e7a6521588b872,2024-11-21T09:12:09.200000
CVE-2024-30549,0,0,00e28713a877ec4005bbaa382f6309b5fbab46d15b113d2b825dbae08bdb2ce6,2024-11-21T09:12:09.330000
CVE-2024-3055,0,0,67946cd23a7eea138e5f43e8c6ea561d14725d81862c72954ebac488f2ac859d,2024-11-21T09:28:48.053000
CVE-2024-3055,0,1,80848d3ebe6c9d2dc11053b924adec8e053b2e76ed033beed24a77e64207f08e,2025-01-30T16:11:40.940000
CVE-2024-30550,0,0,b1012a09324820a2f5d1c5129a5f2c426e3a5ba9be88ba49aab751fbaf16a1e5,2024-11-21T09:12:09.457000
CVE-2024-30551,0,0,1e6b51a7a6c6332aac1197822ceff35a8c0ec56590e5297f09a269ea4cdb1fbc,2024-11-21T09:12:09.580000
CVE-2024-30552,0,0,8d0f5a765b1705cd4ae9297b1fa6993b0afb84b835e645e1c32dd013ea0499fd,2024-11-21T09:12:09.710000
@ -256062,7 +256062,7 @@ CVE-2024-31895,0,0,f50d5f04db53f9d81b5d66d792a53670922d68d4ae5fd0896a38dc1ac638e
CVE-2024-31897,0,0,482d60ce194a404c922472f634fe27b65cdb7d56b2dfc2459272befae42533ec,2024-11-21T09:14:06.077000
CVE-2024-31898,0,0,2bdf434c4d06bca201e71e4a7c99060368586d3dea800b988968adc32062eddf,2024-11-21T09:14:06.253000
CVE-2024-31899,0,0,e3477cb6ba6850b36435640b21267340780a9020b61b2670506bdd2d9d1ba253,2025-01-07T20:02:40.877000
CVE-2024-3190,0,0,bad297e304fb4b0d6eafd0a234cf1fc72af8a9c2c234dc9ef80f9a08d6ffcbca,2024-11-21T09:29:06.810000
CVE-2024-3190,0,1,acb939305a3c103ea90b729158b96bbb213cfee2d2e362ac5c55eb275ba4dc51,2025-01-30T16:09:08.383000
CVE-2024-31902,0,0,003a18851ece455ee1e6ea2a4455c0284b8742534b1304a5388aa31d40a16816,2024-11-21T09:14:06.483000
CVE-2024-31903,0,0,f1559924e9af14a36520fa16f97e50e9463ab7aedc8dee1206ec2eaf945f2191,2025-01-22T16:15:29.030000
CVE-2024-31904,0,0,d2a04e1afb3ab14e7bd62c982b1ec9fbcf0becba36a47360842f1553f25b269c,2025-01-07T21:05:40.810000
@ -257696,9 +257696,9 @@ CVE-2024-34028,0,0,934507f74a9980c1b522d6c06e1c5c313c6c6350eb055bcfd2ba2fe531c55
CVE-2024-34029,0,0,28955cadb2652f3ed8715b1105f4f2b127c3a074a158620f14abf34f2332bab0,2024-11-21T09:17:56.890000
CVE-2024-3403,0,0,35c375acdcdc96d67dcf90a24b47f970416839cdfccc78da387631d90f23c467,2024-11-21T09:29:31.520000
CVE-2024-34030,0,0,0f42953a89d194a36318ed8d4be50bf3efbe42245c9b26de406722e8c8b045aa,2024-11-21T09:17:57.040000
CVE-2024-34031,0,1,965adb0dd9870fa0b70e6becb0de24e260a730e143f6cdb53f9f644c7ba714ea,2025-01-30T14:30:40.657000
CVE-2024-34032,0,1,cf001237ea53caa629b039a4334f22486fffbbd4d7a0f05ad3f6e68b3e09e5da,2025-01-30T14:31:00.057000
CVE-2024-34033,0,1,cfe0d057081e1aeef658525f7464f9137fd5e9e218807cc56ad4ed4afd0c6cc4,2025-01-30T14:32:24.690000
CVE-2024-34031,0,0,965adb0dd9870fa0b70e6becb0de24e260a730e143f6cdb53f9f644c7ba714ea,2025-01-30T14:30:40.657000
CVE-2024-34032,0,0,cf001237ea53caa629b039a4334f22486fffbbd4d7a0f05ad3f6e68b3e09e5da,2025-01-30T14:31:00.057000
CVE-2024-34033,0,0,cfe0d057081e1aeef658525f7464f9137fd5e9e218807cc56ad4ed4afd0c6cc4,2025-01-30T14:32:24.690000
CVE-2024-3404,0,0,6fea713d49223c11c4a6ed8171c383bae0a065dce7cd39ac6527df87319a6bb9,2024-11-21T09:29:31.663000
CVE-2024-34043,0,0,53d43ce8307f8de15478a2599f8c8bc215f7ec8b04c173f3e969cef0b4ee49c1,2024-11-21T09:17:57.623000
CVE-2024-34044,0,0,f53b421c4d735b77bf8a81755242f7d2e02484d8eb0a14198eaff9e938f44722,2024-11-21T09:17:57.840000
@ -258452,11 +258452,11 @@ CVE-2024-34995,0,0,abdbc2aef2da3b42556f78c65bc0781f5009a8f6a0313dafe6f17b909e933
CVE-2024-34997,0,0,13f21ea417fd3af13763e4f3faf7aae4d611bc2d0b48b03ccb7937233e7fb8db,2024-11-21T09:19:41.353000
CVE-2024-3500,0,0,3c8bc608b6ad5e8f952884ade0c885304cb5cb379f598ad860c126e127175de1,2025-01-08T21:22:53.997000
CVE-2024-35009,0,0,2e273427408b1e1fff4030ac74819540f868ad5b2d28acdf5d8d3e4f221aab8e,2024-11-21T09:19:41.613000
CVE-2024-3501,0,1,f4737690dd45584486a5a75d133f44e500cdc76d274dc726cca7c804123e35cb,2025-01-30T13:15:09.623000
CVE-2024-3501,0,0,f4737690dd45584486a5a75d133f44e500cdc76d274dc726cca7c804123e35cb,2025-01-30T13:15:09.623000
CVE-2024-35010,0,0,a6fc656a98892420eeec5799d99fa4ae7352dad5dd7951f64589362d56d6fd9a,2024-11-21T09:19:41.840000
CVE-2024-35011,0,0,6fbc8e4762f1f23d80dfde1dccb1be21bc0d0de89b3d4c7d0c638d99ca7df9cc,2024-11-21T09:19:42.063000
CVE-2024-35012,0,0,09d5778d94487c3678d23588ac340e064e0e40aca49c79890be60be1fd21649d,2024-11-21T09:19:42.283000
CVE-2024-3502,0,1,a7280c3857b4138ce49c8810182d5b46e81d48c020fb62a446f961806b2eb539,2025-01-30T13:15:09.853000
CVE-2024-3502,0,0,a7280c3857b4138ce49c8810182d5b46e81d48c020fb62a446f961806b2eb539,2025-01-30T13:15:09.853000
CVE-2024-35039,0,0,d0bf9d904b3952876ffbbc691411e97a258b409c33150c668ef23d079b6a80c6,2024-11-21T09:19:42.510000
CVE-2024-3504,0,0,1e76ca030a65692dbb6d630449e59791e5c57b83588b9e0692b4e2aa7884c7fa,2024-11-21T09:29:44.783000
CVE-2024-35048,0,0,135119f59dfaf319a97db7bd2c1bc169012c9a11400da34d4bae48ab413bd01a,2024-11-21T09:19:42.657000
@ -258754,7 +258754,7 @@ CVE-2024-35451,0,0,a9e8d91c7fb856563fec41fc62c183401db6e468934db2a46c7a491efbf24
CVE-2024-3546,0,0,6a929a5ec13b1df70de88509356c904b07d7b8ba34b598d5dfca415671fdec86,2024-11-21T09:29:50.977000
CVE-2024-35468,0,0,f078143d20bd8ff2771314faaf608d4d85c29a73695f1655b68a13225fe33a65,2024-11-21T09:20:20.703000
CVE-2024-35469,0,0,0ef71f4f233abf9594f964e6d6d590e07f6ef6267c7172573dd2c7cca486f5e2,2024-11-21T09:20:20.920000
CVE-2024-3547,0,0,f5af4505cc68e332dbe87237b388cb16d45882ab9a7699d3d6cf785c002f20ed,2024-11-21T09:29:51.093000
CVE-2024-3547,0,1,cc056654da60c64ae530f1e9165baa2d5681414032cb22b0d41cad3bf8efb850,2025-01-30T16:10:54.307000
CVE-2024-35474,0,0,91de302607cb6d61e5f0d4983bba35c5730030dc688e50f61b2a92614151d2c3,2024-11-21T09:20:21.160000
CVE-2024-35475,0,0,9a47997de7f86bb21a8527bce163a4eff44ce6966a5cecc9f4051aaddc7238e5,2024-11-21T09:20:21.310000
CVE-2024-3548,0,0,64d728af28809c7e405f88cc2b9445430ea7fcba331c3ebc611e9b0849f0df00,2024-11-21T09:29:51.210000
@ -259420,7 +259420,7 @@ CVE-2024-36206,0,0,80d8234ef9c6bbf40d892a823223fec5560241514c3334c39936574bce7c5
CVE-2024-36207,0,0,97754cbc5525fac7ef6a21b3f3ebf448e3ed21aabff25273a14aff4b4c12e5e5,2024-11-21T09:21:51.197000
CVE-2024-36208,0,0,c4eecf6ab69be8779f67ed9d5e55351422fda141959722d8e5af2566cf2bf646,2024-11-21T09:21:51.330000
CVE-2024-36209,0,0,99358c2058f85b33b116911164d15902e2fdeef917f179babf878a264ea065e7,2024-11-21T09:21:51.500000
CVE-2024-3621,0,1,6c5f746a8c5f61fb085d25f3f8ea0de4a3a14e65caedc7f830e83750eb82ff04,2025-01-30T14:40:31.307000
CVE-2024-3621,0,0,6c5f746a8c5f61fb085d25f3f8ea0de4a3a14e65caedc7f830e83750eb82ff04,2025-01-30T14:40:31.307000
CVE-2024-36210,0,0,2bba668221ea04965eab93a2aa296fc5711b6edd8069872767c318f84ba10d03,2024-11-21T09:21:51.637000
CVE-2024-36211,0,0,784af734068ca60317237d50f3dbfed33b6b5fde134f8f711fc7d8491ed4e0dc,2024-11-21T09:21:51.777000
CVE-2024-36212,0,0,3ed1af9fdf30b719f5729eceb4dd46100ca00a37ece33082567447eb53f1548f,2024-11-21T09:21:51.920000
@ -261875,7 +261875,7 @@ CVE-2024-39350,0,0,fdb3462066732470a235bff29ba1732fe017e30a0d02a9750d159a0498864
CVE-2024-39351,0,0,327607e1cddd67f4054754427f899db1dcdfcaad597984bb096ea9ebdc5a5b10,2024-11-21T09:27:31.737000
CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db73a,2024-11-21T09:27:31.870000
CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000
CVE-2024-39354,0,1,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000
CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000
CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000
CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000
CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000
@ -262118,7 +262118,7 @@ CVE-2024-39601,0,0,92d2b69fbd2e8bc149b176391e3e16765df166d2a97846f11f4915fdfd474
CVE-2024-39602,0,0,27041e41974104fd1b79b4ac803ed5fde80beca6cb3dd96452797a458af7b383,2025-01-14T16:15:31.540000
CVE-2024-39603,0,0,1437983f8883ed245799b0e5c1e1953f598b12b478ace10cadcd2f37e9d67a15,2025-01-14T16:15:31.640000
CVE-2024-39604,0,0,88257eaba5c332ff2d127c02fbeac9934efd2fc6ba8e017d75c36c5cef181610,2025-01-14T16:15:31.747000
CVE-2024-39605,0,1,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000
CVE-2024-39605,0,0,3d15565b47da01f09220518de7967c2695d8eac811d4af1b8240b665e7ca3c87,2025-01-30T14:34:40.630000
CVE-2024-39607,0,0,aadcaab0bf1d7729e38b88e8516ae68565ef10bef4190422593ee5df929d784f,2024-11-26T09:15:06.277000
CVE-2024-39608,0,0,9ffd9e93083b666f0e42c9a03d32cf85ab205f595971f01f7b69deb9e34455e8,2025-01-14T16:15:31.853000
CVE-2024-39609,0,0,2a17afe0616a352707ec6d7a4b1c89eb322f40e85f4e6ff34b51561aff3d09f0,2024-11-19T19:58:29.653000
@ -263316,7 +263316,7 @@ CVE-2024-41468,0,0,10bf02a4bb290678b06592c8c1b3227ccfabee3baa4072ea0f6b7fc4b45e9
CVE-2024-41473,0,0,29d4e7b54fb4126a361ecc042f6a7b31e6afda88ff19b4c6fc756b4a5212f348,2024-11-21T09:32:42.720000
CVE-2024-41475,0,0,b8be933a7b93d0c1cf4b6c4176e5022fbe4f2cb5fba128f6278ff8ebfcb5d463,2024-09-18T18:51:25.513000
CVE-2024-41476,0,0,36071a8bb76fa7000bdd44fd6508ba17d20e4aae8303bd257093c61563aaa3c3,2024-08-12T14:35:13.627000
CVE-2024-4148,0,1,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000
CVE-2024-4148,0,0,2e542f9ab0f6c828f38b2e237e7cc980ff3e9e70e4486defcf952616ff1a655e,2025-01-30T13:15:10.093000
CVE-2024-41481,0,0,6eb5de345a9525c442ab97a24184da0c8a5a6c01c4d00868ab2a9512a25cc800,2024-08-13T14:51:33.017000
CVE-2024-41482,0,0,58ae3affe6e4394d947e5aa2d9dcb7a3ce735382358e46a1f77100da98d84172,2024-08-13T14:51:43.163000
CVE-2024-4149,0,0,f45d768064d804412c5499f92694d8be86562e7ca241a43abd934c3f16fce1ed,2024-11-21T09:42:16.890000
@ -265234,7 +265234,7 @@ CVE-2024-43846,0,0,00546e8b7d32618825c1193130d999ce23114d449f5814665fe713817c3f3
CVE-2024-43847,0,0,40ae3f5c22580f8696b31462f52ae00e272df092f77c73d18c35f4e6f355f13a,2024-10-25T19:55:53.963000
CVE-2024-43848,0,0,afa9f7a71028fa60eedc9a3a10bbe895ac3ef406bc4b18f0f8a8865a6f95d3fd,2024-10-25T13:57:51.800000
CVE-2024-43849,0,0,bb2f13ce55d02e025d8b5df3a85c28012dc63944edc5a60786100663bd1bf49f,2024-10-24T16:02:21.587000
CVE-2024-4385,0,0,ee902bcd5a550a2f573e4df8318a99cea196cb23cdfb957746f674c4983835b0,2024-11-21T09:42:44.713000
CVE-2024-4385,0,1,6b321f47210a4f402aa206dba55236d60e4f3bf998d01a619d9e932d532b4d1c,2025-01-30T16:09:33.727000
CVE-2024-43850,0,0,5026c93dc45245fc690dfe704ae40ea697f74bbd447206e9ac7891250f89dda9,2024-09-30T13:57:33.400000
CVE-2024-43851,0,0,946449cde7c43100052b7fc9053f5f755974a4dba660acc98fbea6da7c92d49a,2024-10-24T16:07:41.687000
CVE-2024-43852,0,0,bcad036330e4766c8ab5dff7cca3995c28fcfe68ecb4abd33b1fd81a51a3287b,2024-08-20T19:32:55.747000
@ -265553,7 +265553,7 @@ CVE-2024-44169,0,0,8e659cce58d9a53d0497d3730dec7575b8a3d2351d4de051efdd53f958a4e
CVE-2024-4417,0,0,4e3d6204cd6966eb0d27497c2863f9921840677a5ed28df1c16d852d537c8a4f,2024-11-21T09:42:47.380000
CVE-2024-44170,0,0,4d2a800695872f7abc00b41c3e1d9ae1548d65569627bdeeb9ef0e31c2a1724b,2024-09-30T19:48:51.767000
CVE-2024-44171,0,0,61d23c156cb013a8a8af9a10b8da0c4d43b13a26cab640993f3b36fb5e09e5ab,2024-09-24T16:22:38.880000
CVE-2024-44172,0,0,6ff5fd7f36da624a8e4d5ae9fe38d09821bf81d42d627f5a88b0bfd7c0aec890,2025-01-27T22:15:11.930000
CVE-2024-44172,0,1,8e0bb5dfd74c12dff365254bfb56b3a0129d5f37916ebdae4759c31610a23b80,2025-01-30T16:47:17.370000
CVE-2024-44174,0,0,9fef131a05569228953753a69bb54c67406d2be203d34e38f490d828de204009,2024-10-30T16:35:20.507000
CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12daa4,2024-10-30T17:14:55.127000
CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000
@ -266580,7 +266580,7 @@ CVE-2024-45796,0,0,01c9127a9e7d6e535a3a930242bf9f9d5c2a1cbeadfdf8175a5c8fb0bb4be
CVE-2024-45797,0,0,c84e8443a269bae84796aec501500e8480ed1330037de3edec788de410762008,2024-10-18T12:53:04.627000
CVE-2024-45798,0,0,490269bd2a7e8e2136a585b277298e0fd2793ca29324d9ef69308a44b095e7bb,2024-09-20T12:30:51.220000
CVE-2024-45799,0,0,c852979390ddd115fddc3999a7a2b4ed741b1339f638a70d3124dee7d6c96413,2024-09-20T12:31:20.110000
CVE-2024-4580,0,0,ce0dc46af980686b05509ea0289987cd8a505fa2732d379052b61894fdb89144,2024-11-21T09:43:08.940000
CVE-2024-4580,0,1,df067ac1e886d8dc479c776ad840ff90bab8aa03d23a01baeb5e01d13144d370,2025-01-30T15:55:44.283000
CVE-2024-45800,0,0,4167c45d50337de65fd2604084d1d9f0801e36db06bae66cff5994f6ce8e5eaa,2024-09-20T12:31:20.110000
CVE-2024-45801,0,0,7bd2125c176a54840b4a07da0d08e9005539420f0eaa027e673835a41ea39c26,2024-09-20T12:31:20.110000
CVE-2024-45802,0,0,5118eb720598f0b5f0f7955d1553146171ca853fc8c195ed65b55673cb27fbb0,2025-01-03T12:15:26.117000
@ -266731,7 +266731,7 @@ CVE-2024-46084,0,0,83705853e72627ee7c2534dabfa677423187cc3cb58e1b6278bdb9f958c7d
CVE-2024-46085,0,0,235827898b42a9e561ca9f6fb3d66ddfe29920ecb7a133538f1a4710b1062288,2024-09-20T12:30:51.220000
CVE-2024-46086,0,0,db65165feccd5cb075ac96f210c77557e2fa2e1d4ad8dc2351e61d2dfab7f1ef,2024-09-25T17:08:41.937000
CVE-2024-46088,0,0,cebef494058af71996a2bd2599de3e728bb9445ff54a8925f9eb5974360a8dfe,2024-10-15T12:58:51.050000
CVE-2024-4609,0,0,e500fdda1cf040f009fe5352a5194e07aa9d25ccfb8ce7352f7c21225eb70de3,2024-11-21T09:43:12.620000
CVE-2024-4609,0,1,0d30c3b2f29c5240f0aac26aff26d3fd4c6b27605cceeb00f758ad3112e29b82,2025-01-30T15:50:28.557000
CVE-2024-46097,0,0,81923f5d4d8e5055b162d76d680c8f22ce08e7aa6381b7cf7beec6a443dacf5f,2024-09-30T12:45:57.823000
CVE-2024-4610,0,0,f50600a6c6829b515e589c2ef59552849dc680c9e925131563e15658aa25578f,2024-11-27T19:29:04.697000
CVE-2024-46101,0,0,e753d2c1bb092894837b23e0471205bf34ea95c90d6464840efb9cbd99474750,2024-09-26T13:32:55.343000
@ -266796,7 +266796,7 @@ CVE-2024-4633,0,0,4be9efb7395c528b05dc39db0f29be9d9debe80ebcf8638d7ee15d2174982f
CVE-2024-46330,0,0,fb0912248c72cdb890e148fb8d15fc4a24d9dfffc5c218fc836550de7cd4ecb0,2024-09-30T12:46:20.237000
CVE-2024-46331,0,0,6291a6cdf65b126a104c517cdbb8a547242f83239cadbf67a03f4d15648664f1,2024-09-30T12:45:57.823000
CVE-2024-46333,0,0,c870313be8293ae808f6f74cc79ece6e4d82dedcd46cf642a068e85f3720b28d,2024-09-30T12:45:57.823000
CVE-2024-4634,0,0,5b054bd144b9176362ee5c6f20d9184237b3f1751e5cc99bd16dbf550697f8a4,2024-11-21T09:43:15.343000
CVE-2024-4634,0,1,eb60703eaec3c1cb33741c607a7e9d8ef61e689c7df21581c70bdd061bd8fc33,2025-01-30T16:01:17.150000
CVE-2024-46340,0,0,509c04c6b928f13979254f73eb53c9343eb60f2e6a3bd03e83c81e5d4021163a,2025-01-28T23:15:07.487000
CVE-2024-46341,0,0,0b54e207dfc51f9d880626aceceecaf4c92e14fd4888ec8d3b9add5932056882,2024-12-11T15:15:10.090000
CVE-2024-4635,0,0,87f43db3808bf2002a7413b8e77f45922cac81f6b6e7149135bfc36fd2d70fdd,2024-11-21T09:43:15.457000
@ -267377,7 +267377,7 @@ CVE-2024-47113,0,0,e4a4b7ababf2602f5329349bd99728f33e6592d940c12e395d7099b940e40
CVE-2024-47115,0,0,7a7f36fd4f42315d6d6861efa2fa7bf95141b001bf20215444f270c56375d7b4,2025-01-21T16:15:46.587000
CVE-2024-47117,0,0,a26952e58650ef25d9f11a5aae4455c43930c6e2575395901d2106687495648d,2024-12-10T14:30:44.400000
CVE-2024-47119,0,0,822d29d557ac8a46a432d9833d3741afebbd1611ae551e680e9265032df20c37,2024-12-18T16:15:13.110000
CVE-2024-4712,0,1,72c05213aa50046f03c2ceead2ea0141808f5bcda36c2be58d2e87fc20f17f56,2025-01-30T14:58:45.433000
CVE-2024-4712,0,0,72c05213aa50046f03c2ceead2ea0141808f5bcda36c2be58d2e87fc20f17f56,2025-01-30T14:58:45.433000
CVE-2024-47121,0,0,346648e20973f21c82fabd4a08a632a55356bf3264a158afc57ac406e96c43c4,2024-11-01T20:39:20.677000
CVE-2024-47122,0,0,7ba55296c1246880ecd41488ae0cfca0580aa596752d1a2853d946be717d540c,2024-10-17T18:15:05.480000
CVE-2024-47123,0,0,5653f27850e6d35409f08b28cacb03a0f8d3e59c1152fcc0a7ddcb50ea8eb316,2024-11-21T17:15:16.473000
@ -267389,7 +267389,7 @@ CVE-2024-47128,0,0,65759f80a9ff2e996983784301775be8d3d67c43668184bead5522ffb06db
CVE-2024-47129,0,0,21ab298568b77c231224ddece70855941d2bceaa4599c817bac87f2708ef4742,2024-10-17T18:15:06.930000
CVE-2024-4713,0,0,b4955fe6b5819902c5b4de23942cae46515c7959c7f9cea3df2810ef17b3f66a,2024-11-21T09:43:25.970000
CVE-2024-47130,0,0,aa210527789d3142a26190221a1f00d05f6fb48f13f743e00fe050e6aed804e6,2024-10-17T18:15:07.130000
CVE-2024-47131,0,1,5a043d3c6427bec05dcf5dbf8b3fb5126f4b062616151b30537188bd73082d58,2025-01-30T14:35:10.020000
CVE-2024-47131,0,0,5a043d3c6427bec05dcf5dbf8b3fb5126f4b062616151b30537188bd73082d58,2025-01-30T14:35:10.020000
CVE-2024-47133,0,0,732f4b3ccc248a886bb57b758e9499b4fde95dbd65c8663f4fa49932f5353704,2024-12-18T07:15:07.703000
CVE-2024-47134,0,0,731bb1f9c493297a05be84d72e8728d365811c3cf823fc1f39f880a39ec0564a,2024-10-16T13:50:32.607000
CVE-2024-47135,0,0,0f0243de033a38c800d27683079832eaf8a01f0f9426503f7ac2abba9f3ef240,2024-10-15T18:21:04.813000
@ -267983,7 +267983,7 @@ CVE-2024-47781,0,0,ac3343a5bdfe2b42fa2baeb94dc64f26c6cd35309487275f571da09df8ca4
CVE-2024-47782,0,0,aea12cd12b139670528cb559076d430b505402dadabc98ae5bd0b14d0824b1de,2024-11-14T18:19:34.127000
CVE-2024-47783,0,0,a479c1d46c5300cdfd4b0953e47a352189557dfa1e1f57f0b45d3a57b4f5aec2,2024-11-13T23:13:25.367000
CVE-2024-47789,0,0,4e41e3af7c3971f8658317523511cc8ea6d0da3f22708f230815441b517be231,2024-10-14T11:15:11.797000
CVE-2024-4779,0,0,2e1aaf861b56995420e2ecd41fb05fbeff0136f0ff02e8684e6cad712f3005ea,2024-11-21T09:43:35.870000
CVE-2024-4779,0,1,8c24b442d011991b1c83a32cd89d83eb925ddd5f67de8dc98121dafc7963437c,2025-01-30T16:10:38.760000
CVE-2024-47790,0,0,0033caa01d3b380ade4380efa296858b7b158eabdc29e84feb2d5832c0b983fa,2024-10-14T11:15:11.930000
CVE-2024-47791,0,0,15000555053c296919902f42e8781945f23bfee06473820c84acf5fc428f2c99,2024-12-10T19:44:43.937000
CVE-2024-47793,0,0,882b9f21365001a1bbe1427d7ecd7686f09cb53c26df041c802a57c5badf616d,2024-10-21T21:25:36.697000
@ -268565,7 +268565,7 @@ CVE-2024-48902,0,0,fac907ba592985cedbc6c7d62d6399de126c11c59cc432f7434b088369952
CVE-2024-48903,0,0,9c89803e6726410301aaff247c42234fa7c4ad2b19e692a9182ae81ee0c051d9,2024-10-23T15:12:34.673000
CVE-2024-48904,0,0,35d8cc445681b5e4ff1fcbbfd5a27253a724d76e1a2a2d6acebb5b7ec5903547,2024-10-23T15:12:34.673000
CVE-2024-48909,0,0,5af217867017b45645b1cd88e9368407196c63b062f42cfaf011c832caa8e595,2024-10-17T17:56:11.130000
CVE-2024-4891,0,0,51e6040bc4f90200a2c089840fe47a75168e50b1b672efc53fbd9785b6e7594e,2024-11-21T09:43:48.267000
CVE-2024-4891,0,1,da144f5b8eac6a1bb02dce3640ba1147c865a134b9c516618c4c8a80a71defd2,2025-01-30T15:45:34.377000
CVE-2024-48910,0,0,7f12c97e649c7955bf5eb5f3507eac6092487e8d427486ba58a1995cf7bdfe0b,2024-11-01T12:57:03.417000
CVE-2024-48911,0,0,55b7a5a266268268213060e2c0d21ae7b031d3c5984450b459efb48b395401c8,2024-10-17T21:13:37.147000
CVE-2024-48912,0,0,c126261c0e22c041d80daa93d1a490f776182219e98126fc7e02d842adc655a4,2025-01-10T19:37:41.063000
@ -271885,6 +271885,7 @@ CVE-2024-53604,0,0,19e77dbbd22cf0c536f2182ed04fcfa937399395f3ae572f74b753c8357c9
CVE-2024-53605,0,0,8ecdd923e7f721b070d2ccfb4ecaf0eaa48031e234017ed413d81c0a92c94d84,2024-12-04T18:15:15.810000
CVE-2024-5361,0,0,ad73d990c4bd9b694be52243b80a81244f1190d0986e7eec73b93a7337fd4e1e,2024-11-21T09:47:29.953000
CVE-2024-53614,0,0,e0f021daad18a863a0efc93b4705ca0ebff1779316d0f9947e46818dacd2e7b5,2024-12-04T17:15:15.310000
CVE-2024-53615,1,1,76beb71a50d4cfca6dce41294cae4a1370c6eeea303a2d1f791c05587b2982db,2025-01-30T15:15:17.390000
CVE-2024-53617,0,0,dd2ee5869a76723244988f189f5e4e219fcd77588c7888e87da2897c111b37d9,2024-12-02T20:15:07.710000
CVE-2024-53619,0,0,7e8e9692dc22af705d23ae8b792483811e548f5452e797f9099331427eac5db0,2024-11-26T20:15:33.880000
CVE-2024-5362,0,0,ad218d3bc95842e117fa458c49bff7d460d472a119fc1f559f5852b4e012b5a8,2024-11-21T09:47:30.090000
@ -272841,6 +272842,9 @@ CVE-2024-55411,0,0,e79315ed14538192b3442e269ae3df7163b086fe6589e73b0be27cd11820e
CVE-2024-55412,0,0,6e1875e4d94fbec9f5b13096fd8188b74519aaec7a91136cabb4f52c00245964,2025-01-08T16:15:35.527000
CVE-2024-55413,0,0,eef50e9e636ae6bc827b08d7c7eec17970a99ab50a51fccd44bf2d480fff7156,2025-01-08T16:15:35.717000
CVE-2024-55414,0,0,0d97009591fcf6c0b34e60fb7a805f4c6f9d80da2e217dde940ef3fa78396336,2025-01-08T16:15:35.883000
CVE-2024-55415,1,1,e45b76c72cb21be89d474a4bec24dfe8e9045fcf763c54d6f2d233f7cf01f85d,2025-01-30T15:15:17.490000
CVE-2024-55416,1,1,916405c0350122128e79fbfd247ac7ba7f5fec226ebd0db591359b5db74cfe3d,2025-01-30T15:15:17.583000
CVE-2024-55417,1,1,c4f74f3880fc19276a9d9941e49048b8067e6a9a86e3dc3998f5ca920a416fa3,2025-01-30T15:15:17.667000
CVE-2024-5542,0,0,6f204123d7eb6582297f3ed2f1f9284859b42e6e6e67e32f4ec293ca8971e5c4,2024-11-21T09:47:53.577000
CVE-2024-5543,0,0,a26f2d14789d49017a49269cf3e4b4468656a016d744676df971b6df226be4f0,2024-11-21T09:47:53.697000
CVE-2024-5544,0,0,9d691e1e8372bdc434d572825f303cd1b0a2983a0161dea14c330331f38ec0b0,2024-11-21T09:47:53.813000
@ -276205,8 +276209,8 @@ CVE-2024-8144,0,0,696edcb2bb311965c748dca1b652d460d37d41665bb332ac8c5789a18b7571
CVE-2024-8145,0,0,5b5516a02e82f1a24921fba53f44ff719cb4889853174576c8c5cf18949cdb17,2024-09-18T15:34:47.007000
CVE-2024-8146,0,0,3c38a8bf86aa5143d343a4e058bbc1c1d9adb80751bb2e546e609de9556fc1e2,2024-09-24T17:00:38.933000
CVE-2024-8147,0,0,946ab893ddf9a675ac292ab1826a8652381a7ca069f4a6e6887c36e74d1a22f4,2024-09-11T18:37:20.670000
CVE-2024-8148,0,0,19050abc6a02329d1598540a38d3be670def7449d84f72f465f7712bc4e64706,2024-10-07T17:48:28.117000
CVE-2024-8149,0,0,1b6da2ce517da81789eb4b04009f8c3dff7d9b5880f014dc3d2d33a48b558a75,2024-10-07T17:48:28.117000
CVE-2024-8148,0,1,b11f6d458a5c2f184e6b06287d9079a61d6bddf8a0405723705b807ca0f63708,2025-01-30T16:20:34.150000
CVE-2024-8149,0,1,e5829772fade038e0e9e84ed0d873110a6cd6806a0a803d906ea385de6069066,2025-01-30T16:20:02.563000
CVE-2024-8150,0,0,b20f5342ff1470679bbc0ab15ce3d915aeb3002367f334c834e9ac120b5cd845,2024-09-12T21:01:57.790000
CVE-2024-8151,0,0,61072cd2dcf67db24ffebac51f604a71bd486239310714fab754dd0fa4ebef4b,2024-08-26T19:07:54.247000
CVE-2024-8152,0,0,384333635aed066971b397f054838e616b07dd646d7f4b75acf4f33ae9eb4767,2024-08-26T19:06:30.997000
@ -276493,7 +276497,7 @@ CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4d
CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000
CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000
CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000
CVE-2024-8494,1,1,0d19e0e4615d4d4f344ea75ed41d19ebde950527d3f7fe31c0774e6c6dea42ed,2025-01-30T14:15:36.973000
CVE-2024-8494,0,0,0d19e0e4615d4d4f344ea75ed41d19ebde950527d3f7fe31c0774e6c6dea42ed,2025-01-30T14:15:36.973000
CVE-2024-8495,0,0,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000
CVE-2024-8496,0,0,ab865babe0d164049e1365545a634298d8f9eeb65fa574e795c6818555b64d40,2024-12-13T19:42:40.417000
CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000
@ -277457,7 +277461,7 @@ CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b3676507860927
CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa03544,2024-11-28T09:15:05.710000
CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000
CVE-2024-9672,0,1,327a8471aafd6c747031a7b4ba4de124462bd8b2abfe091b37818952b24ea92e,2025-01-30T14:55:08.713000
CVE-2024-9672,0,0,327a8471aafd6c747031a7b4ba4de124462bd8b2abfe091b37818952b24ea92e,2025-01-30T14:55:08.713000
CVE-2024-9673,0,0,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000
CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000
CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000
@ -278031,13 +278035,13 @@ CVE-2025-0734,0,0,2b0fbea7bc08e89f2b572e3c6521a570d94025a1015e33909cf99289b07379
CVE-2025-0736,0,0,2fbf9a82d2eb84a70c138a527dc373077f185d1a8eb3dfa65a9134c893f72229,2025-01-28T09:15:09.543000
CVE-2025-0739,0,0,06db79985b3ffc9ce679a6b1532d26dde689388e80d0abf5747f95fe2433e285,2025-01-30T11:15:11.607000
CVE-2025-0740,0,0,6070ddeff96009c0ce06c222e5a51193e82b3688197e9979a0b1546db6a4a197,2025-01-30T11:15:11.763000
CVE-2025-0741,0,1,11f8d45217ed192e75aebac16701edf8ae2757fdbcc3df572b4e673f04ad7e83,2025-01-30T14:15:37.127000
CVE-2025-0742,0,1,e706bf0d6b618f0ebe427501e895e0fa5538cc27bace9eaa3ce7235425ba2299,2025-01-30T14:15:37.320000
CVE-2025-0743,0,1,429ebae93d41afa1d6712ed6205096ae558266dfda3a52a35e5c21cd61484e33,2025-01-30T14:15:37.507000
CVE-2025-0744,0,1,d566dadf0f75ebb6d83db5ac73568871507920ba33f544bd8fbcf889d711706e,2025-01-30T14:15:37.687000
CVE-2025-0745,0,1,7a673391c7e643b07ad96875e22fdb777a481cad36bf7e1522890846f0544049,2025-01-30T14:15:37.857000
CVE-2025-0741,0,0,11f8d45217ed192e75aebac16701edf8ae2757fdbcc3df572b4e673f04ad7e83,2025-01-30T14:15:37.127000
CVE-2025-0742,0,0,e706bf0d6b618f0ebe427501e895e0fa5538cc27bace9eaa3ce7235425ba2299,2025-01-30T14:15:37.320000
CVE-2025-0743,0,0,429ebae93d41afa1d6712ed6205096ae558266dfda3a52a35e5c21cd61484e33,2025-01-30T14:15:37.507000
CVE-2025-0744,0,0,d566dadf0f75ebb6d83db5ac73568871507920ba33f544bd8fbcf889d711706e,2025-01-30T14:15:37.687000
CVE-2025-0745,0,0,7a673391c7e643b07ad96875e22fdb777a481cad36bf7e1522890846f0544049,2025-01-30T14:15:37.857000
CVE-2025-0746,0,0,82f05cf4ac1b3bbdc81944686720f25863230e2cd080d0ac3a95fb013a5f8b26,2025-01-30T12:15:28.113000
CVE-2025-0747,0,1,d36204131870c5d714f2df51bb514cb05f2fddc9c83df51a6ac35b9a2d128679,2025-01-30T14:15:38.133000
CVE-2025-0747,0,0,d36204131870c5d714f2df51bb514cb05f2fddc9c83df51a6ac35b9a2d128679,2025-01-30T14:15:38.133000
CVE-2025-0750,0,0,f0dcf8db3f28c907442c44817e918052a296a00a1a12376f3cb7890aea55adf6,2025-01-28T10:15:09.317000
CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c062b,2025-01-27T20:15:34.587000
CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae1520b,2025-01-28T10:15:09.493000
@ -278078,8 +278082,10 @@ CVE-2025-0849,0,0,2080b1314603620cb3f8746fb1f255655b1b7caaf0a70104b6b1966e3468cb
CVE-2025-0851,0,0,49552e625992bdb3a412aeacb5ef8fcb2bb7c90acfd6cc180846494a5bc52610,2025-01-29T22:15:30.463000
CVE-2025-0860,0,0,57eb159251c47f86690502a6468f7bb73145fb297d274d97d9f0ac6ac7ddded6,2025-01-30T10:15:08.723000
CVE-2025-0861,0,0,62f8d40ca04d4b5490a690c9c53c17fca5090134b2a22ca70beef3bfaf8e9ef0,2025-01-30T10:15:08.907000
CVE-2025-0869,1,1,c00b626e4282f826353e23285ea2a2e2d9f7821ad3a302556c07cfef2c902385,2025-01-30T13:15:10.273000
CVE-2025-0870,1,1,79959c76a1134388ccab8c308daae5a53c58c280cf4118b2d0f5c928e2079866,2025-01-30T13:15:10.483000
CVE-2025-0869,0,0,c00b626e4282f826353e23285ea2a2e2d9f7821ad3a302556c07cfef2c902385,2025-01-30T13:15:10.273000
CVE-2025-0870,0,0,79959c76a1134388ccab8c308daae5a53c58c280cf4118b2d0f5c928e2079866,2025-01-30T13:15:10.483000
CVE-2025-0871,1,1,24dddddb7292c73ee5114bcb016776d1fe668a27680ab7f838511f0d6460093b,2025-01-30T15:15:18.253000
CVE-2025-0872,1,1,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000
CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000
CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
@ -278454,6 +278460,11 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8
CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000
CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000
CVE-2025-22217,0,0,feb391972c0b9cea12eac2644fa650dfd74fa775909a2be34ec05a7261c4fd8e,2025-01-28T19:15:14.640000
CVE-2025-22218,1,1,836ab65655ed2b3f519b6fee527b320c95f0b22b468f06c5346ef7ce0ca0c595,2025-01-30T15:15:18.487000
CVE-2025-22219,1,1,45a9d478146875c58c04215315d263d7929148968ff42c1529a986918c1732fe,2025-01-30T16:15:31.013000
CVE-2025-22220,1,1,b65749e0f949850b6f1851b9f4c71868ce52b00a0ef348e0e967f54a0e5efca6,2025-01-30T16:15:31.143000
CVE-2025-22221,1,1,14b811ced27407dc9bda7c232bdce11f670b0b99078460e6a2a0aff6fbcca024,2025-01-30T16:15:31.257000
CVE-2025-22222,1,1,88427fbd6b71746a7cac38ab28182f0393978cf8d8f60352e5bba62689c94a83,2025-01-30T16:15:31.367000
CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000
CVE-2025-22262,0,0,2a90436047a91b64c9791cff4f6c4190896e3e92637458d2d2ccf25cb4f8537c,2025-01-21T14:15:09.757000
CVE-2025-22264,0,0,79177f17455e861265910dfa8dd2caa5a78c248a179fa18c3179e839e36cde00,2025-01-23T16:15:37.257000
@ -278772,7 +278783,7 @@ CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c597
CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000
CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000
CVE-2025-23006,0,0,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000
CVE-2025-23007,0,1,717722792f7937fb38469f7870413e56349c6bd035f1a66db88bc1b767b46c1a,2025-01-30T14:15:38.300000
CVE-2025-23007,0,0,717722792f7937fb38469f7870413e56349c6bd035f1a66db88bc1b767b46c1a,2025-01-30T14:15:38.300000
CVE-2025-23011,0,0,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000
CVE-2025-23012,0,0,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000
CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000
@ -278852,6 +278863,7 @@ CVE-2025-23211,0,0,b01b3d1eaa389abc74d10a53464a452db8c48b8e46d369d0635594b6a3f9c
CVE-2025-23212,0,0,5d60c49ffd32521a5482891d50382e894e871b53bc8376be27f61b9b217ff0da,2025-01-28T17:15:26.273000
CVE-2025-23213,0,0,7d98e0a72de95b4de425a92931a16b0e202255e768c13a8e6a1a984e46d039ec,2025-01-28T16:15:41.217000
CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000
CVE-2025-23216,1,1,00b505d4b9b9843f71db2ff599b87d4f422e7f80537e6f7097d7f130a64ef994,2025-01-30T16:15:31.473000
CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000
CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000
CVE-2025-23220,0,0,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000
@ -278861,6 +278873,7 @@ CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe
CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000
CVE-2025-23362,0,0,1b94e2fb0c40adc071aa869f9b4973eb9cf09ca0af55a23699e64fa6aa0684ff,2025-01-29T02:15:27.910000
CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000
CVE-2025-23367,1,1,8708284fa63d75792ac7858f9eb29d032b34975a20c7fa3ef097e90ea50ebea7,2025-01-30T15:15:18.610000
CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000
CVE-2025-23374,0,0,36c3b1c296397ec3c6fcd57ba11be579fc8474e390570baba348f95e84355229,2025-01-30T05:15:10.787000
CVE-2025-23385,0,0,1cca13617e43c9bbbebf0fb602e4964d98053328c9c544d2017c39482fdeda55,2025-01-28T16:15:41.377000
@ -279284,20 +279297,20 @@ CVE-2025-24149,0,0,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeec
CVE-2025-24150,0,0,09acba2826b7df3f8ebfa0d368cb24a977e4e05b23689ba04ae5892d23b40c54,2025-01-27T22:15:19.270000
CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000
CVE-2025-24152,0,0,9875511f91869e98c63cef2f35db10cd0155ee0f27be472f10837aa54dc5c773,2025-01-27T22:15:19.443000
CVE-2025-24153,0,0,59d669342a492b9d2d8a609c8e00e457983b611fbf4a79373f564b00b215da7e,2025-01-27T22:15:19.537000
CVE-2025-24153,0,1,6fdd0aa3380e03c1389e7e0c8530b480f9fc0d41d434b351af8e0b611cf2489d,2025-01-30T16:55:07.740000
CVE-2025-24154,0,0,c4623b888872e9bd806d6476f60723aca6e3e8ef47fe953b172a0b16a1c68fd1,2025-01-28T16:15:43.533000
CVE-2025-24156,0,0,fa2a466c11edf05a7c6f3e83d316724d46ff61cd4c8bf9cbb9507c6b0faaced6,2025-01-28T21:15:18.340000
CVE-2025-24156,0,1,8fa4c1a03f09991e5c2bed2e07959c1558a8892a2864cd53dcb29d166373a914,2025-01-30T16:43:39.593000
CVE-2025-24158,0,0,b480328077e53e4161097a766fad1482b065ad3b58ae4ae456fb1fa65cdfa65c,2025-01-28T16:15:43.693000
CVE-2025-24159,0,0,e25599ac271888e49238b528ab28908bfa9393a8f6137edf8a25905c7d6c7a77,2025-01-28T16:15:43.843000
CVE-2025-24160,0,0,5cd3c10ec42e427ac539d98658330a74a29433ef6efe7d191efaf4206f615f9a,2025-01-28T16:15:44.003000
CVE-2025-24161,0,0,7f65dc99e7781432bd49455eaa73c8925a5877a6d13c71b03a8ba16d090afb3d,2025-01-27T22:15:20.083000
CVE-2025-24161,0,1,0dc82d4ed236c2395f820344cded25249cabb2da3e61d73e4c0edae2679b581a,2025-01-30T16:34:58.187000
CVE-2025-24162,0,0,9cf81295cd6bd2a6dc3874c53712e03c0cb8ec582d8e812473c8041f4e6d5f29,2025-01-28T16:15:44.187000
CVE-2025-24163,0,0,ff21254150a2ff67a849e5cdc971468f1fbd7feadfbd74e9ad8839fc3fbc5d7f,2025-01-28T16:15:44.330000
CVE-2025-24166,0,0,15edf859d475720db53f3f95ed8d575ade96a95f125f2377032600fe411e75ab,2025-01-28T22:15:17.080000
CVE-2025-24169,0,0,fbfdd654253f3994c874b40dfb221a6e1355c2dbace515b15a5c93f393bd01e2,2025-01-27T22:15:20.460000
CVE-2025-24169,0,1,6d755845d64c6951c077fbd505366a52b470f5f801a7504189b5dfcb4650feb0,2025-01-30T16:24:54.597000
CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000
CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000
CVE-2025-24177,0,0,1ccc86e1d31c0e801dcfc4672cc5ab974be3b9ba670a0e19fad101e541886467,2025-01-27T22:15:20.750000
CVE-2025-24177,0,1,7093231474cd37fc1206cb86983fb697c3827c42e0c7d917cda4d55518409c14,2025-01-30T16:26:45.687000
CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000
CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000
CVE-2025-24354,0,0,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000
@ -279315,6 +279328,7 @@ CVE-2025-24367,0,0,2dde85784ec9629d596d7bcf8877ef61ab7a77a4d03b902c93b772a1e0c8b
CVE-2025-24368,0,0,761affe4f81311650725b2d0afa011960bd8f2b1d46ad3a802c200945d7bb31c,2025-01-27T19:15:29.540000
CVE-2025-24369,0,0,9730b81a70e801fabbb471b0ad4e9b27e118e3371046e937665a429126c9ea18,2025-01-27T23:15:11.310000
CVE-2025-24374,0,0,f578e447307218a84c1c03c82fb88e32f22e0777305e270f4df7c9481dc24824,2025-01-29T16:15:44.090000
CVE-2025-24376,1,1,fdfcaaceb7f300707afe1e393da8fab2e94652198889e87ddac2bbec7e0b5dbd,2025-01-30T16:15:31.630000
CVE-2025-24389,0,0,703cd148aa55fffbc38e036ef55c06da66449ab5152579e3986444865088b5ce,2025-01-27T06:15:24.170000
CVE-2025-24390,0,0,31dccc33f27efa697a88d53c2bd0e3339846722442ec6537bda6f0c65832dee4,2025-01-27T06:15:24.313000
CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000
@ -279476,6 +279490,7 @@ CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534a
CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000
CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000
CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000
CVE-2025-24784,1,1,25bed7670662071e6ec26a875dcb49a75daf84ce22dc70c7d3e927d82decaaaa,2025-01-30T16:15:31.780000
CVE-2025-24788,0,0,9dfdfa5e99f57b63746ea63896160006e5500c55a971a5995049b070a1ee2779,2025-01-29T21:15:21.140000
CVE-2025-24789,0,0,07ef1e1d39436ec939bd0e158cad0bd40252fff55c1f48589ea340fb94248f10,2025-01-29T18:15:47.030000
CVE-2025-24790,0,0,e41ba34b6b8f6cb8c6d3b3540fe2ede95268f20b3e1f5fd5c812ee77d4df7d59,2025-01-29T18:15:47.207000
@ -279490,4 +279505,5 @@ CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b
CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000
CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000
CVE-2025-24882,0,0,a23ce05efaa4af8c3630627536762c229213516f16a0fddf8927088c78e2a99f,2025-01-29T18:15:47.570000
CVE-2025-24883,1,1,e4977be39a4935cccc31d44b4babca335570d7230803a869c62284a8184b38eb,2025-01-30T16:15:31.947000
CVE-2025-24884,0,0,a1ca36a099d9726efc182c133a664383454ee2f707a06a51fc353abfffeb9263,2025-01-29T21:15:21.667000

Can't render this file because it is too large.