mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-02-20T19:00:22.081235+00:00
This commit is contained in:
parent
16c1480685
commit
d0c7b3dd39
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-2973",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2015-07-24T16:59:02.347",
|
||||
"lastModified": "2024-11-21T02:28:25.437",
|
||||
"lastModified": "2025-02-20T18:32:30.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -63,9 +63,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.4.17",
|
||||
"matchCriteriaId": "85ADE6AA-1FDE-4BDA-964C-0BF128DD6149"
|
||||
"matchCriteriaId": "21E4A0A8-3378-48C0-950A-EA66F998FCDA"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2015-7791",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2015-12-29T22:59:06.547",
|
||||
"lastModified": "2024-11-21T02:37:24.680",
|
||||
"lastModified": "2025-02-20T18:32:30.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -84,9 +84,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "1.5.2",
|
||||
"matchCriteriaId": "8F12EAA1-3CE0-4FF4-9A31-227DBEDF0020"
|
||||
"matchCriteriaId": "4972F7A2-B830-439B-84FA-B27785B0E3DF"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-4825",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2016-06-25T21:59:07.767",
|
||||
"lastModified": "2024-11-21T02:53:03.553",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48"
|
||||
"matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-4826",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2016-06-25T21:59:08.750",
|
||||
"lastModified": "2024-11-21T02:53:03.667",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48"
|
||||
"matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-4827",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2016-06-25T21:59:09.750",
|
||||
"lastModified": "2024-11-21T02:53:03.780",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48"
|
||||
"matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2016-4828",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2016-06-25T21:59:10.813",
|
||||
"lastModified": "2024-11-21T02:53:03.897",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "68FA643C-E0F0-4279-B105-72ADE0313B48"
|
||||
"matchCriteriaId": "8B09712A-BB54-4D7D-BDDF-04C947B48C25"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2016-5198",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2017-01-19T05:59:00.213",
|
||||
"lastModified": "2025-01-29T18:15:29.050",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:06:01.273",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-5030",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2017-04-24T23:59:00.190",
|
||||
"lastModified": "2025-01-29T18:15:29.307",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:06:14.400",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2017-5070",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2017-10-27T05:29:00.847",
|
||||
"lastModified": "2025-01-29T18:15:29.570",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:06:20.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2018-17463",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2018-11-14T15:29:00.297",
|
||||
"lastModified": "2025-01-29T18:15:29.997",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:05:36.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-1003029",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2019-03-08T21:29:00.297",
|
||||
"lastModified": "2025-02-07T13:15:25.013",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:05:05.957",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -110,8 +110,8 @@
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:jenkins:script_security:*:*:*:*:*:jenkins:*:*",
|
||||
"versionEndExcluding": "1.54",
|
||||
"matchCriteriaId": "B7D4D86E-A7CD-49D3-B63A-1063AD24DF1E"
|
||||
"versionEndIncluding": "1.53",
|
||||
"matchCriteriaId": "4F309F6A-5D2A-4E7E-9C91-FA5E6413F498"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2019-1003030",
|
||||
"sourceIdentifier": "jenkinsci-cert@googlegroups.com",
|
||||
"published": "2019-03-08T21:29:00.343",
|
||||
"lastModified": "2025-02-07T13:15:25.223",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:04:29.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-28339",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2020-11-07T19:15:12.880",
|
||||
"lastModified": "2024-11-21T05:22:36.373",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -105,9 +105,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.9.36",
|
||||
"matchCriteriaId": "5B3AB822-10A6-4B84-AE64-78C07AC71820"
|
||||
"matchCriteriaId": "E53D47A3-6B9B-4D39-8289-0ABDF4A93F44"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-20734",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2021-06-22T02:15:07.180",
|
||||
"lastModified": "2024-11-21T05:47:05.970",
|
||||
"lastModified": "2025-02-20T18:32:30.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,8 +85,8 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart:1.5.2:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "0868ACA3-F866-46CE-BAE0-48B50D95C05C"
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:1.5.2:*:*:*:*:wordpress:*:*",
|
||||
"matchCriteriaId": "F6A1CBF5-EBBE-44D9-8C29-B63F6CD18892"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2021-37976",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2021-10-08T22:15:08.417",
|
||||
"lastModified": "2025-01-29T17:15:15.167",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-02-20T18:05:54.830",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-4355",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:13.987",
|
||||
"lastModified": "2024-11-21T06:37:29.533",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.7",
|
||||
"matchCriteriaId": "E0001C32-A260-43BD-8522-79783AC06CC9"
|
||||
"matchCriteriaId": "2BCF3C7B-D36E-40C1-B682-DD6251D423E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2021-4375",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-06-07T02:15:15.207",
|
||||
"lastModified": "2024-11-21T06:37:32.467",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.2.7",
|
||||
"matchCriteriaId": "E0001C32-A260-43BD-8522-79783AC06CC9"
|
||||
"matchCriteriaId": "2BCF3C7B-D36E-40C1-B682-DD6251D423E9"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3935",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:12.293",
|
||||
"lastModified": "2024-11-21T07:20:33.790",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,9 +48,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.4",
|
||||
"matchCriteriaId": "249726EF-990A-462C-8F33-512E3B419BB5"
|
||||
"matchCriteriaId": "684472B7-D7E8-49DA-B3A5-74F4CBE12E7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-3946",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2022-12-12T18:15:12.357",
|
||||
"lastModified": "2024-11-21T07:20:35.100",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -64,9 +64,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.4",
|
||||
"matchCriteriaId": "249726EF-990A-462C-8F33-512E3B419BB5"
|
||||
"matchCriteriaId": "684472B7-D7E8-49DA-B3A5-74F4CBE12E7D"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-41840",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2022-11-18T19:15:30.547",
|
||||
"lastModified": "2024-11-21T07:23:54.850",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,9 +90,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.8",
|
||||
"matchCriteriaId": "2DDBF339-FD93-45F3-BB8A-9F6678CCB20F"
|
||||
"matchCriteriaId": "618E0B97-7F0E-41A7-9DB4-44A74380FC5B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4140",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-01-02T22:15:16.287",
|
||||
"lastModified": "2024-11-21T07:34:39.223",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,9 +48,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.5",
|
||||
"matchCriteriaId": "AED0FC82-32B5-4D12-B154-A2C875F3E76E"
|
||||
"matchCriteriaId": "31D18437-FE34-4E3D-8E8F-C7EE3295B678"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4236",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-01-02T22:15:16.567",
|
||||
"lastModified": "2024-11-21T07:34:50.850",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.5",
|
||||
"matchCriteriaId": "AED0FC82-32B5-4D12-B154-A2C875F3E76E"
|
||||
"matchCriteriaId": "31D18437-FE34-4E3D-8E8F-C7EE3295B678"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4237",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-01-02T22:15:16.630",
|
||||
"lastModified": "2024-11-21T07:34:50.953",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,9 +48,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.6",
|
||||
"matchCriteriaId": "CB6293C5-3808-4A77-9570-3DE3C94244A5"
|
||||
"matchCriteriaId": "86C08235-0ACE-426B-ADC7-EB87C22D3A8C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4655",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-01-16T16:15:13.707",
|
||||
"lastModified": "2024-11-21T07:35:40.853",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -48,9 +48,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.8.9",
|
||||
"matchCriteriaId": "4D644402-B2E9-45CF-9CD7-93BC6E8930E8"
|
||||
"matchCriteriaId": "CD6FDFC4-D027-4B06-81D0-E06B8B69A915"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22705",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-03-29T20:15:07.450",
|
||||
"lastModified": "2024-11-21T07:45:15.500",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -86,9 +86,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.8.10",
|
||||
"matchCriteriaId": "C83302A1-0BBB-4A83-8329-2ADA8268D842"
|
||||
"matchCriteriaId": "6D5F57E2-5F01-4AC3-B564-130C7BB1C220"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-40219",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:02.237",
|
||||
"lastModified": "2024-11-21T08:19:01.657",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41233",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:27.050",
|
||||
"lastModified": "2024-11-21T08:20:53.013",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-41962",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:31.577",
|
||||
"lastModified": "2024-11-21T08:21:59.923",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43484",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:34.103",
|
||||
"lastModified": "2024-11-21T08:24:08.023",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43493",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:34.157",
|
||||
"lastModified": "2024-11-21T08:24:09.113",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43610",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:34.217",
|
||||
"lastModified": "2024-11-21T08:24:27.630",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-43614",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-09-27T15:19:34.280",
|
||||
"lastModified": "2024-11-21T08:24:28.013",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,10 +60,10 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionStartIncluding": "2.7",
|
||||
"versionEndIncluding": "2.8.21",
|
||||
"matchCriteriaId": "3A07E8A8-4F65-42E9-8AFE-B5E4A7D23CCF"
|
||||
"matchCriteriaId": "72D09356-4C9B-4884-9C03-792F5594832B"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2023-46272",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-19T19:15:13.917",
|
||||
"lastModified": "2025-02-19T19:15:13.917",
|
||||
"lastModified": "2025-02-20T17:15:10.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer Overflow vulnerability in Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, allows an attacker to execute arbitrary code via the implementation of the ah_auth service"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La vulnerabilidad de desbordamiento del b\u00fafer en el motor IQ de Extreme Networks antes de 10.6R1A, y hasta 10.6R4 antes de 10.6R5, permite a un atacante ejecutar c\u00f3digo arbitrario a trav\u00e9s de la implementaci\u00f3n del servicio AH_AUTH"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000115355&q=CVE-2023-46272",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-50847",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-12-28T19:15:15.843",
|
||||
"lastModified": "2024-11-21T08:37:24.163",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "2.9.3",
|
||||
"matchCriteriaId": "7433D50F-C909-48E9-BEF2-601387A1FE8F"
|
||||
"matchCriteriaId": "AD5F484C-7EC5-484B-9D20-900DEB55F1B8"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T15:15:11.673",
|
||||
"lastModified": "2025-02-20T15:15:11.673",
|
||||
"lastModified": "2025-02-20T18:15:21.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, title\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176516",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176516",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T15:15:11.920",
|
||||
"lastModified": "2025-02-20T15:15:11.920",
|
||||
"lastModified": "2025-02-20T18:15:22.890",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176492",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176492",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T15:15:12.050",
|
||||
"lastModified": "2025-02-20T15:15:12.050",
|
||||
"lastModified": "2025-02-20T18:15:23.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176492",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176492",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51312",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T15:15:12.293",
|
||||
"lastModified": "2025-02-20T15:15:12.293",
|
||||
"lastModified": "2025-02-20T18:15:23.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176493",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176493",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51315",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T15:15:12.680",
|
||||
"lastModified": "2025-02-20T15:15:12.680",
|
||||
"lastModified": "2025-02-20T18:15:23.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176493",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176493",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51318",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T16:15:34.703",
|
||||
"lastModified": "2025-02-20T16:15:34.703",
|
||||
"lastModified": "2025-02-20T18:15:23.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176499",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176499",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51325",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T16:15:35.330",
|
||||
"lastModified": "2025-02-20T16:15:35.330",
|
||||
"lastModified": "2025-02-20T18:15:23.877",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176505",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176505",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51330",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T16:15:35.647",
|
||||
"lastModified": "2025-02-20T16:15:35.647",
|
||||
"lastModified": "2025-02-20T17:15:11.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu \"date\" parameter."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176508",
|
||||
@ -20,6 +55,10 @@
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176508",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-51332",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T16:15:35.850",
|
||||
"lastModified": "2025-02-20T16:15:35.850",
|
||||
"lastModified": "2025-02-20T17:15:11.253",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176510",
|
||||
|
25
CVE-2023/CVE-2023-513xx/CVE-2023-51333.json
Normal file
25
CVE-2023/CVE-2023-513xx/CVE-2023-51333.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-51333",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:24.077",
|
||||
"lastModified": "2025-02-20T18:15:24.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176511",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-513xx/CVE-2023-51334.json
Normal file
25
CVE-2023/CVE-2023-513xx/CVE-2023-51334.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-51334",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:24.203",
|
||||
"lastModified": "2025-02-20T18:15:24.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cinema Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176512",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-513xx/CVE-2023-51335.json
Normal file
25
CVE-2023/CVE-2023-513xx/CVE-2023-51335.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-51335",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:24.347",
|
||||
"lastModified": "2025-02-20T18:15:24.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://packetstorm.news/files/id/176508",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5951",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-12-04T22:15:08.063",
|
||||
"lastModified": "2024-11-21T08:42:50.830",
|
||||
"lastModified": "2025-02-20T18:32:30.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "6D77F5A6-A6AB-4943-8702-4475CB1CA7E0"
|
||||
"matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5952",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-12-04T22:15:08.117",
|
||||
"lastModified": "2024-11-21T08:42:51.027",
|
||||
"lastModified": "2025-02-20T18:32:30.690",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "6D77F5A6-A6AB-4943-8702-4475CB1CA7E0"
|
||||
"matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-5953",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-12-04T22:15:08.170",
|
||||
"lastModified": "2024-11-21T08:42:51.153",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -60,9 +60,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.5",
|
||||
"matchCriteriaId": "62DCBB7B-A579-499A-B300-87D4F88A44C5"
|
||||
"matchCriteriaId": "92748727-4447-48C2-B830-3F24E8AD8D4E"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6120",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2023-12-09T07:15:08.130",
|
||||
"lastModified": "2024-11-21T08:43:10.320",
|
||||
"lastModified": "2025-02-20T18:34:50.990",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:collne:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.9.7",
|
||||
"matchCriteriaId": "58A8E610-7BF0-4745-B5F6-E1FFA8397E64"
|
||||
"matchCriteriaId": "70C51E31-DE5E-49C8-A43C-B34805ED5D08"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,16 +2,43 @@
|
||||
"id": "CVE-2024-12173",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-02-19T06:15:21.003",
|
||||
"lastModified": "2025-02-19T06:15:21.003",
|
||||
"lastModified": "2025-02-20T18:15:24.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Master Slider WordPress plugin before 3.10.5 does not sanitise and escape some of its settings, which could allow high privilege users such as Editor and above to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Master Slider WordPress antes de 3.10.5 no depura y escapa a algunas de sus configuraciones, lo que podr\u00eda permitir que los usuarios de alto privilegio, como el editor y arriba, realicen Cross-Site Scripting Almacenado ataques cuando la capacidad unfiltered_html no est\u00e1 permitida (por ejemplo en configuraciones multisitio)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/0f35be0e-0f63-4e33-aa4d-c47b1f1e0595/",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2570",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T00:15:08.073",
|
||||
"lastModified": "2024-11-21T09:10:02.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:13:30.057",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257073",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20edit-task.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257073",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257073",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2571",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T01:15:48.493",
|
||||
"lastModified": "2024-11-21T09:10:02.260",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:13:36.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257074",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257074",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20manage-admin.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257074",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257074",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2572",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T01:15:48.707",
|
||||
"lastModified": "2024-11-21T09:10:02.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:13:22.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257075",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257075",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-details.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257075",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257075",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2573",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T01:15:48.923",
|
||||
"lastModified": "2024-11-21T09:10:02.530",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:12:59.823",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257076",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257076",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/Execution%20After%20Redirect%20-%20task-info.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257076",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257076",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2574",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T02:15:06.177",
|
||||
"lastModified": "2024-11-21T09:10:02.667",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:10:50.230",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257077",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257077",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20edit-task.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257077",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257077",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2575",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T02:15:06.397",
|
||||
"lastModified": "2024-11-21T09:10:02.810",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:10:40.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257078",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257078",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20task-details.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257078",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257078",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2576",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T02:15:06.620",
|
||||
"lastModified": "2024-11-21T09:10:02.960",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:09:56.283",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257079",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257079",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-admin.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257079",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257079",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2577",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-18T03:15:06.123",
|
||||
"lastModified": "2024-11-21T09:10:03.103",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-20T18:09:43.090",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,65 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257080",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257080",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/skid-nochizplz/skid-nochizplz/blob/main/TrashBin/CVE/SOURCECODESTER%20Employee%20Task%20Management%20System/IDOR%20-%20update-employee.php.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257080",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257080",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2773",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T23:15:11.883",
|
||||
"lastModified": "2024-11-21T09:10:29.120",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:26:30.320",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Kurunie/vuln_report/blob/main/Complete%20Online%20Marriage%20Registration%20System's%20vuln.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257607",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257607",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Kurunie/vuln_report/blob/main/Complete%20Online%20Marriage%20Registration%20System's%20vuln.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257607",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257607",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2775",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-21T23:15:12.403",
|
||||
"lastModified": "2024-11-21T09:10:29.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:29:08.757",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257609",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257609",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%202.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257609",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257609",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2778",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-22T01:15:07.690",
|
||||
"lastModified": "2024-11-21T09:10:29.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:28:46.003",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,69 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_marriage_registration_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "B6723869-7A39-47FB-8719-6DAB5E08E3DC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%203.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257612",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257612",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Complete%20Online%20Marriage%20Registration%20System/Complete%20Online%20Marriage%20Registration%20System%20-%20vuln%203.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257612",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257612",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-28112",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T20:15:07.730",
|
||||
"lastModified": "2025-02-13T17:12:42.737",
|
||||
"lastModified": "2025-02-20T17:25:58.783",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -90,9 +90,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:peeringmanager:peering_manager:*:*:*:*:*:*:*:*",
|
||||
"criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "3F6A1362-9C72-4E47-9B75-057B56BC505A"
|
||||
"matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
@ -111,7 +111,7 @@
|
||||
"url": "https://owasp.org/www-community/attacks/xss",
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
@ -125,7 +125,7 @@
|
||||
"url": "https://owasp.org/www-community/attacks/xss",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Technical Description"
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28113",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T20:15:07.933",
|
||||
"lastModified": "2024-11-21T09:05:50.570",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-20T17:08:04.250",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,66 @@
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/commit/49dc5593184d7740d81e57dbbe3f971d2969dfac",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-f4mf-5g28-q7f5",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/commit/49dc5593184d7740d81e57dbbe3f971d2969dfac",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-f4mf-5g28-q7f5",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-28114",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2024-03-12T20:15:08.113",
|
||||
"lastModified": "2024-11-21T09:05:50.730",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-20T17:18:20.863",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 5.8
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.1,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,48 +69,108 @@
|
||||
"value": "CWE-74"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:peering-manager:peering_manager:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "1.8.3",
|
||||
"matchCriteriaId": "B1DD9909-194C-4B81-A9D6-0E24FEA824C0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/Command_Injection",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python",
|
||||
"source": "security-advisories@github.com"
|
||||
"source": "security-advisories@github.com",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/commit/8a865fb596c11ad7caf45aef317d8fcbce7f85ff",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/peering-manager/peering-manager/security/advisories/GHSA-q37x-qfrx-jcv6",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-community/attacks/Command_Injection",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://owasp.org/www-project-web-security-testing-guide/v41/4-Web_Application_Security_Testing/07-Input_Validation_Testing/18-Testing_for_Server_Side_Template_Injection",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://stackoverflow.com/questions/73939573/how-to-sanitise-string-of-python-code-with-python",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2832",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-23T06:15:08.793",
|
||||
"lastModified": "2024-11-21T09:10:38.020",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-02-20T17:22:38.917",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,67 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_shopping_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49A4487F-1CD7-4B67-88AF-1D471D13D36C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257752",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257752",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/comeony/vuln_report/blob/main/Online%20Shopping%20System%20-%20vuln%201.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.257752",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.257752",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2927",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-26T23:15:47.840",
|
||||
"lastModified": "2024-11-21T09:10:51.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:53:42.533",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,30 +96,73 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:anisha:mobile_shop:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7E42FBD-E07D-412C-8F3C-FE0152825E63"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258000",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258000",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304053",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258000",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258000",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304053",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2938",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T01:15:47.630",
|
||||
"lastModified": "2024-11-21T09:10:53.177",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:38:08.680",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Beatriz-ai-boop/cve/blob/main/report/1.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258029",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258029",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304746",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Beatriz-ai-boop/cve/blob/main/report/1.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258029",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258029",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304746",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2941",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T03:15:13.160",
|
||||
"lastModified": "2024-11-21T09:10:53.607",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:28:58.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258032",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258032",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304757",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%201.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258032",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258032",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304757",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2942",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-03-27T03:15:13.490",
|
||||
"lastModified": "2024-11-21T09:10:53.753",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:06:40.927",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_examination_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C936CAF1-EB95-4D46-985A-DAF239D77187"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258033",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258033",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304758",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/E1CHO/cve_hub/blob/main/Online%20Examination%20System/Online%20Examination%20System%20-%20vuln%202.pdf",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.258033",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.258033",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.304758",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2024/CVE-2024-469xx/CVE-2024-46933.json
Normal file
48
CVE-2024/CVE-2024-469xx/CVE-2024-46933.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2024-46933",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.007",
|
||||
"lastModified": "2025-02-20T18:15:25.007",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Atos Eviden BullSequana XH2140 BMC before C4EM-125: OMF_C4E 101.05.0014. Some BullSequana XH products were shipped without proper hardware programming, leading to a potential denial-of-service with privileged access."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H",
|
||||
"baseScore": 7.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.3,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://eviden.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://support.bull.com/ols/product/security/psirt/security-bulletins/ast2600-left-unconfigured-in-bullsequana-xh2140-psirt-270-tlp-clear-version-2-7-cve-2024-46933/view",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4792",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:45.760",
|
||||
"lastModified": "2024-11-21T09:43:37.300",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:24:20.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263891",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263891",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332533",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_action.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263891",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263891",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332533",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4793",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:46.307",
|
||||
"lastModified": "2024-11-21T09:43:37.463",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:23:45.077",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263892",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263892",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332535",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_laundry.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263892",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263892",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332535",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4794",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:47.013",
|
||||
"lastModified": "2024-11-21T09:43:37.600",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:22:57.657",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263893",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263893",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332536",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_receiving.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263893",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263893",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332536",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4795",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:48.390",
|
||||
"lastModified": "2024-11-21T09:43:37.747",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:22:18.310",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263894",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263894",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332537",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_user.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263894",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263894",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332537",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4796",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:49.137",
|
||||
"lastModified": "2024-11-21T09:43:37.887",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:21:43.983",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263895",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263895",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332538",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/sql_manage_inv.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263895",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263895",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332538",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4797",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:44:51.433",
|
||||
"lastModified": "2024-11-21T09:43:38.033",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:20:28.093",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -120,38 +140,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263896",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263896",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332539",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/xss_action.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263896",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263896",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.332539",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4817",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:45:08.827",
|
||||
"lastModified": "2024-11-21T09:43:40.890",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:18:32.357",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,40 +138,97 @@
|
||||
"value": "CWE-99"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263938",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263938",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333055",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR_manage_user.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263938",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263938",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333055",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4818",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:45:10.140",
|
||||
"lastModified": "2024-11-21T09:43:41.023",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:17:41.877",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,40 +138,97 @@
|
||||
"value": "CWE-73"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263939",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263939",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333057",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/LFI.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263939",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263939",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333057",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-4819",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-05-14T15:45:11.543",
|
||||
"lastModified": "2024-11-21T09:43:41.173",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-02-20T18:16:52.500",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -80,6 +80,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -118,40 +138,97 @@
|
||||
"value": "CWE-285"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:campcodes:online_laundry_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3247D9B5-AF81-487E-933A-C0481D687201"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263940",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263940",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333058",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yylmm/CVE/blob/main/Online%20Laundry%20Management%20System/IDOR.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.263940",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.263940",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.333058",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-549xx/CVE-2024-54958.json
Normal file
21
CVE-2024/CVE-2024-549xx/CVE-2024-54958.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54958",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.187",
|
||||
"lastModified": "2025-02-20T18:15:25.187",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nagios XI 2024R1.2.2 is susceptible to a stored Cross-Site Scripting (XSS) vulnerability in the Tools page. This flaw allows an attacker to inject malicious scripts into the Tools interface, which are then stored and executed in the context of other users accessing the page."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54958",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-549xx/CVE-2024-54959.json
Normal file
21
CVE-2024/CVE-2024-549xx/CVE-2024-54959.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54959",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.317",
|
||||
"lastModified": "2025-02-20T18:15:25.317",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nagios XI 2024R1.2.2 is vulnerable to a Cross-Site Request Forgery (CSRF) attack through the Favorites component, enabling POST-based Cross-Site Scripting (XSS)."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54959",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-549xx/CVE-2024-54960.json
Normal file
21
CVE-2024/CVE-2024-549xx/CVE-2024-54960.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54960",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.457",
|
||||
"lastModified": "2025-02-20T18:15:25.457",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL Injection vulnerability in Nagios XI 2024R1.2.2 allows a remote attacker to execute SQL injection via a crafted payload in the History Tab component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54960",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-549xx/CVE-2024-54961.json
Normal file
21
CVE-2024/CVE-2024-549xx/CVE-2024-54961.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-54961",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.593",
|
||||
"lastModified": "2025-02-20T18:15:25.593",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nagios XI 2024R1.2.2 has an Information Disclosure vulnerability, which allows unauthenticated users to access multiple pages displaying the usernames and email addresses of all current users."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sharpe-nl/CVEs/tree/main/CVE-2024-54961",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2024/CVE-2024-554xx/CVE-2024-55457.json
Normal file
21
CVE-2024/CVE-2024-554xx/CVE-2024-55457.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2024-55457",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:25.740",
|
||||
"lastModified": "2025-02-20T18:15:25.740",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MasterSAM Star Gate 11 is vulnerable to directory traversal via /adama/adama/downloadService. An attacker can exploit this vulnerability by manipulating the file parameter to access arbitrary files on the server, potentially exposing sensitive information."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h13nh04ng/CVE-2024-55457-PoC",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2024/CVE-2024-577xx/CVE-2024-57716.json
Normal file
25
CVE-2024/CVE-2024-577xx/CVE-2024-57716.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2024-57716",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:11.803",
|
||||
"lastModified": "2025-02-20T17:15:11.803",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in trenoncourt AutoQueryable v.1.7.0 allows a remote attacker to obtain sensitive information via the Unselectable function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/pentesttoolscom/vulnerability-research/tree/master/CVE-2024-57716",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/trenoncourt/AutoQueryable",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-12xx/CVE-2025-1258.json
Normal file
16
CVE-2025/CVE-2025-12xx/CVE-2025-1258.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-1258",
|
||||
"sourceIdentifier": "psirt@lenovo.com",
|
||||
"published": "2025-02-20T18:15:26.217",
|
||||
"lastModified": "2025-02-20T18:15:26.217",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
25
CVE-2025/CVE-2025-259xx/CVE-2025-25968.json
Normal file
25
CVE-2025/CVE-2025-259xx/CVE-2025-25968.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25968",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:26.570",
|
||||
"lastModified": "2025-02-20T18:15:26.570",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "DDSN Interactive cm3 Acora CMS version 10.1.1 contains an improper access control vulnerability. An editor-privileged user can access sensitive information, such as system administrator credentials, by force browsing the endpoint and exploiting the 'file' parameter. By referencing specific files (e.g., cm3.xml), attackers can bypass access controls, leading to account takeover and potential privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ddsn.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/padayali-JD/CVE-2025-25968",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2025/CVE-2025-259xx/CVE-2025-25973.json
Normal file
25
CVE-2025/CVE-2025-259xx/CVE-2025-25973.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2025-25973",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T18:15:26.713",
|
||||
"lastModified": "2025-02-20T18:15:26.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A stored Cross Site Scripting vulnerability in the \"related recommendations\" feature in Ppress v.0.0.9 allows a remote attacker to execute arbitrary code via a crafted script to the article.title, article.category, and article.tags parameters."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/coleak2021/512acaa12ba0987499d560967acff1d1",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yandaozi/PPress/issues/3",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26304.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26304.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26304",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.260",
|
||||
"lastModified": "2025-02-20T17:15:12.260",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the parseSWF_EXPORTASSETS function in util/parser.c of libming v0.4.8."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/323",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26305.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26305.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26305",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.377",
|
||||
"lastModified": "2025-02-20T17:15:12.377",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the parseSWF_SOUNDINFO function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/322",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26306.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26306.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26306",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.490",
|
||||
"lastModified": "2025-02-20T17:15:12.490",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the readSizedString function in util/read.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/324",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26307.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26307.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26307",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.607",
|
||||
"lastModified": "2025-02-20T17:15:12.607",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the parseSWF_IMPORTASSETS2 function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/325",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26308.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26308.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26308",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.730",
|
||||
"lastModified": "2025-02-20T17:15:12.730",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the parseSWF_FILTERLIST function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/326",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26309.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26309.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26309",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.853",
|
||||
"lastModified": "2025-02-20T17:15:12.853",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A memory leak has been identified in the parseSWF_DEFINESCENEANDFRAMEDATA function in util/parser.c of libming v0.4.8, which allows attackers to cause a denial of service via a crafted SWF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/327",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26310.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26310.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26310",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:12.967",
|
||||
"lastModified": "2025-02-20T17:15:12.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple memory leaks have been identified in the ABC file parsing functions (parseABC_CONSTANT_POOL and `parseABC_FILE) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted ABC file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/328",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2025/CVE-2025-263xx/CVE-2025-26311.json
Normal file
21
CVE-2025/CVE-2025-263xx/CVE-2025-26311.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2025-26311",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-20T17:15:13.087",
|
||||
"lastModified": "2025-02-20T17:15:13.087",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple memory leaks have been identified in the clip actions parsing functions (parseSWF_CLIPACTIONS and parseSWF_CLIPACTIONRECORD) in util/parser.c of libming v0.4.8, which allow attackers to cause a denial of service via a crafted SWF file."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/libming/libming/issues/329",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
82
CVE-2025/CVE-2025-270xx/CVE-2025-27091.json
Normal file
82
CVE-2025/CVE-2025-270xx/CVE-2025-27091.json
Normal file
@ -0,0 +1,82 @@
|
||||
{
|
||||
"id": "CVE-2025-27091",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-02-20T18:15:26.850",
|
||||
"lastModified": "2025-02-20T18:15:26.850",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenH264 is a free license codec library which supports H.264 encoding and decoding. A vulnerability in the decoding functions of OpenH264 codec library could allow a remote, unauthenticated attacker to trigger a heap overflow. This vulnerability is due to a race condition between a Sequence Parameter Set (SPS) memory allocation and a subsequent non Instantaneous Decoder Refresh (non-IDR) Network Abstraction Layer (NAL) unit memory usage. An attacker could exploit this vulnerability by crafting a malicious bitstream and tricking a victim user into processing an arbitrary video containing the malicious bistream. An exploit could allow the attacker to cause an unexpected crash in the victim's user decoding client and, possibly, perform arbitrary commands on the victim's host by abusing the heap overflow. This vulnerability affects OpenH264 2.5.0 and earlier releases. Both Scalable Video Coding (SVC) mode and Advanced Video Coding (AVC) mode are affected by this vulnerability. OpenH264 software releases 2.6.0 and later contained the fix for this vulnerability. Users are advised to upgrade. There are no known workarounds for this vulnerability.\n\n### For more information\n\nIf you have any questions or comments about this advisory:\n* [Open an issue in cisco/openh264](https://github.com/cisco/openh264/issues)\n* Email Cisco Open Source Security ([oss-security@cisco.com](mailto:oss-security@cisco.com)) and Cisco PSIRT ([psirt@cisco.com](mailto:psirt@cisco.com))\n\n### Credits:\n\n* **Research:** Octavian Guzu and Andrew Calvano of Meta\n* **Fix ideation:** Philipp Hancke and Shyam Sadhwani of Meta\n* **Fix implementation:** Benzheng Zhang (@BenzhengZhang)\n* **Release engineering:** Benzheng Zhang (@BenzhengZhang)"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cisco/openh264/releases/tag/v2.6.0",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cisco/openh264/security/advisories/GHSA-m99q-5j7x-7m9x",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
107
README.md
107
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-02-20T17:00:56.445324+00:00
|
||||
2025-02-20T19:00:22.081235+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-02-20T16:51:45.987000+00:00
|
||||
2025-02-20T18:53:42.533000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,69 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
281920
|
||||
281942
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `26`
|
||||
Recently added CVEs: `22`
|
||||
|
||||
- [CVE-2023-51308](CVE-2023/CVE-2023-513xx/CVE-2023-51308.json) (`2025-02-20T15:15:11.793`)
|
||||
- [CVE-2023-51309](CVE-2023/CVE-2023-513xx/CVE-2023-51309.json) (`2025-02-20T15:15:11.920`)
|
||||
- [CVE-2023-51310](CVE-2023/CVE-2023-513xx/CVE-2023-51310.json) (`2025-02-20T15:15:12.050`)
|
||||
- [CVE-2023-51311](CVE-2023/CVE-2023-513xx/CVE-2023-51311.json) (`2025-02-20T15:15:12.170`)
|
||||
- [CVE-2023-51312](CVE-2023/CVE-2023-513xx/CVE-2023-51312.json) (`2025-02-20T15:15:12.293`)
|
||||
- [CVE-2023-51313](CVE-2023/CVE-2023-513xx/CVE-2023-51313.json) (`2025-02-20T15:15:12.437`)
|
||||
- [CVE-2023-51314](CVE-2023/CVE-2023-513xx/CVE-2023-51314.json) (`2025-02-20T15:15:12.563`)
|
||||
- [CVE-2023-51315](CVE-2023/CVE-2023-513xx/CVE-2023-51315.json) (`2025-02-20T15:15:12.680`)
|
||||
- [CVE-2023-51316](CVE-2023/CVE-2023-513xx/CVE-2023-51316.json) (`2025-02-20T15:15:12.810`)
|
||||
- [CVE-2023-51317](CVE-2023/CVE-2023-513xx/CVE-2023-51317.json) (`2025-02-20T16:15:34.600`)
|
||||
- [CVE-2023-51318](CVE-2023/CVE-2023-513xx/CVE-2023-51318.json) (`2025-02-20T16:15:34.703`)
|
||||
- [CVE-2023-51319](CVE-2023/CVE-2023-513xx/CVE-2023-51319.json) (`2025-02-20T16:15:34.803`)
|
||||
- [CVE-2023-51320](CVE-2023/CVE-2023-513xx/CVE-2023-51320.json) (`2025-02-20T16:15:34.903`)
|
||||
- [CVE-2023-51321](CVE-2023/CVE-2023-513xx/CVE-2023-51321.json) (`2025-02-20T16:15:35.007`)
|
||||
- [CVE-2023-51323](CVE-2023/CVE-2023-513xx/CVE-2023-51323.json) (`2025-02-20T16:15:35.110`)
|
||||
- [CVE-2023-51324](CVE-2023/CVE-2023-513xx/CVE-2023-51324.json) (`2025-02-20T16:15:35.210`)
|
||||
- [CVE-2023-51325](CVE-2023/CVE-2023-513xx/CVE-2023-51325.json) (`2025-02-20T16:15:35.330`)
|
||||
- [CVE-2023-51326](CVE-2023/CVE-2023-513xx/CVE-2023-51326.json) (`2025-02-20T16:15:35.437`)
|
||||
- [CVE-2023-51327](CVE-2023/CVE-2023-513xx/CVE-2023-51327.json) (`2025-02-20T16:15:35.543`)
|
||||
- [CVE-2023-51330](CVE-2023/CVE-2023-513xx/CVE-2023-51330.json) (`2025-02-20T16:15:35.647`)
|
||||
- [CVE-2023-51331](CVE-2023/CVE-2023-513xx/CVE-2023-51331.json) (`2025-02-20T16:15:35.750`)
|
||||
- [CVE-2023-51332](CVE-2023/CVE-2023-513xx/CVE-2023-51332.json) (`2025-02-20T16:15:35.850`)
|
||||
- [CVE-2024-57401](CVE-2024/CVE-2024-574xx/CVE-2024-57401.json) (`2025-02-20T15:15:13.347`)
|
||||
- [CVE-2025-0161](CVE-2025/CVE-2025-01xx/CVE-2025-0161.json) (`2025-02-20T16:15:36.333`)
|
||||
- [CVE-2025-20059](CVE-2025/CVE-2025-200xx/CVE-2025-20059.json) (`2025-02-20T15:15:13.957`)
|
||||
- [CVE-2023-51333](CVE-2023/CVE-2023-513xx/CVE-2023-51333.json) (`2025-02-20T18:15:24.077`)
|
||||
- [CVE-2023-51334](CVE-2023/CVE-2023-513xx/CVE-2023-51334.json) (`2025-02-20T18:15:24.203`)
|
||||
- [CVE-2023-51335](CVE-2023/CVE-2023-513xx/CVE-2023-51335.json) (`2025-02-20T18:15:24.347`)
|
||||
- [CVE-2024-46933](CVE-2024/CVE-2024-469xx/CVE-2024-46933.json) (`2025-02-20T18:15:25.007`)
|
||||
- [CVE-2024-54958](CVE-2024/CVE-2024-549xx/CVE-2024-54958.json) (`2025-02-20T18:15:25.187`)
|
||||
- [CVE-2024-54959](CVE-2024/CVE-2024-549xx/CVE-2024-54959.json) (`2025-02-20T18:15:25.317`)
|
||||
- [CVE-2024-54960](CVE-2024/CVE-2024-549xx/CVE-2024-54960.json) (`2025-02-20T18:15:25.457`)
|
||||
- [CVE-2024-54961](CVE-2024/CVE-2024-549xx/CVE-2024-54961.json) (`2025-02-20T18:15:25.593`)
|
||||
- [CVE-2024-55457](CVE-2024/CVE-2024-554xx/CVE-2024-55457.json) (`2025-02-20T18:15:25.740`)
|
||||
- [CVE-2024-57716](CVE-2024/CVE-2024-577xx/CVE-2024-57716.json) (`2025-02-20T17:15:11.803`)
|
||||
- [CVE-2025-1258](CVE-2025/CVE-2025-12xx/CVE-2025-1258.json) (`2025-02-20T18:15:26.217`)
|
||||
- [CVE-2025-25968](CVE-2025/CVE-2025-259xx/CVE-2025-25968.json) (`2025-02-20T18:15:26.570`)
|
||||
- [CVE-2025-25973](CVE-2025/CVE-2025-259xx/CVE-2025-25973.json) (`2025-02-20T18:15:26.713`)
|
||||
- [CVE-2025-26304](CVE-2025/CVE-2025-263xx/CVE-2025-26304.json) (`2025-02-20T17:15:12.260`)
|
||||
- [CVE-2025-26305](CVE-2025/CVE-2025-263xx/CVE-2025-26305.json) (`2025-02-20T17:15:12.377`)
|
||||
- [CVE-2025-26306](CVE-2025/CVE-2025-263xx/CVE-2025-26306.json) (`2025-02-20T17:15:12.490`)
|
||||
- [CVE-2025-26307](CVE-2025/CVE-2025-263xx/CVE-2025-26307.json) (`2025-02-20T17:15:12.607`)
|
||||
- [CVE-2025-26308](CVE-2025/CVE-2025-263xx/CVE-2025-26308.json) (`2025-02-20T17:15:12.730`)
|
||||
- [CVE-2025-26309](CVE-2025/CVE-2025-263xx/CVE-2025-26309.json) (`2025-02-20T17:15:12.853`)
|
||||
- [CVE-2025-26310](CVE-2025/CVE-2025-263xx/CVE-2025-26310.json) (`2025-02-20T17:15:12.967`)
|
||||
- [CVE-2025-26311](CVE-2025/CVE-2025-263xx/CVE-2025-26311.json) (`2025-02-20T17:15:13.087`)
|
||||
- [CVE-2025-27091](CVE-2025/CVE-2025-270xx/CVE-2025-27091.json) (`2025-02-20T18:15:26.850`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `65`
|
||||
Recently modified CVEs: `76`
|
||||
|
||||
- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2025-02-20T15:23:21.377`)
|
||||
- [CVE-2024-2472](CVE-2024/CVE-2024-24xx/CVE-2024-2472.json) (`2025-02-20T15:28:10.360`)
|
||||
- [CVE-2024-37361](CVE-2024/CVE-2024-373xx/CVE-2024-37361.json) (`2025-02-20T15:15:13.190`)
|
||||
- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2025-02-20T16:20:40.547`)
|
||||
- [CVE-2024-47908](CVE-2024/CVE-2024-479xx/CVE-2024-47908.json) (`2025-02-20T15:57:06.850`)
|
||||
- [CVE-2024-52295](CVE-2024/CVE-2024-522xx/CVE-2024-52295.json) (`2025-02-20T16:21:26.323`)
|
||||
- [CVE-2024-55952](CVE-2024/CVE-2024-559xx/CVE-2024-55952.json) (`2025-02-20T16:22:50.240`)
|
||||
- [CVE-2024-55953](CVE-2024/CVE-2024-559xx/CVE-2024-55953.json) (`2025-02-20T16:25:07.667`)
|
||||
- [CVE-2024-56511](CVE-2024/CVE-2024-565xx/CVE-2024-56511.json) (`2025-02-20T16:26:58.487`)
|
||||
- [CVE-2024-8911](CVE-2024/CVE-2024-89xx/CVE-2024-8911.json) (`2025-02-20T15:30:18.643`)
|
||||
- [CVE-2024-8943](CVE-2024/CVE-2024-89xx/CVE-2024-8943.json) (`2025-02-20T15:30:59.567`)
|
||||
- [CVE-2025-1176](CVE-2025/CVE-2025-11xx/CVE-2025-1176.json) (`2025-02-20T16:40:56.790`)
|
||||
- [CVE-2025-1177](CVE-2025/CVE-2025-11xx/CVE-2025-1177.json) (`2025-02-20T15:58:50.097`)
|
||||
- [CVE-2025-1189](CVE-2025/CVE-2025-11xx/CVE-2025-1189.json) (`2025-02-20T16:24:17.783`)
|
||||
- [CVE-2025-22467](CVE-2025/CVE-2025-224xx/CVE-2025-22467.json) (`2025-02-20T15:53:06.133`)
|
||||
- [CVE-2025-24011](CVE-2025/CVE-2025-240xx/CVE-2025-24011.json) (`2025-02-20T16:44:29.017`)
|
||||
- [CVE-2025-24012](CVE-2025/CVE-2025-240xx/CVE-2025-24012.json) (`2025-02-20T16:45:15.377`)
|
||||
- [CVE-2025-24896](CVE-2025/CVE-2025-248xx/CVE-2025-24896.json) (`2025-02-20T15:48:37.877`)
|
||||
- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-20T15:15:14.380`)
|
||||
- [CVE-2025-25942](CVE-2025/CVE-2025-259xx/CVE-2025-25942.json) (`2025-02-20T15:15:14.587`)
|
||||
- [CVE-2025-25943](CVE-2025/CVE-2025-259xx/CVE-2025-25943.json) (`2025-02-20T15:15:14.743`)
|
||||
- [CVE-2025-25944](CVE-2025/CVE-2025-259xx/CVE-2025-25944.json) (`2025-02-20T15:15:14.900`)
|
||||
- [CVE-2025-25945](CVE-2025/CVE-2025-259xx/CVE-2025-25945.json) (`2025-02-20T15:15:15.073`)
|
||||
- [CVE-2025-25946](CVE-2025/CVE-2025-259xx/CVE-2025-25946.json) (`2025-02-20T15:15:15.227`)
|
||||
- [CVE-2025-25947](CVE-2025/CVE-2025-259xx/CVE-2025-25947.json) (`2025-02-20T15:15:15.530`)
|
||||
- [CVE-2024-2573](CVE-2024/CVE-2024-25xx/CVE-2024-2573.json) (`2025-02-20T18:12:59.823`)
|
||||
- [CVE-2024-2574](CVE-2024/CVE-2024-25xx/CVE-2024-2574.json) (`2025-02-20T18:10:50.230`)
|
||||
- [CVE-2024-2575](CVE-2024/CVE-2024-25xx/CVE-2024-2575.json) (`2025-02-20T18:10:40.443`)
|
||||
- [CVE-2024-2576](CVE-2024/CVE-2024-25xx/CVE-2024-2576.json) (`2025-02-20T18:09:56.283`)
|
||||
- [CVE-2024-2577](CVE-2024/CVE-2024-25xx/CVE-2024-2577.json) (`2025-02-20T18:09:43.090`)
|
||||
- [CVE-2024-2773](CVE-2024/CVE-2024-27xx/CVE-2024-2773.json) (`2025-02-20T18:26:30.320`)
|
||||
- [CVE-2024-2775](CVE-2024/CVE-2024-27xx/CVE-2024-2775.json) (`2025-02-20T18:29:08.757`)
|
||||
- [CVE-2024-2778](CVE-2024/CVE-2024-27xx/CVE-2024-2778.json) (`2025-02-20T18:28:46.003`)
|
||||
- [CVE-2024-28112](CVE-2024/CVE-2024-281xx/CVE-2024-28112.json) (`2025-02-20T17:25:58.783`)
|
||||
- [CVE-2024-28113](CVE-2024/CVE-2024-281xx/CVE-2024-28113.json) (`2025-02-20T17:08:04.250`)
|
||||
- [CVE-2024-28114](CVE-2024/CVE-2024-281xx/CVE-2024-28114.json) (`2025-02-20T17:18:20.863`)
|
||||
- [CVE-2024-2832](CVE-2024/CVE-2024-28xx/CVE-2024-2832.json) (`2025-02-20T17:22:38.917`)
|
||||
- [CVE-2024-2927](CVE-2024/CVE-2024-29xx/CVE-2024-2927.json) (`2025-02-20T18:53:42.533`)
|
||||
- [CVE-2024-2938](CVE-2024/CVE-2024-29xx/CVE-2024-2938.json) (`2025-02-20T18:38:08.680`)
|
||||
- [CVE-2024-2941](CVE-2024/CVE-2024-29xx/CVE-2024-2941.json) (`2025-02-20T18:28:58.243`)
|
||||
- [CVE-2024-2942](CVE-2024/CVE-2024-29xx/CVE-2024-2942.json) (`2025-02-20T18:06:40.927`)
|
||||
- [CVE-2024-4792](CVE-2024/CVE-2024-47xx/CVE-2024-4792.json) (`2025-02-20T18:24:20.357`)
|
||||
- [CVE-2024-4793](CVE-2024/CVE-2024-47xx/CVE-2024-4793.json) (`2025-02-20T18:23:45.077`)
|
||||
- [CVE-2024-4794](CVE-2024/CVE-2024-47xx/CVE-2024-4794.json) (`2025-02-20T18:22:57.657`)
|
||||
- [CVE-2024-4795](CVE-2024/CVE-2024-47xx/CVE-2024-4795.json) (`2025-02-20T18:22:18.310`)
|
||||
- [CVE-2024-4796](CVE-2024/CVE-2024-47xx/CVE-2024-4796.json) (`2025-02-20T18:21:43.983`)
|
||||
- [CVE-2024-4797](CVE-2024/CVE-2024-47xx/CVE-2024-4797.json) (`2025-02-20T18:20:28.093`)
|
||||
- [CVE-2024-4817](CVE-2024/CVE-2024-48xx/CVE-2024-4817.json) (`2025-02-20T18:18:32.357`)
|
||||
- [CVE-2024-4818](CVE-2024/CVE-2024-48xx/CVE-2024-4818.json) (`2025-02-20T18:17:41.877`)
|
||||
- [CVE-2024-4819](CVE-2024/CVE-2024-48xx/CVE-2024-4819.json) (`2025-02-20T18:16:52.500`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
338
_state.csv
338
_state.csv
@ -76369,7 +76369,7 @@ CVE-2015-2969,0,0,a6227da3ec97ec12ae2ecd4e518e5e398048e1cfa7ab81073d83b17a57ae5a
|
||||
CVE-2015-2970,0,0,bdb774a4f43bc135b5ebf54bfeff8ddb1f7b29fa263806e9b89bba9b4effde1c,2024-11-21T02:28:25.077000
|
||||
CVE-2015-2971,0,0,62735c61e9c12718c41334ff9d3675c0bfa8c07e8bedf2811cc4a72e8adf402b,2024-11-21T02:28:25.183000
|
||||
CVE-2015-2972,0,0,158b8f3ec78c54793d014612a503375bd45db40b144ea6dcbf627b350b80c8ac,2024-11-21T02:28:25.300000
|
||||
CVE-2015-2973,0,0,4f6c0d64a017212b13c5092fc0a929a581c0f81ce4c68dac7f11f5655f846e17,2024-11-21T02:28:25.437000
|
||||
CVE-2015-2973,0,1,d21c3c6752a63f5dea0029172d0f34d6015fa83428d5a308ece6fccec16f4c6a,2025-02-20T18:32:30.690000
|
||||
CVE-2015-2974,0,0,1439adb553c92e9c2b19dfbbc6c60ff2bc3c6623e0428e64db50612ea44f662e,2024-11-21T02:28:25.567000
|
||||
CVE-2015-2975,0,0,152804feb84f2a7b7517565917a1bdf73a48f9314cb5e2f82a6c1ccf7788e5d6,2024-11-21T02:28:25.690000
|
||||
CVE-2015-2976,0,0,6da1a28317cd61306521d5ec7535b3c5625bbb05dc962a8a2a81967c7e1d2632,2024-11-21T02:28:25.810000
|
||||
@ -80583,7 +80583,7 @@ CVE-2015-7787,0,0,e7ffd836900ab2cbe714a1bae345a491ddfa6d7e4b1a6b06063cd95d59dde0
|
||||
CVE-2015-7788,0,0,cef225d84f0e0cc498800cd9a58535e01f4bf41957033c32fac1886fa7af2d63,2024-11-21T02:37:24.340000
|
||||
CVE-2015-7789,0,0,b019431cec4b656a585be7c7a29769515b9356817023a390c244aa57c79b82c3,2024-11-21T02:37:24.447000
|
||||
CVE-2015-7790,0,0,d918779762b82ec200e82c4eea5d159d12ebf8b6a3fddff5b11cdb7fd4ec08b9,2024-11-21T02:37:24.573000
|
||||
CVE-2015-7791,0,0,a53bffabae9d069d68f99aa2346ecfc555db672bb65d62d5b845944124b0ba7d,2024-11-21T02:37:24.680000
|
||||
CVE-2015-7791,0,1,30c46c03fe88cae851ec2bd35347650a061ef101285604c5189c01ef223a5c85,2025-02-20T18:32:30.690000
|
||||
CVE-2015-7792,0,0,633335c17c42e4bdc12eade2bc77b959edb1964f32f73e6a2b91bf4b687aca30,2024-11-21T02:37:24.783000
|
||||
CVE-2015-7793,0,0,7430a1ecabb2e0adaa0fc48b7bf2be48224f8ce3d88d7f5ab5a730c34c10c419,2024-11-21T02:37:24.893000
|
||||
CVE-2015-7794,0,0,687d7947da0fbe275520709d3a138b3cfe90c579077b62b85150825d4b4db41b,2024-11-21T02:37:25
|
||||
@ -88054,10 +88054,10 @@ CVE-2016-4821,0,0,9eca5dbbc8b587dc9328834b1da524cd9a01a05e2c527015fb7a8e162ccb9c
|
||||
CVE-2016-4822,0,0,da038560166be4a592796d8feb944b4f32b7cd701fced815c1a846c55f523f73,2024-11-21T02:53:03.167000
|
||||
CVE-2016-4823,0,0,c82dcde87f8eaa30004168bf63c86a67d619d91b4165fa53b4e9aec8294462b1,2024-11-21T02:53:03.313000
|
||||
CVE-2016-4824,0,0,ba1db843692158571863930e920398f5ea5520d01f56e76b40e55f468763f2f5,2024-11-21T02:53:03.440000
|
||||
CVE-2016-4825,0,0,198ef2e58ce1a99a714e98f9a452d6bf9ff2234907ba2269d29b44dd55c8606b,2024-11-21T02:53:03.553000
|
||||
CVE-2016-4826,0,0,b8b7f91cfde6b75f2101a91b53fbdc341c76bde47d4774dc7876b34478f6a8c6,2024-11-21T02:53:03.667000
|
||||
CVE-2016-4827,0,0,c6b30ae54fe605378cebb89b2f7bf7235aa4b66825d30cdcb181888c9ba0dca8,2024-11-21T02:53:03.780000
|
||||
CVE-2016-4828,0,0,8cf682642fe23e370e3dbbcf700e43387f35db859e59e3a8815df284310dc946,2024-11-21T02:53:03.897000
|
||||
CVE-2016-4825,0,1,698622719399cd46567ac2a874e0e53b3624f8c6ce464f10341927567656b543,2025-02-20T18:34:50.990000
|
||||
CVE-2016-4826,0,1,9f23b8103ea91c2062402aafc42b4a004f7cdb7d4e781d4e8a5e92829714170a,2025-02-20T18:34:50.990000
|
||||
CVE-2016-4827,0,1,407b748daa29454ff00243186883e09b733a4a25d461427c56d2c663327db66d,2025-02-20T18:34:50.990000
|
||||
CVE-2016-4828,0,1,96e3d00ff0f89bb6893fff60801b31773437bb8fc12bf9a5f6fc3c4bdecac56c,2025-02-20T18:34:50.990000
|
||||
CVE-2016-4829,0,0,ee7777fcf68a11c177eaa6c14eafcc4c2d70e8047c16dafd6cb2aeafbd138cc2,2024-11-21T02:53:04.007000
|
||||
CVE-2016-4830,0,0,2254394998bf7d7b5d716ef25cf5b087885320a61518ae9d6d6bc5fc7f5d242e,2024-11-21T02:53:04.110000
|
||||
CVE-2016-4831,0,0,449eb395554f906f8a42ad4a08c48fdeb609e19ebe9990da0fbe33d79d3a21d9,2024-11-21T02:53:04.227000
|
||||
@ -88400,7 +88400,7 @@ CVE-2016-5194,0,0,8185033d9012165cc31acb2382c5db14cc153b70b8e1ec74f008137fb74472
|
||||
CVE-2016-5195,0,0,a72b2a47f09f317d155c3faa867aa5de0484857a93d1a6bb00eb8bb513581af3,2025-01-29T18:15:28.220000
|
||||
CVE-2016-5196,0,0,85d60c53c34b34a94d1179275edd2dbc1908adaf314ce782eec74fdc214d2790,2024-11-21T02:53:49.200000
|
||||
CVE-2016-5197,0,0,74734dde4ecc6b3409ed55059c42eca7f8eadfb7f8d2fce0bff152caf355fae2,2024-11-21T02:53:49.310000
|
||||
CVE-2016-5198,0,0,00364648dd89727532f18d29e771fc5b5a86b90153518c8fd5529649ae690e28,2025-01-29T18:15:29.050000
|
||||
CVE-2016-5198,0,1,f8e72c129d1860d6b27a996fa600331dc1e5cb837213e5e87450ca3b8f5e267f,2025-02-20T18:06:01.273000
|
||||
CVE-2016-5199,0,0,af7b883c8a25a0fc5ef58d60a01c24f776d4e2af270560d9047cac249fd826e1,2024-11-21T02:53:49.563000
|
||||
CVE-2016-5200,0,0,1d9761eb86b4904ddf3bd2084d1f12a47f7ac16df3c584bddaa4d78dfb4b4351,2024-11-21T02:53:49.680000
|
||||
CVE-2016-5201,0,0,49d7d942f4c2bb57ec7aa33d38d6bb1a8c5b2ba43e61df8ba5cec080a29e6c6c,2024-11-21T02:53:49.790000
|
||||
@ -105417,7 +105417,7 @@ CVE-2017-5026,0,0,d5a38725a31f738366f1beee032cbd89dd10b4653b84108a8a2d10586c7523
|
||||
CVE-2017-5027,0,0,3faa021617bb8d53bbbd89ee85f4d713e0f72f31c3a228d4fdb19e5be10c868e,2024-11-21T03:26:53.583000
|
||||
CVE-2017-5028,0,0,95c1b912517beef415dde1d0fc022d559f040e8de5930a425edb5c27b84a546a,2024-11-21T03:26:53.707000
|
||||
CVE-2017-5029,0,0,9dd4f9a8e4f58ca0f045826febe4afe3ab6de659018279e9cb2f9d10cd599fde,2024-11-21T03:26:53.837000
|
||||
CVE-2017-5030,0,0,f178f4ed43cee7aaa9660085cc0972200fcd2c89e86f8d82544cdb521dcebe2e,2025-01-29T18:15:29.307000
|
||||
CVE-2017-5030,0,1,573bd0218b7771b760248e7c9966d7539bd1763a3a3e659c262e4fec20f4af49,2025-02-20T18:06:14.400000
|
||||
CVE-2017-5031,0,0,9fb7bb74b87cbc7d0714ba0a0e2e38a87e2994b27b2b7d0d433ca78776958806,2024-11-21T03:26:54.123000
|
||||
CVE-2017-5032,0,0,710ce084d71a97ad9230e94b0ab051f5fe7b6da6649d98398e5e6becf0de3373,2024-11-21T03:26:54.253000
|
||||
CVE-2017-5033,0,0,61cd2f4ffd1551497a52b52be639018e94b322c5e70f38acc7f84cb2af939762,2024-11-21T03:26:54.380000
|
||||
@ -105457,7 +105457,7 @@ CVE-2017-5066,0,0,9f5c2db614b32a678fdd9232bf96577d4474ace1459543d090a572f1f93f7c
|
||||
CVE-2017-5067,0,0,2ad162add6cbb32a510fab0bef6721d8082bbf537ce0c72472a58068a607f20d,2024-11-21T03:26:58.730000
|
||||
CVE-2017-5068,0,0,9d3ca8511d9e49adbc729771915a5711f48fc24f691507c7e4ce24512d6e6220,2024-11-21T03:26:58.850000
|
||||
CVE-2017-5069,0,0,4c6f0e28aa3e2ae29a418ffac89a0640856c7571f8819fd880192061f88a95e7,2024-11-21T03:26:58.977000
|
||||
CVE-2017-5070,0,0,6e5c0be159f829fcc86ca3543c3ebf687f5f153dedb548f7fb86972ef33780f3,2025-01-29T18:15:29.570000
|
||||
CVE-2017-5070,0,1,f3e658e1cb31f49bc94501023b6af813bc6afef713109e8d381d8ea249f5ef98,2025-02-20T18:06:20.647000
|
||||
CVE-2017-5071,0,0,f5410941818e677c4e6d6a02b68726701eff5212f53fd7443f7b0b365d607e7b,2024-11-21T03:26:59.240000
|
||||
CVE-2017-5072,0,0,35f02b5f2a282cbaf303df9a2725e772dc9c96fe8c0511537b449848ccae02cc,2024-11-21T03:26:59.377000
|
||||
CVE-2017-5073,0,0,398bd66ebf7a3e98cb53bb4d3120ac66281a7438a4ab776997a78de490a8b102,2024-11-21T03:26:59.497000
|
||||
@ -117678,7 +117678,7 @@ CVE-2018-17459,0,0,01667fcf40f4afd58354e38c26130af139dcd0605eb3148ed6ff5b403fe9c
|
||||
CVE-2018-17460,0,0,101fb371c6a177f13942684b9b8431c334fa9b769774866138f9caaa7f94fff3,2024-11-21T03:54:28.183000
|
||||
CVE-2018-17461,0,0,08e94a9f8b2c0e111cba3b1e993843050bfee9e16729fcee062cac3c222c1ef0,2024-11-21T03:54:28.300000
|
||||
CVE-2018-17462,0,0,0f38ee64ade5675c8c7659e22612dee11f0c46a14e4775d4e46cf17fd01feff6,2024-11-21T03:54:28.417000
|
||||
CVE-2018-17463,0,0,d6d579acbbe44ce174a43c906cfce5f0a114286522043c028ed0802531be2bfc,2025-01-29T18:15:29.997000
|
||||
CVE-2018-17463,0,1,35a05252070deeef3bfec2cb9d8cfd440b99743b57fe1023512d0e930843932e,2025-02-20T18:05:36.830000
|
||||
CVE-2018-17464,0,0,c548efa1995e58d97e68bdebda14642d2421e787b72731d7c363a5950c5dfebc,2024-11-21T03:54:28.703000
|
||||
CVE-2018-17465,0,0,61bf7c13a28fb91b007e833a8b545f7c7406cab9cef3d683611550623b865d06,2024-11-21T03:54:28.840000
|
||||
CVE-2018-17466,0,0,2deb66fce5ef461e44fedc1d7c2744ce380a5a1a5eea9b876e97a1c96a3fd0ca,2024-11-21T03:54:28.967000
|
||||
@ -128155,8 +128155,8 @@ CVE-2019-1003025,0,0,9af42893769b7fc06499fcc1553335da2ed9c5949155c884cbfc8509bc1
|
||||
CVE-2019-1003026,0,0,8926b54c91d67008cbe059a9263a943e0ddb50ec72a565a1e25d2ea17035ca1d,2024-11-21T04:17:45.863000
|
||||
CVE-2019-1003027,0,0,56f161009556c27505aec3dea316a43730f99659e895f1e3bd5a5f2f8aba6713,2024-11-21T04:17:45.977000
|
||||
CVE-2019-1003028,0,0,d92a32bceca5f379cfee172d48634f5adb98c1a57b20664042f547930ce377e2,2024-11-21T04:17:46.087000
|
||||
CVE-2019-1003029,0,0,f773a17ca297e99ab90baba9667d3f501afbb1f6e6f354bdf97d8bf5b8d76972,2025-02-07T13:15:25.013000
|
||||
CVE-2019-1003030,0,0,0aaf5f4f1977c928c3ac076147926ac60583bf09a024edc23be9ce26f7e8ee44,2025-02-07T13:15:25.223000
|
||||
CVE-2019-1003029,0,1,e93b8c02358b2b54ebe5affac58650f084981613da1d8d0713368d2e7fa5c3dc,2025-02-20T18:05:05.957000
|
||||
CVE-2019-1003030,0,1,4a746704f7c55af7486174492f04200b1b8cbb50249b47a2cde93d737d78dfeb,2025-02-20T18:04:29.923000
|
||||
CVE-2019-1003031,0,0,f5c1957a31b1c62b3f5e059f8af14b086fbd7d3d41e8b72f4ccf5ee6bbd32c59,2024-11-21T04:17:46.473000
|
||||
CVE-2019-1003032,0,0,e1f996b3969bba4e9c31f9343af2bc586fb9daa6067802944375227975e629de,2024-11-21T04:17:46.590000
|
||||
CVE-2019-1003033,0,0,8981279a91935b64290350c6e4b6b0ca1f3d966b92bedda3ec8996ad36de38af,2024-11-21T04:17:46.697000
|
||||
@ -145359,7 +145359,7 @@ CVE-2020-10091,0,0,0023df9918fdadf5afde7a589c871143ff25422b0de5b843dd37446810a20
|
||||
CVE-2020-10092,0,0,bed5d552f5b0bb036c3eba1f155fae926f11ff2232ff3d62a715ff4a0ef59ea4,2024-11-21T04:54:47.620000
|
||||
CVE-2020-10093,0,0,8d0aacd8361af89ed8fce3d23dd783fc6ebd0d8701df0b06ae901731b7ad72e2,2024-11-21T04:54:47.750000
|
||||
CVE-2020-10094,0,0,6beba78c56501a731d17d4bafa1b7bfd29c7992446387d70f96b80c08094f2cd,2024-11-21T04:54:47.943000
|
||||
CVE-2020-10095,0,1,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000
|
||||
CVE-2020-10095,0,0,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000
|
||||
CVE-2020-10096,0,0,83bee2203a7f767077f6e40b91b5e7f86c8349ada403a759a945e38e30f5b09d,2024-11-21T04:54:48.140000
|
||||
CVE-2020-10097,0,0,b53a137dcc84c6f9a450665caecc8824e07d3b31ad927277cb99bd9e9b8f13c6,2024-11-21T04:54:48.277000
|
||||
CVE-2020-10098,0,0,f339d753f3504f60ee2bba806202c760ab227ba9d95ed2b4ebdd071aab6eee53,2024-11-21T04:54:48.413000
|
||||
@ -148500,7 +148500,7 @@ CVE-2020-13474,0,0,74c4914a43840fa6e12dd2b53c69ece53ee5a95a7a94ae3930fd8e8a2420f
|
||||
CVE-2020-13476,0,0,cf0a65f58de6a051d6c0e19448011654ef686aa415974f52eecd957162dfb0bb,2024-11-21T05:01:21.103000
|
||||
CVE-2020-1348,0,0,a9b6f338f457c1b2fb5fb90f4dd043111447cbd66f8ac00dfb2af910a3226e23,2024-11-21T05:10:17.980000
|
||||
CVE-2020-13480,0,0,5b25db3b1580aa288920d42b9b54622f48b7bf339d5a2131430bb02df62f2c06,2024-11-21T05:01:21.253000
|
||||
CVE-2020-13481,0,1,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000
|
||||
CVE-2020-13481,0,0,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000
|
||||
CVE-2020-13482,0,0,c3adf851d39e5a118e124354d5ac6f55d29bdc276513f621b483678ff1a7566e,2024-11-21T05:01:21.413000
|
||||
CVE-2020-13483,0,0,ee2229aa912f53fce6524ec444822b1c650cad80395874d5fb423ba8ff8fa71f,2024-11-21T05:01:21.573000
|
||||
CVE-2020-13484,0,0,53f1e472880fa0d80a8ad749380a006e55911a59405653282e32e67c54cafd0e,2024-11-21T05:01:21.727000
|
||||
@ -157022,7 +157022,7 @@ CVE-2020-28332,0,0,ea41092a4260f1e209a6608011762121335205630f1dc46a519bbb481f2fe
|
||||
CVE-2020-28333,0,0,5d01970ea48e94db343cacea2357594ffb1a5d1e941a45ca5cd8dadd11e341b3,2024-11-21T05:22:35.830000
|
||||
CVE-2020-28334,0,0,65275d5ea9fcff73bb1c7e5a59a552727645cc0d94321b25b43b1dcb15d4882b,2024-11-21T05:22:35.963000
|
||||
CVE-2020-28337,0,0,7caee8fe0e93e360f8b1e63e72b18d9f77590694eb7167e04004ae7b68abbc4f,2024-11-21T05:22:36.137000
|
||||
CVE-2020-28339,0,0,5039b7010003f040693a8531f46f951897dd8fae1466593fc48b783fdcb38f15,2024-11-21T05:22:36.373000
|
||||
CVE-2020-28339,0,1,bb8a63d2869b981df38938bdb818f664572a8c5bb07e2ef5b0ffccd745c01fbd,2025-02-20T18:34:50.990000
|
||||
CVE-2020-2834,0,0,45bf764b720cb9e23fbdbe5872b2f9ed6161433c0737bbfb3510fcc0e229976e,2024-11-21T05:26:24.210000
|
||||
CVE-2020-28340,0,0,3776145d68503bcc87d9be1c321633a4a8181ea0030d5b290a8b01d7d68341dd,2024-11-21T05:22:37.350000
|
||||
CVE-2020-28341,0,0,8c43b8448d82d3fb811af0f398a258dc882482eff4870114642334a64384d899,2024-11-21T05:22:37.573000
|
||||
@ -158513,7 +158513,7 @@ CVE-2020-35540,0,0,6bd64b059b520580fc1288131d694e2faf21edb8f793d207b450f97b8fdf5
|
||||
CVE-2020-35541,0,0,8d5365eb0cabd9fb3bbef386a7a8573f0770d7f02e50738d63f9bc34f5836ae4,2023-11-07T03:21:58.650000
|
||||
CVE-2020-35542,0,0,cf77cdeac798a3a257ffcb234660d4518d214cb4498ec8c17e86fd96ebfc678f,2024-11-21T05:27:31.673000
|
||||
CVE-2020-35545,0,0,90718e2ddefe9ba5082932c97e23e972baa70313d1d4fdf00f695b1d71c6cc9b,2024-11-21T05:27:31.870000
|
||||
CVE-2020-35546,0,1,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000
|
||||
CVE-2020-35546,0,0,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000
|
||||
CVE-2020-35547,0,0,0b56fd34bbcf6f73360d1254a0790470258ba9dfdd070f322adb5be0ea6a8538,2024-11-21T05:27:32.053000
|
||||
CVE-2020-35548,0,0,d7355cb5b84b5b614d93237f5cbb2796f3a81213009605c0528bcf58e0d77ec2,2024-11-21T05:27:32.280000
|
||||
CVE-2020-35549,0,0,6a5d8eef45e56534ec7da225d0cd05db4848ea6f60c0898ba9512b7ec9f90052,2024-11-21T05:27:32.460000
|
||||
@ -167348,7 +167348,7 @@ CVE-2021-20730,0,0,1ec3f829ceb2c426bbf7d23d4044627c96ef2289553acb3f1ab413dbd8cac
|
||||
CVE-2021-20731,0,0,823b1d42249f84272bc5106b9599ba761650700f6e7efeedcac976149b22995b,2024-11-21T05:47:05.653000
|
||||
CVE-2021-20732,0,0,f14744fc9e3f05a52bb58b83b93ee800abccaa6faca752df64b5fc8396b3ab62,2024-11-21T05:47:05.757000
|
||||
CVE-2021-20733,0,0,53355cf173790d2615079e366ff26d651f8f647643c5147be3b2fdbc0816727c,2024-11-21T05:47:05.860000
|
||||
CVE-2021-20734,0,0,783068fe08882431d4084242b514ee232ae1c566c060205b3fe9bf7e8a13dec4,2024-11-21T05:47:05.970000
|
||||
CVE-2021-20734,0,1,d3aa13e0a38173dd06b80f9766834e5163918ce5ad4aa2c21795b64f2e975153,2025-02-20T18:32:30.690000
|
||||
CVE-2021-20735,0,0,89f58d6c204069d7e35bd1504c4b0de1429c1d570156ee6d1d9f9cb80e1f8919,2024-11-21T05:47:06.077000
|
||||
CVE-2021-20736,0,0,9d90bafbbe8ec4514f8cf04a08985a6ebd7a760ffcc061c9a286056aa391080f,2024-11-21T05:47:06.210000
|
||||
CVE-2021-20737,0,0,c5379f88fe9c362eec4bcaf6f34c8aeca21ba24e9ec263bdda6a1513b1751183,2024-11-21T05:47:06.327000
|
||||
@ -180572,7 +180572,7 @@ CVE-2021-37972,0,0,683e1a1fefcd3e6b35217c21fee5a5db7a833faf0db4a4cea8afec0b89d7f
|
||||
CVE-2021-37973,0,0,743719dc94941c0357e14c84302b60c64b1c9baa604633a5edeaa1f72511ddde,2025-02-03T14:15:32.667000
|
||||
CVE-2021-37974,0,0,931558bac71f677090ea0b1907b8540ee5ebcd09055b5e5c0cdab44c71c9cd9c,2024-11-21T06:16:10.087000
|
||||
CVE-2021-37975,0,0,574c7731ec3c645981816344462d7b8e155d6f2955a8879bf1219a53ab4d177c,2025-02-19T19:37:44.870000
|
||||
CVE-2021-37976,0,0,a688ef197c2d29b70611dd79c03840483ff8e68d10b02af37ebae3027176db74,2025-01-29T17:15:15.167000
|
||||
CVE-2021-37976,0,1,dd5a7fa4d6b16e7e14ff3b5357015c05846da841d51b43f563c37221ca591a09,2025-02-20T18:05:54.830000
|
||||
CVE-2021-37977,0,0,1b17f7ec5b0de42e2e2b48b889a4cfca2be4df4c6df43a9cfe4b4af2363e8a11,2024-11-21T06:16:10.597000
|
||||
CVE-2021-37978,0,0,8c9a82307b49cf288e54e9dd5a62e4200930d32429f0706b995b3970a9915020,2024-11-21T06:16:10.773000
|
||||
CVE-2021-37979,0,0,c66ff43d04413f35f45413c5706ee15b0d59c742ab89b8f1050a1346c9f2c5c4,2024-11-21T06:16:10.933000
|
||||
@ -184873,7 +184873,7 @@ CVE-2021-43546,0,0,920e4f87bea82058d1bb12ab331e18dfec5c687d94479ee497c2d02443da4
|
||||
CVE-2021-43547,0,0,738134ffb8b48b09d07852a075e9bdd6119081eca87270671abdf67dea1ab53e,2024-11-21T06:29:24.410000
|
||||
CVE-2021-43548,0,0,660c279219eaeb88d08019bd0834a60ff1b9daa9ea70302d8f188ff62ba5fb9a,2024-11-21T06:29:24.557000
|
||||
CVE-2021-43549,0,0,421cca19c964e8ed53b3dfc40db7fffdf3c441d4b930645d6ca3cbd04fed3d4f,2024-11-21T06:29:24.693000
|
||||
CVE-2021-4355,0,0,1fecb778fbf00c51d06cf0a582a48c15eeb153feb81f301f8f05cedc6c333cb2,2024-11-21T06:37:29.533000
|
||||
CVE-2021-4355,0,1,faa989c3b45b8dce966e7a8a03608dbc11f1b19245d486e046c899a92c006625,2025-02-20T18:34:50.990000
|
||||
CVE-2021-43550,0,0,4f927d9d2d1f50852677237c7281fe3439f9606e8728e5657367006e16b78eb8,2024-11-21T06:29:24.837000
|
||||
CVE-2021-43551,0,0,3f79cff9ad7256c5dc96a3fb585a194a11e2798b0c9ca81d4d885df6a5d7ae5a,2024-11-21T06:29:24.990000
|
||||
CVE-2021-43552,0,0,ced5d0bfdab6b81b6d96bebb9728ad8801b7cb6c6c7f47c84d8238bf0fce1ea6,2024-11-21T06:29:25.140000
|
||||
@ -185008,7 +185008,7 @@ CVE-2021-43746,0,0,0aa389b0cf544c260fc12cb905e5b0cfa9d202ea84753dffc0e382f8c91ee
|
||||
CVE-2021-43747,0,0,162c6bdf1b6723bca99ff032baa034ae5eceba178c46376fd03f8cba27ddcb95,2024-11-21T06:29:42.410000
|
||||
CVE-2021-43748,0,0,8483a3c9771d0af04aa08b723a77be227af06be24dd9bd9b567e0e24603eff64,2024-11-21T06:29:42.533000
|
||||
CVE-2021-43749,0,0,6e53c2d7105d3127906e304110ff9fa2ff10113032655c11e5064fb136fa4f4d,2024-11-21T06:29:42.663000
|
||||
CVE-2021-4375,0,0,0dcba94500ef3d67311eb5b8af3724fb1eb468111f67c10b6e8a148d9ad75dd4,2024-11-21T06:37:32.467000
|
||||
CVE-2021-4375,0,1,d2743d7b615ecc33b9e3121e048fb8b97c18d5ac641bd531634722afa5096125,2025-02-20T18:34:50.990000
|
||||
CVE-2021-43750,0,0,2dfccf5af2de1d16ae98dd3dbd9c6f8bcbf853bd1c72f440527778a0236ef80b,2024-11-21T06:29:42.787000
|
||||
CVE-2021-43751,0,0,54215a7355234a86f6c2ca4a904ea7d11e59250e603dbecf986311c50ce6d57e,2024-11-21T06:29:42.913000
|
||||
CVE-2021-43752,0,0,c3a3b348b7031f34b1c1fbd1ed0c7531e6835e563e859b77f332a3751caf5fab,2024-11-21T06:29:43.040000
|
||||
@ -206039,7 +206039,7 @@ CVE-2022-39346,0,0,6f96ae0d6cb2161bb8cbd15fd8f5ebb7d460662735f1fc173e8b082d66f11
|
||||
CVE-2022-39347,0,0,d4a9a30b92d340cef8780f6e37e0412aa0f8aeb3180bc1cc00665a4e5e63a168,2024-11-21T07:18:05.243000
|
||||
CVE-2022-39348,0,0,14a772d30d8064b4c726670b85ab408eddd9b49d913bb04ad19491852ed0f35f,2024-11-25T18:12:24.673000
|
||||
CVE-2022-39349,0,0,d9eb9faa07e80f1d180cbde0331ee8cbc227032de1b8da0c3fe934149355d7d7,2024-11-21T07:18:05.543000
|
||||
CVE-2022-3935,0,0,a2952c2b0d24a269dc182030ce3e35c1ccfbc58dc8e49e4ca725856adf5c5187,2024-11-21T07:20:33.790000
|
||||
CVE-2022-3935,0,1,ad2e7888561fab62ba438c4dacf5056e22bb1e53f31f072012c6145e9aebee3c,2025-02-20T18:34:50.990000
|
||||
CVE-2022-39350,0,0,975455911476cfc36b24f6e872afea362a2c241ae6d8c090820244014a9c4e17,2024-11-21T07:18:05.670000
|
||||
CVE-2022-39351,0,0,20bceefea9d8b1fd505df359a8cc931d6eb1058fd84be3fe6fd9a0b30d2c92ab,2024-11-21T07:18:05.790000
|
||||
CVE-2022-39352,0,0,619ffeee8a97413d83d42824216aa98c6965291b4b040f24d2421b03c8d94492,2024-11-21T07:18:05.920000
|
||||
@ -206123,7 +206123,7 @@ CVE-2022-39429,0,0,e8920945479dc9dc3abc7c75449e57b59112dffa60102a122d992e4e52bbe
|
||||
CVE-2022-3943,0,0,c6a031ab5daa36a8a57885730b19c5fb6363ea001759beadfd390da099c2fd96,2024-11-21T07:20:34.693000
|
||||
CVE-2022-3944,0,0,2b9853ccd47902190848f88a95812c694fbbf21951edd58ca3fedf266f08ab33,2024-11-21T07:20:34.833000
|
||||
CVE-2022-3945,0,0,26e69a315e7117e46986b54e044c5ee05f5d853b256d40ee5be004975f80dc04,2024-11-21T07:20:34.967000
|
||||
CVE-2022-3946,0,0,9cd213c76127b766b5dc4b8d052cd94c386c00ea098442ac1ff04fdd88ee80db,2024-11-21T07:20:35.100000
|
||||
CVE-2022-3946,0,1,64800a8af899fc02465b4ec453e17e3cc94a68ca244a8e874bf3851be00bc14a,2025-02-20T18:34:50.990000
|
||||
CVE-2022-3947,0,0,681cb64e004d29032d143d18284e73a8d5442ae3ab58a1d674c0562fe20fb641,2024-11-21T07:20:35.210000
|
||||
CVE-2022-3948,0,0,5290841fb098f9b190aa34f411715a0ccd3843a05ce1a26bdeffc8d5b115cf2f,2024-11-21T07:20:35.340000
|
||||
CVE-2022-3949,0,0,7c6f8512a8abfa4b01f78316eae9ac430961091829c0cb65b6a7ea7ba8f4f1a2,2024-11-21T07:20:35.470000
|
||||
@ -207497,7 +207497,7 @@ CVE-2022-41396,0,0,1cbf100dab8252b6b1e9a6f4ef622626ef406aa2ff4caa7044120fcbba7e7
|
||||
CVE-2022-41397,0,0,c0e9869db0b13268b06eb3421b088956793e4cd60d97884cf46f5a0f733cb4d1,2025-01-31T18:15:30.750000
|
||||
CVE-2022-41398,0,0,69ef4933c7ac0d2bbe3d2169ffbca7425bcde1676b28eaf93f4fa5178e8a6f9f,2025-01-31T17:15:09.463000
|
||||
CVE-2022-41399,0,0,03431e8c2d0e990b1359f18724462ed7aeccbe840e45e68c8417db2e9b358cfc,2025-01-31T17:15:09.690000
|
||||
CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000
|
||||
CVE-2022-4140,0,1,74dcf5db1e0be637332a6afe0ecd6ba057c2e832f6785f297a0b1ddfb4667755,2025-02-20T18:34:50.990000
|
||||
CVE-2022-41400,0,0,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000
|
||||
CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000
|
||||
CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000
|
||||
@ -207877,7 +207877,7 @@ CVE-2022-41837,0,0,da976b3221763a386544255193ab24037e7b81a5f07d12269c2575a62eb82
|
||||
CVE-2022-41838,0,0,546268d788f73b9fce8f7e18b2812da881102fc48279872eb03c5b56fbecaede,2024-11-21T07:23:54.587000
|
||||
CVE-2022-41839,0,0,3a1cc942325f596a15dcd0130e165f62a62efe691eea7c4be7dfeed4a3948108,2024-11-21T07:23:54.723000
|
||||
CVE-2022-4184,0,0,62ed9466dae96e308bcc436829687f9c68a605d214c3f0d1c004979a3c9478f5,2024-11-21T07:34:44.297000
|
||||
CVE-2022-41840,0,0,c257a46d7d4f96a8fff2e173b1a9985dfc91dc189ea61c22c2b10080dab84642,2024-11-21T07:23:54.850000
|
||||
CVE-2022-41840,0,1,50a8bd10b6f9c309b489530eee2dc1647fa36ad8fa8e6efa78b9fde77c0165d0,2025-02-20T18:34:50.990000
|
||||
CVE-2022-41841,0,0,64e18e299dcd9bea0f008d0f89f38f03483022ffbb8cd473cdcc586f0897d07d,2024-11-21T07:23:54.983000
|
||||
CVE-2022-41842,0,0,db7facad48c9df7cf17237976cb6b373b7f8f9d42ab4b4c8c30e765a638a15da,2024-11-21T07:23:55.163000
|
||||
CVE-2022-41843,0,0,33fd763f638770421fcb523f9555ecaed6b09726189ba8764551aa55019a2824,2024-11-21T07:23:55.327000
|
||||
@ -208313,7 +208313,7 @@ CVE-2022-42352,0,0,b3bdd3dd3f49dab06d26807cddb5ec74555534836396f332cfe4c0709677b
|
||||
CVE-2022-42354,0,0,d67a07d5b2f198f5a2be2dfcf2897e9cf8de553e6c9ac36b6d5e03d59c369f36,2024-11-21T07:24:48.557000
|
||||
CVE-2022-42356,0,0,5f2a316aae4aa18aeb9b85e1fc3c4c3ca5ee735f3273946f2165e76e49d26aac,2024-11-21T07:24:48.670000
|
||||
CVE-2022-42357,0,0,dab8d6d88e46964496a8ef189a79a2e96d44b10d72e9f11a0135e92c3d145c2f,2024-11-21T07:24:48.787000
|
||||
CVE-2022-4236,0,0,e5bf677e06e701e34da13158c7524aa6ebee35c40b8139d7d124034d222b63eb,2024-11-21T07:34:50.850000
|
||||
CVE-2022-4236,0,1,f44f0e0aec09f0281c086199a0893c497a67bf353709af933de59a5c9ece962d,2025-02-20T18:34:50.990000
|
||||
CVE-2022-42360,0,0,7b87cf3e51d6778c85e65b3236843cf59075f761398b36a5b81353488dbe846e,2024-11-21T07:24:48.900000
|
||||
CVE-2022-42362,0,0,9eadbc21e61c55f70cbc5a3bace718af8b83637d9d7ca47b57a005d1316e0a3d,2024-11-21T07:24:49.017000
|
||||
CVE-2022-42364,0,0,adf1c13810a4c43d1dd81b87fde900a65804d7425c53233dd4333b294a10073c,2024-11-21T07:24:49.130000
|
||||
@ -208321,7 +208321,7 @@ CVE-2022-42365,0,0,67105c0b67ae700a1a43232fd919b1af128d246cf4d8a14b56bfedda5fa16
|
||||
CVE-2022-42366,0,0,cbdc2a47f1d57fe9123056a56fb713502c4e22cfd807589f8639821ad3dd7ba0,2024-11-21T07:24:49.370000
|
||||
CVE-2022-42367,0,0,1b0b5ce1e6c43e85242e5174e13c1b521d04b28557027a812658331787a54f2e,2024-11-21T07:24:49.490000
|
||||
CVE-2022-42369,0,0,892578b14e3bf67d8e406a88f69e5f15e1bc61b7c59b75ceba5469306a51ac89,2024-11-27T20:11:45.410000
|
||||
CVE-2022-4237,0,0,3293ba84b89ec343e7b64738385e8a515bad791a06652b7e3f9737f69f9354c1,2024-11-21T07:34:50.953000
|
||||
CVE-2022-4237,0,1,71e964028a5e9381fc3e6a627d6d00f1b6ab465ec940c32dd48ce5a65a3f36c7,2025-02-20T18:34:50.990000
|
||||
CVE-2022-42370,0,0,24faaeabb00cef36a9bebf9855b4c5fab9c63b4f8596c99fb0872aa6c31fa425,2024-11-27T20:11:45.410000
|
||||
CVE-2022-42371,0,0,86e960895390f9be7ce03264e82c490beb90ef89a2af12327c6f7e1add8150dd,2024-11-27T20:11:45.410000
|
||||
CVE-2022-42372,0,0,08e8b34feb7a653f7eb6545fa58de87b2e7a3350232e52d3ca546d0f53b11b73,2024-11-27T20:11:45.410000
|
||||
@ -209941,7 +209941,7 @@ CVE-2022-4458,0,0,192c505acac2dca8dc3917e8ce2ad50b37e61fd6b24832a0220a2cc7916316
|
||||
CVE-2022-44580,0,0,1853f516861af1bdf42c74118d4da1d78e165ffb9737892b9636796df575431d,2024-11-21T07:28:09.657000
|
||||
CVE-2022-44581,0,0,c3574e38c9269af9fd19b1ebf323c712e1313fd8428037a97f7166891237fcde,2024-11-21T07:28:09.773000
|
||||
CVE-2022-44582,0,0,ab7c8aa0b744df343c2efa6f49df3e2120ade672dfebaf27bbaf41972c94de55,2024-11-21T07:28:09.910000
|
||||
CVE-2022-44583,0,1,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000
|
||||
CVE-2022-44583,0,0,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000
|
||||
CVE-2022-44584,0,0,6a47cb16261f5a8edd1470398f86011a9af92c9f9186fcc59739e048dd1f030e,2024-11-21T07:28:10.153000
|
||||
CVE-2022-44585,0,0,2444819fca6202dd5f513ba043d6869c7cd739cb13c9f4a195bafc9d86534f3b,2024-11-21T07:28:10.263000
|
||||
CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67beddab4,2024-11-21T07:28:10.380000
|
||||
@ -211284,7 +211284,7 @@ CVE-2022-46546,0,0,953644dfd7dcd1310feb2dbe1d7a04c8526f3ce60b1b5ecaa5c986d56a8df
|
||||
CVE-2022-46547,0,0,3e51b6c07353ce94b24542c0786764142a1771ff60791a20bb3ceccb1b8b537c,2024-11-21T07:30:43.473000
|
||||
CVE-2022-46548,0,0,64248efcbf88dc92f8a09b35f80b85ee763643b73b2fa8350dbeca987304cfb2,2024-11-21T07:30:43.620000
|
||||
CVE-2022-46549,0,0,7fe60d3b6858bbe191f518a4420ad0be9069dc69b8ef585b00ab7e20c7ebd7a8,2024-11-21T07:30:43.753000
|
||||
CVE-2022-4655,0,0,ff0f124f383830339da9f4a7c163710590476b61e8fa78587ec05793016febda,2024-11-21T07:35:40.853000
|
||||
CVE-2022-4655,0,1,bd8d686155af4c551bf4bd1177c6f87f9389e165a383504576a9b00d293e085a,2025-02-20T18:34:50.990000
|
||||
CVE-2022-46550,0,0,bc5cc20200b63bba7cc7ce99207ee2a9f136ccba8514010e03709f485b043f79,2024-11-21T07:30:43.890000
|
||||
CVE-2022-46551,0,0,779c0f14d348f2840326905acd59932a8ebbf1f2102078c30f0d03da86fdd8b8,2024-11-21T07:30:44.033000
|
||||
CVE-2022-46552,0,0,5bffd6f496961f428fedf6678d6afda561e1d18f085e86afdac95451d78deb97,2024-11-21T07:30:44.173000
|
||||
@ -215956,14 +215956,14 @@ CVE-2023-21058,0,0,64330bb9c4249333ce6f10ddaa280396ef4bb32482959b6db5e7e9f6f3b63
|
||||
CVE-2023-21059,0,0,70972c21ff5031e5a8812f2b89330f3bb3733e080c457204297376dcabb2f5e1,2024-11-21T07:42:05.127000
|
||||
CVE-2023-2106,0,0,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000
|
||||
CVE-2023-21060,0,0,ed6a1ed343bc5908d4275aafe515b039b63037861daff961d4fd11deac6d0845,2024-11-21T07:42:05.240000
|
||||
CVE-2023-21061,0,1,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000
|
||||
CVE-2023-21061,0,0,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000
|
||||
CVE-2023-21062,0,0,5e5b5d7600fd0d3dd7a9942040f4966711abc6b36e9bb29aa93767415087a9fc,2024-11-21T07:42:05.473000
|
||||
CVE-2023-21063,0,0,20a4c3f6408a88e1c28159889207c238ab338761b1694db207a9f40672d7a4ac,2024-11-21T07:42:05.580000
|
||||
CVE-2023-21064,0,0,f66e6a7ec4713e6a44090694f45ba9d60b4264c55e2ed80bc5bd402cbd8005c3,2024-11-21T07:42:05.693000
|
||||
CVE-2023-21065,0,0,94d2bbc43c1b96f9732745485dc5f1641c6bc254138879f3df272c7166e2db6e,2024-11-21T07:42:05.817000
|
||||
CVE-2023-21066,0,0,f3310930fd44b4ceafd1bc0f3a1442d00659ef92bf9c822f23789082b5e2acbd,2024-11-21T07:42:05.940000
|
||||
CVE-2023-21067,0,1,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000
|
||||
CVE-2023-21068,0,1,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000
|
||||
CVE-2023-21067,0,0,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000
|
||||
CVE-2023-21068,0,0,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000
|
||||
CVE-2023-21069,0,0,7997a769d0fc1eb29768d5d5204d9a0da76475cb9cf6af165e778132a8be14a4,2024-11-21T07:42:06.303000
|
||||
CVE-2023-2107,0,0,b37e87d1922ae828ac557e5cc8f42c5406432b2bbc0f1d675673e3290327b00a,2024-11-21T07:57:57.197000
|
||||
CVE-2023-21070,0,0,2b115936a5d121763e30e349ca2d0580b34609ea9a496b2fbfe446f7bf106484,2024-11-21T07:42:06.423000
|
||||
@ -217160,7 +217160,7 @@ CVE-2023-22308,0,0,906012441499d1c849365e5400b5357dda9cc467b769670e76ddebf0ea235
|
||||
CVE-2023-22309,0,0,a7231f19d4cb4ea22c4d4790a3de2cc23a6aa0b434c7b7b587091619c74b99b1,2024-11-21T07:44:30.073000
|
||||
CVE-2023-2231,0,0,7a123ab9506421883b22a81ab048ba2bb77ff795874a80b8d72ffaa1959d6e3b,2024-11-21T07:58:12.077000
|
||||
CVE-2023-22310,0,0,e89d325885a14d654c2cee0362e627ca7ab351551936d19e0a6836ce159a1e18,2024-11-21T07:44:30.180000
|
||||
CVE-2023-22311,0,1,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000
|
||||
CVE-2023-22311,0,0,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000
|
||||
CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7503,2024-11-21T07:44:30.403000
|
||||
CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000
|
||||
CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000
|
||||
@ -217515,7 +217515,7 @@ CVE-2023-22701,0,0,4d5591b4189a34b72f590a18adbc22df2acf28c65fc714c2ad02a47caeea3
|
||||
CVE-2023-22702,0,0,769d3b6aec63175e143fea3b63c0d9199e41f031818f96eda054bdfc4c9cc9a1,2024-11-21T07:45:15.100000
|
||||
CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7321,2024-11-21T07:45:15.227000
|
||||
CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000
|
||||
CVE-2023-22705,0,0,65973db752a75c1aefb8423eeb981dbb110113de8aa579e1b895f4bd82c26ba8,2024-11-21T07:45:15.500000
|
||||
CVE-2023-22705,0,1,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000
|
||||
CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000
|
||||
CVE-2023-22707,0,0,83b334ee529eefc9ab11f726a4a33783ae7ec49b01a932387d3ab561fdacf988,2024-11-21T07:45:15.753000
|
||||
CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000
|
||||
@ -221334,7 +221334,7 @@ CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f7
|
||||
CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000
|
||||
CVE-2023-27515,0,0,8dfc9617f583bdd1babe238c49e7e58612036e70ee685520461ed821ca4854ca,2024-11-21T07:53:04.393000
|
||||
CVE-2023-27516,0,0,63cc8b4dfa2de06886c95f604edc887930374b8e766f7347b609a4a1d828c6aa,2024-11-21T07:53:04.520000
|
||||
CVE-2023-27517,0,1,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000
|
||||
CVE-2023-27517,0,0,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000
|
||||
CVE-2023-27518,0,0,9baf0d487aa874353bba8cde2f44da2f0c67dd17f3eb5b570347204d068fdfbe,2025-01-31T15:15:08.247000
|
||||
CVE-2023-27519,0,0,717790a336c8f9e5a77a95e0bd0274d8d47193d1a8993a7207854ff0bd8ab7ac,2024-11-21T07:53:04.963000
|
||||
CVE-2023-2752,0,0,6d790d550f8804fc5c5478d21ae5ee8d7bd1da5991dfa9817023711eac8596b0,2024-11-21T07:59:13.467000
|
||||
@ -231362,7 +231362,7 @@ CVE-2023-40215,0,0,ccf51d0a2679a3484c6f7cb0fd3ff4e33ed32371a3a9e32685ce12d1f3627
|
||||
CVE-2023-40216,0,0,c8eec68a4da70bdabafba12d88f23f1de14c236b7a0477667b9f540f55de5a19,2024-11-21T08:19:01.133000
|
||||
CVE-2023-40217,0,0,fcb98472a84e8e26af93db20ae6c81bb896ea70f29e0d37f59355073006524cc,2024-11-21T08:19:01.303000
|
||||
CVE-2023-40218,0,0,7e9ff8055b5991f0c786d5c7c55bb4061db1248def6777d5d32d4ca5de5102ae,2024-11-21T08:19:01.470000
|
||||
CVE-2023-40219,0,0,d312cff569dae579b11a2237538409084b8189381ad409b7b26a9e9c9cf4fc81,2024-11-21T08:19:01.657000
|
||||
CVE-2023-40219,0,1,420d65f82fad2c6c0a7543e46625f87769e9a3cc3fe69078034d1006af7f7b71,2025-02-20T18:34:50.990000
|
||||
CVE-2023-4022,0,0,7d28cfa5cb69299ac816454a0ce6e4287487b976b7e847836ca22e4bb44c1918,2024-11-21T08:34:14.873000
|
||||
CVE-2023-40220,0,0,4e4c8d42b37fdc492577d4df159739563bf50d025eb5eae2e90cdd97ddf5718f,2024-11-21T08:19:01.780000
|
||||
CVE-2023-40221,0,0,0f5c4c77c15a1563f65ecaa72879d46af8c8213e98a1889ade52c63df5bdb7d3,2024-11-21T08:19:01.930000
|
||||
@ -232209,7 +232209,7 @@ CVE-2023-41229,0,0,b930cdbbe88f083acef960f8f5e5450aa69114993909ce345d88d7e673472
|
||||
CVE-2023-41230,0,0,a46089e009e01da52efcba60eb5616b6d85e910e61e7780908c77a324855221f,2024-11-21T08:20:52.603000
|
||||
CVE-2023-41231,0,0,03a2478d352371d62f62b64999273a7bcde68a67a92faf899c818e1823e8cafe,2024-11-21T08:20:52.717000
|
||||
CVE-2023-41232,0,0,5174afeb37f2c2c253baa98f5978e3dcd1a77391afe7566ba24edb6a69e68143,2024-11-21T08:20:52.870000
|
||||
CVE-2023-41233,0,0,9f3924758c4eb49007f2691bc554e0f9ba0f1addcedfec3eee11043031346a43,2024-11-21T08:20:53.013000
|
||||
CVE-2023-41233,0,1,50c4bc5420c4fbd7ddc660b4757fd8d0b1c34afe4059e1d8ad069556bfda9c77,2025-02-20T18:34:50.990000
|
||||
CVE-2023-41234,0,0,4f8d2167f703a1f5d9c00b2ebe5faccb4fe754a786d66acacf8ffc5dbfbd75fe,2024-11-21T08:20:53.133000
|
||||
CVE-2023-41235,0,0,d1d7e9d267f221374eb76694b55c2554466d593156003228f676adb610da8cd2,2024-11-21T08:20:53.260000
|
||||
CVE-2023-41236,0,0,8efafb87f68395385e0232e90401d586717111d3a20cd326158c892e13f1ae6f,2024-11-21T08:20:53.387000
|
||||
@ -232766,7 +232766,7 @@ CVE-2023-41957,0,0,a29f516d99af407c126a5e7ad417d81ce357dcbef8ae20e5c515d3719d1d6
|
||||
CVE-2023-4196,0,0,ef9c1646e137c44dab7abcf516cdc093158d8d226c4a6c8193984fb89aad5817,2024-11-21T08:34:36.033000
|
||||
CVE-2023-41960,0,0,bc34f55c0365c3e902620fef0f4ca6fa370f5764b27024ab41f4fe778d27af59,2024-11-21T08:21:59.677000
|
||||
CVE-2023-41961,0,0,d9eaf9a08b277b340f7d29fb515e8b334169a617c247410cfe10f782b5e55f3d,2025-01-23T18:34:03.960000
|
||||
CVE-2023-41962,0,0,ddfd42eaecd7c45420038a2470f93c7b8b9f7d6267cbd32837e17e8c62297a72,2024-11-21T08:21:59.923000
|
||||
CVE-2023-41962,0,1,8e211ae560f0b224b6dc90a762c337812a7535e5c4a77ff74c318f202d3b9783,2025-02-20T18:34:50.990000
|
||||
CVE-2023-41963,0,0,c488bbe213194cd9c4226a7f83fad3df13113f5834bb9bc7fa01fced3c6de0ef,2024-11-21T08:22:00.053000
|
||||
CVE-2023-41964,0,0,717405df1f2cf03c06becb18f5d6cdd82b5117004176fedd87a240e96fd3fe6f,2024-11-21T08:22:00.200000
|
||||
CVE-2023-41965,0,0,6e1160ce9cf9e97c4a661d80bc713c4291ac5e919384b1f33a3ca71b6caa1a9f,2024-11-21T08:22:00.367000
|
||||
@ -233782,7 +233782,7 @@ CVE-2023-43478,0,0,b363a6d7eacf2de3df908c7040728757be0307c514662b6e0555d36436206
|
||||
CVE-2023-4348,0,0,692cebc2724d39ef48703dff7796d1af38e61707ca753f487575c32468089efd,2024-11-15T12:15:14.397000
|
||||
CVE-2023-43481,0,0,ea239528ecf87a0f7c130169a57a2f0e98cbfb6de044eb89f0fe88122deee4f6,2024-11-21T08:24:07.670000
|
||||
CVE-2023-43482,0,0,4de30ef5cfde53322bf3771904d0488160e79381ba7f784b33cb0306a6fae59a,2024-11-21T08:24:07.903000
|
||||
CVE-2023-43484,0,0,df6a74cd16db4313c9c5d1346828ce84b53d020288b78a3f0d6337d93adfcdab,2024-11-21T08:24:08.023000
|
||||
CVE-2023-43484,0,1,9c2c1b002c8ecd72d8d86bc61ca52dd3c9635a95fc6bec5955384e6209f6c303,2025-02-20T18:34:50.990000
|
||||
CVE-2023-43485,0,0,f2e756b077c55ee5d60a7820b4f35f5bbc8c268c3f52a4818a3ee3de6d1cc46f,2024-11-21T08:24:08.163000
|
||||
CVE-2023-43487,0,0,da4b908218727f03580be0b88995d21b69d09331653a711975ff37d806ae1d91,2024-11-21T08:24:08.347000
|
||||
CVE-2023-43488,0,0,ebec5a7de90577d8c80523e93429725f86a21a7f6c2b5819c8450ec31d4d3fcc,2024-11-21T08:24:08.503000
|
||||
@ -233791,7 +233791,7 @@ CVE-2023-4349,0,0,a113f0c16e334ce035b6008fdd7a7e84fda6de5dcd31b75f844d308d867993
|
||||
CVE-2023-43490,0,0,70a8d4e2a9f0e66d5f0d4f8aa9bbf29ba9745e14090a884644c25d2720095b7e,2024-11-21T08:24:08.723000
|
||||
CVE-2023-43491,0,0,5de63384fb88ba7f66b800b0456c3327a91060d3df85b7692db574848ad55def,2024-11-21T08:24:08.840000
|
||||
CVE-2023-43492,0,0,7a7e359e002bd992e2c5ca74393c2e0ff956ea07b2444a5288d843fcba91190f,2024-11-21T08:24:08.970000
|
||||
CVE-2023-43493,0,0,112cf3a1ee97dde267f7a6a1ef06b6aa357c62193a4ba91821d1824bc2db6b4e,2024-11-21T08:24:09.113000
|
||||
CVE-2023-43493,0,1,ce24f1bb4356303e4e35b3a9813725be585e97951713f251a2192638265ce2ae,2025-02-20T18:34:50.990000
|
||||
CVE-2023-43494,0,0,b143555b57f154e4dc948e48eaba7f7a208774cc09626bcf0c4bbaf9566a3d47,2024-11-21T08:24:09.237000
|
||||
CVE-2023-43495,0,0,ad9a36dcdebd80b7326e0f7a06320c01e45cfffe1adbc65a5de4c27956532575,2024-11-21T08:24:09.377000
|
||||
CVE-2023-43496,0,0,ffe1ef005f7babcd075672e6ee2de0ac82e9c4688be7aaf1d6612b5d6c21a3c0,2024-11-21T08:24:09.497000
|
||||
@ -233892,10 +233892,10 @@ CVE-2023-4360,0,0,bf776b564f3d9f4caa1d912b4d5307249bcc398bd846123f845e5bb5ceeeb3
|
||||
CVE-2023-43608,0,0,6c27dbdafa55f2b7aa33c3b628ee6a7a91ecbd84b5bb3689ac1f00133224f13b,2024-11-21T08:24:27.367000
|
||||
CVE-2023-43609,0,0,fb2435a70d57b18c0efee8a58bb126e64bcba03418ae3f4ec7b94648b4be8270,2024-11-21T08:24:27.500000
|
||||
CVE-2023-4361,0,0,fffbd1502a6e8a4a3e57bb55356e04373dad92e0e12adfebb9247d6da916fbf9,2024-11-21T08:34:56.010000
|
||||
CVE-2023-43610,0,0,dff74ed8a22059464003d7b270c1731148485d2c28a1663c4d30b120be4ef49b,2024-11-21T08:24:27.630000
|
||||
CVE-2023-43610,0,1,3398d70884a3b75d3665e9fcf50e949d3bc1d8320e3af92db062ae0a4fdfcae6,2025-02-20T18:34:50.990000
|
||||
CVE-2023-43611,0,0,c870388edda2fadd40d04f44c0e4b5df8dbf6e33dc5c1b8a0154cfcd890ffb51,2024-11-21T08:24:27.740000
|
||||
CVE-2023-43612,0,0,0becea009dd3688d8312fd922863813239422d536141eb1bf18a8c3cc33b4be9,2024-11-21T08:24:27.890000
|
||||
CVE-2023-43614,0,0,8ff9c6dcf8abdd3a07113d1ec0c53e61b631c2e424df9bf4b21e1d2715bc94b3,2024-11-21T08:24:28.013000
|
||||
CVE-2023-43614,0,1,c35da460a4f57f7ca5c71f7afebb93d121ee52d5cba3265ba3fe3294985f7a03,2025-02-20T18:34:50.990000
|
||||
CVE-2023-43615,0,0,65b899e8dc4bcba791d588f9a9252f8e73a24a6d6302f2d567880ae45f83a201,2024-11-21T08:24:28.130000
|
||||
CVE-2023-43616,0,0,98c8c9d3d3ece2e1e2f359f9a389eb045b0e29c4ec80b9937bdec062013e3181,2024-11-21T08:24:28.283000
|
||||
CVE-2023-43617,0,0,34950c338e8a0462fb56c4f9409c842609c3359ab444962c9eb93ce2eeda1fd8,2024-11-21T08:24:28.443000
|
||||
@ -235734,8 +235734,8 @@ CVE-2023-46266,0,0,81806eaa6162d2628009ed70de1b2798f644cbf4406448d48f1535898504c
|
||||
CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000
|
||||
CVE-2023-4627,0,0,44c2ecd7362aa4de1a961a6fa4371a3240ed6fa84366e6d7bf5b1fbfa11dd3d2,2025-01-15T16:37:02.837000
|
||||
CVE-2023-46270,0,0,0789f887abfd7ae93c1dbe57cd351d8a2da80170c7bc99a18d2256a683596402,2024-11-21T08:28:12.507000
|
||||
CVE-2023-46271,0,1,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000
|
||||
CVE-2023-46272,0,0,6a5674c01f30ce0183e1dce1cb0349944e1e60fbf99477dd2701847f7d87dbc8,2025-02-19T19:15:13.917000
|
||||
CVE-2023-46271,0,0,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000
|
||||
CVE-2023-46272,0,1,1e8ad68c251bac92ada76c50a345818fa5a32e1e44b266c487785e20e6280825,2025-02-20T17:15:10.897000
|
||||
CVE-2023-46277,0,0,e192ca50b4060017d85c73fc1706fd083f6c682d8478108f323ab6790e52648a,2024-11-21T08:28:12.653000
|
||||
CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000
|
||||
CVE-2023-46279,0,0,17e25b379ca2a3fc5376c2a68c12148facaaedd8add0153d19efc2adb88f9b14,2025-02-13T18:15:34.690000
|
||||
@ -239034,7 +239034,7 @@ CVE-2023-50843,0,0,6622e0f37505b1e36dd9c752cc842fd5c0fbc267e206eb72429cb6715da54
|
||||
CVE-2023-50844,0,0,a6135888fe8b45ba8312ae11cb80f2f32d312074252ff60959f7d963a5b0e55c,2024-11-21T08:37:23.790000
|
||||
CVE-2023-50845,0,0,4b1de9a7f80dc03136cfa85538b309879f855db30d9be20acea70e1e0098e1be,2024-11-21T08:37:23.903000
|
||||
CVE-2023-50846,0,0,9a57383847dd3059e0d75dd8eebd0419ce4772ef504971e326ebee29ff4f4cdb,2024-11-21T08:37:24.023000
|
||||
CVE-2023-50847,0,0,8af88a86a3973ffb9b180f3688093f1185c41115fba9de24528f2281cbacaa0b,2024-11-21T08:37:24.163000
|
||||
CVE-2023-50847,0,1,8e2b199dfa4dfa569e23d416b25296e0d24ade2ecff4907c2c0e8619db8bbff0,2025-02-20T18:34:50.990000
|
||||
CVE-2023-50848,0,0,03098ffc01df1a6f925be974e2b8b2896eb8309e51fcdf8dbc50d422b690e589,2024-11-21T08:37:24.307000
|
||||
CVE-2023-50849,0,0,d5fdca61f99f1dbfefeff38bb6cfb6fd829f36ca030c93562f4c6219bc386f41,2024-11-21T08:37:24.440000
|
||||
CVE-2023-5085,0,0,c3dc096463ec9767731a311106d0ff3749acd54e0bded3788615c36bbd3edb19,2024-11-21T08:41:02.137000
|
||||
@ -239298,43 +239298,46 @@ CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587
|
||||
CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000
|
||||
CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000
|
||||
CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000
|
||||
CVE-2023-51293,0,1,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000
|
||||
CVE-2023-51296,0,1,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000
|
||||
CVE-2023-51293,0,0,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000
|
||||
CVE-2023-51296,0,0,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000
|
||||
CVE-2023-51297,0,0,82a03c125c89e9c5feb7167bc5c79f32a86cc86d30fa01646e6efbdc926b03eb,2025-02-19T20:15:34.770000
|
||||
CVE-2023-51298,0,1,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000
|
||||
CVE-2023-51299,0,1,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000
|
||||
CVE-2023-51298,0,0,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000
|
||||
CVE-2023-51299,0,0,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000
|
||||
CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000
|
||||
CVE-2023-51300,0,1,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000
|
||||
CVE-2023-51301,0,1,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000
|
||||
CVE-2023-51302,0,1,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000
|
||||
CVE-2023-51303,0,1,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000
|
||||
CVE-2023-51305,0,1,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000
|
||||
CVE-2023-51306,1,1,9abb5db728e8fe46856cf7f999df226ea525572318f83566b985a5915b4d98dc,2025-02-20T15:15:11.673000
|
||||
CVE-2023-51308,1,1,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000
|
||||
CVE-2023-51309,1,1,d5a34397b2d3712a4de0493249687b8ab829c9c913c53ab0eb208f0231b7e47f,2025-02-20T15:15:11.920000
|
||||
CVE-2023-51300,0,0,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000
|
||||
CVE-2023-51301,0,0,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000
|
||||
CVE-2023-51302,0,0,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000
|
||||
CVE-2023-51303,0,0,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000
|
||||
CVE-2023-51305,0,0,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000
|
||||
CVE-2023-51306,0,1,4ee512037b5a17f44d41cb85824b3aa21cbf2013fd9687b1c54a56b2512be0e8,2025-02-20T18:15:21.527000
|
||||
CVE-2023-51308,0,0,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000
|
||||
CVE-2023-51309,0,1,e8a267fb846fdf7ab7dcb6178679f00727db2db3808c8e0a0d4d14c04ce996de,2025-02-20T18:15:22.890000
|
||||
CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000
|
||||
CVE-2023-51310,1,1,04555726acd1d4321ddba39dd114106b5d6b5d634e69030505aa3132d2e331bf,2025-02-20T15:15:12.050000
|
||||
CVE-2023-51311,1,1,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000
|
||||
CVE-2023-51312,1,1,24df8ac219fd57ec3572cef764abdf460dd12ed44613d62f818ae74ace712664,2025-02-20T15:15:12.293000
|
||||
CVE-2023-51313,1,1,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000
|
||||
CVE-2023-51314,1,1,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000
|
||||
CVE-2023-51315,1,1,132e3dd91521663a35e221b7a999ef09c182eb57c48d8ad573a4dc220cc18f59,2025-02-20T15:15:12.680000
|
||||
CVE-2023-51316,1,1,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000
|
||||
CVE-2023-51317,1,1,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000
|
||||
CVE-2023-51318,1,1,f5ce695c6eca3c365541aa97f79aa692177cb4b44d64fd10b094343c8e2b8506,2025-02-20T16:15:34.703000
|
||||
CVE-2023-51319,1,1,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000
|
||||
CVE-2023-51310,0,1,f4d071c477d5fdc5cab7b5b3fa4720e6ca8a83f4159e2d11461587a7973502bb,2025-02-20T18:15:23.090000
|
||||
CVE-2023-51311,0,0,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000
|
||||
CVE-2023-51312,0,1,af0e37187ed278587c858c2f07fd240cea5d64346e1f10c5fb7311e4a0e68208,2025-02-20T18:15:23.293000
|
||||
CVE-2023-51313,0,0,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000
|
||||
CVE-2023-51314,0,0,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000
|
||||
CVE-2023-51315,0,1,93388a032dcef67ad051bc5698be424af785a597baf012fcfffa6e19240ae44a,2025-02-20T18:15:23.490000
|
||||
CVE-2023-51316,0,0,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000
|
||||
CVE-2023-51317,0,0,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000
|
||||
CVE-2023-51318,0,1,e156ff65231831e807af792d62b39f920a1b080c98fa76e62945fdf2d761f0ab,2025-02-20T18:15:23.683000
|
||||
CVE-2023-51319,0,0,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000
|
||||
CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000
|
||||
CVE-2023-51320,1,1,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000
|
||||
CVE-2023-51321,1,1,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000
|
||||
CVE-2023-51323,1,1,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000
|
||||
CVE-2023-51324,1,1,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000
|
||||
CVE-2023-51325,1,1,d9bce55484426b97e5206f92ca8131481536ba82ebadc469adf7d081660cea41,2025-02-20T16:15:35.330000
|
||||
CVE-2023-51326,1,1,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000
|
||||
CVE-2023-51327,1,1,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000
|
||||
CVE-2023-51320,0,0,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000
|
||||
CVE-2023-51321,0,0,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000
|
||||
CVE-2023-51323,0,0,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000
|
||||
CVE-2023-51324,0,0,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000
|
||||
CVE-2023-51325,0,1,667a2d572d3e56010ed0cee43300ab295ca00f6d7d9ec057ce9b3e1df3c304f6,2025-02-20T18:15:23.877000
|
||||
CVE-2023-51326,0,0,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000
|
||||
CVE-2023-51327,0,0,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000
|
||||
CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000
|
||||
CVE-2023-51330,1,1,f6ddadd04f6bc79dd4ed033e5a2c587bce52b3f4671127e98010c92709f4a14b,2025-02-20T16:15:35.647000
|
||||
CVE-2023-51331,1,1,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000
|
||||
CVE-2023-51332,1,1,1f0734dc885312d91e40d1b3167395e307e144bd8e608075edd4dd7c3f53282f,2025-02-20T16:15:35.850000
|
||||
CVE-2023-51330,0,1,e664e43a7af31a50c03fc87cdd3e67b4189e6bd4271a563ec9e5266a551a0790,2025-02-20T17:15:11.087000
|
||||
CVE-2023-51331,0,0,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000
|
||||
CVE-2023-51332,0,1,c151beca79a66bf098a3a0f0f346ef429ee573baee252e050cd52d6e34e7708e,2025-02-20T17:15:11.253000
|
||||
CVE-2023-51333,1,1,f4af773f151d02c849c1fa93949fdf704223450e1cf38ad113c0c3c52c373c00,2025-02-20T18:15:24.077000
|
||||
CVE-2023-51334,1,1,f613e300bfb51036e7b4409b994f21852e706f98a9484d60919186bf86d03f54,2025-02-20T18:15:24.203000
|
||||
CVE-2023-51335,1,1,2eccd00df936880dcb3b6f2147f9859b385aa4a589ecea8aa4bc6a8a800ad647,2025-02-20T18:15:24.347000
|
||||
CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000
|
||||
CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000
|
||||
CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000
|
||||
@ -241385,9 +241388,9 @@ CVE-2023-5947,0,0,098e7ff1029cb6d87b50ef695adb5f87e2adc3374937eb3401a2166bbd8cd7
|
||||
CVE-2023-5948,0,0,fbd2677268b742d5db8f21fa6e16e4118508ae8f644808fe2b7f06afd363d324,2024-11-21T08:42:50.440000
|
||||
CVE-2023-5949,0,0,7510afa978eb353908194351be3db24552fb727cae79bd4e452afa213104bad5,2024-11-21T08:42:50.580000
|
||||
CVE-2023-5950,0,0,4ce112e27dba3b3dd95522f82cc5fd4d5febee0276cd39a8390bbc7d2ba257d2,2024-11-21T08:42:50.700000
|
||||
CVE-2023-5951,0,0,6f76e5fab74536b2e63d239ae0cb4dde40a5fa570d046ed5530119ff0e6b8aee,2024-11-21T08:42:50.830000
|
||||
CVE-2023-5952,0,0,1e1a816e5214ed2f703bd4fa6ff2e574582f4914b4dff90bbd3d6fefcb805b18,2024-11-21T08:42:51.027000
|
||||
CVE-2023-5953,0,0,e46ab422458329e4eeb7d39665102fed95f95a802207f0b9c5e275168ce50438,2024-11-21T08:42:51.153000
|
||||
CVE-2023-5951,0,1,926113101e4476a9dba9e7a111d9dea4871b87eba92f2ad19ff23bbd66797da1,2025-02-20T18:32:30.690000
|
||||
CVE-2023-5952,0,1,e435d4f4140f94818c08cc82685990eaab7920c66540d9ddc9acd9d912c017dd,2025-02-20T18:32:30.690000
|
||||
CVE-2023-5953,0,1,3d3ea956a9d05885dccbc4eabbd027dac8c5edfc3529cf4db4b56b7aff37de79,2025-02-20T18:34:50.990000
|
||||
CVE-2023-5954,0,0,ac1ef91ec2c5675c7e1c3b282c6ef6b3b939a5f7987a716f19550c6af0d61303,2024-11-21T08:42:51.270000
|
||||
CVE-2023-5955,0,0,cf96c33af6cc9b73b57b78012e4782149164c9aac8d93899ee8320263d002887,2024-11-21T08:42:51.403000
|
||||
CVE-2023-5956,0,0,081455ccb1fc867165d2e32ce0fd09036c2e1e7e184bef4b711e9161cef17619,2024-11-21T08:42:51.590000
|
||||
@ -241545,7 +241548,7 @@ CVE-2023-6116,0,0,85a3fd1f085ef6c41245bd36d6c6a57a46ff0b8f6c7ef7f918479ce74ece08
|
||||
CVE-2023-6117,0,0,b236051dc9fd988695329143bca826e2efad81490e22dca429cfb07ef02e7af9,2024-11-21T08:43:09.830000
|
||||
CVE-2023-6118,0,0,bc42470e8d89ffc7a9c40bb55be64cdb3ab1b388e46948d1b287bb00331a466e,2024-11-21T08:43:09.967000
|
||||
CVE-2023-6119,0,0,f907bdfebbfcac37637f5c8bdb63b2f5c6c4dcb0567ca3ec448b07963d811cba,2024-11-21T08:43:10.167000
|
||||
CVE-2023-6120,0,0,2532afbcacd9991fd810c829ee8715af96f18f283082d0c25dea0009297b6e59,2024-11-21T08:43:10.320000
|
||||
CVE-2023-6120,0,1,da84340d1c5dfa32167b534b8b7cc767f6e28717b2b703f6ed27762f28f6e541,2025-02-20T18:34:50.990000
|
||||
CVE-2023-6121,0,0,c1ffe3d1aca9c6ce7e9c8405bfa8c025c65f623b025bd65fed74c641e61f3c45,2024-11-21T08:43:10.460000
|
||||
CVE-2023-6122,0,0,cab51e4f436a377319b9fdff95c2df46c82a130498ea39695665da328e66a6c8,2024-11-21T08:43:10.613000
|
||||
CVE-2023-6123,0,0,945d422ef5d56b423c8873dcf7c6ff717fe04de4fcc4bdaed30db49145443830,2024-12-18T17:32:47.300000
|
||||
@ -244360,7 +244363,7 @@ CVE-2024-10957,0,0,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c
|
||||
CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000
|
||||
CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000
|
||||
CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000
|
||||
CVE-2024-10960,0,1,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000
|
||||
CVE-2024-10960,0,0,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000
|
||||
CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000
|
||||
CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d31c,2024-11-15T13:58:08.913000
|
||||
CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000
|
||||
@ -244377,8 +244380,8 @@ CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b
|
||||
CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000
|
||||
CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000
|
||||
CVE-2024-10976,0,0,add1dc642ca0b3839b02b45025e0871bcc2dc4571c371fa1948c8c2b0fc1c9e1,2025-02-11T17:46:21.280000
|
||||
CVE-2024-10977,0,1,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000
|
||||
CVE-2024-10978,0,1,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000
|
||||
CVE-2024-10977,0,0,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000
|
||||
CVE-2024-10978,0,0,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000
|
||||
CVE-2024-10979,0,0,c563f753316fdbc35fc0c4266561157efcd47ba87314ae829bfbd5ca249cb75d,2025-02-11T21:27:49.273000
|
||||
CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000
|
||||
CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000
|
||||
@ -245489,7 +245492,7 @@ CVE-2024-1217,0,0,6b4f28a64a0963868a0b0fd68f3e80e1f35d8f2883d87d4094b446f0742cbc
|
||||
CVE-2024-12170,0,0,dda5e4dfb884254330b10e15454ff7f267eea062af3a3c0f061f58e061dbc21b,2025-01-07T05:15:15.713000
|
||||
CVE-2024-12171,0,0,02bdcd1ee67eefd33d15b29c0f023f4ae1c93e77bdd7b1fc34ccf1ee81e2337a,2025-02-01T04:15:30.303000
|
||||
CVE-2024-12172,0,0,71dcf4ad1517a839187dba7f34de208b20f0af666e791340d3555b8bf199e319,2024-12-12T06:15:23.587000
|
||||
CVE-2024-12173,0,0,4f1370f3a33cf5d39fb9681c7defbf9004f56ec2e518087913fd718e7f630f17,2025-02-19T06:15:21.003000
|
||||
CVE-2024-12173,0,1,40318b60c711aa39885ed06dd8b46aeaf2fc04d2ff227d24f115d1ef6b46e01b,2025-02-20T18:15:24.483000
|
||||
CVE-2024-12174,0,0,d557284551bec104067ec802c1680b85a8fd3b4f89f1ebaca3a04bd8bacf5eb2,2024-12-09T22:15:22.237000
|
||||
CVE-2024-12175,0,0,d343e9c859734ac59607cdd69472323b5b2b24ca1f02ce9797a72fd283ae52a1,2025-01-10T21:26:56.183000
|
||||
CVE-2024-12176,0,0,c0f27faa92b2096f6d155f1bdd3b84e12e907e1e8188f65eb3c16d954de1037d,2025-01-07T05:15:15.900000
|
||||
@ -245532,7 +245535,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72
|
||||
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
|
||||
CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000
|
||||
CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000
|
||||
CVE-2024-12213,0,1,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000
|
||||
CVE-2024-12213,0,0,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000
|
||||
CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000
|
||||
CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000
|
||||
CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000
|
||||
@ -245607,7 +245610,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528
|
||||
CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000
|
||||
CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000
|
||||
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
|
||||
CVE-2024-12296,0,1,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000
|
||||
CVE-2024-12296,0,0,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000
|
||||
CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000
|
||||
CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000
|
||||
CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000
|
||||
@ -245688,7 +245691,7 @@ CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2
|
||||
CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000
|
||||
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
|
||||
CVE-2024-12385,0,0,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000
|
||||
CVE-2024-12386,0,1,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000
|
||||
CVE-2024-12386,0,0,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000
|
||||
CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
|
||||
CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000
|
||||
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
|
||||
@ -245838,7 +245841,7 @@ CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a553
|
||||
CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000
|
||||
CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000
|
||||
CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000
|
||||
CVE-2024-12550,0,1,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000
|
||||
CVE-2024-12550,0,0,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000
|
||||
CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000
|
||||
CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000
|
||||
CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000
|
||||
@ -246626,13 +246629,13 @@ CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626
|
||||
CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000
|
||||
CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000
|
||||
CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000
|
||||
CVE-2024-13475,0,1,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000
|
||||
CVE-2024-13475,0,0,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000
|
||||
CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000
|
||||
CVE-2024-13477,0,1,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000
|
||||
CVE-2024-13477,0,0,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000
|
||||
CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000
|
||||
CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000
|
||||
CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000
|
||||
CVE-2024-13480,0,1,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000
|
||||
CVE-2024-13480,0,0,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000
|
||||
CVE-2024-13481,0,0,18f6163dfd9d1440b7c7726ceaa029ecf7615c66174a2f06ab95e8be286bcd48,2025-02-19T12:15:30.753000
|
||||
CVE-2024-13483,0,0,36b609d73c634ce761bc3a61cf94037aa579c6e7fb89e544a11515a27c0ee3f1,2025-02-19T12:15:30.900000
|
||||
CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000
|
||||
@ -246641,7 +246644,7 @@ CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80
|
||||
CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000
|
||||
CVE-2024-13489,0,0,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000
|
||||
CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000
|
||||
CVE-2024-13490,0,1,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000
|
||||
CVE-2024-13490,0,0,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000
|
||||
CVE-2024-13491,0,0,3901e563b54ff00b6149844edb6c3aec1c2bb14d137786d8368044d8dc0748a8,2025-02-19T12:15:31.187000
|
||||
CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000
|
||||
CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000
|
||||
@ -246680,8 +246683,8 @@ CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a30
|
||||
CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000
|
||||
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
|
||||
CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000
|
||||
CVE-2024-13531,0,1,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000
|
||||
CVE-2024-13532,0,1,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000
|
||||
CVE-2024-13531,0,0,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000
|
||||
CVE-2024-13532,0,0,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000
|
||||
CVE-2024-13533,0,0,dca093e418f506c56c7b721bf19c66fbd6fc8408ab62d8e654c432036b784a95,2025-02-19T12:15:31.333000
|
||||
CVE-2024-13534,0,0,24e878dd73461d45240baee5013d359ea0437394343be594e0594e5922b1d61d,2025-02-19T12:15:31.480000
|
||||
CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000
|
||||
@ -246692,8 +246695,8 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166
|
||||
CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000
|
||||
CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000
|
||||
CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000
|
||||
CVE-2024-13543,0,1,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000
|
||||
CVE-2024-13544,0,1,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000
|
||||
CVE-2024-13543,0,0,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000
|
||||
CVE-2024-13544,0,0,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000
|
||||
CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000
|
||||
CVE-2024-13547,0,0,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000
|
||||
CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000
|
||||
@ -246711,7 +246714,7 @@ CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e
|
||||
CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000
|
||||
CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000
|
||||
CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000
|
||||
CVE-2024-13570,0,1,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000
|
||||
CVE-2024-13570,0,0,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000
|
||||
CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000
|
||||
CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000
|
||||
CVE-2024-13575,0,0,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000
|
||||
@ -246746,7 +246749,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552
|
||||
CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000
|
||||
CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000
|
||||
CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000
|
||||
CVE-2024-13612,0,1,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
|
||||
CVE-2024-13612,0,0,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000
|
||||
CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000
|
||||
CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000
|
||||
CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000
|
||||
@ -246860,7 +246863,7 @@ CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae8
|
||||
CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000
|
||||
CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000
|
||||
CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000
|
||||
CVE-2024-13813,0,1,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000
|
||||
CVE-2024-13813,0,0,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000
|
||||
CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000
|
||||
CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000
|
||||
CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000
|
||||
@ -246872,8 +246875,8 @@ CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2
|
||||
CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000
|
||||
CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000
|
||||
CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000
|
||||
CVE-2024-13842,0,1,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
|
||||
CVE-2024-13843,0,1,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
||||
CVE-2024-13842,0,0,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000
|
||||
CVE-2024-13843,0,0,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000
|
||||
CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000
|
||||
CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000
|
||||
CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000
|
||||
@ -248989,9 +248992,9 @@ CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fb
|
||||
CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000
|
||||
CVE-2024-21685,0,0,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000
|
||||
CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000
|
||||
CVE-2024-21687,0,1,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000
|
||||
CVE-2024-21687,0,0,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000
|
||||
CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000
|
||||
CVE-2024-21689,0,1,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000
|
||||
CVE-2024-21689,0,0,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000
|
||||
CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000
|
||||
CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000
|
||||
CVE-2024-21691,0,0,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000
|
||||
@ -251157,7 +251160,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1
|
||||
CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000
|
||||
CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000
|
||||
CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000
|
||||
CVE-2024-2472,0,1,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000
|
||||
CVE-2024-2472,0,0,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000
|
||||
CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000
|
||||
CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000
|
||||
CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000
|
||||
@ -251898,7 +251901,7 @@ CVE-2024-25696,0,0,d5a9136c1d8f99bf95f80eb21266c5f45a51ff0365b75c1e51382b7ec2cfb
|
||||
CVE-2024-25697,0,0,a267efec5273910cac3ec9498c584553301da7dd464ae170402e82473ed69618,2025-01-08T14:22:09.017000
|
||||
CVE-2024-25698,0,0,d8153d0a5f5447d2ed8050d1aff648edef1b78164d821441b8ecfff2f9f3ddd0,2025-01-30T16:18:43
|
||||
CVE-2024-25699,0,0,2adecc9e6c7b1072773d72f427349412dc90e94c4e67f251b1aa2cd7cacf3e08,2025-01-30T16:23:46.597000
|
||||
CVE-2024-2570,0,0,8904be72da1cc04949bb577192b9c0d2e6811b77e6cbf72d6c39d9361754ea4c,2024-11-21T09:10:02.120000
|
||||
CVE-2024-2570,0,1,f2c8b0c8e5be58ab9605cab2cf83fb7f3f1fc99037c03351618b2107ce971245,2025-02-20T18:13:30.057000
|
||||
CVE-2024-25700,0,0,9f93306ac6edcebea165bf5bf6cc8e9e96960ebf6d995fdefa65259eb1d6db09,2024-04-25T18:15:07.817000
|
||||
CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc54d,2024-10-16T21:00:36.173000
|
||||
CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000
|
||||
@ -251909,7 +251912,7 @@ CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531b
|
||||
CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000
|
||||
CVE-2024-25708,0,0,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc3a8,2025-01-31T13:27:06.877000
|
||||
CVE-2024-25709,0,0,e4b0ec44272d6a266af0f61140023cf74e93b905fc1b38dc4d3a6cfeb46aa3ed,2025-01-31T14:35:45.990000
|
||||
CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000
|
||||
CVE-2024-2571,0,1,e582357e70f62facc4e9492592fa1228759dbdc12736beb495fabfbf81689210,2025-02-20T18:13:36.077000
|
||||
CVE-2024-25710,0,0,4922d2b8c6c59484e2f96bdfd1fa1e7bfad107bb66f26dbc6d083080fea0c895,2025-02-13T18:17:15.147000
|
||||
CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000
|
||||
CVE-2024-25712,0,0,63f8849279631b5dd31f14b17e44f9ea3d88f75b6e7b1e3f66e09afe909d185b,2025-01-16T17:51:16.490000
|
||||
@ -251917,13 +251920,13 @@ CVE-2024-25713,0,0,7cb9846da4920671c42e088b26485e0952d0f913d5cb2aa4287dd0a1359ca
|
||||
CVE-2024-25714,0,0,5f5ec83991c8636624f4337fd8c71900ea8e4cac894cd5c5104c7c5d2e9cd5cb,2024-11-21T09:01:15.770000
|
||||
CVE-2024-25715,0,0,887d8932bcfac8adcfbc6486e84838e399b323dbff1591e24e7eb0ed7512d224,2024-11-21T09:01:16.017000
|
||||
CVE-2024-25718,0,0,bf6058051f29852df9a6b0e96ff2d0b68fcb7f243846d3b198a96ffbdccf9997,2024-11-21T09:01:16.167000
|
||||
CVE-2024-2572,0,0,de24d696c7ed82d8362251834c70e7fe2bca21380cdcf80af058c3bf16288f2f,2024-11-21T09:10:02.410000
|
||||
CVE-2024-2572,0,1,87613423acb47abc33271413e223cbf3de24d5677db02c2e6a8d547b5c6a81c1,2025-02-20T18:13:22.020000
|
||||
CVE-2024-25722,0,0,b643febd38bb4dc1f1e9694e66460a793480bcbbe11a0215b76ee150392e896f,2024-11-21T09:01:16.413000
|
||||
CVE-2024-25723,0,0,09418abdec3f5b8028050527741fc967ec29e7f200c615cc75c1ae01a568a8b0,2024-11-21T09:01:16.563000
|
||||
CVE-2024-25724,0,0,e0bfae1578de6d009c2ec567f45727863a3aaa4f54ddde5da227f1c075d1beb2,2024-11-21T09:01:16.797000
|
||||
CVE-2024-25728,0,0,249547664dee94486de7d24f91565612df1fd7ba5870da82cfb8177b2a0fcb61,2024-11-21T09:01:17.043000
|
||||
CVE-2024-25729,0,0,3db67ab23a258a05979984a126775ad307c38690f174be37fd98d41efab8557a,2024-11-21T09:01:17.263000
|
||||
CVE-2024-2573,0,0,18749619bfe68b4fd232f3610f21ec57fdb648eb6944794773ea674a54eade8f,2024-11-21T09:10:02.530000
|
||||
CVE-2024-2573,0,1,b79b1180561c3a7fd205d80040573866ef52299a8fb246485f49ef358e1ae1de,2025-02-20T18:12:59.823000
|
||||
CVE-2024-25730,0,0,85e063f99da70c01b1b3a3bbfc7f4b413bf752190780e969335d19a636e3425c,2024-11-21T09:01:17.477000
|
||||
CVE-2024-25731,0,0,6c3e919119578ea97d9a9640c3ffc3eedc427ada22d3030737980e0d058696a9,2024-11-21T09:01:17.700000
|
||||
CVE-2024-25734,0,0,3574c01447c22483c86f66e396d575e7bf7b614a6b4ebe187ebdc4c9a17dcf82,2024-11-21T09:01:17.837000
|
||||
@ -251932,7 +251935,7 @@ CVE-2024-25736,0,0,831650ee2b289fa09d115f05113a0521c5f85fe00e3f4a57b362a744d6e20
|
||||
CVE-2024-25737,0,0,4bf6de89cebe09aa2368df8de50a16d59403650b4e336a34b7d2536eee9a53ba,2024-11-21T09:01:18.417000
|
||||
CVE-2024-25738,0,0,104f8fb5616d4b0fc4a70325425b561419d44b0dc6df45cc5ada7cb95d562c2f,2024-11-21T09:01:18.627000
|
||||
CVE-2024-25739,0,0,3c706a17add34350e9cf827e766f3bbf1b14a8aa3ef17092c57f8fb63d79383b,2024-11-21T09:01:18.840000
|
||||
CVE-2024-2574,0,0,d9cc20ff963ed81c94d0c72dc3875ded0c6982c2eead670b598fb51d94b2c801,2024-11-21T09:10:02.667000
|
||||
CVE-2024-2574,0,1,42ab3d86f020fc690af2a2e85cb665f1d9747c0eafe41f89be4b8b85e352c03d,2025-02-20T18:10:50.230000
|
||||
CVE-2024-25740,0,0,d6d3c8770d2c76a0fc3555da9c432136eb7575e28d8f6e4a82b40609ff87844a,2024-11-21T09:01:18.993000
|
||||
CVE-2024-25741,0,0,1d23ef34ccb35d014111342476db8a5b6563966ba18b74c74ec859aa07028c90,2024-11-21T09:01:19.140000
|
||||
CVE-2024-25742,0,0,52bed7f896019850d6a1a17d1537a9725f1c6d4ed95ae4b4ff3c038ecb99e0ff,2024-11-21T09:01:19.287000
|
||||
@ -251940,16 +251943,16 @@ CVE-2024-25743,0,0,50c02bd6f47af4d1391f96d4d393b58262df1e4f8aead8b2009a7fda94847
|
||||
CVE-2024-25744,0,0,b136b3d01b604786d3dbfab666ea457af36733ed2726033559248a8a8f7c83fb,2024-11-21T09:01:19.657000
|
||||
CVE-2024-25746,0,0,2fbc2bd1ee4877f2696f835cbac1f796a8bd9a57feb82e0d10e67249ce7bd03f,2024-11-21T09:01:19.810000
|
||||
CVE-2024-25748,0,0,56bb048209c050832d360f12e3e88b4a19abb70516badb42d8a32762d27c39f5,2024-11-21T09:01:20.017000
|
||||
CVE-2024-2575,0,0,d13bf77312f52544ced50446e6f94414639eecaa379c44f14ba8cae9f6dde728,2024-11-21T09:10:02.810000
|
||||
CVE-2024-2575,0,1,bca86758902227bb966bcb5114d69ceaab519e3fc2f55a9be98f345879e8878b,2025-02-20T18:10:40.443000
|
||||
CVE-2024-25751,0,0,fb580ffbac566625269451e1f43f3cbc8826d1032ad28d5d28cbaa07aa67f464,2024-11-21T09:01:20.233000
|
||||
CVE-2024-25753,0,0,212cb4d11c4ea5393e35576976cb22a20b28a0598ff81717740bd5ec65ca3ed4,2024-11-21T09:01:20.453000
|
||||
CVE-2024-25756,0,0,92898c31ea6fcedcd1267a1bcae650b419c641858f92b17b698db23c897ae92c,2024-11-21T09:01:20.683000
|
||||
CVE-2024-2576,0,0,a3b6546e58247abe9bcbf63e1b2892b257c2f26b907c9321f4c8eec89b5f1888,2024-11-21T09:10:02.960000
|
||||
CVE-2024-2576,0,1,9eafb3169bae20824c696ba06690f87c921596851d52943fc02b2607ce6df77e,2025-02-20T18:09:56.283000
|
||||
CVE-2024-25760,0,0,c45a46352a5d67e1141c582ed464c0b6537f04649b66b954625542797a253143,2024-02-27T15:15:07.820000
|
||||
CVE-2024-25763,0,0,b88e8c350b416b345655932a9f416e922f06fbf90349fa5914aec08ad9918eac,2024-12-06T21:15:06.113000
|
||||
CVE-2024-25767,0,0,0ca78670771c5475ecaa5b22e5b07acd76b8ce6bcee60635d4c63930e9338774,2024-11-21T09:01:21.100000
|
||||
CVE-2024-25768,0,0,ca5e5fafb79a5045a2f311eea8b17b095a90d33f4f213631285129e72bbe41c9,2024-11-21T09:01:21.313000
|
||||
CVE-2024-2577,0,0,0cffc6b89093ad2aec228544183866929252f57ef89cf6d6524c201756e21d21,2024-11-21T09:10:03.103000
|
||||
CVE-2024-2577,0,1,4e8f0d0dfeaf2618ccca4cc1b72f717dc0c6272eaa249ebc2648013033edf451,2025-02-20T18:09:43.090000
|
||||
CVE-2024-25770,0,0,398f17523c9506a877868692f911a4e483227a4dd1226854f612f5460a815c77,2024-11-21T09:01:21.520000
|
||||
CVE-2024-2578,0,0,dcf3a8c7eaa2ed6078005c88780e68cc6d17ce19d2e3cc6e2a9c1f77cd939559,2024-11-21T09:10:03.243000
|
||||
CVE-2024-2579,0,0,f36838f8c9e0fe4fa638d23b3b6348547666dfbb79b14e037d8d241191eb52f7,2024-11-21T09:10:03.367000
|
||||
@ -253579,7 +253582,7 @@ CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fa
|
||||
CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000
|
||||
CVE-2024-27728,0,0,46e06ce272ce05b5accc64e25080f982ab4dc5a49c281203dbe76629733a8fd4,2024-08-20T14:35:06.747000
|
||||
CVE-2024-27729,0,0,809fcc66d1703da695f3fdd07183b33a76080add392f01a1abb9d8a582f159f5,2024-09-11T20:29:52.477000
|
||||
CVE-2024-2773,0,0,018fb490a9d26494d921abab57a48493b2cfc80bcef8c4ecda213f042e19cd06,2024-11-21T09:10:29.120000
|
||||
CVE-2024-2773,0,1,2cd7d672e838d27a7fd1a99babec2dccf70e5ef0c810c5a549991f91ab554ab9,2025-02-20T18:26:30.320000
|
||||
CVE-2024-27730,0,0,acfcf7485c8d77fdf14cfede383a631f0141a2fb98231e83b41705b53ce22b1a,2024-08-19T13:00:23.117000
|
||||
CVE-2024-27731,0,0,0d3ba0916b089cf85ebb0d7f3b887a2201a141773d2892b38832e38a6bc4a12b,2024-08-19T13:00:23.117000
|
||||
CVE-2024-27733,0,0,539349bc579d8094317996ab3ddf62f89037e0f53da0557ec04eca7f3ed5858f,2024-11-21T09:04:58.253000
|
||||
@ -253589,7 +253592,7 @@ CVE-2024-27743,0,0,8a8023dce84e20698a8622f127a9a4605329e9ae56a693b1b628391bea5a5
|
||||
CVE-2024-27744,0,0,d87bcdd72cf7cf7c0ffdb2aaccde30128c133219c9b50f003c292157283c3c73,2024-11-21T09:04:58.937000
|
||||
CVE-2024-27746,0,0,cccbd29f894f9698774bcae5e4bc2377fa7c94e3f6464de4b19ea803ef2d352b,2024-11-21T09:04:59.170000
|
||||
CVE-2024-27747,0,0,730bf8bc21e4bbd04a9fa6e13239843c2634744b55e747c9304ef4f250570fce,2024-11-21T09:04:59.400000
|
||||
CVE-2024-2775,0,0,cf67f004e139a119a0ccf197f65b74d8e84079346aff80fb2aa16d01dbd621a2,2024-11-21T09:10:29.380000
|
||||
CVE-2024-2775,0,1,a489e08525c2a6b7e1747c8c55d6b25d8f750fc079381c03461485aee5242c66,2025-02-20T18:29:08.757000
|
||||
CVE-2024-27752,0,0,51f44ea4d791b236f1be7a96290ec94dc23c429a938add370ee6be6fe01f7126,2024-11-21T09:04:59.627000
|
||||
CVE-2024-27756,0,0,e93ad2fc2a071bfb70f8b4c256623e40cfa1d2e82cb7ead180eb27a2cd889aaf,2024-11-21T09:04:59.863000
|
||||
CVE-2024-27757,0,0,da813ae164b43a62f4abf9ccd54f7d6818fa328eab81f6c5f191e6a935f228c7,2024-11-21T09:05:00.087000
|
||||
@ -253610,7 +253613,7 @@ CVE-2024-27774,0,0,307f48a7716a730e60d75be64dea775aaf45a608fbb3ab8fba2c3652139b9
|
||||
CVE-2024-27775,0,0,468f4bdeb691bac934a90af6b47335beff0a01310cc0f12046ca31ea2abc0fb4,2024-11-21T09:05:02.297000
|
||||
CVE-2024-27776,0,0,ef49ef17c1210e0ed2c1ff489a27f0662db66dc8a6e90113cd624459aa34be3a,2024-11-21T09:05:02.433000
|
||||
CVE-2024-27778,0,0,3b61d8453c3de288977eb08a96cca8e26535b9043516770daafb9936f17dae62,2025-01-31T17:35:05.800000
|
||||
CVE-2024-2778,0,0,da9799ba1a896260f3966e85cd8ba6bdf1155e8b3eb8fb7ffe9ea6d0361cc9d7,2024-11-21T09:10:29.870000
|
||||
CVE-2024-2778,0,1,3f1276203f90b009e4c7f6d1e7f79cb2399150023bd01e1e305fa9cf1af8da84,2025-02-20T18:28:46.003000
|
||||
CVE-2024-27780,0,0,f04cd8a4518fae52b47e1499947545d117e7ab549094d2b1c1a46aabc5c3aa05,2025-02-11T17:15:21.850000
|
||||
CVE-2024-27781,0,0,0130e91964b45c066f777dfb4fe85552f6a357216c61f934c4b42ddf6711019b,2025-02-11T17:15:21.980000
|
||||
CVE-2024-27782,0,0,b01afce97382f5347b598b12017d99ef6ba8abe65ad6d5215e9994d037f58038,2024-11-21T09:05:02.573000
|
||||
@ -253933,9 +253936,9 @@ CVE-2024-28109,0,0,1eccc18b2c79a7ac7c54d045aea775d6dfc7e6339edc2544d6cfaee6e307e
|
||||
CVE-2024-2811,0,0,7ca649efe599a5e9071e040230504b89a79c0c012685e27d28102b0fe39088dd,2024-11-21T09:10:34.833000
|
||||
CVE-2024-28110,0,0,02bed29e56bb2de858376e909bccd6140b6410e0e47c817033bde5090de34af9,2024-11-21T09:05:50.160000
|
||||
CVE-2024-28111,0,0,099cc0d37be85ae64372808397b692b5eba198e1e4d4fb2a3d8b654e7c3d3b33,2024-11-21T09:05:50.300000
|
||||
CVE-2024-28112,0,0,6392a4bd3c2c9ff4058d8417c21cbb729ef04ae5623dacc788aba6d2230d3901,2025-02-13T17:12:42.737000
|
||||
CVE-2024-28113,0,0,242345c5a7c05643c8552ec8949a72af78cfd10b31789018575b3b5bf3509171,2024-11-21T09:05:50.570000
|
||||
CVE-2024-28114,0,0,1c68ef300c720fd0e2779aa4d4bbc4e06c19751805537132151bdc1431bf65ec,2024-11-21T09:05:50.730000
|
||||
CVE-2024-28112,0,1,9b6562d0b8b8b962701b0e06a1d6d6d6ca3185d1b8abe09821d679f218da596d,2025-02-20T17:25:58.783000
|
||||
CVE-2024-28113,0,1,66814e01c7b9dbe9b678d1cf4f03347bcea5245869cfc273cd6eb8e88b8aa832,2025-02-20T17:08:04.250000
|
||||
CVE-2024-28114,0,1,454d90cdd6fe951b8369afca9dd6491b9986e2f889f5972dda9e047bac5f1471,2025-02-20T17:18:20.863000
|
||||
CVE-2024-28115,0,0,22c183804756e395faece574c368d4cae136c9c5ac642ca5fa899dd4c72bdc38,2024-11-21T09:05:50.867000
|
||||
CVE-2024-28116,0,0,06ab2acc19d3b1b085641d8b752eae550641fce1928137c9f5fc8bf2298f4ec1,2025-01-02T22:57:51.510000
|
||||
CVE-2024-28117,0,0,25a818d5b218e308783785ed799f95754af9a77920e6452a88595579929a615b,2025-01-02T22:58:56.197000
|
||||
@ -254094,7 +254097,7 @@ CVE-2024-28303,0,0,cc9962bb9c810b91c2e702a1cd75dbbe01254ddcbe7ebada5a07f031ba243
|
||||
CVE-2024-2831,0,0,46af6348b329d2dfc198fe1539e3605e6e4c554559dbe5d1d756cc0cf6bb1a4d,2024-11-21T09:10:37.903000
|
||||
CVE-2024-28318,0,0,a3097b47a933abcb0bedd806254eb8371d5cdbce9b80173dbc5f3461847aae12,2024-11-21T09:06:10.323000
|
||||
CVE-2024-28319,0,0,adbb9262fe095c1ee41b752e8e7ce767756f12f9e01c77d91fcf8570d7a4e12e,2024-11-21T09:06:10.557000
|
||||
CVE-2024-2832,0,0,5d907d9ba66f185faca0a75e9347295f2d6eb86c36962ff89343f7ac82cd3cdd,2024-11-21T09:10:38.020000
|
||||
CVE-2024-2832,0,1,8e3577c0947f8baf9d745f1e687966da954c57f14f7581913b291934890e1425,2025-02-20T17:22:38.917000
|
||||
CVE-2024-28320,0,0,156b627473e5ac6bcd288f42ccc346804a8651dfc17bef3f6969a7ebea1ce1a6,2024-11-21T09:06:10.710000
|
||||
CVE-2024-28322,0,0,4d8f57dcf95c839919bd19e58d706ebb428b316858edbbc8a9f943ea2521b9e8,2024-11-21T09:06:10.940000
|
||||
CVE-2024-28323,0,0,9e5e2a70f2e5e23491acdbf55cb239ce131de5927f67f0ce1e28bc2023e2002d,2024-11-21T09:06:11.183000
|
||||
@ -254760,7 +254763,7 @@ CVE-2024-29244,0,0,10592a85c5d4647480056a5bbd0b67225862ce6c23f623418cd1bca09ea83
|
||||
CVE-2024-2925,0,0,08a688428b1cf91c81dd53f1f81a26bc2648cbdabba0669e09c3c551848cd6da,2025-01-08T18:28:36.057000
|
||||
CVE-2024-2926,0,0,18353582fbf60ea48ced69d4190ccb60f0390ef67dfa3f20a639890b23e716a0,2024-11-21T09:10:51.370000
|
||||
CVE-2024-29269,0,0,59344950251fa21a0e7c78785a2aa3fcb549293d2bf33594b54e6b598043aea6,2024-11-21T09:07:53.570000
|
||||
CVE-2024-2927,0,0,03a7365e8e4d348218dde20ddc39fe906873932323b37259861ce99ea9e8e4b5,2024-11-21T09:10:51.553000
|
||||
CVE-2024-2927,0,1,657ce22cd5ecaec297d48bd8ea785372c7f7e333cd5f7606c6b2e73d32346b72,2025-02-20T18:53:42.533000
|
||||
CVE-2024-29271,0,0,37f926466d04417e896efefe23e469b02c33926c2512f94216987bab3c6b9581,2024-11-21T09:07:53.797000
|
||||
CVE-2024-29272,0,0,2856fc70b0ec5cc9b3179f269199b1b80194795a938f481175966887300de617,2024-11-21T09:07:54.027000
|
||||
CVE-2024-29273,0,0,e88c38979e6a8cb440359a757929c3c3768beb837dec53069b260cb2536d1e3b,2024-11-21T09:07:54.247000
|
||||
@ -254794,7 +254797,7 @@ CVE-2024-2937,0,0,10c97f18fa847858ff544d31a1bbce732f86937b7f371f3c3318a5bd104ab2
|
||||
CVE-2024-29374,0,0,3c9dcb393dadb2eef429924e4ab497db696f80f75e2ea5168ce1784d3940cae1,2024-11-21T09:07:58.040000
|
||||
CVE-2024-29375,0,0,eae7f37c7536d2abe6de97e5c3f25b30f69651dd714d2404d06b4e6ac9373606,2024-11-21T09:07:58.267000
|
||||
CVE-2024-29376,0,0,18e37db27049adb98aa236244a0509330fb220c59ba9007f64ad7afe95b197ae,2024-11-22T15:15:06.440000
|
||||
CVE-2024-2938,0,0,088a0b429cea7c89040ce660e7b711e5f5081c30a305b078ed3d3c59164c5e42,2024-11-21T09:10:53.177000
|
||||
CVE-2024-2938,0,1,7b2acb4a8c3102ebbb7a51612bc2d0e2030ef75d7eed8fdbe4349ac523679a1c,2025-02-20T18:38:08.680000
|
||||
CVE-2024-29384,0,0,37b8aaab42a5fcf67ce4a959be3db82cf960d74412bf273fd4f14e5f574d3f2a,2024-11-21T09:07:58.653000
|
||||
CVE-2024-29385,0,0,379560aa263a88d8a2172d50f1080a233949e14f3a947946f4ae7f79bb2447ff,2024-11-21T09:07:58.880000
|
||||
CVE-2024-29386,0,0,fd0e19b44781b45be87bf3d1b7742f73d7b3002fe0c467975f0bb9cd268f3f22,2024-11-21T09:07:59.103000
|
||||
@ -254808,12 +254811,12 @@ CVE-2024-29400,0,0,b60e49df326991eb27557ce166dcd99358995137b6ae59e95d7fffbbd0b37
|
||||
CVE-2024-29401,0,0,32400f36889e84c9eb29bf3619b3dd286820f63d644126600928028e512d6d8d,2024-11-21T09:08:00.460000
|
||||
CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617b9b,2024-11-21T09:08:00.663000
|
||||
CVE-2024-29404,0,0,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000
|
||||
CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000
|
||||
CVE-2024-2941,0,1,791b6be749f54c80a94b45470542c13f79a740bb4377f7a50b4bf078bcbf68b1,2025-02-20T18:28:58.243000
|
||||
CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000
|
||||
CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000
|
||||
CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000
|
||||
CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000
|
||||
CVE-2024-2942,0,0,c582b913b7e1aa03026ab0af4662fd77534dacff2215aab90e4e0f0fc5a28b07,2024-11-21T09:10:53.753000
|
||||
CVE-2024-2942,0,1,26108ec70f2b46a3e343d5e817ecb446a8d832968925c86c71a2e6e00c547f59,2025-02-20T18:06:40.927000
|
||||
CVE-2024-29421,0,0,beb9c3d391776927bc0509fe96d1996ccda24e4a7b2806b30c432e1112a2c867,2024-11-21T09:08:01.653000
|
||||
CVE-2024-2943,0,0,dca16f8713e0f1bd75fb8d30a5211fbafd09ffd45538f6138cf1e61114441d88,2024-11-21T09:10:53.903000
|
||||
CVE-2024-29432,0,0,ade0c38d544c4d9d932c5077e1bc9211169c5c1f27ec5bc2376eb60f136730e7,2024-11-21T09:08:01.873000
|
||||
@ -260959,7 +260962,7 @@ CVE-2024-37358,0,0,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5
|
||||
CVE-2024-37359,0,0,0164b4be005f853818bcdcce258948ef3b9e1daade18f9e2f8fca5b602fd2996,2025-02-19T23:15:10.330000
|
||||
CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000
|
||||
CVE-2024-37360,0,0,a4091fe21f26d9058b42d48095351e79c48d46ff5ddb54aa2e6a91e3943ae007,2025-02-19T23:15:10.537000
|
||||
CVE-2024-37361,0,1,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000
|
||||
CVE-2024-37361,0,0,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000
|
||||
CVE-2024-37362,0,0,bb8cf118a60dd5876d1853971fb911924b6e1d70593c134cd474c796067a2140,2025-02-20T00:15:19.630000
|
||||
CVE-2024-37363,0,0,82ca42c41eab0f0de2c367f2c6182f5bcfc400fd0a5fa6cd33611ca15fd803e3,2025-02-20T00:15:19.750000
|
||||
CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000
|
||||
@ -267979,6 +267982,7 @@ CVE-2024-46921,0,0,71dee254cc2f309e1467d8fa6e97afa4a8c64f91201f645efed32b11d86fc
|
||||
CVE-2024-46922,0,0,6bdd5d60ca2de902a066d900eb3f1a02f2bc8961d2c788d1e656cf659ba11e92,2025-02-18T18:15:23.653000
|
||||
CVE-2024-46923,0,0,a9a48683084983e354bc1f2a4a7b5f585943d9f414289960054fde2cd8cee181,2025-02-18T18:15:24.083000
|
||||
CVE-2024-4693,0,0,a9c8482c3ea2d347585fc5de3f7febf7c02e48c514bcd2a505cc67d911f0408a,2024-11-21T09:43:23.560000
|
||||
CVE-2024-46933,1,1,57ccc07d56265bc523d2c786977cdba52e4e908b0583314595a03ce4983846f2,2025-02-20T18:15:25.007000
|
||||
CVE-2024-46934,0,0,a6247ccfc7686585f1ad4c13508e51c74923607d7000191b941f9a6c77eca291,2024-09-26T17:41:09.580000
|
||||
CVE-2024-46935,0,0,5cad8a9a95361aabd63f1624134999baecb2a4cd5a3fdbbc89b1eb92fa778d51,2024-09-26T17:39:33.123000
|
||||
CVE-2024-46936,0,0,8b90383cd17b05972139dd51260528d7de429165343a27e0f637b90d1d54a91f,2024-09-26T13:32:02.803000
|
||||
@ -268106,7 +268110,7 @@ CVE-2024-4707,0,0,e65b188ea06841988570af59fea3d47c9f9ac747dd0bff4b49dca436b75799
|
||||
CVE-2024-47070,0,0,f44cb16339f89c133e15084d069c0fb846144ea38144e388a800586a53fe0e83,2024-09-30T12:45:57.823000
|
||||
CVE-2024-47071,0,0,ba349c35770c0b38461f4a8cd0cb017eb80bd299da2b0136e08a2f2a4f3af1d6,2024-10-04T13:51:25.567000
|
||||
CVE-2024-47072,0,0,5396eeb2e43ea0b6080e1687e9e26b1d765ba3b900cbaf26034407d05f09195a,2024-11-08T19:01:03.880000
|
||||
CVE-2024-47073,0,1,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000
|
||||
CVE-2024-47073,0,0,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000
|
||||
CVE-2024-47074,0,0,5945c0ec22658edf552da4d4d0e2c77a971cac91f2ef7f591a767b9f728bed9b,2024-11-12T19:52:38.023000
|
||||
CVE-2024-47075,0,0,a2d6efb1d41afa02c7ea509cf6e92889c9a139c99ce90d9a00872aa72d65ae14,2024-09-30T12:46:20.237000
|
||||
CVE-2024-47076,0,0,66607a2d6fa007363ac6549c2a23f1ab8af8f0bcb4165cd6338f82d994cf0c10,2024-11-21T09:39:23.823000
|
||||
@ -268855,7 +268859,7 @@ CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d4
|
||||
CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000
|
||||
CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000
|
||||
CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000
|
||||
CVE-2024-47908,0,1,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000
|
||||
CVE-2024-47908,0,0,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000
|
||||
CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000
|
||||
CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000
|
||||
CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000
|
||||
@ -268868,7 +268872,7 @@ CVE-2024-47916,0,0,33932b79d79c6af0ee005a6e7fc2e2bb088bcfe0a7b5481ded4f6ce2add3e
|
||||
CVE-2024-47917,0,0,5d5a6f10963abcbe327d324b4c53887826a237fdec53414fa77d2afb0dfeefe3,2024-12-30T10:15:06.067000
|
||||
CVE-2024-47918,0,0,7530f8d68575d125182fd384c344672ae824cc84fb94040d19cfe95a710875da,2024-12-30T10:15:06.223000
|
||||
CVE-2024-47919,0,0,3c343ad94fed5f2ae64fca9e5ca3fc0ac76c601fd581311320da380cae3290f2,2024-12-30T10:15:06.377000
|
||||
CVE-2024-4792,0,0,fa6e5afe18217f009cd2de1100fb67a7f283ef61d98ff61cdde102013614a3ef,2024-11-21T09:43:37.300000
|
||||
CVE-2024-4792,0,1,b274d57acca1d4c65fde4169255e0e2cbec1f6e46d5c18f3d8dae47f042f2868,2025-02-20T18:24:20.357000
|
||||
CVE-2024-47920,0,0,84b8f5e52464f0feb19d316f587baa724342453c3a4ccb060b2f042060571164,2024-12-30T10:15:06.510000
|
||||
CVE-2024-47921,0,0,71c0fd921096ae2d507a35918bc61daeab2b73777d88280d4597f4b89e65ab47,2024-12-30T10:15:06.643000
|
||||
CVE-2024-47922,0,0,0a73ee942d238b1c4a3410a96f82d4af69655244be23fa2bc97c214e1fd00637,2024-12-30T10:15:06.790000
|
||||
@ -268876,11 +268880,11 @@ CVE-2024-47923,0,0,69fc6b278e017fcedb7e46f43c40c2a7575855810ab2798afaa101788f373
|
||||
CVE-2024-47924,0,0,5e9fdcc1d6f6368ecfcd2003d54cc5c9ae067e5e908a91cef46fb2536076e8d3,2024-12-30T10:15:07.090000
|
||||
CVE-2024-47925,0,0,e85657cf2064d6c6e6af79febd3acfb5604d99d861da18ed64400f723839f9de,2024-12-30T10:15:07.233000
|
||||
CVE-2024-47926,0,0,484379ebe866d5f80b8df90be76850be47d4ff1695103f0fb6b101347d861dde,2024-12-30T10:15:07.380000
|
||||
CVE-2024-4793,0,0,a6ca6dc2e5c47daa16d59954e19a82bf00c36bb6db82d6b1c1e23c1f1df319c1,2024-11-21T09:43:37.463000
|
||||
CVE-2024-4793,0,1,71c105dd8a23544d38a6828e9fb69e3f3c6b237924652b6cd022ef685b41711f,2025-02-20T18:23:45.077000
|
||||
CVE-2024-47934,0,0,c5ee21e51979d89f537acbabceb77f32a9e51b9036a475c6fa323918ce911a01,2025-01-08T03:15:08.550000
|
||||
CVE-2024-47935,0,0,dda26a62a7bdc994f9b4a9d9391e631773aed6ff22c30899552af9731fa1f71a,2025-02-17T06:15:13.053000
|
||||
CVE-2024-47939,0,0,56807ff489784cf4fadb2e00da7b797597c1ced2e2c98f8bd3c06e8fe447a672,2024-11-01T12:57:03.417000
|
||||
CVE-2024-4794,0,0,c8bbe767ad72c9235212e11271c46c761e04d6a9b46861dabd15f61ddf88f000,2024-11-21T09:43:37.600000
|
||||
CVE-2024-4794,0,1,d08d4c149975b67912d030422dddd09703cb9e1751aaae9789bc33f4c754cfb1,2025-02-20T18:22:57.657000
|
||||
CVE-2024-47940,0,0,13d7c32b7f73c4e4fb7631fb34c565a5b9a53b3818e0802f4a7c760b1b5809b8,2024-11-13T23:14:54.567000
|
||||
CVE-2024-47941,0,0,e46ed4e38ae9d62f777a8865ae6eefdbc32a15f239d52d25d160960a20de831a,2024-11-13T23:15:09.783000
|
||||
CVE-2024-47942,0,0,099064c27c2b916cca22aafe567708372c6ba9a730970a2887bf6a7a7c842eca,2024-11-13T23:15:21.497000
|
||||
@ -268891,10 +268895,10 @@ CVE-2024-47946,0,0,8eff08d83a0e5f81c0159854fd0287a2f79c269d6589402493189cd9869f0
|
||||
CVE-2024-47947,0,0,f24b791cf36da926e8c9239dfd41faa528b16583cf9b1b9f83aae3c1b70b6a1a,2024-12-12T16:15:16.417000
|
||||
CVE-2024-47948,0,0,517ff2cf40b380f17f0ca0cb700d9beda797d40f6236e57145e952b4be3c000e,2024-10-11T19:56:44.863000
|
||||
CVE-2024-47949,0,0,c7868bf3f997ce1e01baff6d85be7f51aca23f28e73102f98ffda228afc78456,2024-10-11T19:57:06.207000
|
||||
CVE-2024-4795,0,0,874142283439f7d65325bd0714cbf0599f4b631a02f97bcc512f2aca94da1495,2024-11-21T09:43:37.747000
|
||||
CVE-2024-4795,0,1,dd2d486ba609ba014c71e05c2e9b9a1f0df6b4f09397829abf4a2ca66693154c,2025-02-20T18:22:18.310000
|
||||
CVE-2024-47950,0,0,0b353a6b6eb79af020c7980a95c5f964a98e13a84e61e2385f8d2f3761ea8661,2024-10-11T19:57:16.883000
|
||||
CVE-2024-47951,0,0,fa9da431d5a464d9f4e4eb5097d2fbc73ddb9c3ea25da29b847729c36d10632d,2024-10-11T19:57:58.937000
|
||||
CVE-2024-4796,0,0,9fe80a6b316d6ce6a66092be59e4d47fd759d1417eb006688a5ff4cd8243d1e9,2024-11-21T09:43:37.887000
|
||||
CVE-2024-4796,0,1,ceb41063676ba57502406a29370821fecb656631d7f7fe4124aa1223c9480590,2025-02-20T18:21:43.983000
|
||||
CVE-2024-47962,0,0,7b284d3a92b94be931f2eddf9f677773a3e8626787ccc225294ba67314d2b840,2024-10-17T14:37:59.900000
|
||||
CVE-2024-47963,0,0,c1d47e4c90912a69dddce2215d20fc406312f25b6f4d5e4a1283028200326719,2024-10-17T14:37:38.160000
|
||||
CVE-2024-47964,0,0,1ca5abc22fa60a593d5a5c58fc5b1ab3626f0f4e8f5f5210e57c100462c0c79e,2024-10-17T14:37:25.183000
|
||||
@ -268903,7 +268907,7 @@ CVE-2024-47966,0,0,edabeb1f7aeb7f8d00936bad7786e754c58a555de2d30879c269718988a10
|
||||
CVE-2024-47967,0,0,97181f7ea9a6a74768e7203e4cedea30d4dac4b4e08e4adb3b56a5fca9107b45,2024-11-21T09:40:20.430000
|
||||
CVE-2024-47968,0,0,92f4d9082565d49a7d36858256cc5dcc945a5d5167050a34834e7aa3ed3bc781,2024-10-31T13:35:11.047000
|
||||
CVE-2024-47969,0,0,50df27d200744eb6ebefad1e85f9b5d315d093a4f2882287eaaf2a22816b67b5,2024-11-01T15:35:18.530000
|
||||
CVE-2024-4797,0,0,6b1cd638f6d04fb063f470a36fe4df3258deaf0f92b353a15b275b2daa26fe47,2024-11-21T09:43:38.033000
|
||||
CVE-2024-4797,0,1,58c8adf8ba064ab385be3bf057d0161679f7cbfbe471cec4ff7dfba3bff39202,2025-02-20T18:20:28.093000
|
||||
CVE-2024-47971,0,0,76a6ff426f8feb99ced2cb58b38af148514deb9d524fe0d304f2d094be2b7d42,2025-02-10T23:15:14.900000
|
||||
CVE-2024-47972,0,0,13e18a497c1f4803a99c95bb10bb80cbed18788d72842abcf844f7182af14b78,2024-11-06T17:35:35.073000
|
||||
CVE-2024-47973,0,0,4c755251fddad4f39a2e7e0c2967304daa922575998c42fd2fc2365294c3e592,2024-10-10T12:57:21.987000
|
||||
@ -269005,14 +269009,14 @@ CVE-2024-48150,0,0,7e0e8a001062b532c3059fdc4e866d0a1df7baf74eecbf43787dc95e0441e
|
||||
CVE-2024-48153,0,0,8f8abb4c772e2c722ff428fe00187f9b6c882572e02c4e3368b92a462f733b63,2024-10-17T18:35:10.707000
|
||||
CVE-2024-4816,0,0,fef5824bd2dfc2b3cc7b7819e3a058275a15a939e06187fc90b4f9ac47eddd43,2024-11-21T09:43:40.753000
|
||||
CVE-2024-48168,0,0,c8182ce0d3356b936019874b976817ca2e205233549304053f6c152dd63c77c8,2024-10-15T16:35:11.240000
|
||||
CVE-2024-4817,0,0,69b54e13904730a2cb8b3640e98d901bcd198715db2965178e6e36fa08e9e5ee,2024-11-21T09:43:40.890000
|
||||
CVE-2024-4817,0,1,362e43aebff5ee28d84d958b975850127943d4cd09b7a902dbf00fbf2f893eb6,2025-02-20T18:18:32.357000
|
||||
CVE-2024-48170,0,0,34fd20d51f74a2ecf2d8d3a06f0137fb8961ff5f329c5a6acaaa7ddfeee73779,2025-02-18T20:15:19.797000
|
||||
CVE-2024-48176,0,0,361e37561a50782b7c3bb1ddcf565a9526e0808df3a2cfee43b6842d60dab4ca,2024-11-06T18:17:17.287000
|
||||
CVE-2024-48177,0,0,b59cc1c2e42f675a1362418899fda46dd8119ec25122c12b9138beae75e838dd,2024-10-30T17:35:11.637000
|
||||
CVE-2024-48178,0,0,ee85880b14f6d7dc4a557e98498726e030c1ccf5636d6ad1b49925337896afae,2024-10-30T18:35:13.637000
|
||||
CVE-2024-4818,0,0,f3b85377e88831254803419a395ee90c953d4c15d34492e90643001c75c98f7e,2024-11-21T09:43:41.023000
|
||||
CVE-2024-4818,0,1,3b19d81ce8815dae9a3a9471bfe72ca31589d7886430a88e8930cb024af1df62,2025-02-20T18:17:41.877000
|
||||
CVE-2024-48180,0,0,5bf52bf080c52c948152f3a64d4613154e737bb0c20dc350307b8dd087f76967,2024-10-18T12:53:04.627000
|
||||
CVE-2024-4819,0,0,1247dc61bdaa76c8e596582ad21ee4b87d1a8f5d40d3089e857ed45c72c58259,2024-11-21T09:43:41.173000
|
||||
CVE-2024-4819,0,1,ec052c1aa23b9d0a3c096af8b6dfa6395ffbdb8a7fd809062ebaf27467ab1baa,2025-02-20T18:16:52.500000
|
||||
CVE-2024-48191,0,0,56ec2e0a18b5e8325d7def2b6a594f02e85c60e9c19e3ae6cfc636a431a82a33,2024-10-29T14:34:50.257000
|
||||
CVE-2024-48192,0,0,a310388b880b5c2a74a62b31f30e0e2c6d3433813b6a8227dba77259ee50173f,2024-10-18T12:52:33.507000
|
||||
CVE-2024-48195,0,0,3a0243d8ca14eea1c8868c96910904894da328ee0146c36695cb41bdc0787fd6,2024-10-30T18:35:14.433000
|
||||
@ -271840,7 +271844,7 @@ CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f4
|
||||
CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000
|
||||
CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000
|
||||
CVE-2024-52294,0,0,6292d16468fc827dd6fc5e9bde5041230ca83aa97d2fa7a45b6fdf7131f4357f,2024-12-30T17:15:09.467000
|
||||
CVE-2024-52295,0,1,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000
|
||||
CVE-2024-52295,0,0,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000
|
||||
CVE-2024-52296,0,0,b562f18595b8ca53024157f705b18f7c73f8b643fe6d08b20dc5b815792285b0,2024-11-13T17:01:58.603000
|
||||
CVE-2024-52297,0,0,5528a19c9c06652e4abd378b7e62659078889b6d0c1cac57d71cfe9d52fe1e73,2024-11-13T17:01:58.603000
|
||||
CVE-2024-52298,0,0,0e82a2c04d492598179d5deb8d7d99c3d515ec084ea8200a762f2512cbb5ddcf,2024-11-18T17:29:27.170000
|
||||
@ -273645,7 +273649,11 @@ CVE-2024-5494,0,0,01220fe18988d81f50a7497aa6ab19647b6ffe5fd178defdb09fee026bb9cf
|
||||
CVE-2024-5495,0,0,5042268a950e30bd3019e8943c12e21fd198069753506c20c0160553a125c76e,2024-12-26T16:42:57.383000
|
||||
CVE-2024-54951,0,0,1856b28c2c5a142d99515b7fffdcacc1f630ba9c318f4cffa13c747e66dec9a4,2025-02-14T16:15:34.060000
|
||||
CVE-2024-54954,0,0,ea2e7989196e0ca78538061e8245a722c8247faafc7a9c565c651ca357e96580,2025-02-10T18:15:29.663000
|
||||
CVE-2024-54958,1,1,6aefd21a1ce1eefc4b610009933b888ea2941a468b242ea3647f8112e084a691,2025-02-20T18:15:25.187000
|
||||
CVE-2024-54959,1,1,23341c755499a41e921c677f79b9e21a0cb33bf6d220ba3431707bac926a67f4,2025-02-20T18:15:25.317000
|
||||
CVE-2024-5496,0,0,9136fd74dd5c910c46896c769e58528b87587fcd9bbfc0ee678598fdc16fe0a5,2024-12-26T16:43:17.607000
|
||||
CVE-2024-54960,1,1,cba4c300fef202d9ca91804fc0fbd38a7713acb1de2fdd77b89a749c00ea10a5,2025-02-20T18:15:25.457000
|
||||
CVE-2024-54961,1,1,1c1835716c9881646ed84e80d1f8ca1dc3531ce5f62894a3896bb442d552297e,2025-02-20T18:15:25.593000
|
||||
CVE-2024-5497,0,0,3a56eddb971efbd0b60114afefb35325ddcc2425bb5133ac9d5e88b22eba20b7,2024-12-26T16:43:33.383000
|
||||
CVE-2024-5498,0,0,9ecbba4511623233a33c3c81181005b0976c38a133da4d6811e96531fd97f158,2024-12-26T16:43:44.433000
|
||||
CVE-2024-54982,0,0,f9ebf7280811fe14b802aa42d21c7712849d65d0c4fab1838b9c1493b6720970,2025-01-16T21:15:16.320000
|
||||
@ -273760,6 +273768,7 @@ CVE-2024-5545,0,0,b3cc69efdd158ef8f80171ade54c093cb4f6f75ed2a82ff6b2260af3cf25e4
|
||||
CVE-2024-55451,0,0,4eb1042aa51ba5a2799fe7ce59f7c5e8943825e1ba0ec7639498dab2444e41a0,2024-12-17T17:15:09.687000
|
||||
CVE-2024-55452,0,0,681d222c3a1792768b7aa7a338d01a7a3eab54a804f9924046fdaec1682302e7,2024-12-17T15:15:16.287000
|
||||
CVE-2024-55456,0,0,a3d3f2052af70dd917d8e618e90f97fc45b823a73793a50cabf867252a0b02ec,2025-02-18T19:15:19.267000
|
||||
CVE-2024-55457,1,1,c8ba5f039f367cf5d86708520b4f251ee6846d502151072711406410b0204581,2025-02-20T18:15:25.740000
|
||||
CVE-2024-55459,0,0,aaa3d8d0f713f465a68fbf50795e69a87967113e6513b09fe3014c6150fa903c,2025-01-09T15:15:18.963000
|
||||
CVE-2024-5546,0,0,71926433cfbcfec44b5e59c226d53a3ac8f9e554d9dd85d86edfe3dad7bedc17,2024-09-19T14:39:09.437000
|
||||
CVE-2024-55460,0,0,991d1a5efcb4389047ba5c662c88a64eed917ea469cb9d6eef8e55336a792ded,2025-02-19T15:15:14.810000
|
||||
@ -273933,8 +273942,8 @@ CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22
|
||||
CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000
|
||||
CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fabe96,2024-12-27T17:15:08.480000
|
||||
CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000
|
||||
CVE-2024-55952,0,1,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000
|
||||
CVE-2024-55953,0,1,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000
|
||||
CVE-2024-55952,0,0,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000
|
||||
CVE-2024-55953,0,0,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000
|
||||
CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000
|
||||
CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000
|
||||
CVE-2024-55956,0,0,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000
|
||||
@ -274333,7 +274342,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3
|
||||
CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000
|
||||
CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000
|
||||
CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000
|
||||
CVE-2024-56511,0,1,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000
|
||||
CVE-2024-56511,0,0,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000
|
||||
CVE-2024-56512,0,0,599da64766ce0e1c2bd7cfcf30544268a9ad3bb7673ddbfdef2855ca9f183344,2025-02-11T16:10:28.690000
|
||||
CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000
|
||||
CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000
|
||||
@ -274850,7 +274859,7 @@ CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b
|
||||
CVE-2024-5739,0,0,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000
|
||||
CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000
|
||||
CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000
|
||||
CVE-2024-57401,1,1,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000
|
||||
CVE-2024-57401,0,0,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000
|
||||
CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000
|
||||
CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000
|
||||
CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000
|
||||
@ -275023,6 +275032,7 @@ CVE-2024-57703,0,0,d743eff85f5c1f058398ac2e48beaddc31cc085b96c135580c81255c71093
|
||||
CVE-2024-57704,0,0,388d13d725b2d6b848e05df34aea7c5a2dcb3a5641239200e2639502ff2e9d9d,2025-02-03T21:15:14.990000
|
||||
CVE-2024-57707,0,0,256285bb0e4c937fcd8fcd84fe295c9ba07342d1410e4f5a401c2306ce0e91b0,2025-02-10T17:15:18.353000
|
||||
CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000
|
||||
CVE-2024-57716,1,1,bb1c0f3eb3962fcd570e3230e5affadd08b072a40353dc99f590040eea2f1b88,2025-02-20T17:15:11.803000
|
||||
CVE-2024-57719,0,0,9af381064dc4b979246282f21dfbef1d0e1e6baf2733f304b6946b2054a0e999,2025-02-18T20:15:22.603000
|
||||
CVE-2024-5772,0,0,a130ac538e53608257b53eec354d0ff395f00d63a43d268bd6c4f0666ec5359a,2025-01-29T17:46:54.753000
|
||||
CVE-2024-57720,0,0,a92cd4ff4b9ce08012253caea48a1eedf30cd05c41e4bdf4daafaed100b4bd5b,2025-02-18T20:15:22.690000
|
||||
@ -277957,7 +277967,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972
|
||||
CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000
|
||||
CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000
|
||||
CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000
|
||||
CVE-2024-8911,0,1,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000
|
||||
CVE-2024-8911,0,0,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000
|
||||
CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000
|
||||
CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000
|
||||
CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000
|
||||
@ -277986,7 +277996,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3
|
||||
CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000
|
||||
CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000
|
||||
CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000
|
||||
CVE-2024-8943,0,1,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000
|
||||
CVE-2024-8943,0,0,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000
|
||||
CVE-2024-8944,0,0,4d54f1a0baaf503429d63b0c7baf27b829b5af54b4fe40f08a44318e73509207,2024-09-23T16:56:34.637000
|
||||
CVE-2024-8945,0,0,49fe08fa5001a52fcc4b693eea0010b97a8789b0d8d21b7f4e3e0328bdefe156,2024-09-25T19:24:25.167000
|
||||
CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d94a,2024-09-24T13:11:17.417000
|
||||
@ -278907,7 +278917,7 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0
|
||||
CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000
|
||||
CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000
|
||||
CVE-2025-0158,0,0,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000
|
||||
CVE-2025-0161,1,1,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000
|
||||
CVE-2025-0161,0,0,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000
|
||||
CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000
|
||||
CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000
|
||||
CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000
|
||||
@ -279488,8 +279498,8 @@ CVE-2025-1172,0,0,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063
|
||||
CVE-2025-1173,0,0,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000
|
||||
CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000
|
||||
CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000
|
||||
CVE-2025-1176,0,1,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000
|
||||
CVE-2025-1177,0,1,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000
|
||||
CVE-2025-1176,0,0,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000
|
||||
CVE-2025-1177,0,0,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000
|
||||
CVE-2025-1178,0,0,6e9bc15abee46095fa45b59249884a86b08db54b5b6bfb3dfcc9175f57316032,2025-02-11T16:15:50.410000
|
||||
CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112f5,2025-02-11T07:15:30.230000
|
||||
CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000
|
||||
@ -279501,7 +279511,7 @@ CVE-2025-1185,0,0,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe6
|
||||
CVE-2025-1186,0,0,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000
|
||||
CVE-2025-1187,0,0,4d377fdf42828c943e4e7e7e9bc0ee6d4b95eda485220a10fe3d04dafc88feff,2025-02-18T21:28:37.800000
|
||||
CVE-2025-1188,0,0,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000
|
||||
CVE-2025-1189,0,1,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000
|
||||
CVE-2025-1189,0,0,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000
|
||||
CVE-2025-1190,0,0,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000
|
||||
CVE-2025-1191,0,0,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000
|
||||
CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc37a,2025-02-18T17:52:35.107000
|
||||
@ -279540,6 +279550,7 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa
|
||||
CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000
|
||||
CVE-2025-1244,0,0,4873e23ffda0d795b5208f2bbb0bbb9ab8821cf32651b326d7afc0c6c00e584c,2025-02-19T19:15:15.437000
|
||||
CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000
|
||||
CVE-2025-1258,1,1,e60d49e74992453b0cd2d8b93f0bc7a60901e2447adb1d6d0cde7627e3bb44f5,2025-02-20T18:15:26.217000
|
||||
CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000
|
||||
CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000
|
||||
CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000
|
||||
@ -279605,7 +279616,7 @@ CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19
|
||||
CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000
|
||||
CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000
|
||||
CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000
|
||||
CVE-2025-20059,1,1,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000
|
||||
CVE-2025-20059,0,0,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000
|
||||
CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000
|
||||
CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000
|
||||
CVE-2025-20075,0,0,b30b32e2f08da502fea0698f2946161a425eb310144fa5e17bbcbe0fe4f71804,2025-02-18T00:15:21.107000
|
||||
@ -280274,7 +280285,7 @@ CVE-2025-22402,0,0,3d05349369555f44f15217004f13f07d59bb4bf46759f4c867640d0bca502
|
||||
CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000
|
||||
CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000
|
||||
CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000
|
||||
CVE-2025-22467,0,1,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22467,0,0,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000
|
||||
CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000
|
||||
CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000
|
||||
CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000
|
||||
@ -281133,8 +281144,8 @@ CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb
|
||||
CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000
|
||||
CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000
|
||||
CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000
|
||||
CVE-2025-24011,0,1,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000
|
||||
CVE-2025-24012,0,1,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000
|
||||
CVE-2025-24011,0,0,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000
|
||||
CVE-2025-24012,0,0,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000
|
||||
CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000
|
||||
CVE-2025-24014,0,0,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000
|
||||
CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000
|
||||
@ -281572,7 +281583,7 @@ CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34b
|
||||
CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000
|
||||
CVE-2025-24894,0,0,719537e2b65db00c391760a0cd638c15406668ed57b32d2a279ec49cb0e3adaa,2025-02-18T19:15:28.090000
|
||||
CVE-2025-24895,0,0,b00a9ba498d0a292ef1f9fa7a927fff9b8cfa424cc9586cb281d28faa6ce8d74,2025-02-18T19:15:28.240000
|
||||
CVE-2025-24896,0,1,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000
|
||||
CVE-2025-24896,0,0,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000
|
||||
CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000
|
||||
CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000
|
||||
CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b344,2025-02-03T21:15:15.703000
|
||||
@ -281768,13 +281779,15 @@ CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30ca
|
||||
CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000
|
||||
CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000
|
||||
CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000
|
||||
CVE-2025-25901,0,1,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
|
||||
CVE-2025-25942,0,1,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000
|
||||
CVE-2025-25943,0,1,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000
|
||||
CVE-2025-25944,0,1,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000
|
||||
CVE-2025-25945,0,1,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000
|
||||
CVE-2025-25946,0,1,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000
|
||||
CVE-2025-25947,0,1,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000
|
||||
CVE-2025-25901,0,0,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000
|
||||
CVE-2025-25942,0,0,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000
|
||||
CVE-2025-25943,0,0,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000
|
||||
CVE-2025-25944,0,0,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000
|
||||
CVE-2025-25945,0,0,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000
|
||||
CVE-2025-25946,0,0,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000
|
||||
CVE-2025-25947,0,0,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000
|
||||
CVE-2025-25968,1,1,711195bae1cb33836f8040e138c018d1d5c96de564aef9a9814105c5940f5c3f,2025-02-20T18:15:26.570000
|
||||
CVE-2025-25973,1,1,59faf3ab50d50be92a7a5a4d603b0614ab61d75477967f0e0e911734e157c5d1,2025-02-20T18:15:26.713000
|
||||
CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000
|
||||
CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000
|
||||
CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000
|
||||
@ -281786,6 +281799,14 @@ CVE-2025-26058,0,0,d6830ee74802882f622367eb3e014df2c057afc37826d4d9d4aaa490f6e8c
|
||||
CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000
|
||||
CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000
|
||||
CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000
|
||||
CVE-2025-26304,1,1,4aba16d7a61da7bc2842eb12b4bf3c9c6246498e6a8b53b4a819b512fc92d4ae,2025-02-20T17:15:12.260000
|
||||
CVE-2025-26305,1,1,3dc5b1438bcbf16d99e86f03c2d33af491ec29c798bc0acfd78d8d014fc73cc0,2025-02-20T17:15:12.377000
|
||||
CVE-2025-26306,1,1,ad0323aa5286b06e3a2496c2f503724f28b4742676b125b1f5a4176f3e7db0fb,2025-02-20T17:15:12.490000
|
||||
CVE-2025-26307,1,1,ceb0357c37b88e34244c9f55d7082302d7c6688f50d8028aba18cb4b4966953c,2025-02-20T17:15:12.607000
|
||||
CVE-2025-26308,1,1,3e072877f412939a3c50a2422a54d75c10bdf23be48f05068cfdfbe70a89a12d,2025-02-20T17:15:12.730000
|
||||
CVE-2025-26309,1,1,d91dfb16f99b8b177a88ed69fb910d1699945bbbc6ceb6223bd02a4bc745f70c,2025-02-20T17:15:12.853000
|
||||
CVE-2025-26310,1,1,29f1fcba38b2588cfaea820a424c57e92680a0eca4091920c8fd5bfcf8d6fd62,2025-02-20T17:15:12.967000
|
||||
CVE-2025-26311,1,1,d2e3f842457159c725513ec11a1987e09e62cac50eca91e4348430aa6d4c7bdd,2025-02-20T17:15:13.087000
|
||||
CVE-2025-26339,0,0,7ef9dcda2637eaa8381f0c62a213393a7c2029d066112e960db3e0a470c75e63,2025-02-12T14:15:33.510000
|
||||
CVE-2025-26340,0,0,ed188c0516bc2765f5549bbb8984d07bbadbda89d48c5e1878285cb21ac606ac,2025-02-12T14:15:33.650000
|
||||
CVE-2025-26341,0,0,6ceabd274660df5a6e17e97d397989a301331c2fd9cb0d9b6d2622b35273a528,2025-02-12T14:15:33.857000
|
||||
@ -281916,6 +281937,7 @@ CVE-2025-27013,0,0,f948cc3f5edcc63c02fbe1aa3ab5587f3b1659a21b1a5f943b19bb040cbb2
|
||||
CVE-2025-27016,0,0,04fa07ed62d9b49f3b31ebda2ac8455c38c6351226a3cae9904a3c1abe91e83f,2025-02-18T20:15:34.013000
|
||||
CVE-2025-27089,0,0,e1cd39d7d2d496ca126251592ce334845a8dbaa95837461791aefc38c5c96ee4,2025-02-19T17:15:15.800000
|
||||
CVE-2025-27090,0,0,1f7a1f68f44411e4af49caeac1dba85d17f51b5d72f982d15d3cbe07a63e4481,2025-02-19T22:15:24.247000
|
||||
CVE-2025-27091,1,1,1f31f1738107c079abfb76423f421b24481f1590b449faf518c191e3377a5c93,2025-02-20T18:15:26.850000
|
||||
CVE-2025-27092,0,0,a2d77f19ec65de3c929cda30f22d3993a6f6513f45b321406307690349bba5d0,2025-02-19T23:15:15.957000
|
||||
CVE-2025-27113,0,0,5361e7323e42f3b09824985b5c3b788849d795bb02cd5dec29aec9ac11d6b7a1,2025-02-18T23:15:10.960000
|
||||
CVE-2025-27218,0,0,40b16171d941ca5d442e2983417f31e8c5c3dec3980d6c4e3b1b2213673eeb44,2025-02-20T05:15:15.270000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user