Auto-Update: 2025-01-17T19:00:28.406135+00:00

This commit is contained in:
cad-safe-bot 2025-01-17 19:03:55 +00:00
parent f9e22ab11a
commit d898b7c05c
87 changed files with 4577 additions and 723 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2022-45876",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-26T22:15:08.737",
"lastModified": "2024-11-21T07:29:53.063",
"lastModified": "2025-01-17T18:15:18.117",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-0432",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-31T16:15:07.390",
"lastModified": "2024-11-21T07:37:10.143",
"lastModified": "2025-01-17T18:15:19.433",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-22300",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-27T20:15:09.343",
"lastModified": "2024-11-21T07:44:29.050",
"lastModified": "2025-01-17T18:15:19.947",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25911",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-06-11T14:15:09.923",
"lastModified": "2024-11-21T07:50:24.840",
"vulnStatus": "Modified",
"lastModified": "2025-01-17T17:55:14.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -38,19 +38,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
@ -110,19 +110,31 @@
"references": [
{
"url": "https://csirt.divd.nl/CVE-2023-25911/",
"source": "csirt@divd.nl"
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
"source": "csirt@divd.nl"
"source": "csirt@divd.nl",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://csirt.divd.nl/DIVD-2023-00021",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://divd.nl/cves/CVE-2023-25911",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25914",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-08-21T21:15:08.970",
"lastModified": "2024-11-21T07:50:25.230",
"vulnStatus": "Modified",
"lastModified": "2025-01-17T17:54:40.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,20 +42,20 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-25915",
"sourceIdentifier": "csirt@divd.nl",
"published": "2023-08-21T21:15:09.170",
"lastModified": "2024-11-21T07:50:25.357",
"vulnStatus": "Modified",
"lastModified": "2025-01-17T17:54:52.697",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -42,19 +42,19 @@
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27304",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.397",
"lastModified": "2024-11-21T07:52:36.693",
"lastModified": "2025-01-17T18:15:20.303",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27384",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2023-05-23T02:15:09.437",
"lastModified": "2024-11-21T07:52:47.937",
"lastModified": "2025-01-17T18:15:20.547",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -45,6 +45,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-27927",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-27T20:15:09.577",
"lastModified": "2024-11-21T07:53:42.827",
"lastModified": "2025-01-17T18:15:21.080",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28384",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-27T23:15:14.867",
"lastModified": "2024-11-21T07:54:57.990",
"lastModified": "2025-01-17T17:15:07.697",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28400",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-27T23:15:14.917",
"lastModified": "2024-11-21T07:54:59.713",
"lastModified": "2025-01-17T17:15:08.363",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28650",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-27T20:15:09.633",
"lastModified": "2024-11-21T07:55:44.473",
"lastModified": "2025-01-17T18:15:21.340",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28652",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-27T20:15:09.693",
"lastModified": "2024-11-21T07:55:44.680",
"lastModified": "2025-01-17T18:15:21.607",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28655",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-03-27T20:15:09.757",
"lastModified": "2024-11-21T07:55:45.003",
"lastModified": "2025-01-17T18:15:21.850",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-28716",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-27T23:15:14.963",
"lastModified": "2024-11-21T07:55:51.953",
"lastModified": "2025-01-17T17:15:08.537",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29150",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-27T23:15:15.007",
"lastModified": "2024-11-21T07:56:37.140",
"lastModified": "2025-01-17T18:15:22.093",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-29169",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2023-04-27T23:15:15.050",
"lastModified": "2024-11-21T07:56:39.137",
"lastModified": "2025-01-17T18:15:22.337",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31763",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-24T00:15:09.583",
"lastModified": "2024-11-21T08:02:15.463",
"lastModified": "2025-01-17T18:15:22.763",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.6,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-294"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-294"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31814",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.087",
"lastModified": "2024-11-21T08:02:17.297",
"lastModified": "2025-01-17T18:15:23.030",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "NVD-CWE-Other"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-706"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31826",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.127",
"lastModified": "2024-11-21T08:02:18.720",
"lastModified": "2025-01-17T18:15:24.380",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-862"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31860",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T20:15:10.040",
"lastModified": "2024-11-21T08:02:20.550",
"lastModified": "2025-01-17T17:15:08.863",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
@ -80,6 +110,14 @@
"Exploit",
"Issue Tracking"
]
},
{
"url": "https://github.com/wuzhicms/b2b/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31994",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.170",
"lastModified": "2024-11-21T08:02:28.753",
"lastModified": "2025-01-17T17:15:09.097",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31995",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.207",
"lastModified": "2024-11-21T08:02:29.403",
"lastModified": "2025-01-17T17:15:09.840",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-79"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [

View File

@ -2,7 +2,7 @@
"id": "CVE-2023-31996",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-05-23T01:15:10.247",
"lastModified": "2024-11-21T08:02:29.653",
"lastModified": "2025-01-17T17:15:10.213",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -32,6 +32,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -45,6 +65,16 @@
"value": "CWE-77"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"configurations": [

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-45590",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-04-09T15:15:27.627",
"lastModified": "2024-11-21T08:27:01.027",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:08:31.843",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,54 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*",
"versionStartIncluding": "7.0.6",
"versionEndExcluding": "7.0.11",
"matchCriteriaId": "0A39CBD1-AAF7-4423-AA29-840CF0DBFD6E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*",
"matchCriteriaId": "14320E4A-2445-4930-A8D1-B768B7294B36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*",
"matchCriteriaId": "56EE5E2F-CB22-4294-9AA9-DDB344494D9B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*",
"matchCriteriaId": "88271718-0DD4-4717-B403-1B44E2E56C91"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-087",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://fortiguard.com/psirt/FG-IR-23-087",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-47542",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-04-09T15:15:28.207",
"lastModified": "2024-11-21T08:30:25.520",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:11:28.947",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,65 @@
"value": "CWE-1336"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.0.0",
"versionEndExcluding": "7.0.11",
"matchCriteriaId": "5B1EF673-5967-401E-98E3-B7A2B1BEF037"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.5",
"matchCriteriaId": "4763E504-6974-42C5-B912-3E62A9CC312A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-419",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://fortiguard.com/psirt/FG-IR-23-419",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-48784",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2024-04-09T15:15:28.617",
"lastModified": "2024-11-21T08:32:26.347",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:19:51.033",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -51,14 +71,53 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "6.4.0",
"versionEndExcluding": "7.0.16",
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.2.0",
"versionEndExcluding": "7.2.8",
"matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
"versionStartIncluding": "7.4.0",
"versionEndExcluding": "7.4.2",
"matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0"
}
]
}
]
}
],
"references": [
{
"url": "https://fortiguard.com/psirt/FG-IR-23-413",
"source": "psirt@fortinet.com"
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://fortiguard.com/psirt/FG-IR-23-413",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52547",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:08.930",
"lastModified": "2024-11-21T08:40:01.370",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:32:12.300",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,61 @@
"value": "CWE-130"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52548",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:09.753",
"lastModified": "2024-11-21T08:40:01.510",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:31:57.740",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,24 +69,75 @@
"value": "CWE-119"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52710",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:10.100",
"lastModified": "2024-11-21T08:40:24.760",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:32:39.963",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,61 @@
"value": "CWE-754"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-754"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*",
"matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52711",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:10.490",
"lastModified": "2024-11-21T08:40:24.883",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:29:39.560",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,61 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-401"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:curiem-wfg9b_bios_2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "8EEA4852-6B9E-4FC0-A789-763EC2FCE6D4"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-52712",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-05-28T07:15:10.810",
"lastModified": "2024-11-21T08:40:24.993",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:29:32.770",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,61 @@
"value": "CWE-284"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*",
"matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
}
]
}
]
}
],
"references": [
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-0837",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T08:15:07.570",
"lastModified": "2024-11-21T08:47:28.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:47:27.833",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:pro:wordpress:*:*",
"versionEndExcluding": "5.3.3",
"matchCriteriaId": "4227C0A1-E9E8-4E69-8347-C5E20CB8F44A"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,63 +2,15 @@
"id": "CVE-2024-12022",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-07T04:15:07.677",
"lastModified": "2025-01-07T04:15:07.677",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:15:10.533",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WP Menu Image plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wmi_delete_img_menu' function in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to delete images from menus."
},
{
"lang": "es",
"value": "El complemento WP Menu Image para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wmi_delete_img_menu' en todas las versiones hasta la 2.2 incluida. Esto hace posible que atacantes no autenticados eliminen im\u00e1genes de los men\u00fas."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-52485. Reason: This candidate is a reservation duplicate of CVE-2024-52485. Notes: All CVE users should reference CVE-2024-52485 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/wp-menu-image/trunk/init/wmi-functions.php#L126",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96193c0-ddde-463b-a68e-672ab6f812c7?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,63 +2,15 @@
"id": "CVE-2024-12124",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-07T05:15:14.340",
"lastModified": "2025-01-07T05:15:14.340",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:15:10.653",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Role Includer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018user_id\u2019 parameter in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Role Includer para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'user_id' en todas las versiones hasta la 1.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54290. Reason: This candidate is a reservation duplicate of CVE-2024-54290. Notes: All CVE users should reference CVE-2024-54290 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/role-includer/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97b3399b-cda2-4ab1-8919-b1e4ba4a5dcf?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,63 +2,15 @@
"id": "CVE-2024-12208",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-07T05:15:16.270",
"lastModified": "2025-01-07T05:15:16.270",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:15:10.740",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Backup and Restore WordPress \u2013 Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.50. This is due to missing or incorrect nonce validation on the ajax_queue_manual_backup() function. This makes it possible for unauthenticated attackers to trigger backups via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento Backup and Restore WordPress \u2013 Backup Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.50 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n ajax_queue_manual_backup(). Esto hace posible que atacantes no autenticados activen copias de seguridad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-43269. Reason: This candidate is a reservation duplicate of CVE-2024-43269. Notes: All CVE users should reference CVE-2024-43269 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://wordpress.org/plugins/wp-backitup/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e461a04b-6456-4930-b3e7-0f808825aa6b?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -2,67 +2,15 @@
"id": "CVE-2024-12540",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-07T04:15:08.917",
"lastModified": "2025-01-07T04:15:08.917",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:15:10.807",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The LDD Directory Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
},
{
"lang": "es",
"value": "El complemento LDD Directory Lite para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 3.3 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54288. Reason: This candidate is a reservation duplicate of CVE-2024-54288. Notes: All CVE users should reference CVE-2024-54288 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/ldd-directory-lite/trunk/templates/frontend/edit-submit.php#L10",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/ldd-directory-lite/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7675e1c-7194-4cfe-81fb-a78d75e0bb1e?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-12757",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T18:15:24.690",
"lastModified": "2025-01-17T18:15:24.690",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Nedap Librix Ecoreader \n is missing authentication for critical functions that could allow an \nunauthenticated attacker to potentially execute malicious code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "HIGH",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-02",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1239",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-16T03:15:06.900",
"lastModified": "2024-11-21T08:50:08.180",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:34:30.327",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "3.0.5",
"matchCriteriaId": "C55F4AA4-9021-48D1-81C5-8D5CD6E11DCD"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1315",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:16.340",
"lastModified": "2024-11-21T08:50:18.373",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:30:38.363",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,30 +39,78 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*",
"versionEndExcluding": "3.0.5",
"matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1352",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:16.517",
"lastModified": "2024-11-21T08:50:23.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:23:55.973",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*",
"versionEndExcluding": "3.0.5",
"matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1428",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-06T08:15:07.767",
"lastModified": "2024-11-21T08:50:33.803",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:48:58.150",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
"versionEndExcluding": "5.5.4",
"matchCriteriaId": "CEA2F449-CCE8-405D-BA65-FB96CEB9AC61"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1458",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:17.203",
"lastModified": "2024-11-21T08:50:37.560",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:25:27.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.3.5",
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1461",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:17.377",
"lastModified": "2024-11-21T08:50:38.083",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:24:39.060",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.3.5",
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1464",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:17.703",
"lastModified": "2024-11-21T08:50:38.453",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:23:39.073",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.3.5",
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1465",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:17.890",
"lastModified": "2024-11-21T08:50:38.583",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:20:39.593",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.3.5",
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1466",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-04-09T19:15:18.073",
"lastModified": "2024-11-21T08:50:38.723",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:18:00.443",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,25 +36,87 @@
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "8.3.5",
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-2091",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-03-28T03:15:07.887",
"lastModified": "2024-11-21T09:09:01.480",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:35:09.950",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,33 +36,101 @@
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.13.3",
"matchCriteriaId": "550B7CCC-BC3D-4B33-9643-E16C71BABE67"
}
]
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve",
"source": "security@wordfence.com"
"source": "security@wordfence.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-23124",
"sourceIdentifier": "psirt@autodesk.com",
"published": "2024-02-22T03:15:08.027",
"lastModified": "2024-11-21T08:56:59.373",
"lastModified": "2025-01-17T18:15:25.030",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
"value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
},
{
"lang": "es",
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@autodesk.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-26153",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:10.927",
"lastModified": "2025-01-17T17:15:10.927",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 \nare vulnerable to cross-site request forgery (CSRF). An external \nattacker with no access to the device can force the end user into \nsubmitting a \"setconf\" method request, not requiring any CSRF token, \nwhich can lead into denial of service on the device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-26154",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.147",
"lastModified": "2025-01-17T17:15:11.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting in the appliance site \nname. The ETIC RAS web server saves the site name and then presents it \nto the administrators in a few different pages."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-26155",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.327",
"lastModified": "2025-01-17T17:15:11.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "HIGH",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-26156",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.533",
"lastModified": "2025-01-17T17:15:11.533",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.7,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-26157",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.697",
"lastModified": "2025-01-17T17:15:11.697",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in get \nview method under view parameter. The ETIC RAS web server uses dynamic \npages that get their input from the client side and reflect the input in\n their response to the client."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "LOW",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3315",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T21:15:17.430",
"lastModified": "2024-11-21T09:29:22.670",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:13:08.297",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,81 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminininin/blob/blob/main/README.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259386",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259386",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.309575",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/adminininin/blob/blob/main/README.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259386",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259386",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.309575",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3316",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-04T22:15:09.420",
"lastModified": "2024-11-21T09:29:22.837",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T18:05:50.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -76,38 +96,81 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/adminininin/blob/blob/main/2.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259387",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259387",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.309584",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/adminininin/blob/blob/main/2.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259387",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259387",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?submit.309584",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3376",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T12:15:08.603",
"lastModified": "2024-11-21T09:29:29.570",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:41:21.647",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -74,40 +94,93 @@
"value": "CWE-698"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-670"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259497",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259497",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.311154",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259497",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259497",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.311154",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3377",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-06T12:15:08.857",
"lastModified": "2024-11-21T09:29:29.710",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:35:40.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,38 +96,79 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.259498",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259498",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.311155",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
},
{
"url": "https://vuldb.com/?ctiid.259498",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259498",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.311155",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3427",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-04-07T17:15:09.630",
"lastModified": "2024-11-21T09:29:34.933",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:02:59.153",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -76,38 +96,85 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A5C774C8-8C38-4E34-B5D3-74872B5F672A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259599",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259599",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.311606",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.259599",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.259599",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.311606",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-45832",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:11.870",
"lastModified": "2025-01-17T17:15:11.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hard-coded credentials were included as part of the application binary. \nThese credentials served as part of the application authentication flow \nand communication with the mobile application. An attacker could access \nunauthorized information."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "LOW",
"subsequentSystemIntegrity": "HIGH",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48125",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T21:15:13.477",
"lastModified": "2025-01-15T21:15:13.477",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:25.547",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests."
},
{
"lang": "es",
"value": "Un problema en el servicio AsDB de HI-SCAN 6040i Hitrax HX-03-19-I permite a los atacantes enumerar las credenciales de los usuarios a trav\u00e9s de solicitudes de protocolo GIOP manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-48126",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T21:15:13.613",
"lastModified": "2025-01-15T21:15:13.613",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:25.800",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que HI-SCAN 6040i Hitrax HX-03-19-I conten\u00eda credenciales codificadas para acceder al soporte del proveedor y al servicio."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50633",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T18:15:24.337",
"lastModified": "2025-01-16T18:15:24.337",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:26.043",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Broken Object Level Authorization (BOLA) vulnerability in Indico v3.2.9 allows attackers to access sensitive information via sending a crafted POST request to the component /api/principals."
},
{
"lang": "es",
"value": " Una vulnerabilidad de autorizaci\u00f3n a nivel de objeto roto (BOLA) en Indico v3.2.9 permite a los atacantes acceder a informaci\u00f3n confidencial mediante el env\u00edo de una solicitud POST manipulada al componente /api/principals."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/cetinpy/CVE-2024-50633",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-50954",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-15T17:15:16.517",
"lastModified": "2025-01-15T17:15:16.517",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:26.310",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The XINJE XL5E-16T and XD5E-24R-E programmable logic controllers V3.5.3b-V3.7.2a have a vulnerability in handling Modbus messages. When a TCP connection is established with the above series of controllers within a local area network (LAN), sending a specific Modbus message to the controller can cause the PLC to crash, interrupting the normal operation of the programs running in the PLC. This results in the ERR indicator light turning on and the RUN indicator light turning off."
},
{
"lang": "es",
"value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en el manejo de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XL5E-16T%20XD5E-24R%20Modbus/XINJE%20XL5E-16T%20XD5E-24R%20Modbus.md",

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-53683",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:12.053",
"lastModified": "2025-01-17T17:15:12.053",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A valid set of credentials in a .js file and a static token for \ncommunication were obtained from the decompiled IPA. An attacker could \nuse the information to disrupt normal use of the application by changing\n the translation files and thus weaken the integrity of normal use."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "HIGH",
"vulnerableSystemAvailability": "NONE",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-497"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54101",
"sourceIdentifier": "psirt@huawei.com",
"published": "2024-12-12T12:15:23.763",
"lastModified": "2024-12-12T12:15:23.763",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-17T18:09:53.447",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
@ -49,12 +69,82 @@
"value": "CWE-20"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
}
]
}
]
}
],
"references": [
{
"url": "https://consumer.huawei.com/en/support/bulletin/2024/12/",
"source": "psirt@huawei.com"
"source": "psirt@huawei.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-54535",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-01-15T20:15:28.610",
"lastModified": "2025-01-16T20:36:12.483",
"vulnStatus": "Analyzed",
"lastModified": "2025-01-17T18:15:26.610",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 4.0,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.5,
"impactScore": 1.4
}
]
},

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2024-54681",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T17:15:12.227",
"lastModified": "2025-01-17T17:15:12.227",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple bash files were present in the application's private directory.\n Bash files can be used on their own, by an attacker that has already \nfull access to the mobile platform to compromise the translations for \nthe application."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "ACTIVE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-77"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57162",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T16:15:33.063",
"lastModified": "2025-01-16T16:15:33.063",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:27.240",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php."
},
{
"lang": "es",
"value": "Campcodes Cybercafe Management System v1.0 es vulnerable a una inyecci\u00f3n SQL en /ccms/view-user-detail.php."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57577",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:16.740",
"lastModified": "2025-01-16T21:15:16.740",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:27.893",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro speed_dir en la funci\u00f3n formSetSpeedWan."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/blob/main/4/Readme.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57578",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:16.893",
"lastModified": "2025-01-16T21:15:16.893",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:28.430",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro funcpara1 en la funci\u00f3n formSetCfm."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/blob/main/5/Readme.md",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57579",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:17.057",
"lastModified": "2025-01-16T21:15:17.057",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:28.983",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the limitSpeedUp parameter in the formSetClientState function."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro limitSpeedUp en la funci\u00f3n formSetClientState."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/tree/main/6",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57580",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:17.223",
"lastModified": "2025-01-16T21:15:17.223",
"vulnStatus": "Received",
"lastModified": "2025-01-17T17:15:12.410",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function."
},
{
"lang": "es",
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro devName en la funci\u00f3n formSetDeviceName."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/tree/main/7",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57581",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:17.437",
"lastModified": "2025-01-16T21:15:17.437",
"vulnStatus": "Received",
"lastModified": "2025-01-17T17:15:12.597",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro firewallEn en la funci\u00f3n formSetFirewallCfg."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/tree/main/8",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57582",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T21:15:17.627",
"lastModified": "2025-01-16T21:15:17.627",
"vulnStatus": "Received",
"lastModified": "2025-01-17T17:15:12.797",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the startIP parameter in the formSetPPTPServer function."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro startIP en la funci\u00f3n formSetPPTPServer."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/qijiale/Tenda/tree/main/9",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57615",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:09.833",
"lastModified": "2025-01-14T01:15:09.833",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:29.320",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the BATcalcbetween_intern component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
},
{
"lang": "es",
"value": " Un problema en el componente BATcalcbetween_intern de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MonetDB/MonetDB/issues/7413",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57616",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:09.947",
"lastModified": "2025-01-14T01:15:09.947",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:29.573",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the vscanf component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
},
{
"lang": "es",
"value": " Un problema en el componente vscanf de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MonetDB/MonetDB/issues/7412",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57617",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:10.060",
"lastModified": "2025-01-14T01:15:10.060",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:29.803",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the dameraulevenshtein component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
},
{
"lang": "es",
"value": " Un problema en el componente dameraulevenshtein de MonetDB Server v11.49.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/MonetDB/MonetDB/issues/7432",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57642",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-14T01:15:12.873",
"lastModified": "2025-01-14T01:15:12.873",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:30.030",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in the dfe_inx_op_col_def_table component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
},
{
"lang": "es",
"value": " Un problema en el componente dfe_inx_op_col_def_table de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/openlink/virtuoso-opensource/issues/1191",

View File

@ -2,16 +2,55 @@
"id": "CVE-2024-57768",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T18:15:26.003",
"lastModified": "2025-01-16T18:15:26.003",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:30.633",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key."
},
{
"lang": "es",
"value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente validRoleKey?sysRole.key."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUMT",

View File

@ -2,71 +2,15 @@
"id": "CVE-2024-9673",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-01-08T07:15:27.980",
"lastModified": "2025-01-08T07:15:27.980",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-01-17T17:15:12.997",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
"value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de encabezado del complemento en todas las versiones hasta la 2.4.31 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22333. Reason: This candidate is a reservation duplicate of CVE-2025-22333. Notes: All CVE users should reference CVE-2025-22333 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/assets/js/extension-pafe-tooltip.js",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3217875/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/piotnet-addons-for-elementor/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/317a0e93-fcd7-41a0-a83e-98c50bfc6be2?source=cve",
"source": "security@wordfence.com"
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,100 @@
{
"id": "CVE-2025-0430",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2025-01-17T18:15:30.920",
"lastModified": "2025-01-17T18:15:30.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Belledonne Communications Linphone-Desktop \n is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "NONE",
"vulnerableSystemIntegrity": "NONE",
"vulnerableSystemAvailability": "HIGH",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04",
"source": "ics-cert@hq.dhs.gov"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-0532",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T18:15:31.237",
"lastModified": "2025-01-17T18:15:31.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/new_submit.php. The manipulation of the argument m_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/TIANN0/CVE/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.292416",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.292416",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.479100",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-0533",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-01-17T18:15:31.577",
"lastModified": "2025-01-17T18:15:31.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnerableSystemConfidentiality": "LOW",
"vulnerableSystemIntegrity": "LOW",
"vulnerableSystemAvailability": "LOW",
"subsequentSystemConfidentiality": "NONE",
"subsequentSystemIntegrity": "NONE",
"subsequentSystemAvailability": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirements": "NOT_DEFINED",
"integrityRequirements": "NOT_DEFINED",
"availabilityRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
"safety": "NOT_DEFINED",
"automatable": "NOT_DEFINED",
"recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://1000projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/onupset/CVE/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.292417",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.292417",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.479119",
"source": "cna@vuldb.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-22904",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-01-16T03:15:06.313",
"lastModified": "2025-01-16T03:15:06.313",
"vulnStatus": "Received",
"lastModified": "2025-01-17T18:15:31.870",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
@ -15,7 +15,42 @@
"value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptpUserName en la funci\u00f3n setWAN."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "http://re11s.com",

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-17T17:00:37.582012+00:00
2025-01-17T19:00:28.406135+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-17T16:56:52.770000+00:00
2025-01-17T18:35:09.950000+00:00
```
### Last Data Feed Release
@ -33,49 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
277958
277970
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `12`
- [CVE-2024-50967](CVE-2024/CVE-2024-509xx/CVE-2024-50967.json) (`2025-01-17T15:15:12.313`)
- [CVE-2025-0528](CVE-2025/CVE-2025-05xx/CVE-2025-0528.json) (`2025-01-17T15:15:12.430`)
- [CVE-2025-0529](CVE-2025/CVE-2025-05xx/CVE-2025-0529.json) (`2025-01-17T15:15:12.670`)
- [CVE-2025-0530](CVE-2025/CVE-2025-05xx/CVE-2025-0530.json) (`2025-01-17T16:15:33.937`)
- [CVE-2025-0531](CVE-2025/CVE-2025-05xx/CVE-2025-0531.json) (`2025-01-17T16:15:34.250`)
- [CVE-2024-12757](CVE-2024/CVE-2024-127xx/CVE-2024-12757.json) (`2025-01-17T18:15:24.690`)
- [CVE-2024-26153](CVE-2024/CVE-2024-261xx/CVE-2024-26153.json) (`2025-01-17T17:15:10.927`)
- [CVE-2024-26154](CVE-2024/CVE-2024-261xx/CVE-2024-26154.json) (`2025-01-17T17:15:11.147`)
- [CVE-2024-26155](CVE-2024/CVE-2024-261xx/CVE-2024-26155.json) (`2025-01-17T17:15:11.327`)
- [CVE-2024-26156](CVE-2024/CVE-2024-261xx/CVE-2024-26156.json) (`2025-01-17T17:15:11.533`)
- [CVE-2024-26157](CVE-2024/CVE-2024-261xx/CVE-2024-26157.json) (`2025-01-17T17:15:11.697`)
- [CVE-2024-45832](CVE-2024/CVE-2024-458xx/CVE-2024-45832.json) (`2025-01-17T17:15:11.870`)
- [CVE-2024-53683](CVE-2024/CVE-2024-536xx/CVE-2024-53683.json) (`2025-01-17T17:15:12.053`)
- [CVE-2024-54681](CVE-2024/CVE-2024-546xx/CVE-2024-54681.json) (`2025-01-17T17:15:12.227`)
- [CVE-2025-0430](CVE-2025/CVE-2025-04xx/CVE-2025-0430.json) (`2025-01-17T18:15:30.920`)
- [CVE-2025-0532](CVE-2025/CVE-2025-05xx/CVE-2025-0532.json) (`2025-01-17T18:15:31.237`)
- [CVE-2025-0533](CVE-2025/CVE-2025-05xx/CVE-2025-0533.json) (`2025-01-17T18:15:31.577`)
### CVEs modified in the last Commit
Recently modified CVEs: `69`
Recently modified CVEs: `73`
- [CVE-2024-3416](CVE-2024/CVE-2024-34xx/CVE-2024-3416.json) (`2025-01-17T15:43:40.360`)
- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2025-01-17T15:52:40.257`)
- [CVE-2024-3418](CVE-2024/CVE-2024-34xx/CVE-2024-3418.json) (`2025-01-17T16:35:52.327`)
- [CVE-2024-3419](CVE-2024/CVE-2024-34xx/CVE-2024-3419.json) (`2025-01-17T15:35:15.880`)
- [CVE-2024-3420](CVE-2024/CVE-2024-34xx/CVE-2024-3420.json) (`2025-01-17T15:24:53.263`)
- [CVE-2024-3421](CVE-2024/CVE-2024-34xx/CVE-2024-3421.json) (`2025-01-17T15:22:26.840`)
- [CVE-2024-3422](CVE-2024/CVE-2024-34xx/CVE-2024-3422.json) (`2025-01-17T15:18:05.700`)
- [CVE-2024-3424](CVE-2024/CVE-2024-34xx/CVE-2024-3424.json) (`2025-01-17T16:39:48.853`)
- [CVE-2024-3425](CVE-2024/CVE-2024-34xx/CVE-2024-3425.json) (`2025-01-17T16:43:20.130`)
- [CVE-2024-3426](CVE-2024/CVE-2024-34xx/CVE-2024-3426.json) (`2025-01-17T16:56:52.770`)
- [CVE-2024-3743](CVE-2024/CVE-2024-37xx/CVE-2024-3743.json) (`2025-01-17T15:03:47.047`)
- [CVE-2024-49142](CVE-2024/CVE-2024-491xx/CVE-2024-49142.json) (`2025-01-17T15:09:15.647`)
- [CVE-2025-21363](CVE-2025/CVE-2025-213xx/CVE-2025-21363.json) (`2025-01-17T15:10:17.307`)
- [CVE-2025-21364](CVE-2025/CVE-2025-213xx/CVE-2025-21364.json) (`2025-01-17T15:11:24.487`)
- [CVE-2025-21365](CVE-2025/CVE-2025-213xx/CVE-2025-21365.json) (`2025-01-17T15:11:34.843`)
- [CVE-2025-21366](CVE-2025/CVE-2025-213xx/CVE-2025-21366.json) (`2025-01-17T15:12:20.677`)
- [CVE-2025-21370](CVE-2025/CVE-2025-213xx/CVE-2025-21370.json) (`2025-01-17T15:33:41.967`)
- [CVE-2025-21372](CVE-2025/CVE-2025-213xx/CVE-2025-21372.json) (`2025-01-17T15:36:24.423`)
- [CVE-2025-21374](CVE-2025/CVE-2025-213xx/CVE-2025-21374.json) (`2025-01-17T15:39:11.143`)
- [CVE-2025-21378](CVE-2025/CVE-2025-213xx/CVE-2025-21378.json) (`2025-01-17T15:42:41.810`)
- [CVE-2025-21382](CVE-2025/CVE-2025-213xx/CVE-2025-21382.json) (`2025-01-17T15:42:09.233`)
- [CVE-2025-21389](CVE-2025/CVE-2025-213xx/CVE-2025-21389.json) (`2025-01-17T15:44:04.177`)
- [CVE-2025-21393](CVE-2025/CVE-2025-213xx/CVE-2025-21393.json) (`2025-01-17T15:45:26.027`)
- [CVE-2025-21395](CVE-2025/CVE-2025-213xx/CVE-2025-21395.json) (`2025-01-17T15:46:01.927`)
- [CVE-2025-21405](CVE-2025/CVE-2025-214xx/CVE-2025-21405.json) (`2025-01-17T15:47:39.780`)
- [CVE-2024-3315](CVE-2024/CVE-2024-33xx/CVE-2024-3315.json) (`2025-01-17T18:13:08.297`)
- [CVE-2024-3316](CVE-2024/CVE-2024-33xx/CVE-2024-3316.json) (`2025-01-17T18:05:50.107`)
- [CVE-2024-3376](CVE-2024/CVE-2024-33xx/CVE-2024-3376.json) (`2025-01-17T17:41:21.647`)
- [CVE-2024-3377](CVE-2024/CVE-2024-33xx/CVE-2024-3377.json) (`2025-01-17T17:35:40.243`)
- [CVE-2024-3427](CVE-2024/CVE-2024-34xx/CVE-2024-3427.json) (`2025-01-17T17:02:59.153`)
- [CVE-2024-48125](CVE-2024/CVE-2024-481xx/CVE-2024-48125.json) (`2025-01-17T18:15:25.547`)
- [CVE-2024-48126](CVE-2024/CVE-2024-481xx/CVE-2024-48126.json) (`2025-01-17T18:15:25.800`)
- [CVE-2024-50633](CVE-2024/CVE-2024-506xx/CVE-2024-50633.json) (`2025-01-17T18:15:26.043`)
- [CVE-2024-50954](CVE-2024/CVE-2024-509xx/CVE-2024-50954.json) (`2025-01-17T18:15:26.310`)
- [CVE-2024-54101](CVE-2024/CVE-2024-541xx/CVE-2024-54101.json) (`2025-01-17T18:09:53.447`)
- [CVE-2024-54535](CVE-2024/CVE-2024-545xx/CVE-2024-54535.json) (`2025-01-17T18:15:26.610`)
- [CVE-2024-57162](CVE-2024/CVE-2024-571xx/CVE-2024-57162.json) (`2025-01-17T18:15:27.240`)
- [CVE-2024-57577](CVE-2024/CVE-2024-575xx/CVE-2024-57577.json) (`2025-01-17T18:15:27.893`)
- [CVE-2024-57578](CVE-2024/CVE-2024-575xx/CVE-2024-57578.json) (`2025-01-17T18:15:28.430`)
- [CVE-2024-57579](CVE-2024/CVE-2024-575xx/CVE-2024-57579.json) (`2025-01-17T18:15:28.983`)
- [CVE-2024-57580](CVE-2024/CVE-2024-575xx/CVE-2024-57580.json) (`2025-01-17T17:15:12.410`)
- [CVE-2024-57581](CVE-2024/CVE-2024-575xx/CVE-2024-57581.json) (`2025-01-17T17:15:12.597`)
- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-01-17T17:15:12.797`)
- [CVE-2024-57615](CVE-2024/CVE-2024-576xx/CVE-2024-57615.json) (`2025-01-17T18:15:29.320`)
- [CVE-2024-57616](CVE-2024/CVE-2024-576xx/CVE-2024-57616.json) (`2025-01-17T18:15:29.573`)
- [CVE-2024-57617](CVE-2024/CVE-2024-576xx/CVE-2024-57617.json) (`2025-01-17T18:15:29.803`)
- [CVE-2024-57642](CVE-2024/CVE-2024-576xx/CVE-2024-57642.json) (`2025-01-17T18:15:30.030`)
- [CVE-2024-57768](CVE-2024/CVE-2024-577xx/CVE-2024-57768.json) (`2025-01-17T18:15:30.633`)
- [CVE-2024-9673](CVE-2024/CVE-2024-96xx/CVE-2024-9673.json) (`2025-01-17T17:15:12.997`)
- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-01-17T18:15:31.870`)
## Download and Usage

View File

@ -22658,7 +22658,7 @@ CVE-2006-6971,0,0,30b4c36a4b25ee7e8069fc317f679dc4380c3f55bebfb9d35761bf8fec2026
CVE-2006-6972,0,0,8f506b6f5f516e97cdd3e30f94839929e12aa68d6feb8403ee1ab0c3bb098ae8,2024-11-21T00:24:04.983000
CVE-2006-6973,0,0,b0c172571a7e3fbbf9bb7bd23aa66d539a6c75574b53958836b26207966214a1,2024-11-21T00:24:05.127000
CVE-2006-6974,0,0,ef3fde9bd83e6fa4f6a8890f9e5915fbbe457d0b22fce140393cdc707a3ae85c,2024-11-21T00:24:05.263000
CVE-2006-6975,0,1,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000
CVE-2006-6975,0,0,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000
CVE-2006-6976,0,0,418d71c951e11f4c17afe22a63b28728d0eacdd2a404ee6ec0bdd5068faf47a8,2024-11-21T00:24:05.540000
CVE-2006-6977,0,0,3d8c66879361d3274cbbae843e88fd16c44e5d69c8ff35cef5fa1923a0c7578e,2024-11-21T00:24:05.687000
CVE-2006-6978,0,0,c34f966b5f1cd610e3b77698c252679236b5e95a7a79f55b64bfe3927cde1e68,2024-11-21T00:24:05.823000
@ -22714,7 +22714,7 @@ CVE-2006-7027,0,0,bde2d7620e70fe3e9fd88b7eee3d8f2affe93b5a4f505608f505d9f899bd97
CVE-2006-7028,0,0,10c7c6647d4b92142f35a3dad4b5e3da7798e0f1fba3b8973942d232aed61916,2024-11-21T00:24:12.987000
CVE-2006-7029,0,0,d05274c9edad507fc94a06a70dc295c14ea47ea562b6430a2623089554c3f6f7,2024-11-21T00:24:13.123000
CVE-2006-7030,0,0,b371a291b807c5db02b79cabd3266dc6bf4e437b85903aef9e8ab3d115d76dbe,2024-11-21T00:24:13.267000
CVE-2006-7031,0,1,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000
CVE-2006-7031,0,0,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000
CVE-2006-7032,0,0,9a0a02bec8c509c0efda365345d80221095fd13e7b0c60b15e25bc48243b6e78,2024-11-21T00:24:13.550000
CVE-2006-7033,0,0,f293e1e2b08eed970b1d5f2d377c547c7f860b0b99d8ac492f5c8c3e52025f1a,2024-11-21T00:24:13.687000
CVE-2006-7034,0,0,310913b770c09ad04bab56a279511942f2faf0d37ed071b984f9a944ca4e6d7e,2024-11-21T00:24:13.820000
@ -22788,7 +22788,7 @@ CVE-2006-7101,0,0,54914dfc2f2d8c05f5718c4b9fcb082ea15b97165b5f9266b73b1cc0ea96e2
CVE-2006-7102,0,0,c878466fc041bd488504e91ea2b7bd1b546b20fdcdf04216d53e54a78c900c99,2024-11-21T00:24:23.983000
CVE-2006-7103,0,0,fb5030e3101f936fcdba6e8af7c10f4af95c902a1d5ca21ede646503cc45a4b1,2024-11-21T00:24:24.180000
CVE-2006-7104,0,0,75e8ab9990855ce63c9efad6686e517def05049afa5915ea3bc6340c5bfe925b,2024-11-21T00:24:24.350000
CVE-2006-7105,0,1,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000
CVE-2006-7105,0,0,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000
CVE-2006-7106,0,0,052b68c4c39ccb711da3927959cf230d15f6600c3fb1cf33e8f09bc5266a475e,2024-11-21T00:24:24.623000
CVE-2006-7107,0,0,b300b5b09c1d008d729a1137d8096bba1d25751214425e6895bc895e2e2ac98f,2024-11-21T00:24:24.763000
CVE-2006-7108,0,0,389816ff42b48fcd19238e824feabdc94205ba8dce210b6e7f66674be6d41e40,2024-11-21T00:24:24.903000
@ -24583,7 +24583,7 @@ CVE-2007-1674,0,0,898736af90d43b12c675c7e7004a27e56fc818344a9f6200fab13fdb761141
CVE-2007-1675,0,0,88134bcea51f5528cc9733a9accd544287ed7c381d7d445aaa9046fa0dd3b3af,2024-11-21T00:28:54.357000
CVE-2007-1677,0,0,0d8d9740476b59067a995c1051659a20b4ab1382d3f430913062e79affd45b64,2024-11-21T00:28:54.503000
CVE-2007-1678,0,0,0a6ff503a77c9ab19ba61a79356b174a036a6c7cbdde074750fb90ef72605439,2024-11-21T00:28:54.647000
CVE-2007-1679,0,1,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000
CVE-2007-1679,0,0,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000
CVE-2007-1680,0,0,74f9e3bd230e34b6b2cac36b9597aab7cc63538c886572c19b9e602bea0ac609,2024-11-21T00:28:54.940000
CVE-2007-1681,0,0,6766222a3f8845792a3a9b2e2ba5d04f6b75cfd04f3ab195ccb360a1544e7a03,2024-11-21T00:28:55.090000
CVE-2007-1682,0,0,8b65392eb4bcf0bf28074b04459b71babaa2150d883096605ffdf6a345da76af,2024-11-21T00:28:55.240000
@ -24921,7 +24921,7 @@ CVE-2007-2016,0,0,219237bef47cd3d89a064e2008096ec22251fd5a404ebc1e6a827e95ade95e
CVE-2007-2017,0,0,546535e5dcff5b88db8527e35deee25aa0d76c69039039747c9d4e33db0860be,2024-11-21T00:29:42.150000
CVE-2007-2018,0,0,3bdf4adeddcab5ac1ea6297b19f88a79344dc31e6f0bb3ce03a9c68b215e9766,2024-11-21T00:29:42.297000
CVE-2007-2019,0,0,2d45d4f38af76aad986c8235d259f4ca92688a48ad3708a35598872a6d917679,2024-11-21T00:29:42.443000
CVE-2007-2020,0,1,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000
CVE-2007-2020,0,0,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000
CVE-2007-2021,0,0,21684c09b0a57b5b7505bdbe148093d50d0d0492eecb224a83fa928e7b5314cc,2024-11-21T00:29:42.753000
CVE-2007-2022,0,0,0a74377aec1e158ed10e3fdcb91b5ff2c83587fbf81c424f39b9648e3cbcced7,2024-11-21T00:29:42.900000
CVE-2007-2023,0,0,c036be7fab3ae0920f3c3ad37b2f9059dfb50c6a9251f645923397d9ed0adcdc,2024-11-21T00:29:43.100000
@ -25323,7 +25323,7 @@ CVE-2007-2418,0,0,0ce5ecf8ba84947258950ede570da848ddbad9277ca8ddafd1fc1896b8c132
CVE-2007-2419,0,0,7e864fd0311ba966e74cdf0abafa623b4ad43b67f12d94ddca837b539eacf600,2024-11-21T00:30:44.467000
CVE-2007-2420,0,0,5e67598ecc5684ef53e014523f7e87cadd2b55f950679768101d0718a5eb3330,2024-11-21T00:30:44.617000
CVE-2007-2421,0,0,f6020ed7e34caeaa4010ff8b47fa5b09bbb005e2115ed3bb4822fb78060e9bac,2024-11-21T00:30:44.753000
CVE-2007-2422,0,1,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000
CVE-2007-2422,0,0,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000
CVE-2007-2423,0,0,0b83896635331471d87404141f16467346739f0b8dca420f20a9271baf77866c,2024-11-21T00:30:45.040000
CVE-2007-2424,0,0,1c922304dee11dfd180a30859ca86a37f00ad1204bc14ec7002335aba011e2b7,2024-11-21T00:30:45.187000
CVE-2007-2425,0,0,4552c35414ca77abd157ab5a3c322bca479025668f503b79b5811d98cdf7fb96,2024-11-21T00:30:45.340000
@ -26084,7 +26084,7 @@ CVE-2007-3190,0,0,4c2508555f4bb672ac6fa91936f379a042cd9025c1ecb47e69b838a9b848a6
CVE-2007-3191,0,0,f1c66cdf736c9784d9b1b03151b892596c7dbfcbf068ae4299a30d347bda4f86,2024-11-21T00:32:37.463000
CVE-2007-3192,0,0,a7bc488985ed5711ca70747f44e04ef839b560fcecfa1dbf4570d2f6db55fb83,2024-11-21T00:32:37.613000
CVE-2007-3193,0,0,466a6a90fd68b59e93e31de5a45f967fb6c099e73bfea3cda27528cca8dcfc32,2024-11-21T00:32:37.757000
CVE-2007-3194,0,1,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000
CVE-2007-3194,0,0,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000
CVE-2007-3195,0,0,5a2516527b23144ca52bbe1a590a8c793b0f79113d69dd198a4da4cfc807a21e,2024-11-21T00:32:38.057000
CVE-2007-3196,0,0,dc730fa8a9a244caa73a32806f04ab6274e74d634ec6f01253d83153e7921ef4,2024-11-21T00:32:38.220000
CVE-2007-3197,0,0,ef856130105c25f2996c49fe89d04372d79ac0dc781e31ebe2dbac49fbee18cd,2024-11-21T00:32:38.367000
@ -26297,7 +26297,7 @@ CVE-2007-3405,0,0,5b68aa2bd44434ecb40c35a2db1a1ff65bd24ea5952ab3b45ee119092df93b
CVE-2007-3406,0,0,5ba8c0c40aab2e7442619791db7d4e95da8b58c61f3368f64caa41ef76e3f6e5,2024-11-21T00:33:09.647000
CVE-2007-3407,0,0,6eb5791da788424b85b93887dd4ab3b5066e55d4a8940bbcb108b80ed5021c62,2024-11-21T00:33:09.787000
CVE-2007-3408,0,0,2537f832c34e0219d5119235ad7fdb726c6da4d2033e5cc183b2a35820ccfb21,2024-11-21T00:33:09.927000
CVE-2007-3409,0,1,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000
CVE-2007-3409,0,0,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000
CVE-2007-3410,0,0,42b713d16d98e71bfb2ba894991c109d004caccc2efa8def8cc2046a3736c6a6,2024-11-21T00:33:10.220000
CVE-2007-3411,0,0,71fbf15baab87b4d496c0a297ed15355d61657fa52df993ad567ff0c695bd40f,2024-11-21T00:33:10.377000
CVE-2007-3412,0,0,c8cae3f674ab922974283adb017b9bf909a76f69ed166bbe1ea05401586f1635,2024-11-21T00:33:10.983000
@ -26698,7 +26698,7 @@ CVE-2007-3812,0,0,a057a88bd62dd2cf84a9585f0e43e2f7615b3b0e7b564410bf9af9930b322b
CVE-2007-3813,0,0,1dfe731dfdd2a22844282db9d3fa39dfccd2b0bd21b2bc57fa7b8ecd6594574d,2024-11-21T00:34:07.503000
CVE-2007-3814,0,0,24b69119cc8609a7cd25db046bdc3c20bf6de9632f8146e48ff4bb67790f47d0,2024-11-21T00:34:07.630000
CVE-2007-3815,0,0,ccb135b637c4c9ff92a342957f77873ab5c48907ba7a1c386ff0a4a5de52df18,2024-11-21T00:34:07.780000
CVE-2007-3816,0,1,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000
CVE-2007-3816,0,0,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000
CVE-2007-3817,0,0,84ecd5fce551683d845d9045254e63af0981844cb29f63a66e2739c2492c581e,2024-11-21T00:34:08.073000
CVE-2007-3818,0,0,fc09393facd0c477d75888fde9b5aa3492afbc6a73cc3ada69cb86c8d0d42745,2024-11-21T00:34:08.207000
CVE-2007-3819,0,0,68133b1983fea415ba02f4fa9f75646105d692487e126200e69a66987de833f6,2024-11-21T00:34:08.347000
@ -27160,7 +27160,7 @@ CVE-2007-4286,0,0,a7bb9581bd5bc906382f293b635bfafa72ad3eb5b191fc51019dabb7fc895d
CVE-2007-4287,0,0,196aa319b27704f0ce3a5618753d29fc691896f5273ebab8e0e9328ac0411313,2024-11-21T00:35:14.283000
CVE-2007-4288,0,0,34de55785ba29073fd74acc6e47ecc477e01d8869fa33e96a015fbbef9e70217,2024-11-21T00:35:14.417000
CVE-2007-4289,0,0,0c61281a3729f2fc152ee1b619c73e3e6c289f4c4d38fc47082b03b6dcb05d01,2024-11-21T00:35:14.557000
CVE-2007-4290,0,1,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000
CVE-2007-4290,0,0,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000
CVE-2007-4291,0,0,05f61638f5563cebb165558e108521cd9423d24be16bad06eab53e10b29f4608,2024-11-21T00:35:14.827000
CVE-2007-4292,0,0,3aa371c016fa4984d6c6b2f3844ec60dfd8dfee0d33117bba91f721014ce093a,2024-11-21T00:35:14.983000
CVE-2007-4293,0,0,3f353b7109765b5bb62e7a94d53af98e6c56d8181eeae53878246d59c2220773,2024-11-21T00:35:15.140000
@ -27332,7 +27332,7 @@ CVE-2007-4461,0,0,3de60db2724f4cef72bfe99980b55efdfcee3fdd4646732fa7e581574acc16
CVE-2007-4462,0,0,62101041934fa56bdc980b528c55bbcd757d54a71d56a58218495bf1e1547f38,2024-11-21T00:35:39.610000
CVE-2007-4463,0,0,187c35e0bf0628b966b267bc1c20e11ba64192d1628e5020ea4f24910af48fa7,2024-11-21T00:35:39.750000
CVE-2007-4464,0,0,a2db813a61522b747171f39949a8a83c7f59e55ceb2ec5f6094d1e0a6a441f5e,2024-11-21T00:35:39.890000
CVE-2007-4465,0,1,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000
CVE-2007-4465,0,0,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000
CVE-2007-4466,0,0,05d022ac82f920a784de2112b8419f5269a66d668bf3c80f9401be43420d1d57,2024-11-21T00:35:40.293000
CVE-2007-4467,0,0,be85cfac49c9b9ce778282c01b1300dc0010257db8d67ffb621aeecd6b60767f,2024-11-21T00:35:40.407000
CVE-2007-4470,0,0,d2964a4e088d929f64a62b03df0f35a0373ba3c3e84cb9890054f4a568d17366,2024-11-21T00:35:40.527000
@ -27421,7 +27421,7 @@ CVE-2007-4555,0,0,6630d2bb6667238dff571881b0a8ccb540b1ec43c0c9b7c0887e73db144be6
CVE-2007-4556,0,0,b4f43e784681fe6b8359c2e109a742f06d2ba34d81180afd975ba9d99accf207,2024-11-21T00:35:53.020000
CVE-2007-4557,0,0,5ae75a658353db31a4879c7fa1ac3c85c80de620baaeda978b5eb301c1292028,2024-11-21T00:35:53.183000
CVE-2007-4558,0,0,33d7b38ab69a2dc921cd0efb9caba7a58f73953a56c79eb00aeb3febab15c613,2023-11-07T02:01:04.180000
CVE-2007-4559,0,1,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000
CVE-2007-4559,0,0,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000
CVE-2007-4560,0,0,e8c605cc3b9174d5b334105b42dc4ea85ecf4b8dc1c209149ac82d7f531fdc69,2024-11-21T00:35:53.530000
CVE-2007-4561,0,0,a9da5f6fa70f2fbcd69e1fdd36c7725610022097f397c1d4b55428b3ec9d4286,2024-11-21T00:35:53.707000
CVE-2007-4562,0,0,3001d31d10a6ff798d15ba5d0418e8a3943db487e0b5659ddd65909addf80b3f,2024-11-21T00:35:53.857000
@ -27643,7 +27643,7 @@ CVE-2007-4782,0,0,bc6f8aa60af4d2816d1b78e5baff5490f24615214441f891054d2e957f7523
CVE-2007-4783,0,0,ce96bf486d496ce94fbb5d4887520e06f7cddd71865a721244fdc00b4e88faae,2024-11-21T00:36:26.440000
CVE-2007-4784,0,0,2ba6eb1397b30f09b5a0267c90e3e94b01cfdf1f4d69d06a0c1251d9e9e1ab82,2024-11-21T00:36:26.580000
CVE-2007-4785,0,0,4432cfce3d278c9ab8292c097f4a7afca4ac429366bdf34e9208711ceb20e264,2024-11-21T00:36:26.717000
CVE-2007-4786,0,1,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000
CVE-2007-4786,0,0,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000
CVE-2007-4787,0,0,05a5aaaf7dfaf6d662f1c8419b632e8613242f91390c751301b0be183cfd605a,2024-11-21T00:36:27.020000
CVE-2007-4788,0,0,b012ee81b96bd7841ea38ade60bff976f2b03be1131c6d750d0430313390d2d5,2024-11-21T00:36:27.153000
CVE-2007-4789,0,0,f6fac4f1eed433732ee4e0c6354a53039dbe7410a73a0f7964b5630fdd0bc2c2,2024-11-21T00:36:27.303000
@ -27925,7 +27925,7 @@ CVE-2007-5093,0,0,993cb60156fc86ec2ef785c0575991e6b3bd7019f93383a3da535c331912bf
CVE-2007-5094,0,0,df0d6f2388dcca221fce10b9f40a5244914eb8a410b5a246260385fcead6884d,2024-11-21T00:37:06.763000
CVE-2007-5095,0,0,6d5b9f346211fcc92b3cb1d0b460a8fc98ea7697bf7142b16f04eebf2c20f67f,2024-11-21T00:37:06.893000
CVE-2007-5096,0,0,a29e920bb6f95fd23e034a4fc32d21393f32a7a19873eb0fd35d32a1df572bcd,2024-11-21T00:37:07.030000
CVE-2007-5097,0,1,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000
CVE-2007-5097,0,0,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000
CVE-2007-5098,0,0,7445261d4bd176ec3d4e503623e4daa9f4870d18a5851afe1ef0312bfd4b2279,2024-11-21T00:37:07.297000
CVE-2007-5099,0,0,ac7efde8aad5508385d88d0a2400f6afbc1f46a73da3ad9a54d8fff463b9ae2d,2024-11-21T00:37:07.433000
CVE-2007-5100,0,0,36c4ebde2519d1d0636d11c2d48cf76171b1d8111e6ab854c797e1e14ffaa61a,2024-11-21T00:37:07.570000
@ -28385,7 +28385,7 @@ CVE-2007-5561,0,0,99edf9ec5bfc1d9f89a72bf2ea29bfe7d418fe97a61d4d8e9dc519d66b7591
CVE-2007-5562,0,0,92b4ca2b297bdb7ce215a17dad700ae49eede3dc3692583a73b609b9cef653c4,2024-11-21T00:38:11.423000
CVE-2007-5563,0,0,54a2bac93cce3961b913f7e901c091a9509f74c8ff9e36c21f8bddea28ccce0e,2024-11-21T00:38:11.557000
CVE-2007-5564,0,0,947d90e9c1d7f3e853f110562e11b0ecde8e8aa4caafdba3e112f7797b9cbb45,2024-11-21T00:38:11.690000
CVE-2007-5565,0,1,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000
CVE-2007-5565,0,0,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000
CVE-2007-5566,0,0,e5bb5b6554c8b5920f9bdd17dc2969ad5e9fba7349d31fe67dcc6fbbabaaf7db,2024-11-21T00:38:11.953000
CVE-2007-5567,0,0,4a71954d2aa6b64a0e2814cb8d361731e3c0789ef11f1c169c554a98e60f66c4,2024-11-21T00:38:12.100000
CVE-2007-5568,0,0,9ee5143b09df6d9171180041edc412ea03f580c151ae1409087cc639df1f7959,2024-11-21T00:38:12.237000
@ -29591,7 +29591,7 @@ CVE-2008-0077,0,0,0e1bac7dd448a66bc0cfeda427b0b7eccfbbbbcd16dae2ea2988eaf3c68523
CVE-2008-0078,0,0,b0c76c054456efed9bc03f0d63a8c45c69b58d7db12612ac8af88c57bf6ccbaa,2024-11-21T00:41:07.197000
CVE-2008-0079,0,0,1838c9168aeba926515133757754f2f2588c409b8db6c9502b4f2a642fa4a72c,2023-11-07T02:01:40.037000
CVE-2008-0080,0,0,8412f77974bae998d3f560d3bb88b735a41789f49938bbdb0b2bd6d7500ce698,2024-11-21T00:41:07.333000
CVE-2008-0081,0,1,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000
CVE-2008-0081,0,0,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000
CVE-2008-0082,0,0,14df28dec90609a090ec96df339f8fe485b84402601d50278dc98d736092038a,2024-11-21T00:41:07.647000
CVE-2008-0083,0,0,8687f7f0c7a7bc1282b56ce44e732012ba0b44e61620fe9d5985af95c2ec761a,2024-11-21T00:41:07.797000
CVE-2008-0084,0,0,8d9d53772b44e9dcf5259626258fdc8a9bea67493536450ffec6dddab88039cc,2024-11-21T00:41:07.947000
@ -30732,7 +30732,7 @@ CVE-2008-1242,0,0,ade061dbfa3c75b3eae21375dcb17b46551787c88bb56bbea1c3e1a1f55408
CVE-2008-1243,0,0,42145c5f7625854ffe44a16aadd9267afa8a87f9945dc50f532834db7dc599d8,2024-11-21T00:44:02.443000
CVE-2008-1244,0,0,4f75e571a4c461d078fc50e2768c8f6fc64e082b7cb7f899e8ecd70ba2e4d236,2024-11-21T00:44:02.607000
CVE-2008-1245,0,0,499329cbc5730cdbfe3a919e91d36f9384e84ec1c61f007b1e1e33d3d64ffe61,2024-11-21T00:44:02.770000
CVE-2008-1246,0,1,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000
CVE-2008-1246,0,0,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000
CVE-2008-1247,0,0,581e127726d913db054905cf0f171f9dbc4f07f20d4919c7a581266c1b3bd5e5,2024-11-21T00:44:03.133000
CVE-2008-1248,0,0,5025b7537aedeb4eed0917b19cd88ea905d1785c1e11d61e51e5caea29be940a,2024-11-21T00:44:03.283000
CVE-2008-1249,0,0,acdf034143a4271ec6a79d81d9e059030241aad4ad188f11b2205412ceed93da,2024-11-21T00:44:03.420000
@ -31834,7 +31834,7 @@ CVE-2008-2370,0,0,021fd53a864ecce480ee755ce14f76e201760b771f120e1881240bf82ea28b
CVE-2008-2371,0,0,65e826a347a7d47a2217d9f8fdb2282d1c6e3ac77345bbff683c1cf114001c2d,2024-11-21T00:46:44.070000
CVE-2008-2372,0,0,06752596f4dc9c5f79bde310a8a8761c7b1b4e4fce57ed9c3c2ce61ab6497eec,2024-11-21T00:46:44.267000
CVE-2008-2373,0,0,b9e02b4b3e04278094a56d4d148fcf6e26cb39c5f845f8624159072ae5e27fac,2023-11-07T02:02:12.140000
CVE-2008-2374,0,1,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000
CVE-2008-2374,0,0,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000
CVE-2008-2375,0,0,0eab456f6d2e06dda163307088b16f729c480edc6e685ec5b5b9949cabd0ba33,2024-11-21T00:46:44.563000
CVE-2008-2376,0,0,5bafc7bc7070c289491a0683e4b7912e267b230e9643e4b4c4341e8b8c5bb9ac,2024-11-21T00:46:44.693000
CVE-2008-2377,0,0,ab06d4b349e72855c527159f834167645fa48b583d213fc8d0aac2034b654596,2024-11-21T00:46:44.837000
@ -32716,7 +32716,7 @@ CVE-2008-3278,0,0,e68e5a27346081e1298093dadeaf20095f7733d0ce735acc6e303b7d3dd2b8
CVE-2008-3279,0,0,77c22df27107f79ee78ca6a9c77007419f2ec711a34afe9981863476185cea93,2024-11-21T00:48:52.403000
CVE-2008-3280,0,0,bb719b7417b6631526a61fff546be1cfbe43e717c54a73ae62a6272c7b212e85,2024-11-21T00:48:52.517000
CVE-2008-3281,0,0,5571ac81465c0dbbe8c1613369bafa7fe48230b1b507e820179984401d5b8a62,2024-11-21T00:48:52.650000
CVE-2008-3282,0,1,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000
CVE-2008-3282,0,0,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000
CVE-2008-3283,0,0,8aec0e178bc1a698060d811f8bebf9066e08935179f2e4373edd0ad291c9f238,2024-11-21T00:48:52.943000
CVE-2008-3284,0,0,babe9ad38a5b74cc29fce5b8467b30419739070eb54015a780d8919aef96fddc,2023-11-07T02:02:26.743000
CVE-2008-3285,0,0,af5f49f5a709d1ff96a0b92c966c513d54b1d0075b847f0e12b6e55aa036235c,2024-11-21T00:48:53.077000
@ -32899,7 +32899,7 @@ CVE-2008-3461,0,0,8fd9d75ee9a5599892ac6cd3fe7b26179d0ab8de1f672e01aeb8373954a6e0
CVE-2008-3462,0,0,4ec65f92f08900243a5963de40140263596057033b8bc26433b011690d2476ee,2023-11-07T02:02:28.933000
CVE-2008-3463,0,0,579d4a43998c9b2eac5853f8ef6aea44a356e5c281b110cdfeb120f43a4f5f8c,2023-11-07T02:02:29.213000
CVE-2008-3464,0,0,6f30f28ce388878e8688e31283f6c16c7f1b76bbf8b79290d35ede35c8adeef4,2024-11-21T00:49:18.913000
CVE-2008-3465,0,1,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000
CVE-2008-3465,0,0,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000
CVE-2008-3466,0,0,3f605f7ad58aecd6880381ea770fcf5510e7426e4d6d423aca4a9402decf9654,2024-11-21T00:49:19.160000
CVE-2008-3467,0,0,3e16ef74df19bcf7e3f85c918700aa0bf0d9420e425a933a41011fdf73f726e7,2023-11-07T02:02:29.467000
CVE-2008-3468,0,0,bd97f0bdb30e21367d5b70a2692b44a7f6c22cf3161cc2ab669d869b11fa2ef3,2023-11-07T02:02:29.687000
@ -32908,7 +32908,7 @@ CVE-2008-3470,0,0,0386f2718b67efa7c55c859658f69a06fbdf68f14dd09170f22c4d9e5b085e
CVE-2008-3471,0,0,e118a701ddcff55a460444618ccc543da969635fbab102c051dc799fe622d87e,2024-11-21T00:49:19.340000
CVE-2008-3472,0,0,9a9a0bc60d777b949854990bac94c9696ed91fef448021ee436120cdab087d43,2024-11-21T00:49:19.480000
CVE-2008-3473,0,0,eb30fa73efa675fafeee269652d27a922d1d707ca34f4ce34e69e671c9c979b5,2024-11-21T00:49:19.613000
CVE-2008-3474,0,1,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000
CVE-2008-3474,0,0,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000
CVE-2008-3475,0,0,c2e55ba56e3a4ec6c1a80729adc9df6c0e1e36d44bb3bf47e15a0f5dafb7ee1f,2024-11-21T00:49:19.883000
CVE-2008-3476,0,0,bd23dd8f4411c5b005db25888cd78f3500823b5bb145eeec5bd65ec076da7811,2024-11-21T00:49:20.040000
CVE-2008-3477,0,0,f34f16d7433d761a449b8b1788f5d67109642537fda255c851afb35898d1cdbb,2024-11-21T00:49:20.177000
@ -33203,7 +33203,7 @@ CVE-2008-3771,0,0,387d2734e293e9d4229a89ad93ef198a75ba6c7ec0b26ca9f05a68c3fa88ea
CVE-2008-3772,0,0,10c8f7803da5128d98699b607b08b383018544e73c12e8d7bc455979c5415818,2024-11-21T00:50:05.667000
CVE-2008-3773,0,0,efdfe6746783710e84d486e743d6bee162233dd54ca938e337f0f3e37666a519,2024-11-21T00:50:05.807000
CVE-2008-3774,0,0,1d223336b1a5025e63e3b121302bde6341a8c0a93d033d5f359e5f8028235a6d,2024-11-21T00:50:05.960000
CVE-2008-3775,0,1,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000
CVE-2008-3775,0,0,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000
CVE-2008-3776,0,0,759b26637b4be74cbae069136454e0dbc436b18431192b8be6914f0998319ad3,2024-11-21T00:50:06.263000
CVE-2008-3777,0,0,932fb89f1d21261d37ad054956f4845b55faebb9712e16f734a6949004a19edd,2024-11-21T00:50:06.407000
CVE-2008-3778,0,0,d0cabf0e2407f6ee82738a6b8cc4b9767f9748891b1c6fe930a3ad8538752744,2024-11-21T00:50:06.560000
@ -34329,7 +34329,7 @@ CVE-2008-4925,0,0,4f7b18e393b0fa381e68773dfa5861d88a6292105b49d543a9c33f99190cb6
CVE-2008-4926,0,0,7c5e36ad6b1c797c68693f2837e1a9f94c0ce082be6d6e481ddc90150efaeb36,2024-11-21T00:52:51.593000
CVE-2008-4927,0,0,2fc3b624b859ef30c91f0ec77ccaff5a10184bccdd99e3983e23fca43dbe3e25,2024-11-21T00:52:51.740000
CVE-2008-4928,0,0,2f6634b1bd080ca5525d6ed8a3f95c34b424b18654ad6a6d16afacfd255a7fbf,2024-11-21T00:52:51.880000
CVE-2008-4929,0,1,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000
CVE-2008-4929,0,0,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000
CVE-2008-4930,0,0,2c4d59623a2b0b5f63a7916dcb2796169922093478803e0499fb6b55b90d42d3,2024-11-21T00:52:52.193000
CVE-2008-4931,0,0,f86582cbf3eb6ca78b80be18df159e3bb694669014c2df3c7b3109abb16602d5,2024-11-21T00:52:52.330000
CVE-2008-4932,0,0,8c4eb265c406b9ab48545d0fa32e531b8fe25ee35aafa7649d9f84dd93e5abcb,2024-11-21T00:52:52.473000
@ -34394,7 +34394,7 @@ CVE-2008-4992,0,0,e0f2f6bcbbb725f5fd495269be6f4f746da7c0f999ac300af622b04a4b3fe6
CVE-2008-4993,0,0,c4d0175ad3336bd886cdf610ccdfd78bf1755efb9a12d99edafaf3f6a027ef42,2024-11-21T00:53:01.417000
CVE-2008-4994,0,0,cd8d7f094ddd75032df41117ffc7311d6254c621c52e2c185509f21c18799602,2024-11-21T00:53:01.563000
CVE-2008-4995,0,0,bfa93d844fb22352ab90cf141189edab832ce3a5c30a5fd3e1edbdd19ac833df,2024-11-21T00:53:01.710000
CVE-2008-4996,0,1,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000
CVE-2008-4996,0,0,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000
CVE-2008-4997,0,0,7566fced22bd3a3484772345ab5f1fa69faee1d11bd335f12aa38d0edbbe4ecf,2024-11-21T00:53:01.993000
CVE-2008-4998,0,0,15d45704380071e9a9953ea7abe65daa350aa04c7b05aadf01b367c96688628f,2024-11-21T00:53:02.140000
CVE-2008-4999,0,0,080946ba4f06dbec211b9d55cdaf058e0c090d5863b6c277e9665e45ca5d363e,2024-11-21T00:53:02.283000
@ -194208,11 +194208,11 @@ CVE-2022-24801,0,0,4d611f7d290a30c49a36c129519fc7ac71513b1cadc078eef638f25ab4b14
CVE-2022-24802,0,0,07b26b8ea497569aa400e89e075f85d7d8497c28c46912dc679b0c636ee600b1,2024-11-21T06:51:07.880000
CVE-2022-24803,0,0,a6c71e9f6a94b9ae6df5c5767e3e8dc001f3c63ef8ed87909483e22596226c5a,2024-11-21T06:51:08.023000
CVE-2022-24804,0,0,5a8858465a7aa4104bded7bf6892b5e6c2df6ee69b3f374e48216b70388e95c9,2024-11-21T06:51:08.150000
CVE-2022-24805,0,1,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000
CVE-2022-24806,0,1,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000
CVE-2022-24807,0,1,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000
CVE-2022-24808,0,1,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000
CVE-2022-24809,0,1,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000
CVE-2022-24805,0,0,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000
CVE-2022-24806,0,0,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000
CVE-2022-24807,0,0,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000
CVE-2022-24808,0,0,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000
CVE-2022-24809,0,0,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000
CVE-2022-2481,0,0,c6a77134c010c7c4f180df8a4e72b5e901853f245db8d830c126eabeb72bb5e9,2024-11-21T07:01:04.973000
CVE-2022-24810,0,0,817bcf4801ae83c9d34aee0f0d6e71d5b6597a20671eeeac937cf8f303599939,2024-11-21T06:51:08.977000
CVE-2022-24811,0,0,f0de78415af361c1f04eeb300962362dac1f5d4ed9c4710ea6a7d48db701773b,2024-11-21T06:51:09.093000
@ -198481,7 +198481,7 @@ CVE-2022-30018,0,0,a47d8c584648cd074d4197c63600f888a035f4f5141dceac3dc37e5b59189
CVE-2022-3002,0,0,599cae5f99d3994ff275a3aaa8236083e9e9cd9b24d19afcc45b27053349a4ed,2024-11-21T07:18:37.230000
CVE-2022-30023,0,0,c77df69c371246d0c17ca301e646e05c6ea0a815ac1ccd569e618bae3cef56a8,2024-11-21T07:02:05.730000
CVE-2022-30024,0,0,33b065c539ef1ec787028658cb8d0d89066d0e41bbd4e18734571d1dde05fdad,2024-11-21T07:02:05.870000
CVE-2022-30025,0,1,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000
CVE-2022-30025,0,0,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000
CVE-2022-30028,0,0,5da8221e49099da25b4f0bc147828862aa0640753c02395177ba48e88a040936,2024-11-21T07:02:06.170000
CVE-2022-30033,0,0,24cd3dbe45c902507edac8e8bf7464ce3d09e8ab95eff5aef496b56a61833675,2024-11-21T07:02:06.313000
CVE-2022-30034,0,0,8fe6274bdb8b07197fe928571802beaec94b5f94476e6088bc8f77d56e8d836a,2024-11-21T07:02:06.453000
@ -207284,7 +207284,7 @@ CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb6
CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000
CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000
CVE-2022-41220,0,0,ad29ea38b072bf58585a8e13186655e2e23bda37dd415a6a1e953b27bc78646e,2024-11-21T07:22:51.447000
CVE-2022-41221,0,1,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000
CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000
CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000
CVE-2022-41223,0,0,d5c686c09d3342e8d375627b9a2b1c429335074239336f50b05e7aea94075f24,2024-11-21T07:22:51.913000
CVE-2022-41224,0,0,166e5234c48c055c19f09bc2c5da4feda446cc9117a08eefd15b6324545e43f6,2024-11-21T07:22:52.057000
@ -208116,7 +208116,7 @@ CVE-2022-4221,0,0,c3ed54d13577be1fcbbe89f9fe5d6a7f7aec0478031808f088803ba0f73de9
CVE-2022-42218,0,0,e56bbc1e79a6b7b715ab5c96de7dc81a5b5bf8f992bc94909b2a8075ff481af3,2024-11-21T07:24:31.957000
CVE-2022-4222,0,0,9f0f62e0ad502fd7900c569783ad9029d782bd46a0513ab22d201296ac5a6335,2024-11-21T07:34:49.263000
CVE-2022-42221,0,0,22cb1d5c362e6ce83cad250d332a9b8ebcaf3a72dd7627752e8a0f435d5aa533,2024-11-21T07:24:32.100000
CVE-2022-42225,0,1,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000
CVE-2022-42225,0,0,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000
CVE-2022-42227,0,0,d1eb18a0c4fc2be883366222adf7b8f679fb279c1d46312139a0a5942b91a003,2024-11-21T07:24:32.430000
CVE-2022-42229,0,0,30d4ffa5106cde8593ccff0549029cf9a81b07534e7c788198cdb3cec710b8c4,2024-11-21T07:24:32.590000
CVE-2022-4223,0,0,43ffd072faee8cd340b416e1c49fed0811d650f79e3ed18c62f5d8dc99587977,2024-11-21T07:34:49.397000
@ -210755,7 +210755,7 @@ CVE-2022-45872,0,0,a907443ce4f03e99a976737e2d47cb015ba05e3816eae1b1e624fcdd21611
CVE-2022-45873,0,0,42c6c1129d53ef778f4baa826bc586cb39ac06b30554c1745f3ebd88089eac8c,2024-11-21T07:29:52.680000
CVE-2022-45874,0,0,604801db89e4183fba09cead9348f5c7327b92d504380bbdcca7e4a2e64d1fb8,2024-11-21T07:29:52.830000
CVE-2022-45875,0,0,1aac1f8a1a71defacecd22a49897d882cf79fc760121966b688b6327a6a1addb,2024-11-21T07:29:52.943000
CVE-2022-45876,0,0,d42b75b223aa3974435b6f221d5bb446829779a7df31b5b159eafcfd795a7d4c,2024-11-21T07:29:53.063000
CVE-2022-45876,0,1,d70a8354437a5d727daeeefbf8e766205015f588234179d2757a51060bbed30f,2025-01-17T18:15:18.117000
CVE-2022-45877,0,0,06951f61cfe71647f0cc3451d7152061025f7464a71023684c548a20a56e8dff,2024-11-21T07:29:53.193000
CVE-2022-4588,0,0,d97280b0462e32d7444e6df8f57ab38a4f8f5cd3c5d546d73a8096388c6bf7c0,2024-11-21T07:35:32.953000
CVE-2022-45883,0,0,61d96562f23562a14c36a83a13dd17a03fd4abc321b9a6adf2fd11a4fa522081,2023-11-07T03:54:55.933000
@ -213538,7 +213538,7 @@ CVE-2023-0428,0,0,0de93bb0e535635eebbfedf99112ce8cef3ca284b9e0bd9f8cd68750853b4f
CVE-2023-0429,0,0,e0618680b78219428317d6601f27ee8a8a87ae62e6dd517b8d19758523eb5906,2024-11-21T07:37:09.807000
CVE-2023-0430,0,0,acc72707e03d0df228268319b61aeb8ed5dd3736ea4142fcd4397f7588a561d9,2025-01-10T19:15:31.433000
CVE-2023-0431,0,0,459bdaa83a3fb57e14cccc7abf189e66653179e7b70ce44db48ce68f910d878c,2024-11-21T07:37:10.037000
CVE-2023-0432,0,0,c18e0783d1e0318a05bbd49e4ea8bbbe47ddc14a8a5fde83bcbd13b6911b30c3,2024-11-21T07:37:10.143000
CVE-2023-0432,0,1,f570b71e1e00458582a8171c05750fba52db4f805d00c30b1811d9ebeabd8ec9,2025-01-17T18:15:19.433000
CVE-2023-0433,0,0,d42e70fbf8f746ae44adccb8cc0a5b25d08ad867d573fa4f7fa6107bc224a64c,2024-11-21T07:37:10.260000
CVE-2023-0434,0,0,f6a521f3082f28ce6108fa4ac69c86e0205efd2c815548544f3fe58009020014,2024-11-21T07:37:10.390000
CVE-2023-0435,0,0,e42db54bec450824437717898db9abe4d680ff3a0ab18892f0b145e2a2a338f5,2024-11-21T07:37:10.510000
@ -217072,7 +217072,7 @@ CVE-2023-22297,0,0,e2cfb145db1e3ffb902651a518ec98e6141d79673ccfed77db7cf2dbcc633
CVE-2023-22298,0,0,f6dc805831e3b12f7de9ebd55e11a238a6127133a62593b1508897e8f9f4cb83,2024-11-21T07:44:28.837000
CVE-2023-22299,0,0,84693ef0c7bb509df895e8bac855b156e0a311fd0ff082f7e19ad8e321dcec41,2024-11-21T07:44:28.933000
CVE-2023-2230,0,0,2376b593af6286fafded76ff5926b1e2b7d1ae9ecbf888641f9486885a8dfaba,2023-11-07T04:12:14.200000
CVE-2023-22300,0,0,050be24c7c96f9e183e131604c3ab54b16bc7dfef76b8b41af210a17fa0bad62,2024-11-21T07:44:29.050000
CVE-2023-22300,0,1,dbcdd932d1d304d05b27d88d5f52e3ef46ee88dd096a5519f2d41c93013439bc,2025-01-17T18:15:19.947000
CVE-2023-22301,0,0,0a10a6dd91105447bae548de98a8ea94a99eaf9991d4047f34aab0e2b29db3a4,2024-11-21T07:44:29.147000
CVE-2023-22302,0,0,ff5426583dc64cb2c6b21518546068fd3e471ffa8da3386dd10671de652a67d5,2024-11-21T07:44:29.253000
CVE-2023-22303,0,0,61c82bc74511e23b43e9e302a9d93cbbbc62e7ebeb9f7c7eff0d77d6380a2b1e,2024-11-21T07:44:29.373000
@ -219730,7 +219730,7 @@ CVE-2023-25594,0,0,8abf09e59f68ceced335bf46e94e35be82d646a84818ef449033b8635a8f5
CVE-2023-25595,0,0,726a4d03782813d387168e4496552502f96f8a0a02861e47f01e358207039d15,2024-11-21T07:49:47.773000
CVE-2023-25596,0,0,f88f62634ad25859484d0cc31d9b059e5a63e3289ddac7a38fb605882d4dd22a,2024-11-21T07:49:47.883000
CVE-2023-25597,0,0,4517b2582a5f522ffedbc2116021e054810f3e35d0154a016d6237b2a8116c33,2024-11-21T07:49:47.997000
CVE-2023-25598,0,1,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000
CVE-2023-25598,0,0,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000
CVE-2023-25599,0,0,e8f10bf4c5e1aae36571db6e2ab215516a8e52f6532eb9e92eed30ee54734b43,2025-01-16T21:15:14
CVE-2023-2560,0,0,31b34f6bacde082f5f057474e07f836071f934616db2b7cff0b0479c82958eb1,2024-11-21T07:58:49.790000
CVE-2023-25600,0,0,74c80d7f9443116975fdc60b897e0fe9401c713116e099707e64f108069de608,2024-11-21T07:49:48.400000
@ -220028,11 +220028,11 @@ CVE-2023-25908,0,0,d44360c825c09bea35279d42c7153a53fdd12277415e34c57903e54091770
CVE-2023-25909,0,0,714cddfdd75f1b4ea7e881417d151c8506ba152190ec1d08ab811eee9d658732,2024-11-21T07:50:24.600000
CVE-2023-2591,0,0,7c27e595b888753998a6776d8423b11e7f3b409c6e0417d28bf825dd5249753f,2024-11-21T07:58:53.503000
CVE-2023-25910,0,0,142bba38733997b5c55a3c0d314fb84004341c894367bd7f169e7fa153e7a506,2024-11-21T07:50:24.710000
CVE-2023-25911,0,0,fc74b4cf72f9b9c4e0b7fc011c9ec763163c929ac5129f1d0f337641a7b3894b,2024-11-21T07:50:24.840000
CVE-2023-25911,0,1,3a98c867d12555c60f4262e8e77d7030a7b621afb972e2fc259dffbe88e1dec4,2025-01-17T17:55:14.593000
CVE-2023-25912,0,0,894b2fd5456e8fbe83ab0b10f0eab811da9a1928879e0c3db64875eb953082fd,2024-11-21T07:50:24.967000
CVE-2023-25913,0,0,6a91a9eded59c00cc598635ddbe6932ed1f65268ece3db527fc9c04fac8cb0f4,2024-11-21T07:50:25.080000
CVE-2023-25914,0,0,59463d2416f03e6ec5060d7963c40a18472420a29b874c6c0db6f09f0993e112,2024-11-21T07:50:25.230000
CVE-2023-25915,0,0,ac1356fb3904fb3480ee562c53e20c2c96f303b68ae0d6270f1b87a4d55643e6,2024-11-21T07:50:25.357000
CVE-2023-25914,0,1,36c08243bbd0fd2e7dd128385e9c7089591b2279e1b972aff853340762b88b5b,2025-01-17T17:54:40.107000
CVE-2023-25915,0,1,05f4a66d1d321910afa31096f2d912825cea9a498d14478101ad02866603e99b,2025-01-17T17:54:52.697000
CVE-2023-2592,0,0,d74a21ad07e81cc347069c4edc810aec39f12ab86f734829ab6d0c99d89af9e9,2024-11-21T07:58:53.627000
CVE-2023-25921,0,0,f72a487373fc04597a1201466c7f2d8d56c50717e5bd21fbde587ac436cc3f45,2024-12-13T20:53:05.783000
CVE-2023-25922,0,0,0f1b8f78298cca9f068ffab08027b1337d94c98e2e6d7df4df0fdc8dba2aaec7,2024-12-13T20:59:47.813000
@ -221033,7 +221033,7 @@ CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f0
CVE-2023-27300,0,0,2731d707de1e6137ea37ccb1442ea1cbd992ea5ff26bc94a835093c579079405,2024-11-21T07:52:36.353000
CVE-2023-27301,0,0,e75569c03530c3787db8a5025aaab05ee1c08fac50fc8089fc27bbc2e8472b25,2024-11-21T07:52:36.463000
CVE-2023-27303,0,0,eaba63aa37eb9af5018680bdd423400f9bb61ff48e38b570d90bcfc6fc3388c9,2024-11-21T07:52:36.580000
CVE-2023-27304,0,0,0cc477c992ee1b38ae38bbdc46238b14feb337e2b454b418b8dab36b98667dc7,2024-11-21T07:52:36.693000
CVE-2023-27304,0,1,a501e65e3e5e550e7f4b34c3cc05177415e4066170476ccfb2c5465e18a13d85,2025-01-17T18:15:20.303000
CVE-2023-27305,0,0,4cf303d0c0928a90e24c0a02412c953ca387fd40216cdb277dcd541ec2552dd6,2024-11-21T07:52:36.803000
CVE-2023-27306,0,0,847b158e63f2fc7a89b9766d995e5e48514f49c69fc074204576112481970259,2024-11-21T07:52:36.923000
CVE-2023-27307,0,0,213313277f2b73db10152e58d2dba3376cab552d70210ef03d7d5a0122e0a747,2024-11-21T07:52:37.050000
@ -221119,7 +221119,7 @@ CVE-2023-2738,0,0,935afffba4de04fc2776d13f93d9bc63c51d6e63056330c8371d2f5d680acc
CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9dd12,2024-11-21T07:52:47.567000
CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000
CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000
CVE-2023-27384,0,0,6504a55fe0ffca21f7605fabdf0a7b2260b2c2ce952fc153e652bb9e0e1e8fd6,2024-11-21T07:52:47.937000
CVE-2023-27384,0,1,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000
CVE-2023-27385,0,0,c68ecdf016bf2281f407cb9610cd4bbaeed3891f5aa2195ad6bf2208b3c782a6,2024-11-21T07:52:48.053000
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
@ -221570,7 +221570,7 @@ CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea
CVE-2023-27923,0,0,3a143fd60fb8ad11feb760b5ed0965b170454e4647e49db79d5756135e427dea,2024-11-21T07:53:42.473000
CVE-2023-27925,0,0,5ca31ace52a2e3cccc0fdb2255ed7d5bbe1b629ee84594ecb1eee3b8e95dc54a,2024-11-21T07:53:42.590000
CVE-2023-27926,0,0,92311e685781f75574201f01b5d1ef2b44ddb89904a003df3573343542e48164,2024-11-21T07:53:42.710000
CVE-2023-27927,0,0,52779eb444208f1ba62abd320b1a5c02f84dc7b293d3dd48c6ff5c6cf3a83eb7,2024-11-21T07:53:42.827000
CVE-2023-27927,0,1,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000
CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000
CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000
CVE-2023-2793,0,0,a02ac57ccfcc6bf1345b991bf0b54c08efcba6693c369c3c8f72453068bd79c2,2024-11-21T07:59:18.110000
@ -221663,7 +221663,7 @@ CVE-2023-28010,0,0,cea1c83b1a1de56721d3fff63387ec5e4316025f3be2e1922fd578f16178e
CVE-2023-28012,0,0,597f3d542aa3e6d473b0ee06f4f2e30fc7a3c4c261db6e2d7465a4141feca741,2024-11-21T07:53:55.727000
CVE-2023-28013,0,0,ca8516e045e8d827755979c2497ae1dcbf1ff4b1ae4c4f57debc7acf63dfc852,2024-11-21T07:53:55.853000
CVE-2023-28014,0,0,ae9cd8ad6f351e0324a3851e33ca9a5e2e664060b026db12d466ef4138088fe0,2024-11-21T07:53:55.993000
CVE-2023-28015,0,1,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000
CVE-2023-28015,0,0,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000
CVE-2023-28016,0,0,0ea99d77c33f9c7f63039000d06d08b21178affc71516064cbbfab51ae1cb932,2024-11-21T07:53:56.240000
CVE-2023-28017,0,0,35716eab1dbf086839b9951cc0fa716a1f08b1df0f6dd81d881099e22403968f,2024-11-21T07:53:56.363000
CVE-2023-28018,0,0,2094804c51d0176650ceccc697a32d6ba95bbcbf330493713ccb998d3d224411,2024-11-21T07:53:56.500000
@ -222025,7 +222025,7 @@ CVE-2023-28380,0,0,ab6a7a500298be9ef83244b76d2b0ab34530ee1d27727ed37830671bc6501
CVE-2023-28381,0,0,1a9707f277ef8a423a186132cbd8b4225a287d1b1d7725f1112d0c37de025b98,2024-11-21T07:54:57.673000
CVE-2023-28382,0,0,54474447f09dc7eb708c86707f5aa7484af8959e42f6d0e871698326dab881d3,2025-01-15T16:15:26.460000
CVE-2023-28383,0,0,48697de1cca90d6b3ae134dc9ce22dcb6a22b4802be54231637854c435aacd58,2024-11-21T07:54:57.887000
CVE-2023-28384,0,0,e957b9384de65ebb6a80a839cb3cd2ea8a514b08919aa116c79524b409a5f376,2024-11-21T07:54:57.990000
CVE-2023-28384,0,1,4aa33c82e76bb6f8b4b0942e1b075d8e06f17782150f9a17400d8fd319ec11ad,2025-01-17T17:15:07.697000
CVE-2023-28385,0,0,61bd73f4c07fb2f7be9167196c277434b81452ce75602fd8f2e661a62695b4ea,2024-11-21T07:54:58.083000
CVE-2023-28386,0,0,3d8c94f9f394dc7e85a4ca0e062a20b7cf4b75bb1621666ff00503e30a10da09,2024-12-09T18:15:19.273000
CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb1395ac,2024-11-21T07:54:58.317000
@ -222043,7 +222043,7 @@ CVE-2023-28397,0,0,4bff9ed10c02507982d7b9dab6671245255794a218efdc6bf229f1abb9748
CVE-2023-28398,0,0,2aabdbc180b2d9821f7c6981a841f35d5201adbb04843a3da9d33c58786be7c5,2024-11-21T07:54:59.510000
CVE-2023-28399,0,0,111e9d6b4464164ec693f6735189466b823de7819518dc53ec80cbfa558e019c,2025-01-09T21:15:22.560000
CVE-2023-2840,0,0,0555537b6851b1fe0f6a1eeae24d6aca47261971d05f2008fe758de20f6417ba,2024-11-21T07:59:23.673000
CVE-2023-28400,0,0,67a025af7ef4baf741188bdcf00c3ad589d6aec1acd29840c9e7a073fa94c0cc,2024-11-21T07:54:59.713000
CVE-2023-28400,0,1,d2704defd653ccb34a33fe61fb32d5cdc1e9e3155cf972a3d09da48df74e31d6,2025-01-17T17:15:08.363000
CVE-2023-28401,0,0,102355fdd79556c54d740c7afa362a52f2c638a67b948508ee1e87ffe44821d9,2024-11-21T07:54:59.807000
CVE-2023-28402,0,0,c38e72831463b69c6b40624d71abcb938422de02ddbe9d1a7ec65f3416f64165,2024-11-21T07:54:59.930000
CVE-2023-28404,0,0,8cba623eb88a12f1ff1c663d93cba5426a2b008fd2ff25ef48ad773dee2738e3,2024-11-21T07:55:00.030000
@ -222289,12 +222289,12 @@ CVE-2023-28647,0,0,6e622e4c8c506d34225481f32977a08d6344f5c37a9e28afb412ed024963a
CVE-2023-28648,0,0,858ff9277a18ca9a6568baa82146abca15de5820e777ceee09d8606939c08232,2024-11-21T07:55:44.227000
CVE-2023-28649,0,0,b546ed1247b528c80127d17229ccdf396336cfa9f485e93db64beff6ef3a7373,2024-12-09T18:15:20.430000
CVE-2023-2865,0,0,4ca47513f5d6c6a421ad8e01776d00552671f81eb53474ef196889d12cfa70d1,2024-11-21T07:59:27.100000
CVE-2023-28650,0,0,1450dfd4e00e9813b9f852d7a370533d90f4dbe8459b3ea198bdd944c6ccfc68,2024-11-21T07:55:44.473000
CVE-2023-28650,0,1,eb49d182b6197d597a763add36dcef3af56c2de51acaec560234488e891091f6,2025-01-17T18:15:21.340000
CVE-2023-28651,0,0,f7cb336db603427fd325f39326faadfed8890a1591be62055f8fc4903963d889,2025-01-09T21:15:22.740000
CVE-2023-28652,0,0,ff42aa9eecf10ae50957c0e1ecd97ffcd5926fcdca37afd4572284e734c4f3d4,2024-11-21T07:55:44.680000
CVE-2023-28652,0,1,fe4235591b4c07f5e3485ad090b6ce9d4d95c115269d5c6ab90efc13f7f374f9,2025-01-17T18:15:21.607000
CVE-2023-28653,0,0,85425f9a644d94dcc88660335cf1fba4048b509d7b414b67f0faa690535532b2,2024-11-21T07:55:44.780000
CVE-2023-28654,0,0,131327885e5fa2643b72e4d86d04cdaa97dcfd352bd1c6dbe7aa3f5c6b65815c,2024-11-21T07:55:44.897000
CVE-2023-28655,0,0,8409128c7a1b366a01a25f870d9615353d35f13c524988216bf809a856adddca,2024-11-21T07:55:45.003000
CVE-2023-28655,0,1,6686d9a13539db5cf9c93492ef593c530700e40eb842775590ba3529e11a8526,2025-01-17T18:15:21.850000
CVE-2023-28656,0,0,71923347f2d14def6102f4bf85546159cbcf14358f9ea6a41c9c6f7bdf0458ca,2024-11-21T07:55:45.103000
CVE-2023-28657,0,0,b598ea5dd934ee0fcc5ee876e12d99ee8cec046c6f6f43a4f6bea3784038d2c5,2025-01-09T20:15:32.300000
CVE-2023-28658,0,0,4721cc7813fa8c14291ea10a6bd934084fd896731e35e1047a44b653e020baa0,2024-11-21T07:55:45.320000
@ -222359,7 +222359,7 @@ CVE-2023-28712,0,0,65d46ac765e466c7b19911f8fe09fff905333a780340064cdf6d30726ab5b
CVE-2023-28713,0,0,0c63ac3fc393e79d8eb979361877f48466e2baf57ce0eccdfd761ffa103b8706,2025-01-09T20:15:32.550000
CVE-2023-28714,0,0,7963e328f5538c35128d9e328b5ad35d468e921ea64ebebd603d2bde06d9db28,2024-11-21T07:55:51.683000
CVE-2023-28715,0,0,639383fbbab5d4f6889d81c843a9748eac9707d5ee8b338fa759de273f23cf9c,2024-11-21T07:55:51.827000
CVE-2023-28716,0,0,b7087015f3c47188165e814a63a01569dc6584313b021a53e9f89c7fb622fab3,2024-11-21T07:55:51.953000
CVE-2023-28716,0,1,42e0d8096fb1f7bfe4f3c119d4a3f0ef669a7c634429090ac53fcf3d97ed21d4,2025-01-17T17:15:08.537000
CVE-2023-28718,0,0,f847f98e8b25e13dddbbfc5d671ea260cbe9537c6d0d2d7c291bab4c19d69849,2024-11-21T07:55:52.073000
CVE-2023-2872,0,0,c809c535f35d54173eac0975d903d1696c449f170ba2895550c167a12d662551,2024-11-21T07:59:27.960000
CVE-2023-28720,0,0,ac09d331d5cfd20938bb7223dd423e76cc8964f995f8c7729deac6115c29c8ea,2024-11-21T07:55:52.187000
@ -222744,7 +222744,7 @@ CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3e
CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000
CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000
CVE-2023-29150,0,0,53fd9d7666e4c7481ad461d2c290eea5e35316c6b0e762d9d695758c393300a2,2024-11-21T07:56:37.140000
CVE-2023-29150,0,1,c2f33a58cfaa7e9c12e1da6a90a6dfb46bfd0d9dec7fa728bf1442451c2a122d,2025-01-17T18:15:22.093000
CVE-2023-29151,0,0,727047795af5b498bb8bb582c46dd36be3631963786c95d5e8a4ca6f1c857b84,2024-11-21T07:56:37.237000
CVE-2023-29152,0,0,eceffce06206d987481c535a3ea7c671bd8caa5cd08c017b9a186e3d386a055d,2024-11-21T07:56:37.357000
CVE-2023-29153,0,0,4a8bc2238fb5bbbda2a2410b86d68f6271586134e8d4666b131c2ea851408a47,2024-11-21T07:56:37.470000
@ -222763,7 +222763,7 @@ CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a8
CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000
CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000
CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000
CVE-2023-29169,0,1,1f1155f544b4cef09f3c22f102bc2105a854d1e4172805984714266e7b7a0f86,2025-01-17T18:15:22.337000
CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34
CVE-2023-29170,0,0,a14eee9c3b65ac3bd8d74bcf4947cbc176ea7dede3e441303f55531eb26d21b7,2024-11-21T07:56:39.230000
CVE-2023-29171,0,0,209e525798550871fedb6e85e35b4c826a5963d1b417ebdf34529996104307bb,2024-11-21T07:56:39.340000
@ -224593,7 +224593,7 @@ CVE-2023-31759,0,0,a2d84b0a8dca779bd4a75f12eaed410b890b68e8e762e9e85d5ea4a9f199b
CVE-2023-3176,0,0,999fe1ea7317073fe2b31bb323d98a6f29f6d8081642f27e32d077db6c6b4e5e,2024-11-21T08:16:37.740000
CVE-2023-31761,0,0,5b67bf26500bf4283d4625610816cb1fea1c4f34676ccb4e96c23468ee410707,2024-11-21T08:02:15.193000
CVE-2023-31762,0,0,74ed2cc1b24d33344283a6a9f3444e0b89de3bf42393ee059f6f223b7fd77e5e,2024-11-21T08:02:15.327000
CVE-2023-31763,0,0,529cb6c35ab3508fbb4fe5b768b5a89cfedf5e45655775944ccb778d70d078ce,2024-11-21T08:02:15.463000
CVE-2023-31763,0,1,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000
CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000
CVE-2023-31779,0,0,57d1dd015d41bdb7a16d9d6f14cf7992f409481c534697d1fe2caa03c46dac25,2024-11-21T08:02:15.617000
CVE-2023-3178,0,0,3137810340e9e86c4c3b5db496a9f5d0dabc9dbc8cd8490fceb40dfc4e419573,2024-11-21T08:16:38.017000
@ -224612,7 +224612,7 @@ CVE-2023-31807,0,0,767b5f080466fa8df5df923ded96cba99455e65929a37edf8f27f16c63dcd
CVE-2023-31808,0,0,4b91e1f555e81a8997ddae2e290898c6d0be80669ff94777a810f5c7a28d6784,2024-11-21T08:02:17.140000
CVE-2023-3181,0,0,f85113ad48f7de9b5138016b5a769db3ba1263ef4e9bd2ae1e4348037f618738,2024-11-21T08:16:38.460000
CVE-2023-31813,0,0,8e8fc395bcbeac8e899865e7f66dbb1c6df21b82d10cdc9a327fabcc1831a1ae,2023-12-16T02:15:07.263000
CVE-2023-31814,0,0,7a627986bb85e8e35b669fb28e3cdea34a3c6eec5454bcdf5d5b8d2da970f381,2024-11-21T08:02:17.297000
CVE-2023-31814,0,1,63e15e3e48004d4af1bddab36ab4ec66f76fbc3890eef88216b584ab5e7988f8,2025-01-17T18:15:23.030000
CVE-2023-31816,0,0,adbf1d16e4cc0799caba61ef60180156a31de4b8c68096c52a492443b815a87f,2024-11-21T08:02:17.440000
CVE-2023-31818,0,0,e2293c2ab2a56409b4ddc5add2c2e04bfaa690b925948f5dfb2f11b0fa3fe3f6,2024-11-21T08:02:17.570000
CVE-2023-31819,0,0,f8ffea9ec7bbc711c06c9fb7fdeb8d6590e2c99b3e86e7a8fedc11e5f8dc25dc,2024-11-21T08:02:17.720000
@ -224623,7 +224623,7 @@ CVE-2023-31822,0,0,45613132497589a9dcb950e1f37ac3a395cbe029e376bf9556698be4e3a27
CVE-2023-31823,0,0,0ce96b85f0042f0b6d51089686bb1cbb368a5ff87b8ac60c040e2010e668d2c1,2024-11-21T08:02:18.273000
CVE-2023-31824,0,0,1f194dcc013dbea37681faeac319ede47ce10cb4422c1beef9219e2bc0a23d81,2024-11-21T08:02:18.413000
CVE-2023-31825,0,0,03dbe4b1a5682614e9eab4c399d6d51c119b6e7b094e5b42da6f242bce34bafa,2024-11-21T08:02:18.570000
CVE-2023-31826,0,0,262ced0a2e626dbfd2a116dba5aa150ca6fa01a95f2a5e4879a4b55e3ad96f54,2024-11-21T08:02:18.720000
CVE-2023-31826,0,1,94ad697a1cf2f06936284069cbcf1523df00d869d08e163fd3260b126185eab1,2025-01-17T18:15:24.380000
CVE-2023-3183,0,0,53da3111600f6b312ce92b28909fdc893a3ab679b13c31964b17fca0c5c6dac0,2024-11-21T08:16:38.710000
CVE-2023-3184,0,0,5a98f666e0a46484595c3fa08341e96998bbd480baa7f5b498adc629dfeb2239,2024-11-21T08:16:38.857000
CVE-2023-31842,0,0,216b8f15018b084ece08520bbe6db9754d2bfd5a6c33dfcefd31c96d920099ee,2024-11-21T08:02:18.863000
@ -224639,7 +224639,7 @@ CVE-2023-31854,0,0,1afe22a18848e9c434b0c259f6d2c90301fa42928d2094ebf0bc1b4b52fc6
CVE-2023-31856,0,0,ce256db1525fce6a46e28d9cc8111df499b2085637139fa8706530beb5896492,2024-11-21T08:02:20.267000
CVE-2023-31857,0,0,7bd3853f2c55682965431fa0d6799811d368a0e716fd1913e523e8cb2e1eb410,2024-11-21T08:02:20.413000
CVE-2023-3186,0,0,14a8a3e02f8d6ed26188c9f463e876e766ad72b9a21434e816a4de3953e3d487,2024-11-21T08:16:39.013000
CVE-2023-31860,0,0,b19f93d6a0c37e48d579870939cf38501c29b9fec1e4af7e585d4bb8b6a49d17,2024-11-21T08:02:20.550000
CVE-2023-31860,0,1,c8cd823357aabe2248349ead353aa43605af9164cf40845a237ab4fd189848d1,2025-01-17T17:15:08.863000
CVE-2023-31861,0,0,00ed8b460a421cbea6dd8b076a614dfb6e50c87d17fb1a33433f66e14cf7477d,2025-01-16T15:15:10.720000
CVE-2023-31862,0,0,e5d2282f2c43ebaed31f9de83715b1445773fd7849c890a179b5317ad27e92a4,2024-11-21T08:02:20.827000
CVE-2023-31867,0,0,3f97c746a106b59feb7da8efbb130c3ebd33dce765f13b1306b2c553d6ba473a,2024-11-21T08:02:20.963000
@ -224708,9 +224708,9 @@ CVE-2023-31983,0,0,ef58504e0a637118d6f8845dd53840a1d2db8ad16799a879832aa8e940c8d
CVE-2023-31985,0,0,bd98f2530ab95ee94061aa53e90417410a462732cff960d98902197614bfe101,2024-11-21T08:02:28.473000
CVE-2023-31986,0,0,4554667e4b44524c54a58b9599dc684ffccd4e428d7fd728ba8c634cc47230b6,2024-11-21T08:02:28.607000
CVE-2023-3199,0,0,3090d868ba2232b79a6345d288a327f64a94c462d32135357515a4c0d92e958f,2024-11-21T08:16:40.807000
CVE-2023-31994,0,0,8f3259b7baaa21013a3ed60deaccd9028d223659ec6283d27b8b7206dc79d99b,2024-11-21T08:02:28.753000
CVE-2023-31995,0,0,fd73938999eb646be2e37ed7c0ede7812f9d86f32a33bf7da0a61b1076e2ef3c,2024-11-21T08:02:29.403000
CVE-2023-31996,0,0,5bb80e295e15fdb70abb0cfcbfb03a96a8d6ce706d3028dd7b043d4557847bbc,2024-11-21T08:02:29.653000
CVE-2023-31994,0,1,f52d122711ee0b067c08e1d09861ac42925c6e7f35be5acf7e4bdc9abaee5571,2025-01-17T17:15:09.097000
CVE-2023-31995,0,1,7b0c1be4afc967363ddd9adb4811ac5626f5b72b8d18cee0978a04ff5aed9f62,2025-01-17T17:15:09.840000
CVE-2023-31996,0,1,8addd81106eaa0f63a624672d923cf5a11a3c2aa0439ab8109e4f0cc63f3e2ea,2025-01-17T17:15:10.213000
CVE-2023-31997,0,0,23a6860242c9df6be185c42cfd4a4a473fe5b3dfcafad46e19bcae2a47554244,2024-11-26T19:15:20.320000
CVE-2023-31998,0,0,ac25b80b9728b3ab0412e032d163754f5150cf9245971c8f4f1d63d9f7860f81,2024-11-21T08:02:29.997000
CVE-2023-31999,0,0,4453265e6b17508561fd877c6ee02695732cb6b46320f037e8dc6cfcebeb75c8,2024-11-21T08:02:30.127000
@ -234977,7 +234977,7 @@ CVE-2023-45585,0,0,ae76bf0d2278756cf8178bb595651b14f13c7b9a7bccf13bd28d7b4108cbf
CVE-2023-45586,0,0,6b565c71ab704bd8e631f209959d1898851432ed4bb3fc8b2b21c0a6ef49fb65,2024-11-21T08:27:00.740000
CVE-2023-45587,0,0,025d5ccaec3461c7aae70d71ac1f3ff5df6906dcd056c99dca83a5aac53bbe47,2024-11-21T08:27:00.890000
CVE-2023-4559,0,0,6d3dd9975708c32ae11f782d8520452850e9b29b83aba9a24d0d60628e2c25a2,2024-11-21T08:35:25.270000
CVE-2023-45590,0,0,6524e3cd1fe04a3ebb0f01ad1b0473d8c7217e18eba48abc93f18386ca01fba8,2024-11-21T08:27:01.027000
CVE-2023-45590,0,1,05ecf04760c6be91163ac0bd5d4f759690d034198a058ca36f4c11671ed8f2dc,2025-01-17T17:08:31.843000
CVE-2023-45591,0,0,45936665370901cf6bd6f3c4d1fb0775d3e157fe83efb64965918cf648dd4184,2024-11-21T08:27:01.167000
CVE-2023-45592,0,0,668bbe96709a91593d310b83f278f0ab698a6defdb9b3a305c9d33af64243101,2024-11-21T08:27:01.310000
CVE-2023-45593,0,0,15650ee38208d7c8cffe49c3f51f946f93a352336d9e31486e0ce70c376d733a,2024-11-21T08:27:01.460000
@ -236485,7 +236485,7 @@ CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66
CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000
CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000
CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000
CVE-2023-47542,0,0,2c301ea3fc1923df3d1786b1c81f5d6312992d198827db876d7bcd4ba7084720,2024-11-21T08:30:25.520000
CVE-2023-47542,0,1,308ff121ada77a017b97131c594f13cddaa5bbd0edbee9d59a4996597c3587ab,2025-01-17T17:11:28.947000
CVE-2023-47543,0,0,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000
CVE-2023-47544,0,0,37c99d07aab35bc0bebf060938c609faefc3158817cf4b2a384b1ee52ef99508,2024-11-21T08:30:25.707000
CVE-2023-47545,0,0,4f687d84e6811695356b024af283b6469f1342f0a2079897109fb36bb91ed5d4,2024-11-21T08:30:25.830000
@ -237508,7 +237508,7 @@ CVE-2023-48780,0,0,c639956bfab0ce7bfd5af6156a8111806fc286d7ec80bb19f8083e2bac841
CVE-2023-48781,0,0,443c0eaace84c8a3023340ca81970964577a0302cfc23bcb008a36d2a89d846b,2024-11-21T08:32:25.940000
CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382cba,2024-11-21T08:32:26.063000
CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000
CVE-2023-48784,0,0,fad171fd5c14eb35c1913cc0abf8a8b72cc534253e00f688d3b68ba966faf302,2024-11-21T08:32:26.347000
CVE-2023-48784,0,1,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd6241e,2025-01-17T17:19:51.033000
CVE-2023-48788,0,0,117cd7d9101610b085c354a97190a21e5f1fc93ca8e7af0fad52f3fe309ccf1e,2024-11-21T08:32:26.470000
CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000
CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000
@ -240096,8 +240096,8 @@ CVE-2023-52543,0,0,5283d1b3068666f9df1d4bd34373b734822e71b72480090d12dd8445b86c1
CVE-2023-52544,0,0,406148b07c3e067d8a9476be53ce0c11d92291c013d48a8edbe35d723499379b,2024-11-21T08:40:00.890000
CVE-2023-52545,0,0,9a8fc8901aa644cde1d29ca0a0573e4a085058e72b5ee8839f817feebb241a74,2024-11-21T08:40:01.073000
CVE-2023-52546,0,0,595e1c1b42c7971cff7132e9cb85749c3833d2ddda52158da49cbfedf79cf606,2024-12-09T13:54:48.487000
CVE-2023-52547,0,0,8137c1d12289f1a7f98ca28b5eeaf4141cb9fd996bf309fb636147e5123add7c,2024-11-21T08:40:01.370000
CVE-2023-52548,0,0,041a4244e394c3d794809c7145324075f3f7c8df545d2b61c18f23ceec55ccd7,2024-11-21T08:40:01.510000
CVE-2023-52547,0,1,13cfbe1c918f5a4b0cd0a89536bf425d70e25d07630d011e3b1655a8627d09ed,2025-01-17T18:32:12.300000
CVE-2023-52548,0,1,5e9b74916239ca79bb24807d83861f84cd24ded664a5de58fa1b70ca1489bc61,2025-01-17T18:31:57.740000
CVE-2023-52549,0,0,ee9009133fbe9f80d74dff5352f9b88a18a64ffd6ce72d5c26cd7d7807302fcc,2024-11-21T08:40:01.647000
CVE-2023-5255,0,0,b25817cf164b6b92e839f9fb2ed96a7d7247900cb99b8587774e529fa151fa4e,2024-11-21T08:41:23.090000
CVE-2023-52550,0,0,df02f2239718e53b99444de87a20222af6feaf7990812f74cec672b0ce4ff90b,2024-11-21T08:40:01.840000
@ -240275,9 +240275,9 @@ CVE-2023-52706,0,0,834345482be0d546ba50b0cb794dcb116ce50eb7b30eea30e56c36d1bfaa6
CVE-2023-52707,0,0,1bc7b595266b548d6027993e063414952e1e09f68ff73fe8319f05c3207dc492,2025-01-06T20:39:33.220000
CVE-2023-52708,0,0,79d1647a46a1e762e1f72065b91297259c43d8680df6c2128c54f559c8998f6f,2025-01-06T20:39:58.813000
CVE-2023-5271,0,0,57c69f88684b23484c89729e90ea1a49339f972575180d1b4d31fadcdba0e1a2,2024-12-23T15:18:44.853000
CVE-2023-52710,0,0,047e81a360897731f880d0599d295390f5494134b8904c6c7f6a32cc4bcc9d22,2024-11-21T08:40:24.760000
CVE-2023-52711,0,0,cc83855bf8e359d211f376a5ee43650e9cad5f7403105f7df8dba026dfcb6788,2024-11-21T08:40:24.883000
CVE-2023-52712,0,0,65525446b7fe131921c52f55da75710a708ef74b13614948d7ca7ba37ec14414,2024-11-21T08:40:24.993000
CVE-2023-52710,0,1,9bbd1f7a1a4ed012966ab0abb1a3fc7deb2b0ba4106e8e59e3113756325b8d92,2025-01-17T18:32:39.963000
CVE-2023-52711,0,1,d29b43a79a6ec43805b15017ff2a9696d678c401f57fa7f6617f0b13154b0601,2025-01-17T18:29:39.560000
CVE-2023-52712,0,1,d1b8d695e6cb234f9215c75edf54a720cfc64714a12f2c0ba8d6f0c02b1ba711,2025-01-17T18:29:32.770000
CVE-2023-52713,0,0,de6af38550e0c85a611046675f7763ec3d45059f76427f0389872a42693db02b,2024-11-21T08:40:25.107000
CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a0ec,2024-11-21T08:40:25.300000
CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000
@ -243093,7 +243093,7 @@ CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc73
CVE-2024-0834,0,0,4909462b05092a27a61fc0c22b9068b69fa51b5caf1c544fca449cadfb1bfd00,2024-11-21T08:47:28.510000
CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d8662f,2024-11-21T08:47:28.640000
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
CVE-2024-0837,0,0,54f84e3002cfdda564fee9168d6c1c7df787ca0f6cd3259ca2097134909dbeda,2024-11-21T08:47:28.917000
CVE-2024-0837,0,1,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
CVE-2024-0839,0,0,49086e11eae50fdeaa0fd1455d8cc94d52d9a0af6af252bac9ff62fabed8f3b8,2024-11-21T08:47:29.143000
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
@ -244996,7 +244996,7 @@ CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
CVE-2024-12022,0,0,8ddb6cca3fbeae75228ec6bf3688dd732e1771ac09aec57ec3253b8f7ff26581,2025-01-07T04:15:07.677000
CVE-2024-12022,0,1,4b0c4a5413ab235f6d4162bb8baa2320652f2e63275aee3944d2530558cd3296,2025-01-17T17:15:10.533000
CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000
CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000
CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000
@ -245064,7 +245064,7 @@ CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921c
CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000
CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000
CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000
CVE-2024-12124,0,0,546dc01e2004b604a5fc415ca243f058dc4bcf606929b3949091b081b3f7e353,2025-01-07T05:15:14.340000
CVE-2024-12124,0,1,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae9478697896b9,2025-01-17T17:15:10.653000
CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000
CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000
CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000
@ -245131,7 +245131,7 @@ CVE-2024-12204,0,0,dd2419f837ae2e8153f295f52cb2a01f412a1909c214527d0037cf9f21b9c
CVE-2024-12205,0,0,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000
CVE-2024-12206,0,0,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000
CVE-2024-12207,0,0,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000
CVE-2024-12208,0,0,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb921361cd,2025-01-07T05:15:16.270000
CVE-2024-12208,0,1,570ae5920f0e6b28dc0cde719aa86834356ad1572351e3f8a72e245ec26cd554,2025-01-17T17:15:10.740000
CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
@ -245270,7 +245270,7 @@ CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3
CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000
CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000
CVE-2024-1239,0,1,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000
@ -245395,7 +245395,7 @@ CVE-2024-12536,0,0,a925f1a48eff74b537962fd623796390384e9d276d37e7a9cb0d9ba10f946
CVE-2024-12538,0,0,09768d3293edcfe78eeb71291a6d043c617de31a086c72fbf20722cd5259fcb2,2025-01-07T04:15:08.720000
CVE-2024-12539,0,0,bf2bc8684b4967ec9692452689aaa296f660969c9ab0dd0ec9b638e64908ab0d,2024-12-17T21:15:07.183000
CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c91,2024-11-21T08:50:09.993000
CVE-2024-12540,0,0,e5d4dce4760b17e4b41f398ec25e8f7eaa8cdf3185b056e79b164244a895d465,2025-01-07T04:15:08.917000
CVE-2024-12540,0,1,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000
CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
@ -245539,6 +245539,7 @@ CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca
CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000
CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000
CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000
CVE-2024-12757,1,1,01072d625822b49e01384e601159c9c64ccc9d51e280e2ccbf25f2d79b8491d5,2025-01-17T18:15:24.690000
CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
@ -245812,7 +245813,7 @@ CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417
CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000
CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000
CVE-2024-13145,0,0,d619d4a0aac8850d0c75f520a9103dfd5ad1c1ab851866f38b7082760726771a,2025-01-06T01:15:06.253000
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
CVE-2024-1315,0,1,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e526,2025-01-17T17:30:38.363000
CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
CVE-2024-13156,0,0,41775375a80c93fa0950178962cf86cfd1e2c8b60f46eda85c616b6213d4e16e,2025-01-14T09:15:20.910000
@ -245994,7 +245995,7 @@ CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a8169
CVE-2024-13502,0,0,e35d372750cc88cf9cffae844c3d280bfcd57c36093969e074e189ae9463f58a,2025-01-17T14:15:31.147000
CVE-2024-13503,0,0,7576f806eda86dcd6b291425bfcddf3d4f266c37af3d5042d8bdb800498b7aa7,2025-01-17T14:15:31.317000
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
CVE-2024-1352,0,0,85cabdc392d08eea6a3af07faeea17433d56015caabb9ac17b4ff2bf52f31c91,2024-11-21T08:50:23.583000
CVE-2024-1352,0,1,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
@ -246049,7 +246050,7 @@ CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628
CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af3816,2024-11-21T08:50:30.790000
CVE-2024-1405,0,0,f1f20b7fcf6fcb7016c5464ac9de09f0711e13473f6f7d4ae7139e675dbe1403,2024-11-21T08:50:30.937000
CVE-2024-1406,0,0,6b28f10833aa0266c21bf391a699e38b0fbc18d07df506bf50ade27d766794c5,2024-11-21T08:50:31.093000
CVE-2024-1407,0,1,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000
CVE-2024-1407,0,0,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000
CVE-2024-1408,0,0,6ef60a72951d16c0b9e728b84742a4d35c67925763670f067b8c3c5941c31590,2024-11-21T08:50:31.397000
CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d89933849,2024-11-21T08:50:31.520000
CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000
@ -246070,7 +246071,7 @@ CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a
CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000
CVE-2024-1426,0,0,23b1a7306f53e67c5a563c9eb21d3cdb5365fa187ec8c954a68012e8a35c2dc8,2024-11-21T08:50:33.500000
CVE-2024-1427,0,0,045d36306302d266d38f2f3182a2a05490c1c0ad4388299e4f45dc3722894b2a,2024-11-21T08:50:33.653000
CVE-2024-1428,0,0,3cd64d4a3fa95db0c0830882d4e3074eb351510266e9e0c2b39fd04a5a4216fe,2024-11-21T08:50:33.803000
CVE-2024-1428,0,1,7796e13a2999d1217a0322c4c01e6866cfb2671a8159abaf43ba19808bf938a3,2025-01-17T17:48:58.150000
CVE-2024-1429,0,0,5058e99ef8f14eb515834ad0343e76a35ce86f45fd71d223b1d90d473652ec8f,2024-11-21T08:50:33.927000
CVE-2024-1430,0,0,3bc978d4dd692ba7ee4a7cc4d11c20fe662c755ea27eb731ad29addddec20cba,2024-11-21T08:50:34.050000
CVE-2024-1431,0,0,1230d8600678d12f7d6985eeb6243f7c0dc22668eba8d5138026b4c6a9e8e477,2024-11-21T08:50:34.230000
@ -246098,15 +246099,15 @@ CVE-2024-1453,0,0,0227e7a01863c94405e531357cdb0c10b796444052d7a86292908c61c86741
CVE-2024-1454,0,0,efee886e7293fa134cee300a2fdd8efed7a47176b613af6fe8be478634f8010f,2024-11-21T08:50:37.150000
CVE-2024-1455,0,0,e455ef50023fd394d707ee63f10df4453b9d4808077ff1d6df4f5071b048364b,2024-11-21T08:50:37.310000
CVE-2024-1456,0,0,8633e71f4c77a0e946debb84f2a4c8ad3ebd080d1f02a90e0c9dc34b01539861,2024-11-21T08:50:37.443000
CVE-2024-1458,0,0,ec3c20bc97fb6748d28a5192421ff51abc4fc396fdfc1241392bb352efb114cb,2024-11-21T08:50:37.560000
CVE-2024-1458,0,1,64c7a0990a0e5ef06a6e068d0f77c7374d95774ca4d8bc6bad25be47e5b94f2b,2025-01-17T18:25:27.900000
CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d0440,2024-11-22T12:15:18.250000
CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000
CVE-2024-1461,0,0,f584e3dbeb8031a8d480cb017e172e2d88e2d972ca75e28d7328042b55e0ef9c,2024-11-21T08:50:38.083000
CVE-2024-1461,0,1,8dba5338edac7720c236df8c7d75c36d10f5b1986f4c4e03d386744d26d52663,2025-01-17T18:24:39.060000
CVE-2024-1462,0,0,22404aaf8a49dc841b4dfb8015ef3d92bcfb9afb2b174c3158b4a5b6857e5937,2024-11-21T08:50:38.210000
CVE-2024-1463,0,0,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000
CVE-2024-1464,0,0,774ba0954367abdcfc9850ebba4296f304d8bfcdbba1a93325f46f442fb6af2e,2024-11-21T08:50:38.453000
CVE-2024-1465,0,0,5ee667cd15d63ff1bbe794bed1e8ceb6109854a7af40827b767f317b47dc50fd,2024-11-21T08:50:38.583000
CVE-2024-1466,0,0,8462e6000ae5180e55e19d0c1e3e4e7bfb5efcb71a99f4875c7c2804764d132a,2024-11-21T08:50:38.723000
CVE-2024-1464,0,1,5381513a296e0115ec061d8021538ebcb7a85f8770f33c8709fe5ce514f2b318,2025-01-17T18:23:39.073000
CVE-2024-1465,0,1,6e2482f9a41a51ae12b482537f83a337bec29ff5e6cdb76e1e42ee95e1d60318,2025-01-17T18:20:39.593000
CVE-2024-1466,0,1,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe9e,2025-01-17T18:18:00.443000
CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000
CVE-2024-1468,0,0,85909a6551afb5c9ed643a3adcc66d39fbe3b663e240971373eb4ce702b3469c,2024-11-21T08:50:38.970000
CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000
@ -246257,7 +246258,7 @@ CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13a
CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000
CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000
CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000
CVE-2024-1638,0,1,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000
CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000
CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000
CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebeaf,2024-11-21T08:50:59.030000
CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000
@ -247353,7 +247354,7 @@ CVE-2024-20906,0,0,b4d72f656cf19f941cb7a69e3c7a565591c3735c1ab6b1104f219eb9464e8
CVE-2024-20907,0,0,9de2ea9ebaa4c3fac2611c739233ad03c8e983e9691002701b71e49fbffb565d,2024-11-27T16:32:05.720000
CVE-2024-20908,0,0,e474d686b39416846ee4634efb324374d3301b95c4cba0a19fa75306b0cac4d0,2024-11-21T08:53:24.567000
CVE-2024-20909,0,0,e43d2b35de49633667df467f3c5d76ceef589ccb2fb385fce0db3081ab7dffa6,2024-11-27T16:32:02.417000
CVE-2024-2091,0,0,ed67c4fdff53bdb98073a15f2bb6c16b7511d3ac2ec4c3ab94c7ebb85210e54c,2024-11-21T09:09:01.480000
CVE-2024-2091,0,1,93bc41da0198455afcea975292628c6f37c463bc63f01893faeaf48ffb1acf07,2025-01-17T18:35:09.950000
CVE-2024-20910,0,0,0bebdc0efa26f8e0ead70e258e2c32c4d75b4b13d5813b7de7da8abdb4d78871,2024-11-21T08:53:24.803000
CVE-2024-20911,0,0,44ed94f6571ba1ed6ab71ecc01af753b87e7e45ad9412fbc292b9940946694a8,2024-11-27T16:31:58.250000
CVE-2024-20912,0,0,4e4c54d5b304f113a69d58829f20fa3206b36f29bc855bce84ffcddf8905f158,2024-11-21T08:53:25.047000
@ -249088,7 +249089,7 @@ CVE-2024-23120,0,0,ac06c2c8db62927ae0ff0b52d59bb679bc1d15c17597778456fb9ce2f4737
CVE-2024-23121,0,0,f927b1f7d7032f240c6a22fe10e3d2651315dc82dec1abe13791c8df2c776bd6,2024-11-21T08:56:58.800000
CVE-2024-23122,0,0,ea802f83148f077bdcacee0853bb097b88aa7ceae9c8e0c76ab719a3e8347479,2024-11-21T08:56:58.993000
CVE-2024-23123,0,0,89e1dd12c90aff262f16a0b9365760f22dc8506be190b933a3cedf3239423eec,2024-11-21T08:56:59.180000
CVE-2024-23124,0,0,3b1c96fd882b953a33460a38ff4c1b12232b92cb58f94c23614efc884e43af35,2024-11-21T08:56:59.373000
CVE-2024-23124,0,1,cf624f3b7cab7fb6fee299c2ba5a965e125ffc8d32f57a5bc3192c1a58f0ad11,2025-01-17T18:15:25.030000
CVE-2024-23125,0,0,554e34bed34462f3c5363e8b180e04e5c1d1cc8bc89dab422d642a824457d1a0,2024-11-21T08:56:59.570000
CVE-2024-23126,0,0,f8e5b5479f3c4daf2ec0a157b4f70ad1b3649cbac015e49b433a4827e6695343,2024-11-21T08:56:59.750000
CVE-2024-23127,0,0,e62634191327f3ef7db3dc55bd00ca620754343e9d8fb17493a6507775a8363d,2024-11-21T08:56:59.940000
@ -251320,7 +251321,7 @@ CVE-2024-26125,0,0,2c3257bf64e1f9bb73b26a4fbfc8be684d1eca4cc144ede6e81b1ca262a90
CVE-2024-26126,0,0,0704f19f338f2bb0acb508b253d0a2da44d884d4f86de92b6da40568e6480cad,2024-11-21T09:01:59.287000
CVE-2024-26127,0,0,a7e023b5ba5da3ad7af563324822a120bd0bfe59d4cb07ca927224a3bef75883,2024-11-21T09:01:59.407000
CVE-2024-26128,0,0,6ec59e3a008feca6738de761b3be3df5c35466eb2f92117550b0e2c3bfd06b31,2024-12-20T19:30:47.733000
CVE-2024-26129,0,1,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000
CVE-2024-26129,0,0,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000
CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b17,2024-11-21T09:10:07.777000
CVE-2024-26130,0,0,59dbefc86c1031aba378031c672a5f376743b0d682ff90d25ffac7caadc4d1ea,2024-11-21T09:01:59.757000
CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af4029a,2024-11-21T09:01:59.880000
@ -251346,6 +251347,11 @@ CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb8
CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000
CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000
CVE-2024-26152,0,0,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000
CVE-2024-26153,1,1,8c3ae9d2191858fd283b4e2f045e9afabdf52853492d2134f5e3c0013293cdc1,2025-01-17T17:15:10.927000
CVE-2024-26154,1,1,7a55563f56bdbef2620b8c6a609d390524041b120bd24f125f40f1983869dda1,2025-01-17T17:15:11.147000
CVE-2024-26155,1,1,9d6b88e7dbfad19e0aa14afa460da6171af4b161cec0634841d95815c20f7672,2025-01-17T17:15:11.327000
CVE-2024-26156,1,1,5ab58b3651faaafae4e5f4c0ea29eb006a0c55d0423cdf2a04d4a07b8a66b5c1,2025-01-17T17:15:11.533000
CVE-2024-26157,1,1,29cbdb0747048f6bf38c1a2fd7f90815e3a23c4798446d9d3ff85458ea1e4770,2025-01-17T17:15:11.697000
CVE-2024-26158,0,0,09fc1d75121ad09ea3a275f9cccd32b38ff46d4cb1778bb89e6ac29161fd0e25,2024-12-06T15:40:50.143000
CVE-2024-26159,0,0,1b48fef43c59f3ec54fb486cca3f3676b117339286d3339609cb0579c3d1ce4c,2024-12-05T03:06:07.380000
CVE-2024-2616,0,0,3c1888c11eeab37d5acfcf6bb075f78798d2b23b1d25b092860d7147320c3bea,2024-11-21T09:10:08.330000
@ -253073,7 +253079,7 @@ CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f31
CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000
CVE-2024-2819,0,0,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000
CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000
CVE-2024-28191,0,1,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000
CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000
CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000
CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1e2b,2024-11-21T09:06:00.070000
CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000
@ -253104,7 +253110,7 @@ CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c75
CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000
CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000
CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000
CVE-2024-28235,0,1,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000
CVE-2024-28235,0,0,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000
CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000
CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000
CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000
@ -254220,13 +254226,13 @@ CVE-2024-29982,0,0,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adc
CVE-2024-29983,0,0,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000
CVE-2024-29984,0,0,1e929976d60d8d8c80a8b4b034fd4acc9655224e09e9042f98560c9a35205d22,2025-01-15T18:43:37.357000
CVE-2024-29985,0,0,95b40f746fa954c9414076d1fb815efea23aa50e94505fc471b09342077083a5,2025-01-15T18:43:11.970000
CVE-2024-29986,0,1,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000
CVE-2024-29987,0,1,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000
CVE-2024-29986,0,0,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000
CVE-2024-29987,0,0,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000
CVE-2024-29988,0,0,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000
CVE-2024-29989,0,0,56c8da873d916d5205300f56ed402933d12560adf2d90e379890eed42730b04d,2025-01-09T13:56:22.663000
CVE-2024-2999,0,0,2ad67e6bafa77ccafcc440f8e6b2fdd38c9778d3b6a3320578b33ffe57141c4d,2024-11-21T09:11:01.453000
CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000
CVE-2024-29991,0,1,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000
CVE-2024-29991,0,0,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000
CVE-2024-29992,0,0,644115a5ada5fd5eaed583dff910388cd7f6edd044c415d410798c64ac367a76,2025-01-09T14:45:52.750000
CVE-2024-29993,0,0,8ee39683bcc6bbc416a9ae96b7bc55ff379fb32e28c9270e9552fcd426131466,2025-01-09T14:37:56.660000
CVE-2024-29994,0,0,f65b69994d750908f737db869af19a3c1faa7da239f527bc4d8473a3cc86632d,2025-01-16T19:10:54.100000
@ -254295,7 +254301,7 @@ CVE-2024-30051,0,0,5ec7db5e17e429ad755582fa5375a88e7eac6c3de3113f00754fbbb45b33c
CVE-2024-30052,0,0,0c318c74f7faa87993deeda3866261297ec0ddb2746c0eda81dbb9b59e40e3d0,2024-11-21T09:11:08.930000
CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000
CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000
CVE-2024-30055,0,1,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000
CVE-2024-30055,0,0,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000
CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
CVE-2024-30057,0,0,ba33c9985864f7902ef361ee4e4e325819ac2bc85f178562cda86ff59e397ce3,2024-11-21T09:11:09.533000
CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000
@ -255923,7 +255929,7 @@ CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf29561
CVE-2024-32147,0,0,0015a72344f3020594d938609bf1336e585f7e37db5d3978f4116a4c5b174873,2024-11-21T09:14:33.310000
CVE-2024-32148,0,0,bcbcb84cdf067050c2de05f2b2117ff412680d783b9484863f82a8a6e2a92a10,2024-11-21T09:14:33.430000
CVE-2024-32149,0,0,e0c6e240bf305db98fa85abfaf803a0c1cbaf878c7d8f6ce0402b338521663c9,2024-11-21T09:14:33.557000
CVE-2024-3215,0,1,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000
CVE-2024-3215,0,0,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000
CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f25738557d1,2024-11-26T11:21:59.167000
CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000
CVE-2024-3216,0,0,6e9522f1c7c9e9a3f76fb9a1485b608987693fafdd4c6cd3272aed28685da99b,2024-11-21T09:29:10.010000
@ -256723,10 +256729,10 @@ CVE-2024-33146,0,0,171629cc4b8cb62195d164515a6fed4d8999741d196bb0f46c6f160081fc7
CVE-2024-33147,0,0,c2cfd2d98b97ea5fdcb835818c9cad8c555afacce5b3b33cc198b2c0c2ba88be,2024-11-21T09:16:34.300000
CVE-2024-33148,0,0,2ee283993abecdd7aea3eb59900cb3b6cc9343c210c9948918a7a2beecc034d8,2024-11-21T09:16:34.530000
CVE-2024-33149,0,0,d43e332631e90db62a378f49f2cf8a062308e47f9d7a2517b540f3e0dac713f1,2024-11-21T09:16:34.763000
CVE-2024-3315,0,0,147f97c493fc524e9b618f92596e58ed1d424e789310fc8b1cc391b05a1ea242,2024-11-21T09:29:22.670000
CVE-2024-3315,0,1,e98ec5c2219d8a677fdb86f16335eacd9f6d03801c8a70ecb07c7bf871cb992d,2025-01-17T18:13:08.297000
CVE-2024-33153,0,0,481314339668aaf169249d85fd2b6e9627ecf80bba0d1e9713ac541257b23ab0,2024-11-21T09:16:34.973000
CVE-2024-33155,0,0,fdf923dee29327949bc8bb3302e7b608f6177ab22c676a11a94533e29c6e2def,2024-11-21T09:16:35.187000
CVE-2024-3316,0,0,e0385a047eae736d56fa7774a4819a8e38f51b8b96e680f666f810bc895aa910,2024-11-21T09:29:22.837000
CVE-2024-3316,0,1,098aeca75fce567e175a1215c88d935de40f13c8ed1cdac936f1abcb274d6bf2,2025-01-17T18:05:50.107000
CVE-2024-33161,0,0,bfd6ab00b53005b4160e045b162320b83cb8a5f21cb9faf3e3e69d505f0c9e2d,2024-11-21T09:16:35.457000
CVE-2024-33164,0,0,4c5ec4d6c3445b968e7db0a41e1381ba58914545669a129a94c9838b9164e330,2024-11-21T09:16:35.903000
CVE-2024-3317,0,0,2300ffb19702a15d6babc122c587a264a1a6930b14e95b1445b1a2f5a5cdb317,2024-11-21T09:29:22.997000
@ -257100,13 +257106,13 @@ CVE-2024-33749,0,0,f12371c90977a51378783144de48785764dc249964e292b81c628eeced6df
CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000
CVE-2024-33752,0,0,303257eae9122abbdacdf0312dd251da9cbaf8817e28d2e256d7349a5b409390,2024-11-21T09:17:26.520000
CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000
CVE-2024-3376,0,0,092de719ff3e0b505e3632d0bd47da3bcd5d657b0208533d3e02409827184b57,2024-11-21T09:29:29.570000
CVE-2024-3376,0,1,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000
CVE-2024-33763,0,0,1e99603accd6dab0b74b0083676bbb54ce1319eb251cb7662607692e2fc57aef,2024-11-21T09:17:26.930000
CVE-2024-33764,0,0,6af47bd6c4a3dca716e33159039af29ff3b524b01eaeb6a1f2c644c72e853c6c,2024-11-21T09:17:27.127000
CVE-2024-33766,0,0,03eec9cc0fd600612d151defefb0e31ff4e0c9a3876ab639dc77d4c88cc5a358,2024-12-04T17:15:12.700000
CVE-2024-33767,0,0,b80958f05e128719de0648dd8cae5c2d8a3e5faf8f3e970a0e7ab179c3bfc022,2024-11-21T09:17:27.407000
CVE-2024-33768,0,0,6bfd88d3b1297a873ea532d4c8a7bbd94c13baa508d333d99b1c9978e541270c,2024-11-21T09:17:27.533000
CVE-2024-3377,0,0,2f7b71339dc9c8a4dca130edf1c6e7db5d640bb443c45acc1b81e08e2d799f2d,2024-11-21T09:29:29.710000
CVE-2024-3377,0,1,d8ca10a55411d4c80f26dc1944f5e959ac69d5da65bf6d27cff0d4b4c6ab3d94,2025-01-17T17:35:40.243000
CVE-2024-33771,0,0,ed0b49470c65e3871d1940fa0b3cbacf7ab413d179c5d64a9d938d0a4abdc56b,2024-11-21T09:17:27.720000
CVE-2024-33772,0,0,a6a00fe9413924c4a4b26071283f7474a04c107e4dee0d16d05d331c8ad95c1b,2024-11-21T09:17:27.913000
CVE-2024-33773,0,0,56f82f3734f8ba835b2e983e98b73956fee4286b1269d584a86ea254d75725ee,2024-11-21T09:17:28.097000
@ -257444,7 +257450,7 @@ CVE-2024-34153,0,0,0130eed18b1a9a87fe4a501a0193d13a00438732c37407da9f8fd10e2ff55
CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16960,2024-11-21T09:18:12.633000
CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000
CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000
CVE-2024-3416,0,1,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000
CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000
CVE-2024-34161,0,0,2c366ee1b57d461f68e85fe2d68570b44da9298dbc452eb855b30363fe2b90fc,2024-11-21T09:18:13.217000
CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000
CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000
@ -257452,18 +257458,18 @@ CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b8
CVE-2024-34165,0,0,05db88a6da35010dc20b3e8a9d223822b8683997a0c67d0b2d4f9d52b701ab91,2024-11-15T14:00:09.720000
CVE-2024-34166,0,0,b65e3f742ada4aa97bbad2fd2ef9b5642c8b234eddbb763ea26559729ad0d782,2025-01-14T16:15:29.033000
CVE-2024-34167,0,0,b64f17228e82af8e3cfbfc8cc266e318fd2d8ce529ce993856d797ebadc36da9,2024-11-15T14:00:09.720000
CVE-2024-3417,0,1,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000
CVE-2024-3417,0,0,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000
CVE-2024-34170,0,0,5d43fe9fb1c0c5ca40611077a724b542eaa2e023bbe67fbf24d729c47b6470ee,2024-11-15T14:00:09.720000
CVE-2024-34171,0,0,eebe78f5b25cec30dcd14a8f47bfb97c41cf65760a12406709beda21c627599d,2024-11-21T09:18:13.917000
CVE-2024-3418,0,1,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000
CVE-2024-3419,0,1,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000
CVE-2024-3418,0,0,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000
CVE-2024-3419,0,0,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000
CVE-2024-34191,0,0,e746afd9a92f9dff6e4ada85c106d8b00b6270936c8e514e831f73fb24a6a2a3,2024-11-21T09:18:14.050000
CVE-2024-34193,0,0,8446fc40425660bbb6c8faef1d786a3a74e2e9b3c7e39f75ac6bb75d99f360f8,2024-11-21T09:18:14.267000
CVE-2024-34195,0,0,7b2b923be1f39c81e8f2094bddad2be6ed9b0bc12f72616acced47e2f24d4bcf,2024-08-30T15:59:08.873000
CVE-2024-34196,0,0,2a0e6ad915887cb7c9651bb279549110d78b7b88d707afa20e4abe342cff21a5,2024-11-21T09:18:14.660000
CVE-2024-34198,0,0,e2696bcaf016e336b09510488bbf039e6a5097a3cbd9eb67814b2f340c9fcdfe,2024-08-29T20:36:45.497000
CVE-2024-34199,0,0,94c50635c16fea9c525571c62b1cb43b7f636cac29ea803ba2bd2ee61ce52389,2024-11-21T09:18:15.107000
CVE-2024-3420,0,1,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000
CVE-2024-3420,0,0,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000
CVE-2024-34200,0,0,27e9d45db103eb5460a1a1cb3bfb76d60f31d6a9bd7b2a9bab39305be55f805b,2024-11-21T09:18:15.337000
CVE-2024-34201,0,0,5bd793720e4992bf4857da402a400e18ebfefbdbaf38794a60325a551dacbd74,2024-11-21T09:18:15.563000
CVE-2024-34202,0,0,cf9bad4b83a5394bd60c41bc93dcc1e3c923cf8f2ca02251f5f5ea3f115e28df,2024-11-21T09:18:15.790000
@ -257473,7 +257479,7 @@ CVE-2024-34205,0,0,8d36985104ff5d5e120aea9cb4bce9e1f31a2da5102693a76352bda9c549d
CVE-2024-34206,0,0,945078f994a796433d592f08bcc7a2ed915743a5f69a10a672d804d02d45662a,2024-11-21T09:18:16.650000
CVE-2024-34207,0,0,ee087726f9078c9026d8651cbe397c80879d18133b733e62347b6235647be16c,2024-11-21T09:18:16.863000
CVE-2024-34209,0,0,23a0086974f749b70babda4a61b3cd611f85f71fd52536d4fc99d9fef3a3a1a4,2024-11-21T09:18:17.070000
CVE-2024-3421,0,1,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000
CVE-2024-3421,0,0,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000
CVE-2024-34210,0,0,5ab268367892a7ed66ca9f970f4f449d8840eaff0c9063f4a35282a4b3fd6034,2024-11-21T09:18:17.283000
CVE-2024-34211,0,0,ac334ae6e5cb8a1d967262bc4c496b0210ce6d92661fd47d7167a29a9a7cc9dc,2024-11-21T09:18:17.500000
CVE-2024-34212,0,0,f932dcb31169cf40186f594cc95fc35ae4efb6b9b581f9f5bcd98eca1d85c35e,2024-11-21T09:18:17.733000
@ -257482,7 +257488,7 @@ CVE-2024-34215,0,0,e6cddb986c9b85172cf3b1fa1cc572977eefc052534144ada951fb8e0fa4a
CVE-2024-34217,0,0,e75b7e7eac7040fd4961b5eeb39d860bff29689de9e80a56b29cd2f45991c310,2024-11-21T09:18:18.453000
CVE-2024-34218,0,0,209c3963a8dea0aeb75193e0a4f4688e9c10ef53892b4d2abe98b260daca377d,2024-11-21T09:18:18.677000
CVE-2024-34219,0,0,d04dc7f4bd443b20338ba824e66b3ed379623b6bac0958da54f08cfc0407971e,2024-11-21T09:18:18.893000
CVE-2024-3422,0,1,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000
CVE-2024-3422,0,0,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000
CVE-2024-34220,0,0,ea3b638a0ad7e7b5b21e6837c13d51fd0282a71ba173fdb7f01e6006ada82a85,2024-11-21T09:18:19.117000
CVE-2024-34221,0,0,5bdb0fc79cd75e9a7f818a361c57194b1225b8358331fcf3592024f663afd166,2024-11-21T09:18:19.333000
CVE-2024-34222,0,0,0c26215edbf7be7db1f1ad76aecbebfdeed9b1a3a427504e193a4c98f675c75c,2024-11-21T09:18:19.557000
@ -257493,7 +257499,7 @@ CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4c
CVE-2024-3423,0,0,d93fa2aa82d74348c343103dd41dfdcb78f23bbbf018959a0d2f38920066aca6,2024-11-21T09:29:34.370000
CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000
CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000
CVE-2024-3424,0,1,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000
CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000
CVE-2024-34240,0,0,a6cc74a4b7e6ac1ff4630f4dda1cfe0067255faac0d07ac084685fd926fc750d,2024-11-21T09:18:21.180000
CVE-2024-34241,0,0,e6b9fe6b441390d6d7cebe002b321929ea0e881ede166ad6eb49a567d3b43c57,2024-11-21T09:18:21.420000
CVE-2024-34243,0,0,ab2b6cc30302098b272d3d3616ac174369a493b8cecc500f7c3250ac61308f25,2024-11-21T09:18:21.647000
@ -257501,15 +257507,15 @@ CVE-2024-34244,0,0,c0de0ab156df18aaf776b84719fdfc1b4932e2d3f59ca3253b2c3b8740d66
CVE-2024-34245,0,0,e6fd27a6271a5f5585096a1b7b99399bdc11d0aefde030caef76f62e04f9a659,2024-11-21T09:18:22.043000
CVE-2024-34246,0,0,3e22ad074fe9d91e948d79151371bfaf86765e202dbc830978a91d2fe9e4241b,2024-11-21T09:18:22.303000
CVE-2024-34249,0,0,3dab1167fd4f27a134b3ac9112bd70fe01cb7720cfdffee84276a73a90df12df,2024-11-21T09:18:22.590000
CVE-2024-3425,0,1,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000
CVE-2024-3425,0,0,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000
CVE-2024-34250,0,0,9ed02b35edbbbb26b151553fdc0aa392154afe3a9b2196b878ecf4ad1d34aadb,2024-11-21T09:18:22.880000
CVE-2024-34251,0,0,fd07ec3cb070a3ae80f69dded9157369c3f0df86b00ea0fcf962e7e317fa75d0,2024-11-21T09:18:23.187000
CVE-2024-34252,0,0,3c13aff3fdad9ff41dabf1e45dc15b69fc8f7be09feb79dac572b3754bae489a,2024-11-21T09:18:23.470000
CVE-2024-34255,0,0,d19f6d83e426b3cebffe58f2c412d7bd0aa9d6a92605a880b672c30923e8e6b2,2024-11-21T09:18:23.707000
CVE-2024-34256,0,0,bc98fd7190fcd122da0b5cd3b0e20bec504d7930a3a44be4b14317b7d5a4dc9a,2024-11-21T09:18:23.973000
CVE-2024-34257,0,0,9334e0dc917b4c810f0435df51ac13770da0c132d8236e8b356e47e3fecaec9e,2024-11-21T09:18:24.203000
CVE-2024-3426,0,1,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000
CVE-2024-3427,0,0,16acd00baaee8833427ce732a1683b4733501d48836096a2b47715bfe7bfaf47,2024-11-21T09:29:34.933000
CVE-2024-3426,0,0,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000
CVE-2024-3427,0,1,6d2c58ef390e816481f4abfc3a3695a143bfb0d9c0cce52634f39617c254b53e,2025-01-17T17:02:59.153000
CVE-2024-34273,0,0,b2d5bd0db28edc08b98857b038ad9abcd63178cec6ca2b16d62e526c095d82eb,2024-11-21T09:18:24.437000
CVE-2024-34274,0,0,15fd2109f2bacc33eb25ace43e53125aefa94083620124221c093ea11690842f,2024-11-21T09:18:24.653000
CVE-2024-3428,0,0,3038c9702cc204891c747b542f4612e219eee1881f1fe769520d370fc294fda5,2025-01-17T13:44:10.790000
@ -259995,7 +260001,7 @@ CVE-2024-37426,0,0,3293d67bf998ead79e31c0d3ab1db91404f4d097e7d7c778732752052388c
CVE-2024-37427,0,0,ca62e1a1fb136dd5921e721be945658c95f18d221b28bab4e797b9c114f2e12e,2024-11-01T20:24:53.730000
CVE-2024-37428,0,0,e0967feb0808fdb437078244ff52b2d8e71358f0e68724f3d851c25c00e914b4,2024-11-21T09:23:49.880000
CVE-2024-37429,0,0,5f8575bf5ff94ebcdae86f116fd20534f9071936711e2c54792c3462f65eb058,2024-11-21T09:23:50.013000
CVE-2024-3743,0,1,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000
CVE-2024-3743,0,0,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000
CVE-2024-37430,0,0,ddd123a7460cd354e7c0ed943ed5fc44297b333202a2cdd449df9cadc0cb77ba,2024-11-21T09:23:50.140000
CVE-2024-37431,0,0,b496291512c08284b73bb4e9ff47c34844386c77487b67fd4a8733b21890f892,2025-01-02T12:15:19.650000
CVE-2024-37432,0,0,aa8f36053b0942c9c26f582f8f5dd0c866a94355bfb57fd6a4fbe735eb72ea35,2024-11-21T09:23:50.263000
@ -266164,6 +266170,7 @@ CVE-2024-45827,0,0,14b2e3c223bee3e57f3f499ba2a6632d8d5cb7e001c1dd0d7aff42ddb6920
CVE-2024-45828,0,0,73bbe0dd60535323b4b9452d4adddfba7eb9c9fe8494d20ce8a68ff41c4895cf,2025-01-11T13:15:21.450000
CVE-2024-45829,0,0,ab7f0021bb7a93beaac116d04129f4163df742a680ddbc4de2302713f584254c,2024-11-05T19:38:57.827000
CVE-2024-4583,0,0,785a5bb3a36957836b7a383b7765b0b67cf9852b800aeb286c820ff0407ffb78,2024-11-21T09:43:09.317000
CVE-2024-45832,1,1,d75bfc3e389f08270f7efbda4f6a9926c8035de2d7487181b2202066be5a30a1,2025-01-17T17:15:11.870000
CVE-2024-45833,0,0,ae7b140338ecffbe1ee920d82db8b77234d8b98166b6071308a3a15f45eb4089,2024-09-23T13:43:42.073000
CVE-2024-45835,0,0,702ff79a19ec21ea639e2383e91f88244f4dc786df2938ac17e866b8515461ee,2024-11-01T14:20:56.350000
CVE-2024-45836,0,0,5680ea0def6f9713e80f70cc8753dae36b28506dd79a8f561bc910ac3bc36a66,2024-10-03T00:35:53.797000
@ -267760,8 +267767,8 @@ CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12ecc
CVE-2024-48121,0,0,3214bee7da8e3f509f7412f3e279397011d850b12d106151290f87bcfd743976,2025-01-15T21:15:13.063000
CVE-2024-48122,0,0,ef4dbe73ddcbe3747d75bc0f305c7993ceeca917a7b17b9ddb38c3b776858056,2025-01-15T21:15:13.200000
CVE-2024-48123,0,0,1ce64456a782985d4c9c698673e093b6139525cfb44a23952e0fe7744f609606,2025-01-15T21:15:13.340000
CVE-2024-48125,0,0,c3755bd226434427c2b180f569b2230179d5af35e7843e7c981f9561e09afddd,2025-01-15T21:15:13.477000
CVE-2024-48126,0,0,a82082fdb76a284967c26fe2fcc716154230021a5b401682f7689f4e75b72428,2025-01-15T21:15:13.613000
CVE-2024-48125,0,1,52b4c432cd9d44248f4716ba7255cd00638eb9bcc133a6e2c0153681beb1d818,2025-01-17T18:15:25.547000
CVE-2024-48126,0,1,39da822ea5af8f88748dbe07438d4c6a18c6f0004db8538062615ee5258f4755,2025-01-17T18:15:25.800000
CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000
CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000
CVE-2024-48139,0,0,1d758cb962b76524a06521373672f481daf5d3617952ffba3fa119154194d14e,2024-10-25T19:35:12.730000
@ -268309,7 +268316,7 @@ CVE-2024-4913,0,0,8f1077ca1f909bbf49b8f2a274026fe5a87623cec281204da7efc615ad191b
CVE-2024-49132,0,0,a869c7f291d5f7192227780fdd0e95f330808e8aa6cad44f6af8f94cb45de649,2025-01-14T17:48:33.683000
CVE-2024-49138,0,0,286dc37677622c63dcdad4f86c15d7e8b98bbb3aa097b7516a11d8c38b7b5d16,2024-12-13T18:09:53.140000
CVE-2024-4914,0,0,c1e4acb17def81a0854cc115da953100335e1c8f9a391685fb384320f3256d4e,2024-11-21T09:43:51.437000
CVE-2024-49142,0,1,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000
CVE-2024-49142,0,0,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000
CVE-2024-49147,0,0,6fba53ba9d6b385fdc5b31747e6fa75096746742b3ab2cf525cf8f2b1550ed5c,2025-01-10T18:09:53.377000
CVE-2024-4915,0,0,0db50bbbf81e6509cf2f04f7c74802ee1539c5988eb17e78bcc8e3a916243d8d,2024-11-21T09:43:51.583000
CVE-2024-4916,0,0,46062bb382c89200b166e2e86c9831624440cd917b76f7208234261e0e99e402,2024-11-21T09:43:51.723000
@ -269571,7 +269578,7 @@ CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34
CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000
CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000
CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000
CVE-2024-50633,0,0,bffa469638f740cac5bce5ceb980b8f0c4d11ecde1ec474e9ebfaf88e77990a1,2025-01-16T18:15:24.337000
CVE-2024-50633,0,1,d0153926c6a02e76397a49275cdaba4d567a050b25f3435171b670652de25f8e,2025-01-17T18:15:26.043000
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000
@ -269686,13 +269693,13 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721
CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000
CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000
CVE-2024-50953,0,0,aaae13e550df547900d535976c765e7cfcbd4c5ca420ae827af2927bdbd375a0,2025-01-16T16:15:31.227000
CVE-2024-50954,0,0,477775d2966f5589398f5cc34462d3c653cd70d54eda8068d474e05199a05ce7,2025-01-15T17:15:16.517000
CVE-2024-50954,0,1,18bee49920c53fb8283b1524ffbd022141797de9d8bf6bf69cc613e4bb16be47,2025-01-17T18:15:26.310000
CVE-2024-50955,0,0,b7968787a5cfb7ac17e9f82a1b15116d586dfbbc8f589b423fc4833d2d57ec69,2024-11-21T22:15:09.370000
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000
CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000
CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000
CVE-2024-50967,1,1,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000
CVE-2024-50967,0,0,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000
CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000
CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000
CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000
@ -271389,6 +271396,7 @@ CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f4
CVE-2024-53680,0,0,8f6a0e7e0ab328aba846c45a5169e8953dc6dbfca85d9cca37f56439e3715008,2025-01-11T13:15:25.710000
CVE-2024-53681,0,0,b5981a5f23a050c58621754137465bbe9a27a78bd67559fa015494e5b655da4f,2025-01-15T13:15:10.963000
CVE-2024-53682,0,0,8fff7fe6ed56d7be9465617e7f5434428ac8e26e2cf3262f7b6c754f477833c1,2025-01-11T13:15:25.860000
CVE-2024-53683,1,1,8ed3f44393e22eea3f080e26403389aa2eeebf5c0860ee00e51eb42f73e4ab91,2025-01-17T17:15:12.053000
CVE-2024-53685,0,0,f14f882249b9db19115e9f5bd40c211ab0535cda9ea0386cce46e0a1a952c567,2025-01-17T14:15:32.120000
CVE-2024-53687,0,0,db69b3a3aa7d0b6527150d997ca94f951ff7fdd68c92c6f81dd6f27f46185a16,2025-01-11T13:15:26.120000
CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000
@ -271697,7 +271705,7 @@ CVE-2024-54098,0,0,fcf0a7b4b42a408ef14e2cdd83601e83ad8a047dacc93336f07058716f90e
CVE-2024-54099,0,0,256f48ffd68ad9fa5138803838c0141f4287c0f26c618e01fad47b5eef64495e,2025-01-10T18:29:23.150000
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
CVE-2024-54100,0,0,40cea7c72a838645d4d4129dd8cb348c8ad2f756f8f2e526c035f7424171b78f,2025-01-14T18:32:54.897000
CVE-2024-54101,0,0,b28cbee4fde9c770888478d7d50338a6e8959ae8cd4abd6f917e1c088fc4ab93,2024-12-12T12:15:23.763000
CVE-2024-54101,0,1,8efc0d479ad38c214523a161299fa1bc431fa727996542f76023b3a82305d936,2025-01-17T18:09:53.447000
CVE-2024-54102,0,0,321dcb146364267c789b6dd20cd279989263c444f9a47d81a6e8ddb19d3e09d0,2025-01-14T18:04:39.450000
CVE-2024-54103,0,0,521378467b2ba6dcd27ca36115f9ecdab36f5f26a2021270812eb31426c0502d,2024-12-12T20:15:40.217000
CVE-2024-54104,0,0,b5d2bab146798e653b7f0c16aaf328d32a4beaf04fab7d328eae5e47092e960c,2024-12-12T20:16:31.800000
@ -272077,7 +272085,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
CVE-2024-54535,0,0,be256317681c38b876d8afffa28833fae912c494d09f5fe9974200b1678cbe2e,2025-01-16T20:36:12.483000
CVE-2024-54535,0,1,206bf99a3aa890b83364e2d0aff86c3b8f6596e8472b76b2fdf32b4a4989a18f,2025-01-17T18:15:26.610000
CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000
CVE-2024-54540,0,0,cec5648fa22fe0cc733814d4be0bb9219cc980c202703a2aa5266fee5fe4c719,2025-01-16T15:15:13.697000
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
@ -272103,6 +272111,7 @@ CVE-2024-54677,0,0,7738db23e6dfe0ca7bf4e6721884297e1312bf0f9f87462addf38007bea25
CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000
CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000
CVE-2024-54680,0,0,23c42810796888c623043dfa17bf2c05e67e8cb1f0dd95a5d3bb0378d9b39a60,2025-01-16T15:17:54.520000
CVE-2024-54681,1,1,253e5dec99c9346d03e651bfd86679c7c1afa29b9d10690c2c2c73d3edd05e49,2025-01-17T17:15:12.227000
CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000
CVE-2024-54683,0,0,35ec2d70086ae912ff4eae7d82bb097dcf57dbd99c9eaf862ef970893175a37f,2025-01-16T15:18:09.453000
CVE-2024-54687,0,0,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000
@ -273168,7 +273177,7 @@ CVE-2024-57159,0,0,15583a75064e55d87bf75fed70e73d79d360d20391d0e99a0f639f7334a51
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
CVE-2024-57160,0,0,cfd418c2294a4aad4ffaf0f6e6c02c6c9c462f90fd047701ea5321fce5ab1453,2025-01-16T16:15:32.817000
CVE-2024-57161,0,0,7d001b6ede91e7126dba3cd73d4b23f42855fc1336561bd2cb109c174d7ee6df,2025-01-16T16:15:32.937000
CVE-2024-57162,0,0,b1e0cf18e266cbe55d44930aeeee1d897cfa1bcb86f690acd1626cef8a0545f2,2025-01-16T16:15:33.063000
CVE-2024-57162,0,1,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000
CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000
@ -273225,21 +273234,21 @@ CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff117
CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000
CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000
CVE-2024-57575,0,0,0325e9b9beebc39d453bf2fb98a790fc58c0448755bf827de5d20c6d07a85690,2025-01-16T21:15:16.537000
CVE-2024-57577,0,0,86ceef2dbb95c37e54c3b90cd4d3ebd8b74724e0a4ac66d71462560ea6c0aff6,2025-01-16T21:15:16.740000
CVE-2024-57578,0,0,a8a3c07649abdae35839bc68d147c5787c95c3770dcd835902b0c2ccfa15a666,2025-01-16T21:15:16.893000
CVE-2024-57579,0,0,5ba17d368e5dbe193f489ec4d6c9a22186058bf13a707672ef5429e8fb28ede2,2025-01-16T21:15:17.057000
CVE-2024-57577,0,1,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000
CVE-2024-57578,0,1,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000
CVE-2024-57579,0,1,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
CVE-2024-57580,0,0,40ce06b8b3bad391b0423dce669bb66461a68e864c0ab61b351a2049f79d8d33,2025-01-16T21:15:17.223000
CVE-2024-57581,0,0,ba8a50519c95b9165041173ef8a2abb403c689b63326baa2909a14502c81be34,2025-01-16T21:15:17.437000
CVE-2024-57582,0,0,1d36287388fe01061acd621e5fd71ef6ba928983d1172795a92a2d624d34f9cd,2025-01-16T21:15:17.627000
CVE-2024-57580,0,1,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000
CVE-2024-57581,0,1,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000
CVE-2024-57582,0,1,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000
CVE-2024-57583,0,0,0a9b32a2c9e5a9aa7a9b9841c10dc898724b6f12184bcb5639e412fb8b164e68,2025-01-16T21:15:17.800000
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
CVE-2024-57611,0,0,6fae1f378c2de7211d8601642d793b718892b838d45e3641195667b838c7ac2a,2025-01-16T16:15:33.893000
CVE-2024-57615,0,0,3b154d15d9d342606b70482eb9cc2d6a4cc130a8065aa7d0da89540a1bd1ede9,2025-01-14T01:15:09.833000
CVE-2024-57616,0,0,7470c60d8605d9c063b37e649a0109bc38842816df47856772ca2131f8a175f6,2025-01-14T01:15:09.947000
CVE-2024-57617,0,0,216302b4e1a3d5a8c021085fb6cfebcd9359b852e85ad845706a7528c42cb425,2025-01-14T01:15:10.060000
CVE-2024-57615,0,1,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000
CVE-2024-57616,0,1,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000
CVE-2024-57617,0,1,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000
CVE-2024-57618,0,0,71f87f6663ee1ef40a6261800f5cbef1a4e202c68cadd758bd9595ac1ec388f3,2025-01-16T21:15:17.943000
CVE-2024-57619,0,0,ce9b917af0f01e2c94f858dbfb420a55aded7c18073a3201f781d8208b5592cd,2025-01-15T17:15:18.470000
CVE-2024-5762,0,0,c0d3df55e57fc9acf7b150356443c67a5f0ff2ceca17905a4d2ee526faf1413e,2024-08-23T16:43:19.497000
@ -273267,7 +273276,7 @@ CVE-2024-57639,0,0,81c18119d0796036207b52600fc301d317795cf7d5d03a2144ee581f0cbeb
CVE-2024-5764,0,0,b7612214e0b4c36a7adafd04d08b4fff0bd1bfea33c567d6f09d0bd135904604,2024-11-06T16:41:00.277000
CVE-2024-57640,0,0,823f369a4e2512904de0df496d9844ebefb1caff102a1b29f5249371b8eb5e9b,2025-01-15T16:15:30.570000
CVE-2024-57641,0,0,6e122f8000b5036a35ba9684cd03b685662827038107eaaf29a6c154497ed980,2025-01-15T16:15:30.750000
CVE-2024-57642,0,0,5d41527b8eba6a05efbeb7957f944b909619e65db0c2a503a1ffa7feaae96b0d,2025-01-14T01:15:12.873000
CVE-2024-57642,0,1,071107a624b8ce997fd26421425efc402383b312771c18eeb873b78aa96ffdfa,2025-01-17T18:15:30.030000
CVE-2024-57643,0,0,ba698b452eaa8706043a8e92fd8ea179cc020ce88d0d466280f0183a4e4e911c,2025-01-16T16:15:34.030000
CVE-2024-57644,0,0,914574fe0b7a114777c2567fd96e73785d33e0046c4e449438fad7358a5594a5,2025-01-15T16:15:30.943000
CVE-2024-57645,0,0,e6113a0ab42f5baeb6ef1e12e65104eacf5948c5f09dd54b54f3011c787894d1,2025-01-15T16:15:31.120000
@ -273327,7 +273336,7 @@ CVE-2024-57764,0,0,3cd9e45ed954c368ca54c9cbce60c96dcde31d52c07d079203117bd00108d
CVE-2024-57765,0,0,6f15a3a607d40a0f75d69003588b78a560775ad59d258daea1d42c4f28b5e872,2025-01-15T00:15:34.323000
CVE-2024-57766,0,0,e0e048b4421fccb07d8708542e32dcef1a59cbb8b6e613b7067f5ff9210d3a7b,2025-01-15T00:15:34.433000
CVE-2024-57767,0,0,4f47def2a552fd83c7f1d4d6e4ae3f549133dbbf6dd763e021c9ec2612ee896f,2025-01-15T00:15:34.543000
CVE-2024-57768,0,0,dfbe7adf9c1441490d4a473b51ff96f30462e0fe2c48818a67e3bff0cdd4d06f,2025-01-16T18:15:26.003000
CVE-2024-57768,0,1,e00f69a24549670426cf3162728515b005047dfd2006716c80c3c15216823f81,2025-01-17T18:15:30.633000
CVE-2024-57769,0,0,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000
CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000
CVE-2024-57770,0,0,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000
@ -276719,7 +276728,7 @@ CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa035
CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000
CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000
CVE-2024-9672,0,0,061e80a15aeea3b03a12d8109775a38b18a9082ea48b25cd40a1b2c0322c9214,2024-12-10T00:15:22.893000
CVE-2024-9673,0,0,160515eb8f09fd336d7ce6380098aac12ba2c5c30d65868d874d0b5bf3432905,2025-01-08T07:15:27.980000
CVE-2024-9673,0,1,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000
CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000
CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000
CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000
@ -277136,6 +277145,7 @@ CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed
CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000
CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000
CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000
CVE-2025-0430,1,1,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000
CVE-2025-0434,0,0,6b09fdee4a1c3fd4134245b9fe1d0b966b891282ee9f6481cd52455196ff3273,2025-01-15T15:15:14.273000
CVE-2025-0435,0,0,12a908c6bc976560385e7102d635ad66ec30f16edcaf6473415ff2f9c1a74a6e,2025-01-15T15:15:14.430000
CVE-2025-0436,0,0,857240181b7b3c09b957ab2dbad6e416781a51bbb4f39b3bb16f673e65f24a93,2025-01-15T15:15:14.620000
@ -277183,10 +277193,12 @@ CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c65
CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000
CVE-2025-0518,0,0,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000
CVE-2025-0527,0,0,d2b51becab8c01f94a687e28d364a879eb752a601305b6821988eb5f9c5bbc2f,2025-01-17T14:15:32.840000
CVE-2025-0528,1,1,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000
CVE-2025-0529,1,1,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000
CVE-2025-0530,1,1,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
CVE-2025-0531,1,1,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
CVE-2025-0528,0,0,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000
CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000
CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
CVE-2025-0532,1,1,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000
CVE-2025-0533,1,1,00c854b2342ff9edb13ef61155d7cae29025b472a6af5e1d39d09a6ad67d9690,2025-01-17T18:15:31.577000
CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000
@ -277360,23 +277372,23 @@ CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb
CVE-2025-21360,0,0,1f25a63fd6925175ed8d8d2e1f8b5dc753b0e006a806367a61359ecb27a1425f,2025-01-14T18:16:01.470000
CVE-2025-21361,0,0,804d0233cc132fe798add3b592d7f7064997d09b5448edddf8d4a0a9f30d78ed,2025-01-14T18:16:01.637000
CVE-2025-21362,0,0,f17a56e11ed70d97b1fec4ab21c8742e9afb6632f3e2d692fb4aae8c406af704,2025-01-15T00:15:43.533000
CVE-2025-21363,0,1,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000
CVE-2025-21364,0,1,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000
CVE-2025-21365,0,1,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000
CVE-2025-21366,0,1,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000
CVE-2025-21370,0,1,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21372,0,1,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
CVE-2025-21374,0,1,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000
CVE-2025-21378,0,1,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000
CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000
CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000
CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000
CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000
CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000
CVE-2025-21380,0,0,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000
CVE-2025-21382,0,1,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000
CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000
CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000
CVE-2025-21389,0,1,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
CVE-2025-21393,0,1,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
CVE-2025-21395,0,1,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000
CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000
CVE-2025-21405,0,1,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
CVE-2025-21409,0,0,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000
CVE-2025-21411,0,0,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000
CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000
@ -277684,7 +277696,7 @@ CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000
CVE-2025-22904,0,0,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
CVE-2025-22904,0,1,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000
CVE-2025-22905,0,0,abc87a85c7bc7d9d749537f6e4185a3608bb9fb9938aa6d93312fdeb15cc69d3,2025-01-16T15:15:15.180000
CVE-2025-22906,0,0,c442b828ae2bdbc2d39f15b231587f53bcedbd794c904b4144293ba283dc2985,2025-01-16T15:15:15.357000
CVE-2025-22907,0,0,afe94c593034a06a548c8df5f439a7a34ed21665762277eb367e4b3ea8c24c00,2025-01-16T15:15:15.547000

Can't render this file because it is too large.