mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-01-17T19:00:28.406135+00:00
This commit is contained in:
parent
f9e22ab11a
commit
d898b7c05c
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-45876",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-26T22:15:08.737",
|
||||
"lastModified": "2024-11-21T07:29:53.063",
|
||||
"lastModified": "2025-01-17T18:15:18.117",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0432",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-31T16:15:07.390",
|
||||
"lastModified": "2024-11-21T07:37:10.143",
|
||||
"lastModified": "2025-01-17T18:15:19.433",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22300",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-27T20:15:09.343",
|
||||
"lastModified": "2024-11-21T07:44:29.050",
|
||||
"lastModified": "2025-01-17T18:15:19.947",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25911",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2023-06-11T14:15:09.923",
|
||||
"lastModified": "2024-11-21T07:50:24.840",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-01-17T17:55:14.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -38,19 +38,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
@ -110,19 +110,31 @@
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csirt.divd.nl/CVE-2023-25911/",
|
||||
"source": "csirt@divd.nl"
|
||||
"source": "csirt@divd.nl",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://csirt.divd.nl/DIVD-2023-00021/",
|
||||
"source": "csirt@divd.nl"
|
||||
"source": "csirt@divd.nl",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://csirt.divd.nl/DIVD-2023-00021",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://divd.nl/cves/CVE-2023-25911",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25914",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2023-08-21T21:15:08.970",
|
||||
"lastModified": "2024-11-21T07:50:25.230",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-01-17T17:54:40.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,20 +42,20 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-25915",
|
||||
"sourceIdentifier": "csirt@divd.nl",
|
||||
"published": "2023-08-21T21:15:09.170",
|
||||
"lastModified": "2024-11-21T07:50:25.357",
|
||||
"vulnStatus": "Modified",
|
||||
"lastModified": "2025-01-17T17:54:52.697",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -42,19 +42,19 @@
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27304",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.397",
|
||||
"lastModified": "2024-11-21T07:52:36.693",
|
||||
"lastModified": "2025-01-17T18:15:20.303",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27384",
|
||||
"sourceIdentifier": "vultures@jpcert.or.jp",
|
||||
"published": "2023-05-23T02:15:09.437",
|
||||
"lastModified": "2024-11-21T07:52:47.937",
|
||||
"lastModified": "2025-01-17T18:15:20.547",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -45,6 +45,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-27927",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-27T20:15:09.577",
|
||||
"lastModified": "2024-11-21T07:53:42.827",
|
||||
"lastModified": "2025-01-17T18:15:21.080",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28384",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-27T23:15:14.867",
|
||||
"lastModified": "2024-11-21T07:54:57.990",
|
||||
"lastModified": "2025-01-17T17:15:07.697",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28400",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-27T23:15:14.917",
|
||||
"lastModified": "2024-11-21T07:54:59.713",
|
||||
"lastModified": "2025-01-17T17:15:08.363",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28650",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-27T20:15:09.633",
|
||||
"lastModified": "2024-11-21T07:55:44.473",
|
||||
"lastModified": "2025-01-17T18:15:21.340",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28652",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-27T20:15:09.693",
|
||||
"lastModified": "2024-11-21T07:55:44.680",
|
||||
"lastModified": "2025-01-17T18:15:21.607",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28655",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-03-27T20:15:09.757",
|
||||
"lastModified": "2024-11-21T07:55:45.003",
|
||||
"lastModified": "2025-01-17T18:15:21.850",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-28716",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-27T23:15:14.963",
|
||||
"lastModified": "2024-11-21T07:55:51.953",
|
||||
"lastModified": "2025-01-17T17:15:08.537",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29150",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-27T23:15:15.007",
|
||||
"lastModified": "2024-11-21T07:56:37.140",
|
||||
"lastModified": "2025-01-17T18:15:22.093",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-29169",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2023-04-27T23:15:15.050",
|
||||
"lastModified": "2024-11-21T07:56:39.137",
|
||||
"lastModified": "2025-01-17T18:15:22.337",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31763",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-24T00:15:09.583",
|
||||
"lastModified": "2024-11-21T08:02:15.463",
|
||||
"lastModified": "2025-01-17T18:15:22.763",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-294"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31814",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.087",
|
||||
"lastModified": "2024-11-21T08:02:17.297",
|
||||
"lastModified": "2025-01-17T18:15:23.030",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "NVD-CWE-Other"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-706"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31826",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.127",
|
||||
"lastModified": "2024-11-21T08:02:18.720",
|
||||
"lastModified": "2025-01-17T18:15:24.380",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31860",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T20:15:10.040",
|
||||
"lastModified": "2024-11-21T08:02:20.550",
|
||||
"lastModified": "2025-01-17T17:15:08.863",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
@ -80,6 +110,14 @@
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wuzhicms/b2b/issues/3",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31994",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.170",
|
||||
"lastModified": "2024-11-21T08:02:28.753",
|
||||
"lastModified": "2025-01-17T17:15:09.097",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31995",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.207",
|
||||
"lastModified": "2024-11-21T08:02:29.403",
|
||||
"lastModified": "2025-01-17T17:15:09.840",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-31996",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2023-05-23T01:15:10.247",
|
||||
"lastModified": "2024-11-21T08:02:29.653",
|
||||
"lastModified": "2025-01-17T17:15:10.213",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -32,6 +32,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -45,6 +65,16 @@
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-45590",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-04-09T15:15:27.627",
|
||||
"lastModified": "2024-11-21T08:27:01.027",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:08:31.843",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,54 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:*",
|
||||
"versionStartIncluding": "7.0.6",
|
||||
"versionEndExcluding": "7.0.11",
|
||||
"matchCriteriaId": "0A39CBD1-AAF7-4423-AA29-840CF0DBFD6E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "14320E4A-2445-4930-A8D1-B768B7294B36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "56EE5E2F-CB22-4294-9AA9-DDB344494D9B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:*",
|
||||
"matchCriteriaId": "88271718-0DD4-4717-B403-1B44E2E56C91"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-087",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-087",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-47542",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-04-09T15:15:28.207",
|
||||
"lastModified": "2024-11-21T08:30:25.520",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:11:28.947",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,65 @@
|
||||
"value": "CWE-1336"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.0.0",
|
||||
"versionEndExcluding": "7.0.11",
|
||||
"matchCriteriaId": "5B1EF673-5967-401E-98E3-B7A2B1BEF037"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.5",
|
||||
"matchCriteriaId": "4763E504-6974-42C5-B912-3E62A9CC312A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "83316FAF-C5DE-4603-B3B2-6796E2FAF1A8"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-419",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-419",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-48784",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2024-04-09T15:15:28.617",
|
||||
"lastModified": "2024-11-21T08:32:26.347",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:19:51.033",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,14 +71,53 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "6.4.0",
|
||||
"versionEndExcluding": "7.0.16",
|
||||
"matchCriteriaId": "FA0532A5-31F2-4A92-BF31-6003E28AC948"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.2.0",
|
||||
"versionEndExcluding": "7.2.8",
|
||||
"matchCriteriaId": "A6D2A14F-3916-45A0-AD4D-27C60E00AEC0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "7.4.0",
|
||||
"versionEndExcluding": "7.4.2",
|
||||
"matchCriteriaId": "4316C2EA-3D6E-4A0C-B81D-ADCE040E03E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-413",
|
||||
"source": "psirt@fortinet.com"
|
||||
"source": "psirt@fortinet.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://fortiguard.com/psirt/FG-IR-23-413",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52547",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-28T07:15:08.930",
|
||||
"lastModified": "2024-11-21T08:40:01.370",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:32:12.300",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,61 @@
|
||||
"value": "CWE-130"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iholpiiahpp-0ab7d6db-en",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52548",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-28T07:15:09.753",
|
||||
"lastModified": "2024-11-21T08:40:01.510",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:31:57.740",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,24 +69,75 @@
|
||||
"value": "CWE-119"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-787"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/cn/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-cn",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvtiroowtboamb-bb3261bd-en",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52710",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-28T07:15:10.100",
|
||||
"lastModified": "2024-11-21T08:40:24.760",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:32:39.963",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,61 @@
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-754"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-bios-2.29:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2D0C60E9-E69E-4692-92FC-BDF8BD28346B"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-hppvticfuoec-8ffde288-en",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52711",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-28T07:15:10.490",
|
||||
"lastModified": "2024-11-21T08:40:24.883",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:29:39.560",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,61 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-401"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:curiem-wfg9b_bios_2.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8EEA4852-6B9E-4FC0-A789-763EC2FCE6D4"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-voiiaciahpp-6376e0c7-en",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-52712",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-05-28T07:15:10.810",
|
||||
"lastModified": "2024-11-21T08:40:24.993",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:29:32.770",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,16 +69,61 @@
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:curiem-wfg9b_firmware:ota-curiem-b-bios-2.28:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0949F6A8-3DCE-4217-B3AE-6B36E9735C95"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:huawei:curiem-wfg9b:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "53861342-BCF5-49E5-A4C5-C1D1C472C8FF"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.huawei.com/en/psirt/security-advisories/2024/huawei-sa-iiacviahpp-71ce77ee-en",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-0837",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-06T08:15:07.570",
|
||||
"lastModified": "2024-11-21T08:47:28.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:47:27.833",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:pro:wordpress:*:*",
|
||||
"versionEndExcluding": "5.3.3",
|
||||
"matchCriteriaId": "4227C0A1-E9E8-4E69-8347-C5E20CB8F44A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3045497/bdthemes-element-pack-lite/trunk/modules/custom-gallery/widgets/custom-gallery.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a54c2a89-4297-48f5-bbff-e5c20c26a632?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,63 +2,15 @@
|
||||
"id": "CVE-2024-12022",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-07T04:15:07.677",
|
||||
"lastModified": "2025-01-07T04:15:07.677",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:15:10.533",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The WP Menu Image plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wmi_delete_img_menu' function in all versions up to, and including, 2.2. This makes it possible for unauthenticated attackers to delete images from menus."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento WP Menu Image para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en la funci\u00f3n 'wmi_delete_img_menu' en todas las versiones hasta la 2.2 incluida. Esto hace posible que atacantes no autenticados eliminen im\u00e1genes de los men\u00fas."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-52485. Reason: This candidate is a reservation duplicate of CVE-2024-52485. Notes: All CVE users should reference CVE-2024-52485 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-menu-image/trunk/init/wmi-functions.php#L126",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e96193c0-ddde-463b-a68e-672ab6f812c7?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,63 +2,15 @@
|
||||
"id": "CVE-2024-12124",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-07T05:15:14.340",
|
||||
"lastModified": "2025-01-07T05:15:14.340",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:15:10.653",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Role Includer plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the \u2018user_id\u2019 parameter in all versions up to, and including, 1.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Role Includer para WordPress es vulnerable a ataques de cross site scripting reflejado a trav\u00e9s del par\u00e1metro 'user_id' en todas las versiones hasta la 1.6 incluida, debido a una desinfecci\u00f3n de entrada y un escape de salida insuficientes. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54290. Reason: This candidate is a reservation duplicate of CVE-2024-54290. Notes: All CVE users should reference CVE-2024-54290 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/role-includer/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97b3399b-cda2-4ab1-8919-b1e4ba4a5dcf?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,63 +2,15 @@
|
||||
"id": "CVE-2024-12208",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-07T05:15:16.270",
|
||||
"lastModified": "2025-01-07T05:15:16.270",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:15:10.740",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Backup and Restore WordPress \u2013 Backup Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.50. This is due to missing or incorrect nonce validation on the ajax_queue_manual_backup() function. This makes it possible for unauthenticated attackers to trigger backups via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Backup and Restore WordPress \u2013 Backup Plugin para WordPress es vulnerable a Cross-Site Request Forgery en todas las versiones hasta la 1.50 incluida. Esto se debe a la falta o la validaci\u00f3n incorrecta de nonce en la funci\u00f3n ajax_queue_manual_backup(). Esto hace posible que atacantes no autenticados activen copias de seguridad a trav\u00e9s de una solicitud falsificada, siempre que puedan enga\u00f1ar a un administrador del sitio para que realice una acci\u00f3n como hacer clic en un enlace."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-43269. Reason: This candidate is a reservation duplicate of CVE-2024-43269. Notes: All CVE users should reference CVE-2024-43269 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/wp-backitup/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e461a04b-6456-4930-b3e7-0f808825aa6b?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,67 +2,15 @@
|
||||
"id": "CVE-2024-12540",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-07T04:15:08.917",
|
||||
"lastModified": "2025-01-07T04:15:08.917",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:15:10.807",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The LDD Directory Lite plugin for WordPress is vulnerable to Reflected Cross-Site Scripting due to the use of remove_query_arg without appropriate escaping on the URL in all versions up to, and including, 3.3. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento LDD Directory Lite para WordPress es vulnerable a ataques de cross site scripting reflejado debido al uso de remove_query_arg sin el escape adecuado en la URL en todas las versiones hasta la 3.3 incluida. Esto permite que atacantes no autenticados inyecten web scripts arbitrarios en p\u00e1ginas que se ejecutan si logran enga\u00f1ar a un usuario para que realice una acci\u00f3n, como hacer clic en un enlace."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-54288. Reason: This candidate is a reservation duplicate of CVE-2024-54288. Notes: All CVE users should reference CVE-2024-54288 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/ldd-directory-lite/trunk/templates/frontend/edit-submit.php#L10",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/ldd-directory-lite/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f7675e1c-7194-4cfe-81fb-a78d75e0bb1e?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
100
CVE-2024/CVE-2024-127xx/CVE-2024-12757.json
Normal file
100
CVE-2024/CVE-2024-127xx/CVE-2024-12757.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-12757",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T18:15:24.690",
|
||||
"lastModified": "2025-01-17T18:15:24.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Nedap Librix Ecoreader \n is missing authentication for critical functions that could allow an \nunauthenticated attacker to potentially execute malicious code."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "HIGH",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-007-02",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1239",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-16T03:15:06.900",
|
||||
"lastModified": "2024-11-21T08:50:08.180",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:34:30.327",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:wpmet:elements_kit_elementor_addons:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "3.0.5",
|
||||
"matchCriteriaId": "C55F4AA4-9021-48D1-81C5-8D5CD6E11DCD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042291%40elementskit-lite&new=3042291%40elementskit-lite&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1822fd58-0dba-4b15-9702-32e3aa4405b3?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1315",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:16.340",
|
||||
"lastModified": "2024-11-21T08:50:18.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:30:38.363",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,30 +39,78 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*",
|
||||
"versionEndExcluding": "3.0.5",
|
||||
"matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.1/app/Controllers/Ajax/PublicUser.php#L445",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/tags/3.0.5/app/Controllers/Ajax/PublicUser.php#L445",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5439651e-5557-4b13-813a-4fc0ad876104?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1352",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:16.517",
|
||||
"lastModified": "2024-11-21T08:50:23.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:23:55.973",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*",
|
||||
"versionEndExcluding": "3.0.5",
|
||||
"matchCriteriaId": "F971EA1A-7D1C-46B7-AB06-128BA87960B2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=2824166",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/classified-listing/trunk/app/Controllers/Ajax/Import.php?rev=3061893",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5da4cdd-15c7-41a6-be2f-e31bd407ae05?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1428",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-06T08:15:07.767",
|
||||
"lastModified": "2024-11-21T08:50:33.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:48:58.150",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
|
||||
"versionEndExcluding": "5.5.4",
|
||||
"matchCriteriaId": "CEA2F449-CCE8-405D-BA65-FB96CEB9AC61"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/tags/5.4.14/modules/trailer-box/widgets/trailer-box.php#L2063",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3047402/bdthemes-element-pack-lite/trunk/modules/wrapper-link/module.php",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/543c4d52-0e47-4bbb-b53e-dbe3f104734f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1458",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:17.203",
|
||||
"lastModified": "2024-11-21T08:50:37.560",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:25:27.900",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.3.5",
|
||||
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e28b78c3-c370-4076-836e-9f61acba064c?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1461",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:17.377",
|
||||
"lastModified": "2024-11-21T08:50:38.083",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:24:39.060",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.3.5",
|
||||
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9d37248-d024-4465-a1e6-d8f2d3a2e02f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1464",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:17.703",
|
||||
"lastModified": "2024-11-21T08:50:38.453",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:23:39.073",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.3.5",
|
||||
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ce6e40e-b090-447a-9bf9-6337d30e7da3?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1465",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:17.890",
|
||||
"lastModified": "2024-11-21T08:50:38.583",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:20:39.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.3.5",
|
||||
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96bdd465-e4ca-4a32-b38a-a2a51598a3a9?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-1466",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-04-09T19:15:18.073",
|
||||
"lastModified": "2024-11-21T08:50:38.723",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:18:00.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,25 +36,87 @@
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:livemeshelementor:addons_for_elementor:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "8.3.5",
|
||||
"matchCriteriaId": "1E0B9DB5-8A1F-40AB-9802-9BC81B846E3E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3048237/addons-for-elementor",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/604975b9-fe2f-4d8f-af13-995f08d72e8f?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-2091",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-03-28T03:15:07.887",
|
||||
"lastModified": "2024-11-21T09:09:01.480",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:35:09.950",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,33 +36,101 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 4.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.13.3",
|
||||
"matchCriteriaId": "550B7CCC-BC3D-4B33-9643-E16C71BABE67"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
"source": "security@wordfence.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/addon-elements-for-elementor-page-builder/tags/1.13/modules/comparison-table/widgets/comparison-table.php#L2076",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3055134%40addon-elements-for-elementor-page-builder&new=3055134%40addon-elements-for-elementor-page-builder&sfp_email=&sfph_mail=",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/18e2e0e5-495f-4f55-b7d8-94193fc2ad12?source=cve",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-23124",
|
||||
"sourceIdentifier": "psirt@autodesk.com",
|
||||
"published": "2024-02-22T03:15:08.027",
|
||||
"lastModified": "2024-11-21T08:56:59.373",
|
||||
"lastModified": "2025-01-17T18:15:25.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A maliciously crafted STP file in ASMIMPORT228A.dll when parsed through Autodesk AutoCAD can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, write sensitive data, or execute arbitrary code in the context of the current process.\n"
|
||||
"value": "A maliciously crafted STP file when parsed in ASMIMPORT228A.dll through Autodesk applications can force an Out-of-Bound Write. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -17,6 +17,26 @@
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@autodesk.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
|
100
CVE-2024/CVE-2024-261xx/CVE-2024-26153.json
Normal file
100
CVE-2024/CVE-2024-261xx/CVE-2024-26153.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-26153",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:10.927",
|
||||
"lastModified": "2025-01-17T17:15:10.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.9.19 \nare vulnerable to cross-site request forgery (CSRF). An external \nattacker with no access to the device can force the end user into \nsubmitting a \"setconf\" method request, not requiring any CSRF token, \nwhich can lead into denial of service on the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-261xx/CVE-2024-26154.json
Normal file
100
CVE-2024/CVE-2024-261xx/CVE-2024-26154.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-26154",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:11.147",
|
||||
"lastModified": "2025-01-17T17:15:11.147",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting in the appliance site \nname. The ETIC RAS web server saves the site name and then presents it \nto the administrators in a few different pages."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-261xx/CVE-2024-26155.json
Normal file
100
CVE-2024/CVE-2024-261xx/CVE-2024-26155.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-26155",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:11.327",
|
||||
"lastModified": "2025-01-17T17:15:11.327",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nexpose clear text credentials in the web portal. An attacker can access \nthe ETIC RAS web portal and view the HTML code, which is configured to \nbe hidden, thus allowing a connection to the ETIC RAS ssh server, which \ncould enable an attacker to perform actions on the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "HIGH",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-261xx/CVE-2024-26156.json
Normal file
100
CVE-2024/CVE-2024-261xx/CVE-2024-26156.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-26156",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:11.533",
|
||||
"lastModified": "2025-01-17T17:15:11.533",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in the \nmethod parameter. The ETIC RAS web server uses dynamic pages that gets \ntheir input from the client side and reflects the input in its response \nto the client."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-261xx/CVE-2024-26157.json
Normal file
100
CVE-2024/CVE-2024-261xx/CVE-2024-26157.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-26157",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:11.697",
|
||||
"lastModified": "2025-01-17T17:15:11.697",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All versions of ETIC Telecom Remote Access Server (RAS) prior to 4.5.0 \nare vulnerable to reflected cross site scripting (XSS) attacks in get \nview method under view parameter. The ETIC RAS web server uses dynamic \npages that get their input from the client side and reflect the input in\n their response to the client."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "LOW",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-22-307-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3315",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T21:15:17.430",
|
||||
"lastModified": "2024-11-21T09:29:22.670",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:13:08.297",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,81 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adminininin/blob/blob/main/README.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259386",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259386",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.309575",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adminininin/blob/blob/main/README.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259386",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259386",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.309575",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3316",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-04T22:15:09.420",
|
||||
"lastModified": "2024-11-21T09:29:22.837",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T18:05:50.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,81 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/adminininin/blob/blob/main/2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259387",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259387",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.309584",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/adminininin/blob/blob/main/2.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259387",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259387",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.309584",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3376",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-06T12:15:08.603",
|
||||
"lastModified": "2024-11-21T09:29:29.570",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:41:21.647",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -74,40 +94,93 @@
|
||||
"value": "CWE-698"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-670"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259497",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259497",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311154",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Sospiro014/zday1/blob/main/Execution_After_Redirect.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259497",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259497",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311154",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3377",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-06T12:15:08.857",
|
||||
"lastModified": "2024-11-21T09:29:29.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:35:40.243",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,79 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oretnom23:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "5A1D4E41-0B2D-4D1E-9AA9-CB4366C91AC4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259498",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259498",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311155",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Sospiro014/zday1/blob/main/ear_stord_xss.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259498",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259498",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311155",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-3427",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2024-04-07T17:15:09.630",
|
||||
"lastModified": "2024-11-21T09:29:34.933",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:02:59.153",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
@ -76,38 +96,85 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A5C774C8-8C38-4E34-B5D3-74872B5F672A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259599",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259599",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311606",
|
||||
"source": "cna@vuldb.com"
|
||||
"source": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-12.md",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.259599",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Permissions Required"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.259599",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.311606",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"VDB Entry"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-458xx/CVE-2024-45832.json
Normal file
100
CVE-2024/CVE-2024-458xx/CVE-2024-45832.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-45832",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:11.870",
|
||||
"lastModified": "2025-01-17T17:15:11.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded credentials were included as part of the application binary. \nThese credentials served as part of the application authentication flow \nand communication with the mobile application. An attacker could access \nunauthorized information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "LOW",
|
||||
"subsequentSystemIntegrity": "HIGH",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48125",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T21:15:13.477",
|
||||
"lastModified": "2025-01-15T21:15:13.477",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:25.547",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the AsDB service of HI-SCAN 6040i Hitrax HX-03-19-I allows attackers to enumerate user credentials via crafted GIOP protocol requests."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Un problema en el servicio AsDB de HI-SCAN 6040i Hitrax HX-03-19-I permite a los atacantes enumerar las credenciales de los usuarios a trav\u00e9s de solicitudes de protocolo GIOP manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-48126",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T21:15:13.613",
|
||||
"lastModified": "2025-01-15T21:15:13.613",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:25.800",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "HI-SCAN 6040i Hitrax HX-03-19-I was discovered to contain hardcoded credentials for access to vendor support and service access."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que HI-SCAN 6040i Hitrax HX-03-19-I conten\u00eda credenciales codificadas para acceder al soporte del proveedor y al servicio."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://kth.diva-portal.org/smash/get/diva2:1876534/FULLTEXT01.pdf",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50633",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T18:15:24.337",
|
||||
"lastModified": "2025-01-16T18:15:24.337",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:26.043",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A Broken Object Level Authorization (BOLA) vulnerability in Indico v3.2.9 allows attackers to access sensitive information via sending a crafted POST request to the component /api/principals."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Una vulnerabilidad de autorizaci\u00f3n a nivel de objeto roto (BOLA) en Indico v3.2.9 permite a los atacantes acceder a informaci\u00f3n confidencial mediante el env\u00edo de una solicitud POST manipulada al componente /api/principals."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/cetinpy/CVE-2024-50633",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-50954",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-15T17:15:16.517",
|
||||
"lastModified": "2025-01-15T17:15:16.517",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:26.310",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The XINJE XL5E-16T and XD5E-24R-E programmable logic controllers V3.5.3b-V3.7.2a have a vulnerability in handling Modbus messages. When a TCP connection is established with the above series of controllers within a local area network (LAN), sending a specific Modbus message to the controller can cause the PLC to crash, interrupting the normal operation of the programs running in the PLC. This results in the ERR indicator light turning on and the RUN indicator light turning off."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Los controladores l\u00f3gicos programables XINJE XL5E-16T y XD5E-24R-E V3.5.3b-V3.7.2a tienen una vulnerabilidad en el manejo de mensajes Modbus. Cuando se establece una conexi\u00f3n TCP con la serie de controladores antes mencionada dentro de una red de \u00e1rea local (LAN), el env\u00edo de un mensaje Modbus espec\u00edfico al controlador puede provocar que el PLC se bloquee, interrumpiendo el funcionamiento normal de los programas que se ejecutan en el PLC. Esto hace que la luz indicadora ERR se encienda y la luz indicadora RUN se apague."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Curator-Kim/Vulnerability-mining/blob/master/XINJE%20XL5E-16T%20XD5E-24R%20Modbus/XINJE%20XL5E-16T%20XD5E-24R%20Modbus.md",
|
||||
|
100
CVE-2024/CVE-2024-536xx/CVE-2024-53683.json
Normal file
100
CVE-2024/CVE-2024-536xx/CVE-2024-53683.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-53683",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:12.053",
|
||||
"lastModified": "2025-01-17T17:15:12.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A valid set of credentials in a .js file and a static token for \ncommunication were obtained from the decompiled IPA. An attacker could \nuse the information to disrupt normal use of the application by changing\n the translation files and thus weaken the integrity of normal use."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.6,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "HIGH",
|
||||
"vulnerableSystemAvailability": "NONE",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-497"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54101",
|
||||
"sourceIdentifier": "psirt@huawei.com",
|
||||
"published": "2024-12-12T12:15:23.763",
|
||||
"lastModified": "2024-12-12T12:15:23.763",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-01-17T18:09:53.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 3.6
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -49,12 +69,82 @@
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A974CA73-84E8-480B-BB4C-4A81D0C985B2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "353AEAF2-AF46-4835-93E1-4F942D5E2810"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "32FBF39A-164F-4F98-AB49-28C50A430C36"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "20112231-B840-44D3-A061-B9B9F80EE378"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C01447F1-7F58-4AE3-B403-C01B2575D898"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "CB3751C1-7729-41D3-AE50-80B5AF601135"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4D81C4EF-7CAF-4E60-91A4-8CF7B95B2B54"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "8198CDB2-4BC5-411A-8736-615A531FC545"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2401DE15-9DBF-4645-A261-8C24D57C6342"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://consumer.huawei.com/en/support/bulletin/2024/12/",
|
||||
"source": "psirt@huawei.com"
|
||||
"source": "psirt@huawei.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-54535",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-01-15T20:15:28.610",
|
||||
"lastModified": "2025-01-16T20:36:12.483",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-01-17T18:15:26.610",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.5,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
|
100
CVE-2024/CVE-2024-546xx/CVE-2024-54681.json
Normal file
100
CVE-2024/CVE-2024-546xx/CVE-2024-54681.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-54681",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T17:15:12.227",
|
||||
"lastModified": "2025-01-17T17:15:12.227",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple bash files were present in the application's private directory.\n Bash files can be used on their own, by an attacker that has already \nfull access to the mobile platform to compromise the translations for \nthe application."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 2.0,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-24-354-01",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57162",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T16:15:33.063",
|
||||
"lastModified": "2025-01-16T16:15:33.063",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:27.240",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Campcodes Cybercafe Management System v1.0 is vulnerable to SQL Injection in /ccms/view-user-detail.php."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Campcodes Cybercafe Management System v1.0 es vulnerable a una inyecci\u00f3n SQL en /ccms/view-user-detail.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/h1-wh0areu/bug_report/blob/main/cybercafe-management-system/SQLi-1.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57577",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:16.740",
|
||||
"lastModified": "2025-01-16T21:15:16.740",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:27.893",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the speed_dir parameter in the formSetSpeedWan function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro speed_dir en la funci\u00f3n formSetSpeedWan."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/blob/main/4/Readme.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57578",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:16.893",
|
||||
"lastModified": "2025-01-16T21:15:16.893",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:28.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the funcpara1 parameter in the formSetCfm function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro funcpara1 en la funci\u00f3n formSetCfm."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.7,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/blob/main/5/Readme.md",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57579",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:17.057",
|
||||
"lastModified": "2025-01-16T21:15:17.057",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:28.983",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the limitSpeedUp parameter in the formSetClientState function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro limitSpeedUp en la funci\u00f3n formSetClientState."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/tree/main/6",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57580",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:17.223",
|
||||
"lastModified": "2025-01-16T21:15:17.223",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T17:15:12.410",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the devName parameter in the formSetDeviceName function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro devName en la funci\u00f3n formSetDeviceName."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/tree/main/7",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57581",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:17.437",
|
||||
"lastModified": "2025-01-16T21:15:17.437",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T17:15:12.597",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the firewallEn parameter in the formSetFirewallCfg function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro firewallEn en la funci\u00f3n formSetFirewallCfg."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/tree/main/8",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57582",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T21:15:17.627",
|
||||
"lastModified": "2025-01-16T21:15:17.627",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T17:15:12.797",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Tenda AC18 V15.03.05.19 was discovered to contain a stack overflow via the startIP parameter in the formSetPPTPServer function."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que Tenda AC18 V15.03.05.19 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro startIP en la funci\u00f3n formSetPPTPServer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/qijiale/Tenda/tree/main/9",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57615",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:09.833",
|
||||
"lastModified": "2025-01-14T01:15:09.833",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:29.320",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the BATcalcbetween_intern component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en el componente BATcalcbetween_intern de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7413",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57616",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:09.947",
|
||||
"lastModified": "2025-01-14T01:15:09.947",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:29.573",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the vscanf component of MonetDB Server v11.47.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en el componente vscanf de MonetDB Server v11.47.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7412",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57617",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:10.060",
|
||||
"lastModified": "2025-01-14T01:15:10.060",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:29.803",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the dameraulevenshtein component of MonetDB Server v11.49.1 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en el componente dameraulevenshtein de MonetDB Server v11.49.1 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/MonetDB/MonetDB/issues/7432",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57642",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-14T01:15:12.873",
|
||||
"lastModified": "2025-01-14T01:15:12.873",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:30.030",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in the dfe_inx_op_col_def_table component of openlink virtuoso-opensource v7.2.11 allows attackers to cause a Denial of Service (DoS) via crafted SQL statements."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Un problema en el componente dfe_inx_op_col_def_table de openlink virtuoso-opensource v7.2.11 permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de declaraciones SQL manipuladas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openlink/virtuoso-opensource/issues/1191",
|
||||
|
@ -2,16 +2,55 @@
|
||||
"id": "CVE-2024-57768",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T18:15:26.003",
|
||||
"lastModified": "2025-01-16T18:15:26.003",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:30.633",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "JFinalOA before v2025.01.01 was discovered to contain a SQL injection vulnerability via the component validRoleKey?sysRole.key."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": " Se descubri\u00f3 que JFinalOA anterior a v2025.01.01 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del componente validRoleKey?sysRole.key."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/r1bbit/JFinalOA/issues/IBHUMT",
|
||||
|
@ -2,71 +2,15 @@
|
||||
"id": "CVE-2024-9673",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-01-08T07:15:27.980",
|
||||
"lastModified": "2025-01-08T07:15:27.980",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-01-17T17:15:12.997",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Piotnet Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Heading widget in all versions up to, and including, 2.4.31 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El complemento Piotnet Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting almacenado a trav\u00e9s del widget de encabezado del complemento en todas las versiones hasta la 2.4.31 incluida, debido a una desinfecci\u00f3n de entrada insuficiente y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten web scripts en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada."
|
||||
"value": "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-22333. Reason: This candidate is a reservation duplicate of CVE-2025-22333. Notes: All CVE users should reference CVE-2025-22333 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/piotnet-addons-for-elementor/trunk/assets/js/extension-pafe-tooltip.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3217875/",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://wordpress.org/plugins/piotnet-addons-for-elementor/#developers",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/317a0e93-fcd7-41a0-a83e-98c50bfc6be2?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
100
CVE-2025/CVE-2025-04xx/CVE-2025-0430.json
Normal file
100
CVE-2025/CVE-2025-04xx/CVE-2025-0430.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2025-0430",
|
||||
"sourceIdentifier": "ics-cert@hq.dhs.gov",
|
||||
"published": "2025-01-17T18:15:30.920",
|
||||
"lastModified": "2025-01-17T18:15:30.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Belledonne Communications Linphone-Desktop \n is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "NONE",
|
||||
"vulnerableSystemIntegrity": "NONE",
|
||||
"vulnerableSystemAvailability": "HIGH",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "ics-cert@hq.dhs.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04",
|
||||
"source": "ics-cert@hq.dhs.gov"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-05xx/CVE-2025-0532.json
Normal file
141
CVE-2025/CVE-2025-05xx/CVE-2025-0532.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-0532",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T18:15:31.237",
|
||||
"lastModified": "2025-01-17T18:15:31.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/new_submit.php. The manipulation of the argument m_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TIANN0/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.292416",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.292416",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.479100",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-05xx/CVE-2025-0533.json
Normal file
145
CVE-2025/CVE-2025-05xx/CVE-2025-0533.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-0533",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-01-17T18:15:31.577",
|
||||
"lastModified": "2025-01-17T18:15:31.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnerableSystemConfidentiality": "LOW",
|
||||
"vulnerableSystemIntegrity": "LOW",
|
||||
"vulnerableSystemAvailability": "LOW",
|
||||
"subsequentSystemConfidentiality": "NONE",
|
||||
"subsequentSystemIntegrity": "NONE",
|
||||
"subsequentSystemAvailability": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirements": "NOT_DEFINED",
|
||||
"integrityRequirements": "NOT_DEFINED",
|
||||
"availabilityRequirements": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedVulnerableSystemAvailability": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemConfidentiality": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemIntegrity": "NOT_DEFINED",
|
||||
"modifiedSubsequentSystemAvailability": "NOT_DEFINED",
|
||||
"safety": "NOT_DEFINED",
|
||||
"automatable": "NOT_DEFINED",
|
||||
"recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://1000projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/onupset/CVE/issues/2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.292417",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.292417",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.479119",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-22904",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-01-16T03:15:06.313",
|
||||
"lastModified": "2025-01-16T03:15:06.313",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-01-17T18:15:31.870",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -15,7 +15,42 @@
|
||||
"value": " Se descubri\u00f3 que RE11S v1.11 contiene un desbordamiento de pila a trav\u00e9s del par\u00e1metro pptpUserName en la funci\u00f3n setWAN."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://re11s.com",
|
||||
|
77
README.md
77
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-01-17T17:00:37.582012+00:00
|
||||
2025-01-17T19:00:28.406135+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-01-17T16:56:52.770000+00:00
|
||||
2025-01-17T18:35:09.950000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,49 +33,56 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
277958
|
||||
277970
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `5`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2024-50967](CVE-2024/CVE-2024-509xx/CVE-2024-50967.json) (`2025-01-17T15:15:12.313`)
|
||||
- [CVE-2025-0528](CVE-2025/CVE-2025-05xx/CVE-2025-0528.json) (`2025-01-17T15:15:12.430`)
|
||||
- [CVE-2025-0529](CVE-2025/CVE-2025-05xx/CVE-2025-0529.json) (`2025-01-17T15:15:12.670`)
|
||||
- [CVE-2025-0530](CVE-2025/CVE-2025-05xx/CVE-2025-0530.json) (`2025-01-17T16:15:33.937`)
|
||||
- [CVE-2025-0531](CVE-2025/CVE-2025-05xx/CVE-2025-0531.json) (`2025-01-17T16:15:34.250`)
|
||||
- [CVE-2024-12757](CVE-2024/CVE-2024-127xx/CVE-2024-12757.json) (`2025-01-17T18:15:24.690`)
|
||||
- [CVE-2024-26153](CVE-2024/CVE-2024-261xx/CVE-2024-26153.json) (`2025-01-17T17:15:10.927`)
|
||||
- [CVE-2024-26154](CVE-2024/CVE-2024-261xx/CVE-2024-26154.json) (`2025-01-17T17:15:11.147`)
|
||||
- [CVE-2024-26155](CVE-2024/CVE-2024-261xx/CVE-2024-26155.json) (`2025-01-17T17:15:11.327`)
|
||||
- [CVE-2024-26156](CVE-2024/CVE-2024-261xx/CVE-2024-26156.json) (`2025-01-17T17:15:11.533`)
|
||||
- [CVE-2024-26157](CVE-2024/CVE-2024-261xx/CVE-2024-26157.json) (`2025-01-17T17:15:11.697`)
|
||||
- [CVE-2024-45832](CVE-2024/CVE-2024-458xx/CVE-2024-45832.json) (`2025-01-17T17:15:11.870`)
|
||||
- [CVE-2024-53683](CVE-2024/CVE-2024-536xx/CVE-2024-53683.json) (`2025-01-17T17:15:12.053`)
|
||||
- [CVE-2024-54681](CVE-2024/CVE-2024-546xx/CVE-2024-54681.json) (`2025-01-17T17:15:12.227`)
|
||||
- [CVE-2025-0430](CVE-2025/CVE-2025-04xx/CVE-2025-0430.json) (`2025-01-17T18:15:30.920`)
|
||||
- [CVE-2025-0532](CVE-2025/CVE-2025-05xx/CVE-2025-0532.json) (`2025-01-17T18:15:31.237`)
|
||||
- [CVE-2025-0533](CVE-2025/CVE-2025-05xx/CVE-2025-0533.json) (`2025-01-17T18:15:31.577`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `69`
|
||||
Recently modified CVEs: `73`
|
||||
|
||||
- [CVE-2024-3416](CVE-2024/CVE-2024-34xx/CVE-2024-3416.json) (`2025-01-17T15:43:40.360`)
|
||||
- [CVE-2024-3417](CVE-2024/CVE-2024-34xx/CVE-2024-3417.json) (`2025-01-17T15:52:40.257`)
|
||||
- [CVE-2024-3418](CVE-2024/CVE-2024-34xx/CVE-2024-3418.json) (`2025-01-17T16:35:52.327`)
|
||||
- [CVE-2024-3419](CVE-2024/CVE-2024-34xx/CVE-2024-3419.json) (`2025-01-17T15:35:15.880`)
|
||||
- [CVE-2024-3420](CVE-2024/CVE-2024-34xx/CVE-2024-3420.json) (`2025-01-17T15:24:53.263`)
|
||||
- [CVE-2024-3421](CVE-2024/CVE-2024-34xx/CVE-2024-3421.json) (`2025-01-17T15:22:26.840`)
|
||||
- [CVE-2024-3422](CVE-2024/CVE-2024-34xx/CVE-2024-3422.json) (`2025-01-17T15:18:05.700`)
|
||||
- [CVE-2024-3424](CVE-2024/CVE-2024-34xx/CVE-2024-3424.json) (`2025-01-17T16:39:48.853`)
|
||||
- [CVE-2024-3425](CVE-2024/CVE-2024-34xx/CVE-2024-3425.json) (`2025-01-17T16:43:20.130`)
|
||||
- [CVE-2024-3426](CVE-2024/CVE-2024-34xx/CVE-2024-3426.json) (`2025-01-17T16:56:52.770`)
|
||||
- [CVE-2024-3743](CVE-2024/CVE-2024-37xx/CVE-2024-3743.json) (`2025-01-17T15:03:47.047`)
|
||||
- [CVE-2024-49142](CVE-2024/CVE-2024-491xx/CVE-2024-49142.json) (`2025-01-17T15:09:15.647`)
|
||||
- [CVE-2025-21363](CVE-2025/CVE-2025-213xx/CVE-2025-21363.json) (`2025-01-17T15:10:17.307`)
|
||||
- [CVE-2025-21364](CVE-2025/CVE-2025-213xx/CVE-2025-21364.json) (`2025-01-17T15:11:24.487`)
|
||||
- [CVE-2025-21365](CVE-2025/CVE-2025-213xx/CVE-2025-21365.json) (`2025-01-17T15:11:34.843`)
|
||||
- [CVE-2025-21366](CVE-2025/CVE-2025-213xx/CVE-2025-21366.json) (`2025-01-17T15:12:20.677`)
|
||||
- [CVE-2025-21370](CVE-2025/CVE-2025-213xx/CVE-2025-21370.json) (`2025-01-17T15:33:41.967`)
|
||||
- [CVE-2025-21372](CVE-2025/CVE-2025-213xx/CVE-2025-21372.json) (`2025-01-17T15:36:24.423`)
|
||||
- [CVE-2025-21374](CVE-2025/CVE-2025-213xx/CVE-2025-21374.json) (`2025-01-17T15:39:11.143`)
|
||||
- [CVE-2025-21378](CVE-2025/CVE-2025-213xx/CVE-2025-21378.json) (`2025-01-17T15:42:41.810`)
|
||||
- [CVE-2025-21382](CVE-2025/CVE-2025-213xx/CVE-2025-21382.json) (`2025-01-17T15:42:09.233`)
|
||||
- [CVE-2025-21389](CVE-2025/CVE-2025-213xx/CVE-2025-21389.json) (`2025-01-17T15:44:04.177`)
|
||||
- [CVE-2025-21393](CVE-2025/CVE-2025-213xx/CVE-2025-21393.json) (`2025-01-17T15:45:26.027`)
|
||||
- [CVE-2025-21395](CVE-2025/CVE-2025-213xx/CVE-2025-21395.json) (`2025-01-17T15:46:01.927`)
|
||||
- [CVE-2025-21405](CVE-2025/CVE-2025-214xx/CVE-2025-21405.json) (`2025-01-17T15:47:39.780`)
|
||||
- [CVE-2024-3315](CVE-2024/CVE-2024-33xx/CVE-2024-3315.json) (`2025-01-17T18:13:08.297`)
|
||||
- [CVE-2024-3316](CVE-2024/CVE-2024-33xx/CVE-2024-3316.json) (`2025-01-17T18:05:50.107`)
|
||||
- [CVE-2024-3376](CVE-2024/CVE-2024-33xx/CVE-2024-3376.json) (`2025-01-17T17:41:21.647`)
|
||||
- [CVE-2024-3377](CVE-2024/CVE-2024-33xx/CVE-2024-3377.json) (`2025-01-17T17:35:40.243`)
|
||||
- [CVE-2024-3427](CVE-2024/CVE-2024-34xx/CVE-2024-3427.json) (`2025-01-17T17:02:59.153`)
|
||||
- [CVE-2024-48125](CVE-2024/CVE-2024-481xx/CVE-2024-48125.json) (`2025-01-17T18:15:25.547`)
|
||||
- [CVE-2024-48126](CVE-2024/CVE-2024-481xx/CVE-2024-48126.json) (`2025-01-17T18:15:25.800`)
|
||||
- [CVE-2024-50633](CVE-2024/CVE-2024-506xx/CVE-2024-50633.json) (`2025-01-17T18:15:26.043`)
|
||||
- [CVE-2024-50954](CVE-2024/CVE-2024-509xx/CVE-2024-50954.json) (`2025-01-17T18:15:26.310`)
|
||||
- [CVE-2024-54101](CVE-2024/CVE-2024-541xx/CVE-2024-54101.json) (`2025-01-17T18:09:53.447`)
|
||||
- [CVE-2024-54535](CVE-2024/CVE-2024-545xx/CVE-2024-54535.json) (`2025-01-17T18:15:26.610`)
|
||||
- [CVE-2024-57162](CVE-2024/CVE-2024-571xx/CVE-2024-57162.json) (`2025-01-17T18:15:27.240`)
|
||||
- [CVE-2024-57577](CVE-2024/CVE-2024-575xx/CVE-2024-57577.json) (`2025-01-17T18:15:27.893`)
|
||||
- [CVE-2024-57578](CVE-2024/CVE-2024-575xx/CVE-2024-57578.json) (`2025-01-17T18:15:28.430`)
|
||||
- [CVE-2024-57579](CVE-2024/CVE-2024-575xx/CVE-2024-57579.json) (`2025-01-17T18:15:28.983`)
|
||||
- [CVE-2024-57580](CVE-2024/CVE-2024-575xx/CVE-2024-57580.json) (`2025-01-17T17:15:12.410`)
|
||||
- [CVE-2024-57581](CVE-2024/CVE-2024-575xx/CVE-2024-57581.json) (`2025-01-17T17:15:12.597`)
|
||||
- [CVE-2024-57582](CVE-2024/CVE-2024-575xx/CVE-2024-57582.json) (`2025-01-17T17:15:12.797`)
|
||||
- [CVE-2024-57615](CVE-2024/CVE-2024-576xx/CVE-2024-57615.json) (`2025-01-17T18:15:29.320`)
|
||||
- [CVE-2024-57616](CVE-2024/CVE-2024-576xx/CVE-2024-57616.json) (`2025-01-17T18:15:29.573`)
|
||||
- [CVE-2024-57617](CVE-2024/CVE-2024-576xx/CVE-2024-57617.json) (`2025-01-17T18:15:29.803`)
|
||||
- [CVE-2024-57642](CVE-2024/CVE-2024-576xx/CVE-2024-57642.json) (`2025-01-17T18:15:30.030`)
|
||||
- [CVE-2024-57768](CVE-2024/CVE-2024-577xx/CVE-2024-57768.json) (`2025-01-17T18:15:30.633`)
|
||||
- [CVE-2024-9673](CVE-2024/CVE-2024-96xx/CVE-2024-9673.json) (`2025-01-17T17:15:12.997`)
|
||||
- [CVE-2025-22904](CVE-2025/CVE-2025-229xx/CVE-2025-22904.json) (`2025-01-17T18:15:31.870`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
306
_state.csv
306
_state.csv
@ -22658,7 +22658,7 @@ CVE-2006-6971,0,0,30b4c36a4b25ee7e8069fc317f679dc4380c3f55bebfb9d35761bf8fec2026
|
||||
CVE-2006-6972,0,0,8f506b6f5f516e97cdd3e30f94839929e12aa68d6feb8403ee1ab0c3bb098ae8,2024-11-21T00:24:04.983000
|
||||
CVE-2006-6973,0,0,b0c172571a7e3fbbf9bb7bd23aa66d539a6c75574b53958836b26207966214a1,2024-11-21T00:24:05.127000
|
||||
CVE-2006-6974,0,0,ef3fde9bd83e6fa4f6a8890f9e5915fbbe457d0b22fce140393cdc707a3ae85c,2024-11-21T00:24:05.263000
|
||||
CVE-2006-6975,0,1,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000
|
||||
CVE-2006-6975,0,0,fb376becbd6c1a42b3c416b6bc7918c7918aceafe5a9971f9e32d0eec376a468,2025-01-17T15:15:07.970000
|
||||
CVE-2006-6976,0,0,418d71c951e11f4c17afe22a63b28728d0eacdd2a404ee6ec0bdd5068faf47a8,2024-11-21T00:24:05.540000
|
||||
CVE-2006-6977,0,0,3d8c66879361d3274cbbae843e88fd16c44e5d69c8ff35cef5fa1923a0c7578e,2024-11-21T00:24:05.687000
|
||||
CVE-2006-6978,0,0,c34f966b5f1cd610e3b77698c252679236b5e95a7a79f55b64bfe3927cde1e68,2024-11-21T00:24:05.823000
|
||||
@ -22714,7 +22714,7 @@ CVE-2006-7027,0,0,bde2d7620e70fe3e9fd88b7eee3d8f2affe93b5a4f505608f505d9f899bd97
|
||||
CVE-2006-7028,0,0,10c7c6647d4b92142f35a3dad4b5e3da7798e0f1fba3b8973942d232aed61916,2024-11-21T00:24:12.987000
|
||||
CVE-2006-7029,0,0,d05274c9edad507fc94a06a70dc295c14ea47ea562b6430a2623089554c3f6f7,2024-11-21T00:24:13.123000
|
||||
CVE-2006-7030,0,0,b371a291b807c5db02b79cabd3266dc6bf4e437b85903aef9e8ab3d115d76dbe,2024-11-21T00:24:13.267000
|
||||
CVE-2006-7031,0,1,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000
|
||||
CVE-2006-7031,0,0,ee5481b7cd2fe9749b9cca0611103ca8ee817f237bc0865475a632453bda472d,2025-01-17T15:15:08.780000
|
||||
CVE-2006-7032,0,0,9a0a02bec8c509c0efda365345d80221095fd13e7b0c60b15e25bc48243b6e78,2024-11-21T00:24:13.550000
|
||||
CVE-2006-7033,0,0,f293e1e2b08eed970b1d5f2d377c547c7f860b0b99d8ac492f5c8c3e52025f1a,2024-11-21T00:24:13.687000
|
||||
CVE-2006-7034,0,0,310913b770c09ad04bab56a279511942f2faf0d37ed071b984f9a944ca4e6d7e,2024-11-21T00:24:13.820000
|
||||
@ -22788,7 +22788,7 @@ CVE-2006-7101,0,0,54914dfc2f2d8c05f5718c4b9fcb082ea15b97165b5f9266b73b1cc0ea96e2
|
||||
CVE-2006-7102,0,0,c878466fc041bd488504e91ea2b7bd1b546b20fdcdf04216d53e54a78c900c99,2024-11-21T00:24:23.983000
|
||||
CVE-2006-7103,0,0,fb5030e3101f936fcdba6e8af7c10f4af95c902a1d5ca21ede646503cc45a4b1,2024-11-21T00:24:24.180000
|
||||
CVE-2006-7104,0,0,75e8ab9990855ce63c9efad6686e517def05049afa5915ea3bc6340c5bfe925b,2024-11-21T00:24:24.350000
|
||||
CVE-2006-7105,0,1,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000
|
||||
CVE-2006-7105,0,0,a8a46c1c8b0c6f9b7e9800a77e4110be699829b7f53ee90ec6303e855fe629b5,2025-01-17T15:15:08.970000
|
||||
CVE-2006-7106,0,0,052b68c4c39ccb711da3927959cf230d15f6600c3fb1cf33e8f09bc5266a475e,2024-11-21T00:24:24.623000
|
||||
CVE-2006-7107,0,0,b300b5b09c1d008d729a1137d8096bba1d25751214425e6895bc895e2e2ac98f,2024-11-21T00:24:24.763000
|
||||
CVE-2006-7108,0,0,389816ff42b48fcd19238e824feabdc94205ba8dce210b6e7f66674be6d41e40,2024-11-21T00:24:24.903000
|
||||
@ -24583,7 +24583,7 @@ CVE-2007-1674,0,0,898736af90d43b12c675c7e7004a27e56fc818344a9f6200fab13fdb761141
|
||||
CVE-2007-1675,0,0,88134bcea51f5528cc9733a9accd544287ed7c381d7d445aaa9046fa0dd3b3af,2024-11-21T00:28:54.357000
|
||||
CVE-2007-1677,0,0,0d8d9740476b59067a995c1051659a20b4ab1382d3f430913062e79affd45b64,2024-11-21T00:28:54.503000
|
||||
CVE-2007-1678,0,0,0a6ff503a77c9ab19ba61a79356b174a036a6c7cbdde074750fb90ef72605439,2024-11-21T00:28:54.647000
|
||||
CVE-2007-1679,0,1,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000
|
||||
CVE-2007-1679,0,0,3690a20369bd39a88d00c1eb9034f2b1d8bcd0faec266e23ad6844e279253621,2025-01-17T15:15:09.180000
|
||||
CVE-2007-1680,0,0,74f9e3bd230e34b6b2cac36b9597aab7cc63538c886572c19b9e602bea0ac609,2024-11-21T00:28:54.940000
|
||||
CVE-2007-1681,0,0,6766222a3f8845792a3a9b2e2ba5d04f6b75cfd04f3ab195ccb360a1544e7a03,2024-11-21T00:28:55.090000
|
||||
CVE-2007-1682,0,0,8b65392eb4bcf0bf28074b04459b71babaa2150d883096605ffdf6a345da76af,2024-11-21T00:28:55.240000
|
||||
@ -24921,7 +24921,7 @@ CVE-2007-2016,0,0,219237bef47cd3d89a064e2008096ec22251fd5a404ebc1e6a827e95ade95e
|
||||
CVE-2007-2017,0,0,546535e5dcff5b88db8527e35deee25aa0d76c69039039747c9d4e33db0860be,2024-11-21T00:29:42.150000
|
||||
CVE-2007-2018,0,0,3bdf4adeddcab5ac1ea6297b19f88a79344dc31e6f0bb3ce03a9c68b215e9766,2024-11-21T00:29:42.297000
|
||||
CVE-2007-2019,0,0,2d45d4f38af76aad986c8235d259f4ca92688a48ad3708a35598872a6d917679,2024-11-21T00:29:42.443000
|
||||
CVE-2007-2020,0,1,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000
|
||||
CVE-2007-2020,0,0,4998ee8938b23aa4228d5601d4ebdc820d64879922301103e046e6765187b83d,2025-01-17T15:15:09.387000
|
||||
CVE-2007-2021,0,0,21684c09b0a57b5b7505bdbe148093d50d0d0492eecb224a83fa928e7b5314cc,2024-11-21T00:29:42.753000
|
||||
CVE-2007-2022,0,0,0a74377aec1e158ed10e3fdcb91b5ff2c83587fbf81c424f39b9648e3cbcced7,2024-11-21T00:29:42.900000
|
||||
CVE-2007-2023,0,0,c036be7fab3ae0920f3c3ad37b2f9059dfb50c6a9251f645923397d9ed0adcdc,2024-11-21T00:29:43.100000
|
||||
@ -25323,7 +25323,7 @@ CVE-2007-2418,0,0,0ce5ecf8ba84947258950ede570da848ddbad9277ca8ddafd1fc1896b8c132
|
||||
CVE-2007-2419,0,0,7e864fd0311ba966e74cdf0abafa623b4ad43b67f12d94ddca837b539eacf600,2024-11-21T00:30:44.467000
|
||||
CVE-2007-2420,0,0,5e67598ecc5684ef53e014523f7e87cadd2b55f950679768101d0718a5eb3330,2024-11-21T00:30:44.617000
|
||||
CVE-2007-2421,0,0,f6020ed7e34caeaa4010ff8b47fa5b09bbb005e2115ed3bb4822fb78060e9bac,2024-11-21T00:30:44.753000
|
||||
CVE-2007-2422,0,1,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000
|
||||
CVE-2007-2422,0,0,32e2b4784576d6303212342ccc2647a5853945a4b0836e2e051fb847d4d43f66,2025-01-17T15:15:09.590000
|
||||
CVE-2007-2423,0,0,0b83896635331471d87404141f16467346739f0b8dca420f20a9271baf77866c,2024-11-21T00:30:45.040000
|
||||
CVE-2007-2424,0,0,1c922304dee11dfd180a30859ca86a37f00ad1204bc14ec7002335aba011e2b7,2024-11-21T00:30:45.187000
|
||||
CVE-2007-2425,0,0,4552c35414ca77abd157ab5a3c322bca479025668f503b79b5811d98cdf7fb96,2024-11-21T00:30:45.340000
|
||||
@ -26084,7 +26084,7 @@ CVE-2007-3190,0,0,4c2508555f4bb672ac6fa91936f379a042cd9025c1ecb47e69b838a9b848a6
|
||||
CVE-2007-3191,0,0,f1c66cdf736c9784d9b1b03151b892596c7dbfcbf068ae4299a30d347bda4f86,2024-11-21T00:32:37.463000
|
||||
CVE-2007-3192,0,0,a7bc488985ed5711ca70747f44e04ef839b560fcecfa1dbf4570d2f6db55fb83,2024-11-21T00:32:37.613000
|
||||
CVE-2007-3193,0,0,466a6a90fd68b59e93e31de5a45f967fb6c099e73bfea3cda27528cca8dcfc32,2024-11-21T00:32:37.757000
|
||||
CVE-2007-3194,0,1,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000
|
||||
CVE-2007-3194,0,0,41e9f0fd0aa8a6dcc5d7bc65bdb811ebbaf757753e2e04345074aa733e39e2cf,2025-01-17T15:15:09.803000
|
||||
CVE-2007-3195,0,0,5a2516527b23144ca52bbe1a590a8c793b0f79113d69dd198a4da4cfc807a21e,2024-11-21T00:32:38.057000
|
||||
CVE-2007-3196,0,0,dc730fa8a9a244caa73a32806f04ab6274e74d634ec6f01253d83153e7921ef4,2024-11-21T00:32:38.220000
|
||||
CVE-2007-3197,0,0,ef856130105c25f2996c49fe89d04372d79ac0dc781e31ebe2dbac49fbee18cd,2024-11-21T00:32:38.367000
|
||||
@ -26297,7 +26297,7 @@ CVE-2007-3405,0,0,5b68aa2bd44434ecb40c35a2db1a1ff65bd24ea5952ab3b45ee119092df93b
|
||||
CVE-2007-3406,0,0,5ba8c0c40aab2e7442619791db7d4e95da8b58c61f3368f64caa41ef76e3f6e5,2024-11-21T00:33:09.647000
|
||||
CVE-2007-3407,0,0,6eb5791da788424b85b93887dd4ab3b5066e55d4a8940bbcb108b80ed5021c62,2024-11-21T00:33:09.787000
|
||||
CVE-2007-3408,0,0,2537f832c34e0219d5119235ad7fdb726c6da4d2033e5cc183b2a35820ccfb21,2024-11-21T00:33:09.927000
|
||||
CVE-2007-3409,0,1,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000
|
||||
CVE-2007-3409,0,0,4b04134b3951cab8527b1ca3cf0470405d6ea9f496cc776db0a8720ec4128075,2025-01-17T15:15:10.013000
|
||||
CVE-2007-3410,0,0,42b713d16d98e71bfb2ba894991c109d004caccc2efa8def8cc2046a3736c6a6,2024-11-21T00:33:10.220000
|
||||
CVE-2007-3411,0,0,71fbf15baab87b4d496c0a297ed15355d61657fa52df993ad567ff0c695bd40f,2024-11-21T00:33:10.377000
|
||||
CVE-2007-3412,0,0,c8cae3f674ab922974283adb017b9bf909a76f69ed166bbe1ea05401586f1635,2024-11-21T00:33:10.983000
|
||||
@ -26698,7 +26698,7 @@ CVE-2007-3812,0,0,a057a88bd62dd2cf84a9585f0e43e2f7615b3b0e7b564410bf9af9930b322b
|
||||
CVE-2007-3813,0,0,1dfe731dfdd2a22844282db9d3fa39dfccd2b0bd21b2bc57fa7b8ecd6594574d,2024-11-21T00:34:07.503000
|
||||
CVE-2007-3814,0,0,24b69119cc8609a7cd25db046bdc3c20bf6de9632f8146e48ff4bb67790f47d0,2024-11-21T00:34:07.630000
|
||||
CVE-2007-3815,0,0,ccb135b637c4c9ff92a342957f77873ab5c48907ba7a1c386ff0a4a5de52df18,2024-11-21T00:34:07.780000
|
||||
CVE-2007-3816,0,1,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000
|
||||
CVE-2007-3816,0,0,98bc5961bba95517eaa21a31db2e6c3344eae0558fa33ea783def732de77ca01,2025-01-17T15:15:10.297000
|
||||
CVE-2007-3817,0,0,84ecd5fce551683d845d9045254e63af0981844cb29f63a66e2739c2492c581e,2024-11-21T00:34:08.073000
|
||||
CVE-2007-3818,0,0,fc09393facd0c477d75888fde9b5aa3492afbc6a73cc3ada69cb86c8d0d42745,2024-11-21T00:34:08.207000
|
||||
CVE-2007-3819,0,0,68133b1983fea415ba02f4fa9f75646105d692487e126200e69a66987de833f6,2024-11-21T00:34:08.347000
|
||||
@ -27160,7 +27160,7 @@ CVE-2007-4286,0,0,a7bb9581bd5bc906382f293b635bfafa72ad3eb5b191fc51019dabb7fc895d
|
||||
CVE-2007-4287,0,0,196aa319b27704f0ce3a5618753d29fc691896f5273ebab8e0e9328ac0411313,2024-11-21T00:35:14.283000
|
||||
CVE-2007-4288,0,0,34de55785ba29073fd74acc6e47ecc477e01d8869fa33e96a015fbbef9e70217,2024-11-21T00:35:14.417000
|
||||
CVE-2007-4289,0,0,0c61281a3729f2fc152ee1b619c73e3e6c289f4c4d38fc47082b03b6dcb05d01,2024-11-21T00:35:14.557000
|
||||
CVE-2007-4290,0,1,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000
|
||||
CVE-2007-4290,0,0,4602b7a383ee2fb83ef35794ca49f55c55896f0d18ea8c469b9b8fe9dda08c99,2025-01-17T15:15:10.517000
|
||||
CVE-2007-4291,0,0,05f61638f5563cebb165558e108521cd9423d24be16bad06eab53e10b29f4608,2024-11-21T00:35:14.827000
|
||||
CVE-2007-4292,0,0,3aa371c016fa4984d6c6b2f3844ec60dfd8dfee0d33117bba91f721014ce093a,2024-11-21T00:35:14.983000
|
||||
CVE-2007-4293,0,0,3f353b7109765b5bb62e7a94d53af98e6c56d8181eeae53878246d59c2220773,2024-11-21T00:35:15.140000
|
||||
@ -27332,7 +27332,7 @@ CVE-2007-4461,0,0,3de60db2724f4cef72bfe99980b55efdfcee3fdd4646732fa7e581574acc16
|
||||
CVE-2007-4462,0,0,62101041934fa56bdc980b528c55bbcd757d54a71d56a58218495bf1e1547f38,2024-11-21T00:35:39.610000
|
||||
CVE-2007-4463,0,0,187c35e0bf0628b966b267bc1c20e11ba64192d1628e5020ea4f24910af48fa7,2024-11-21T00:35:39.750000
|
||||
CVE-2007-4464,0,0,a2db813a61522b747171f39949a8a83c7f59e55ceb2ec5f6094d1e0a6a441f5e,2024-11-21T00:35:39.890000
|
||||
CVE-2007-4465,0,1,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000
|
||||
CVE-2007-4465,0,0,7bacf7b305a03e2af1c1298be67cc3dbf05ab783a086d0d5d98e3b003fbde511,2025-01-17T15:15:10.747000
|
||||
CVE-2007-4466,0,0,05d022ac82f920a784de2112b8419f5269a66d668bf3c80f9401be43420d1d57,2024-11-21T00:35:40.293000
|
||||
CVE-2007-4467,0,0,be85cfac49c9b9ce778282c01b1300dc0010257db8d67ffb621aeecd6b60767f,2024-11-21T00:35:40.407000
|
||||
CVE-2007-4470,0,0,d2964a4e088d929f64a62b03df0f35a0373ba3c3e84cb9890054f4a568d17366,2024-11-21T00:35:40.527000
|
||||
@ -27421,7 +27421,7 @@ CVE-2007-4555,0,0,6630d2bb6667238dff571881b0a8ccb540b1ec43c0c9b7c0887e73db144be6
|
||||
CVE-2007-4556,0,0,b4f43e784681fe6b8359c2e109a742f06d2ba34d81180afd975ba9d99accf207,2024-11-21T00:35:53.020000
|
||||
CVE-2007-4557,0,0,5ae75a658353db31a4879c7fa1ac3c85c80de620baaeda978b5eb301c1292028,2024-11-21T00:35:53.183000
|
||||
CVE-2007-4558,0,0,33d7b38ab69a2dc921cd0efb9caba7a58f73953a56c79eb00aeb3febab15c613,2023-11-07T02:01:04.180000
|
||||
CVE-2007-4559,0,1,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000
|
||||
CVE-2007-4559,0,0,b4d9615876a4ac59adb68ed47ec48fc8e3b9db5f2c84a69c4336580cba7270f1,2025-01-17T15:15:11.123000
|
||||
CVE-2007-4560,0,0,e8c605cc3b9174d5b334105b42dc4ea85ecf4b8dc1c209149ac82d7f531fdc69,2024-11-21T00:35:53.530000
|
||||
CVE-2007-4561,0,0,a9da5f6fa70f2fbcd69e1fdd36c7725610022097f397c1d4b55428b3ec9d4286,2024-11-21T00:35:53.707000
|
||||
CVE-2007-4562,0,0,3001d31d10a6ff798d15ba5d0418e8a3943db487e0b5659ddd65909addf80b3f,2024-11-21T00:35:53.857000
|
||||
@ -27643,7 +27643,7 @@ CVE-2007-4782,0,0,bc6f8aa60af4d2816d1b78e5baff5490f24615214441f891054d2e957f7523
|
||||
CVE-2007-4783,0,0,ce96bf486d496ce94fbb5d4887520e06f7cddd71865a721244fdc00b4e88faae,2024-11-21T00:36:26.440000
|
||||
CVE-2007-4784,0,0,2ba6eb1397b30f09b5a0267c90e3e94b01cfdf1f4d69d06a0c1251d9e9e1ab82,2024-11-21T00:36:26.580000
|
||||
CVE-2007-4785,0,0,4432cfce3d278c9ab8292c097f4a7afca4ac429366bdf34e9208711ceb20e264,2024-11-21T00:36:26.717000
|
||||
CVE-2007-4786,0,1,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000
|
||||
CVE-2007-4786,0,0,5635f29f8d56e0aa368099f96b7a354ed213d0486ee572166a96ffccd32e9496,2025-01-17T15:15:11.380000
|
||||
CVE-2007-4787,0,0,05a5aaaf7dfaf6d662f1c8419b632e8613242f91390c751301b0be183cfd605a,2024-11-21T00:36:27.020000
|
||||
CVE-2007-4788,0,0,b012ee81b96bd7841ea38ade60bff976f2b03be1131c6d750d0430313390d2d5,2024-11-21T00:36:27.153000
|
||||
CVE-2007-4789,0,0,f6fac4f1eed433732ee4e0c6354a53039dbe7410a73a0f7964b5630fdd0bc2c2,2024-11-21T00:36:27.303000
|
||||
@ -27925,7 +27925,7 @@ CVE-2007-5093,0,0,993cb60156fc86ec2ef785c0575991e6b3bd7019f93383a3da535c331912bf
|
||||
CVE-2007-5094,0,0,df0d6f2388dcca221fce10b9f40a5244914eb8a410b5a246260385fcead6884d,2024-11-21T00:37:06.763000
|
||||
CVE-2007-5095,0,0,6d5b9f346211fcc92b3cb1d0b460a8fc98ea7697bf7142b16f04eebf2c20f67f,2024-11-21T00:37:06.893000
|
||||
CVE-2007-5096,0,0,a29e920bb6f95fd23e034a4fc32d21393f32a7a19873eb0fd35d32a1df572bcd,2024-11-21T00:37:07.030000
|
||||
CVE-2007-5097,0,1,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000
|
||||
CVE-2007-5097,0,0,ca466f4036a08f4c488c68f4bef0dbc98670fc75d4ba43636a1b7f01ba399cc2,2025-01-17T15:15:11.630000
|
||||
CVE-2007-5098,0,0,7445261d4bd176ec3d4e503623e4daa9f4870d18a5851afe1ef0312bfd4b2279,2024-11-21T00:37:07.297000
|
||||
CVE-2007-5099,0,0,ac7efde8aad5508385d88d0a2400f6afbc1f46a73da3ad9a54d8fff463b9ae2d,2024-11-21T00:37:07.433000
|
||||
CVE-2007-5100,0,0,36c4ebde2519d1d0636d11c2d48cf76171b1d8111e6ab854c797e1e14ffaa61a,2024-11-21T00:37:07.570000
|
||||
@ -28385,7 +28385,7 @@ CVE-2007-5561,0,0,99edf9ec5bfc1d9f89a72bf2ea29bfe7d418fe97a61d4d8e9dc519d66b7591
|
||||
CVE-2007-5562,0,0,92b4ca2b297bdb7ce215a17dad700ae49eede3dc3692583a73b609b9cef653c4,2024-11-21T00:38:11.423000
|
||||
CVE-2007-5563,0,0,54a2bac93cce3961b913f7e901c091a9509f74c8ff9e36c21f8bddea28ccce0e,2024-11-21T00:38:11.557000
|
||||
CVE-2007-5564,0,0,947d90e9c1d7f3e853f110562e11b0ecde8e8aa4caafdba3e112f7797b9cbb45,2024-11-21T00:38:11.690000
|
||||
CVE-2007-5565,0,1,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000
|
||||
CVE-2007-5565,0,0,bc68cf6b18340dc817a7498e4ff42009ae28a1c256be5c8d10c4b74c769abe8d,2025-01-17T15:15:11.853000
|
||||
CVE-2007-5566,0,0,e5bb5b6554c8b5920f9bdd17dc2969ad5e9fba7349d31fe67dcc6fbbabaaf7db,2024-11-21T00:38:11.953000
|
||||
CVE-2007-5567,0,0,4a71954d2aa6b64a0e2814cb8d361731e3c0789ef11f1c169c554a98e60f66c4,2024-11-21T00:38:12.100000
|
||||
CVE-2007-5568,0,0,9ee5143b09df6d9171180041edc412ea03f580c151ae1409087cc639df1f7959,2024-11-21T00:38:12.237000
|
||||
@ -29591,7 +29591,7 @@ CVE-2008-0077,0,0,0e1bac7dd448a66bc0cfeda427b0b7eccfbbbbcd16dae2ea2988eaf3c68523
|
||||
CVE-2008-0078,0,0,b0c76c054456efed9bc03f0d63a8c45c69b58d7db12612ac8af88c57bf6ccbaa,2024-11-21T00:41:07.197000
|
||||
CVE-2008-0079,0,0,1838c9168aeba926515133757754f2f2588c409b8db6c9502b4f2a642fa4a72c,2023-11-07T02:01:40.037000
|
||||
CVE-2008-0080,0,0,8412f77974bae998d3f560d3bb88b735a41789f49938bbdb0b2bd6d7500ce698,2024-11-21T00:41:07.333000
|
||||
CVE-2008-0081,0,1,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000
|
||||
CVE-2008-0081,0,0,0355840a422e16911542bb81daf626c518b1251127618dc840e52c7d99675b4c,2025-01-17T16:15:24.647000
|
||||
CVE-2008-0082,0,0,14df28dec90609a090ec96df339f8fe485b84402601d50278dc98d736092038a,2024-11-21T00:41:07.647000
|
||||
CVE-2008-0083,0,0,8687f7f0c7a7bc1282b56ce44e732012ba0b44e61620fe9d5985af95c2ec761a,2024-11-21T00:41:07.797000
|
||||
CVE-2008-0084,0,0,8d9d53772b44e9dcf5259626258fdc8a9bea67493536450ffec6dddab88039cc,2024-11-21T00:41:07.947000
|
||||
@ -30732,7 +30732,7 @@ CVE-2008-1242,0,0,ade061dbfa3c75b3eae21375dcb17b46551787c88bb56bbea1c3e1a1f55408
|
||||
CVE-2008-1243,0,0,42145c5f7625854ffe44a16aadd9267afa8a87f9945dc50f532834db7dc599d8,2024-11-21T00:44:02.443000
|
||||
CVE-2008-1244,0,0,4f75e571a4c461d078fc50e2768c8f6fc64e082b7cb7f899e8ecd70ba2e4d236,2024-11-21T00:44:02.607000
|
||||
CVE-2008-1245,0,0,499329cbc5730cdbfe3a919e91d36f9384e84ec1c61f007b1e1e33d3d64ffe61,2024-11-21T00:44:02.770000
|
||||
CVE-2008-1246,0,1,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000
|
||||
CVE-2008-1246,0,0,234b98d9e4362d459f24b8df6c057c6c4ce36abab1fde350b78cf48b995fc4ee,2025-01-17T16:15:25.623000
|
||||
CVE-2008-1247,0,0,581e127726d913db054905cf0f171f9dbc4f07f20d4919c7a581266c1b3bd5e5,2024-11-21T00:44:03.133000
|
||||
CVE-2008-1248,0,0,5025b7537aedeb4eed0917b19cd88ea905d1785c1e11d61e51e5caea29be940a,2024-11-21T00:44:03.283000
|
||||
CVE-2008-1249,0,0,acdf034143a4271ec6a79d81d9e059030241aad4ad188f11b2205412ceed93da,2024-11-21T00:44:03.420000
|
||||
@ -31834,7 +31834,7 @@ CVE-2008-2370,0,0,021fd53a864ecce480ee755ce14f76e201760b771f120e1881240bf82ea28b
|
||||
CVE-2008-2371,0,0,65e826a347a7d47a2217d9f8fdb2282d1c6e3ac77345bbff683c1cf114001c2d,2024-11-21T00:46:44.070000
|
||||
CVE-2008-2372,0,0,06752596f4dc9c5f79bde310a8a8761c7b1b4e4fce57ed9c3c2ce61ab6497eec,2024-11-21T00:46:44.267000
|
||||
CVE-2008-2373,0,0,b9e02b4b3e04278094a56d4d148fcf6e26cb39c5f845f8624159072ae5e27fac,2023-11-07T02:02:12.140000
|
||||
CVE-2008-2374,0,1,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000
|
||||
CVE-2008-2374,0,0,76cd3df379309ff185123db074873bec3ee8085d028ae8d719453e0077588cee,2025-01-17T16:15:25.913000
|
||||
CVE-2008-2375,0,0,0eab456f6d2e06dda163307088b16f729c480edc6e685ec5b5b9949cabd0ba33,2024-11-21T00:46:44.563000
|
||||
CVE-2008-2376,0,0,5bafc7bc7070c289491a0683e4b7912e267b230e9643e4b4c4341e8b8c5bb9ac,2024-11-21T00:46:44.693000
|
||||
CVE-2008-2377,0,0,ab06d4b349e72855c527159f834167645fa48b583d213fc8d0aac2034b654596,2024-11-21T00:46:44.837000
|
||||
@ -32716,7 +32716,7 @@ CVE-2008-3278,0,0,e68e5a27346081e1298093dadeaf20095f7733d0ce735acc6e303b7d3dd2b8
|
||||
CVE-2008-3279,0,0,77c22df27107f79ee78ca6a9c77007419f2ec711a34afe9981863476185cea93,2024-11-21T00:48:52.403000
|
||||
CVE-2008-3280,0,0,bb719b7417b6631526a61fff546be1cfbe43e717c54a73ae62a6272c7b212e85,2024-11-21T00:48:52.517000
|
||||
CVE-2008-3281,0,0,5571ac81465c0dbbe8c1613369bafa7fe48230b1b507e820179984401d5b8a62,2024-11-21T00:48:52.650000
|
||||
CVE-2008-3282,0,1,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000
|
||||
CVE-2008-3282,0,0,e73f5126da8815b64735249dbc68ef93b14cbb4c3f07fd3995c006c69e7f189c,2025-01-17T16:15:26.260000
|
||||
CVE-2008-3283,0,0,8aec0e178bc1a698060d811f8bebf9066e08935179f2e4373edd0ad291c9f238,2024-11-21T00:48:52.943000
|
||||
CVE-2008-3284,0,0,babe9ad38a5b74cc29fce5b8467b30419739070eb54015a780d8919aef96fddc,2023-11-07T02:02:26.743000
|
||||
CVE-2008-3285,0,0,af5f49f5a709d1ff96a0b92c966c513d54b1d0075b847f0e12b6e55aa036235c,2024-11-21T00:48:53.077000
|
||||
@ -32899,7 +32899,7 @@ CVE-2008-3461,0,0,8fd9d75ee9a5599892ac6cd3fe7b26179d0ab8de1f672e01aeb8373954a6e0
|
||||
CVE-2008-3462,0,0,4ec65f92f08900243a5963de40140263596057033b8bc26433b011690d2476ee,2023-11-07T02:02:28.933000
|
||||
CVE-2008-3463,0,0,579d4a43998c9b2eac5853f8ef6aea44a356e5c281b110cdfeb120f43a4f5f8c,2023-11-07T02:02:29.213000
|
||||
CVE-2008-3464,0,0,6f30f28ce388878e8688e31283f6c16c7f1b76bbf8b79290d35ede35c8adeef4,2024-11-21T00:49:18.913000
|
||||
CVE-2008-3465,0,1,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000
|
||||
CVE-2008-3465,0,0,6019716af9bf272c812cbc39a89bc20ad153b0c9c66cbbee7fd12e193ab8842d,2025-01-17T16:15:26.540000
|
||||
CVE-2008-3466,0,0,3f605f7ad58aecd6880381ea770fcf5510e7426e4d6d423aca4a9402decf9654,2024-11-21T00:49:19.160000
|
||||
CVE-2008-3467,0,0,3e16ef74df19bcf7e3f85c918700aa0bf0d9420e425a933a41011fdf73f726e7,2023-11-07T02:02:29.467000
|
||||
CVE-2008-3468,0,0,bd97f0bdb30e21367d5b70a2692b44a7f6c22cf3161cc2ab669d869b11fa2ef3,2023-11-07T02:02:29.687000
|
||||
@ -32908,7 +32908,7 @@ CVE-2008-3470,0,0,0386f2718b67efa7c55c859658f69a06fbdf68f14dd09170f22c4d9e5b085e
|
||||
CVE-2008-3471,0,0,e118a701ddcff55a460444618ccc543da969635fbab102c051dc799fe622d87e,2024-11-21T00:49:19.340000
|
||||
CVE-2008-3472,0,0,9a9a0bc60d777b949854990bac94c9696ed91fef448021ee436120cdab087d43,2024-11-21T00:49:19.480000
|
||||
CVE-2008-3473,0,0,eb30fa73efa675fafeee269652d27a922d1d707ca34f4ce34e69e671c9c979b5,2024-11-21T00:49:19.613000
|
||||
CVE-2008-3474,0,1,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000
|
||||
CVE-2008-3474,0,0,2c05bc7f7bfbb5a7f8d2c2a478c091bc47c1969515e7e639d46b320def51cbe2,2025-01-17T16:15:26.857000
|
||||
CVE-2008-3475,0,0,c2e55ba56e3a4ec6c1a80729adc9df6c0e1e36d44bb3bf47e15a0f5dafb7ee1f,2024-11-21T00:49:19.883000
|
||||
CVE-2008-3476,0,0,bd23dd8f4411c5b005db25888cd78f3500823b5bb145eeec5bd65ec076da7811,2024-11-21T00:49:20.040000
|
||||
CVE-2008-3477,0,0,f34f16d7433d761a449b8b1788f5d67109642537fda255c851afb35898d1cdbb,2024-11-21T00:49:20.177000
|
||||
@ -33203,7 +33203,7 @@ CVE-2008-3771,0,0,387d2734e293e9d4229a89ad93ef198a75ba6c7ec0b26ca9f05a68c3fa88ea
|
||||
CVE-2008-3772,0,0,10c8f7803da5128d98699b607b08b383018544e73c12e8d7bc455979c5415818,2024-11-21T00:50:05.667000
|
||||
CVE-2008-3773,0,0,efdfe6746783710e84d486e743d6bee162233dd54ca938e337f0f3e37666a519,2024-11-21T00:50:05.807000
|
||||
CVE-2008-3774,0,0,1d223336b1a5025e63e3b121302bde6341a8c0a93d033d5f359e5f8028235a6d,2024-11-21T00:50:05.960000
|
||||
CVE-2008-3775,0,1,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000
|
||||
CVE-2008-3775,0,0,78e3b541a183feebace1167665d98e1e5dca4c1ca025937bd552737e98f9cbd5,2025-01-17T16:15:27.113000
|
||||
CVE-2008-3776,0,0,759b26637b4be74cbae069136454e0dbc436b18431192b8be6914f0998319ad3,2024-11-21T00:50:06.263000
|
||||
CVE-2008-3777,0,0,932fb89f1d21261d37ad054956f4845b55faebb9712e16f734a6949004a19edd,2024-11-21T00:50:06.407000
|
||||
CVE-2008-3778,0,0,d0cabf0e2407f6ee82738a6b8cc4b9767f9748891b1c6fe930a3ad8538752744,2024-11-21T00:50:06.560000
|
||||
@ -34329,7 +34329,7 @@ CVE-2008-4925,0,0,4f7b18e393b0fa381e68773dfa5861d88a6292105b49d543a9c33f99190cb6
|
||||
CVE-2008-4926,0,0,7c5e36ad6b1c797c68693f2837e1a9f94c0ce082be6d6e481ddc90150efaeb36,2024-11-21T00:52:51.593000
|
||||
CVE-2008-4927,0,0,2fc3b624b859ef30c91f0ec77ccaff5a10184bccdd99e3983e23fca43dbe3e25,2024-11-21T00:52:51.740000
|
||||
CVE-2008-4928,0,0,2f6634b1bd080ca5525d6ed8a3f95c34b424b18654ad6a6d16afacfd255a7fbf,2024-11-21T00:52:51.880000
|
||||
CVE-2008-4929,0,1,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000
|
||||
CVE-2008-4929,0,0,24a04c987f9188d05b54bbfd7f94586b704ee93028e2487b396bda5c8146fdfc,2025-01-17T16:15:27.347000
|
||||
CVE-2008-4930,0,0,2c4d59623a2b0b5f63a7916dcb2796169922093478803e0499fb6b55b90d42d3,2024-11-21T00:52:52.193000
|
||||
CVE-2008-4931,0,0,f86582cbf3eb6ca78b80be18df159e3bb694669014c2df3c7b3109abb16602d5,2024-11-21T00:52:52.330000
|
||||
CVE-2008-4932,0,0,8c4eb265c406b9ab48545d0fa32e531b8fe25ee35aafa7649d9f84dd93e5abcb,2024-11-21T00:52:52.473000
|
||||
@ -34394,7 +34394,7 @@ CVE-2008-4992,0,0,e0f2f6bcbbb725f5fd495269be6f4f746da7c0f999ac300af622b04a4b3fe6
|
||||
CVE-2008-4993,0,0,c4d0175ad3336bd886cdf610ccdfd78bf1755efb9a12d99edafaf3f6a027ef42,2024-11-21T00:53:01.417000
|
||||
CVE-2008-4994,0,0,cd8d7f094ddd75032df41117ffc7311d6254c621c52e2c185509f21c18799602,2024-11-21T00:53:01.563000
|
||||
CVE-2008-4995,0,0,bfa93d844fb22352ab90cf141189edab832ce3a5c30a5fd3e1edbdd19ac833df,2024-11-21T00:53:01.710000
|
||||
CVE-2008-4996,0,1,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000
|
||||
CVE-2008-4996,0,0,56a7492c22650bf808720560ef32157f0542ea5992a55dd317acbd989523c0ef,2025-01-17T16:15:27.580000
|
||||
CVE-2008-4997,0,0,7566fced22bd3a3484772345ab5f1fa69faee1d11bd335f12aa38d0edbbe4ecf,2024-11-21T00:53:01.993000
|
||||
CVE-2008-4998,0,0,15d45704380071e9a9953ea7abe65daa350aa04c7b05aadf01b367c96688628f,2024-11-21T00:53:02.140000
|
||||
CVE-2008-4999,0,0,080946ba4f06dbec211b9d55cdaf058e0c090d5863b6c277e9665e45ca5d363e,2024-11-21T00:53:02.283000
|
||||
@ -194208,11 +194208,11 @@ CVE-2022-24801,0,0,4d611f7d290a30c49a36c129519fc7ac71513b1cadc078eef638f25ab4b14
|
||||
CVE-2022-24802,0,0,07b26b8ea497569aa400e89e075f85d7d8497c28c46912dc679b0c636ee600b1,2024-11-21T06:51:07.880000
|
||||
CVE-2022-24803,0,0,a6c71e9f6a94b9ae6df5c5767e3e8dc001f3c63ef8ed87909483e22596226c5a,2024-11-21T06:51:08.023000
|
||||
CVE-2022-24804,0,0,5a8858465a7aa4104bded7bf6892b5e6c2df6ee69b3f374e48216b70388e95c9,2024-11-21T06:51:08.150000
|
||||
CVE-2022-24805,0,1,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000
|
||||
CVE-2022-24806,0,1,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000
|
||||
CVE-2022-24807,0,1,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000
|
||||
CVE-2022-24808,0,1,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000
|
||||
CVE-2022-24809,0,1,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000
|
||||
CVE-2022-24805,0,0,411baa4ca617686753ca1a3d1296a03e74d881e97860109fe1618ee99178bd8f,2025-01-17T16:04:56.537000
|
||||
CVE-2022-24806,0,0,55f57080099966680f00d60dd6a32bb26ece7bb64872c51e8a44ac2f72ef8748,2025-01-17T16:09:56.527000
|
||||
CVE-2022-24807,0,0,4a59c1c066bb09f3e49a143ebd7564b82e63ec625d03de5d8866b8b4c9796cb9,2025-01-17T16:15:01.270000
|
||||
CVE-2022-24808,0,0,064745ab41fdc1abbe54f1bc1d464381e46662b727f7bedabf3d4977fdab2193,2025-01-17T16:16:28.860000
|
||||
CVE-2022-24809,0,0,8a49f17a26987a5f95479d33ea5bc2a54a00ba13b0781b4d832b1b4961e21699,2025-01-17T16:17:30.873000
|
||||
CVE-2022-2481,0,0,c6a77134c010c7c4f180df8a4e72b5e901853f245db8d830c126eabeb72bb5e9,2024-11-21T07:01:04.973000
|
||||
CVE-2022-24810,0,0,817bcf4801ae83c9d34aee0f0d6e71d5b6597a20671eeeac937cf8f303599939,2024-11-21T06:51:08.977000
|
||||
CVE-2022-24811,0,0,f0de78415af361c1f04eeb300962362dac1f5d4ed9c4710ea6a7d48db701773b,2024-11-21T06:51:09.093000
|
||||
@ -198481,7 +198481,7 @@ CVE-2022-30018,0,0,a47d8c584648cd074d4197c63600f888a035f4f5141dceac3dc37e5b59189
|
||||
CVE-2022-3002,0,0,599cae5f99d3994ff275a3aaa8236083e9e9cd9b24d19afcc45b27053349a4ed,2024-11-21T07:18:37.230000
|
||||
CVE-2022-30023,0,0,c77df69c371246d0c17ca301e646e05c6ea0a815ac1ccd569e618bae3cef56a8,2024-11-21T07:02:05.730000
|
||||
CVE-2022-30024,0,0,33b065c539ef1ec787028658cb8d0d89066d0e41bbd4e18734571d1dde05fdad,2024-11-21T07:02:05.870000
|
||||
CVE-2022-30025,0,1,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000
|
||||
CVE-2022-30025,0,0,7a44f456dcf7598e29ff57cbe837108479e3d52e9188e661c9630c2f5693137f,2025-01-17T16:15:28.377000
|
||||
CVE-2022-30028,0,0,5da8221e49099da25b4f0bc147828862aa0640753c02395177ba48e88a040936,2024-11-21T07:02:06.170000
|
||||
CVE-2022-30033,0,0,24cd3dbe45c902507edac8e8bf7464ce3d09e8ab95eff5aef496b56a61833675,2024-11-21T07:02:06.313000
|
||||
CVE-2022-30034,0,0,8fe6274bdb8b07197fe928571802beaec94b5f94476e6088bc8f77d56e8d836a,2024-11-21T07:02:06.453000
|
||||
@ -207284,7 +207284,7 @@ CVE-2022-41217,0,0,6d9aa2af14fdb601290a5a2d78768c0423ddc38c43497f360060526acbfb6
|
||||
CVE-2022-41218,0,0,31bae3ea5cbfc8dd52dd6ee2d863ef0cc060786cc1d0412f68c875b5caa5a450,2024-11-21T07:22:51.280000
|
||||
CVE-2022-4122,0,0,41a28625d75093b8185192cc27a639534f890a16e50aaf24efe1b4959312267c,2024-11-21T07:34:37.210000
|
||||
CVE-2022-41220,0,0,ad29ea38b072bf58585a8e13186655e2e23bda37dd415a6a1e953b27bc78646e,2024-11-21T07:22:51.447000
|
||||
CVE-2022-41221,0,1,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000
|
||||
CVE-2022-41221,0,0,1d788e62a46b3145dc2f8c2067c74a9f7096c138656e8475a2fe7d8b43e01f83,2025-01-17T16:15:28.683000
|
||||
CVE-2022-41222,0,0,fbd6a19711cd9b300720e815b4d0be962776ffb964fd725ad987a249fc46d657,2024-11-21T07:22:51.743000
|
||||
CVE-2022-41223,0,0,d5c686c09d3342e8d375627b9a2b1c429335074239336f50b05e7aea94075f24,2024-11-21T07:22:51.913000
|
||||
CVE-2022-41224,0,0,166e5234c48c055c19f09bc2c5da4feda446cc9117a08eefd15b6324545e43f6,2024-11-21T07:22:52.057000
|
||||
@ -208116,7 +208116,7 @@ CVE-2022-4221,0,0,c3ed54d13577be1fcbbe89f9fe5d6a7f7aec0478031808f088803ba0f73de9
|
||||
CVE-2022-42218,0,0,e56bbc1e79a6b7b715ab5c96de7dc81a5b5bf8f992bc94909b2a8075ff481af3,2024-11-21T07:24:31.957000
|
||||
CVE-2022-4222,0,0,9f0f62e0ad502fd7900c569783ad9029d782bd46a0513ab22d201296ac5a6335,2024-11-21T07:34:49.263000
|
||||
CVE-2022-42221,0,0,22cb1d5c362e6ce83cad250d332a9b8ebcaf3a72dd7627752e8a0f435d5aa533,2024-11-21T07:24:32.100000
|
||||
CVE-2022-42225,0,1,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000
|
||||
CVE-2022-42225,0,0,91d814791e6db2db46abb3208c083cbab7c99d4248deb47b4bc3b426e028a1b2,2025-01-17T16:15:29.050000
|
||||
CVE-2022-42227,0,0,d1eb18a0c4fc2be883366222adf7b8f679fb279c1d46312139a0a5942b91a003,2024-11-21T07:24:32.430000
|
||||
CVE-2022-42229,0,0,30d4ffa5106cde8593ccff0549029cf9a81b07534e7c788198cdb3cec710b8c4,2024-11-21T07:24:32.590000
|
||||
CVE-2022-4223,0,0,43ffd072faee8cd340b416e1c49fed0811d650f79e3ed18c62f5d8dc99587977,2024-11-21T07:34:49.397000
|
||||
@ -210755,7 +210755,7 @@ CVE-2022-45872,0,0,a907443ce4f03e99a976737e2d47cb015ba05e3816eae1b1e624fcdd21611
|
||||
CVE-2022-45873,0,0,42c6c1129d53ef778f4baa826bc586cb39ac06b30554c1745f3ebd88089eac8c,2024-11-21T07:29:52.680000
|
||||
CVE-2022-45874,0,0,604801db89e4183fba09cead9348f5c7327b92d504380bbdcca7e4a2e64d1fb8,2024-11-21T07:29:52.830000
|
||||
CVE-2022-45875,0,0,1aac1f8a1a71defacecd22a49897d882cf79fc760121966b688b6327a6a1addb,2024-11-21T07:29:52.943000
|
||||
CVE-2022-45876,0,0,d42b75b223aa3974435b6f221d5bb446829779a7df31b5b159eafcfd795a7d4c,2024-11-21T07:29:53.063000
|
||||
CVE-2022-45876,0,1,d70a8354437a5d727daeeefbf8e766205015f588234179d2757a51060bbed30f,2025-01-17T18:15:18.117000
|
||||
CVE-2022-45877,0,0,06951f61cfe71647f0cc3451d7152061025f7464a71023684c548a20a56e8dff,2024-11-21T07:29:53.193000
|
||||
CVE-2022-4588,0,0,d97280b0462e32d7444e6df8f57ab38a4f8f5cd3c5d546d73a8096388c6bf7c0,2024-11-21T07:35:32.953000
|
||||
CVE-2022-45883,0,0,61d96562f23562a14c36a83a13dd17a03fd4abc321b9a6adf2fd11a4fa522081,2023-11-07T03:54:55.933000
|
||||
@ -213538,7 +213538,7 @@ CVE-2023-0428,0,0,0de93bb0e535635eebbfedf99112ce8cef3ca284b9e0bd9f8cd68750853b4f
|
||||
CVE-2023-0429,0,0,e0618680b78219428317d6601f27ee8a8a87ae62e6dd517b8d19758523eb5906,2024-11-21T07:37:09.807000
|
||||
CVE-2023-0430,0,0,acc72707e03d0df228268319b61aeb8ed5dd3736ea4142fcd4397f7588a561d9,2025-01-10T19:15:31.433000
|
||||
CVE-2023-0431,0,0,459bdaa83a3fb57e14cccc7abf189e66653179e7b70ce44db48ce68f910d878c,2024-11-21T07:37:10.037000
|
||||
CVE-2023-0432,0,0,c18e0783d1e0318a05bbd49e4ea8bbbe47ddc14a8a5fde83bcbd13b6911b30c3,2024-11-21T07:37:10.143000
|
||||
CVE-2023-0432,0,1,f570b71e1e00458582a8171c05750fba52db4f805d00c30b1811d9ebeabd8ec9,2025-01-17T18:15:19.433000
|
||||
CVE-2023-0433,0,0,d42e70fbf8f746ae44adccb8cc0a5b25d08ad867d573fa4f7fa6107bc224a64c,2024-11-21T07:37:10.260000
|
||||
CVE-2023-0434,0,0,f6a521f3082f28ce6108fa4ac69c86e0205efd2c815548544f3fe58009020014,2024-11-21T07:37:10.390000
|
||||
CVE-2023-0435,0,0,e42db54bec450824437717898db9abe4d680ff3a0ab18892f0b145e2a2a338f5,2024-11-21T07:37:10.510000
|
||||
@ -217072,7 +217072,7 @@ CVE-2023-22297,0,0,e2cfb145db1e3ffb902651a518ec98e6141d79673ccfed77db7cf2dbcc633
|
||||
CVE-2023-22298,0,0,f6dc805831e3b12f7de9ebd55e11a238a6127133a62593b1508897e8f9f4cb83,2024-11-21T07:44:28.837000
|
||||
CVE-2023-22299,0,0,84693ef0c7bb509df895e8bac855b156e0a311fd0ff082f7e19ad8e321dcec41,2024-11-21T07:44:28.933000
|
||||
CVE-2023-2230,0,0,2376b593af6286fafded76ff5926b1e2b7d1ae9ecbf888641f9486885a8dfaba,2023-11-07T04:12:14.200000
|
||||
CVE-2023-22300,0,0,050be24c7c96f9e183e131604c3ab54b16bc7dfef76b8b41af210a17fa0bad62,2024-11-21T07:44:29.050000
|
||||
CVE-2023-22300,0,1,dbcdd932d1d304d05b27d88d5f52e3ef46ee88dd096a5519f2d41c93013439bc,2025-01-17T18:15:19.947000
|
||||
CVE-2023-22301,0,0,0a10a6dd91105447bae548de98a8ea94a99eaf9991d4047f34aab0e2b29db3a4,2024-11-21T07:44:29.147000
|
||||
CVE-2023-22302,0,0,ff5426583dc64cb2c6b21518546068fd3e471ffa8da3386dd10671de652a67d5,2024-11-21T07:44:29.253000
|
||||
CVE-2023-22303,0,0,61c82bc74511e23b43e9e302a9d93cbbbc62e7ebeb9f7c7eff0d77d6380a2b1e,2024-11-21T07:44:29.373000
|
||||
@ -219730,7 +219730,7 @@ CVE-2023-25594,0,0,8abf09e59f68ceced335bf46e94e35be82d646a84818ef449033b8635a8f5
|
||||
CVE-2023-25595,0,0,726a4d03782813d387168e4496552502f96f8a0a02861e47f01e358207039d15,2024-11-21T07:49:47.773000
|
||||
CVE-2023-25596,0,0,f88f62634ad25859484d0cc31d9b059e5a63e3289ddac7a38fb605882d4dd22a,2024-11-21T07:49:47.883000
|
||||
CVE-2023-25597,0,0,4517b2582a5f522ffedbc2116021e054810f3e35d0154a016d6237b2a8116c33,2024-11-21T07:49:47.997000
|
||||
CVE-2023-25598,0,1,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000
|
||||
CVE-2023-25598,0,0,feb063d3ad1fdbfaa91ec631b072563c17f1eadc253a15c5a5729735749cd8bd,2025-01-17T16:15:29.543000
|
||||
CVE-2023-25599,0,0,e8f10bf4c5e1aae36571db6e2ab215516a8e52f6532eb9e92eed30ee54734b43,2025-01-16T21:15:14
|
||||
CVE-2023-2560,0,0,31b34f6bacde082f5f057474e07f836071f934616db2b7cff0b0479c82958eb1,2024-11-21T07:58:49.790000
|
||||
CVE-2023-25600,0,0,74c80d7f9443116975fdc60b897e0fe9401c713116e099707e64f108069de608,2024-11-21T07:49:48.400000
|
||||
@ -220028,11 +220028,11 @@ CVE-2023-25908,0,0,d44360c825c09bea35279d42c7153a53fdd12277415e34c57903e54091770
|
||||
CVE-2023-25909,0,0,714cddfdd75f1b4ea7e881417d151c8506ba152190ec1d08ab811eee9d658732,2024-11-21T07:50:24.600000
|
||||
CVE-2023-2591,0,0,7c27e595b888753998a6776d8423b11e7f3b409c6e0417d28bf825dd5249753f,2024-11-21T07:58:53.503000
|
||||
CVE-2023-25910,0,0,142bba38733997b5c55a3c0d314fb84004341c894367bd7f169e7fa153e7a506,2024-11-21T07:50:24.710000
|
||||
CVE-2023-25911,0,0,fc74b4cf72f9b9c4e0b7fc011c9ec763163c929ac5129f1d0f337641a7b3894b,2024-11-21T07:50:24.840000
|
||||
CVE-2023-25911,0,1,3a98c867d12555c60f4262e8e77d7030a7b621afb972e2fc259dffbe88e1dec4,2025-01-17T17:55:14.593000
|
||||
CVE-2023-25912,0,0,894b2fd5456e8fbe83ab0b10f0eab811da9a1928879e0c3db64875eb953082fd,2024-11-21T07:50:24.967000
|
||||
CVE-2023-25913,0,0,6a91a9eded59c00cc598635ddbe6932ed1f65268ece3db527fc9c04fac8cb0f4,2024-11-21T07:50:25.080000
|
||||
CVE-2023-25914,0,0,59463d2416f03e6ec5060d7963c40a18472420a29b874c6c0db6f09f0993e112,2024-11-21T07:50:25.230000
|
||||
CVE-2023-25915,0,0,ac1356fb3904fb3480ee562c53e20c2c96f303b68ae0d6270f1b87a4d55643e6,2024-11-21T07:50:25.357000
|
||||
CVE-2023-25914,0,1,36c08243bbd0fd2e7dd128385e9c7089591b2279e1b972aff853340762b88b5b,2025-01-17T17:54:40.107000
|
||||
CVE-2023-25915,0,1,05f4a66d1d321910afa31096f2d912825cea9a498d14478101ad02866603e99b,2025-01-17T17:54:52.697000
|
||||
CVE-2023-2592,0,0,d74a21ad07e81cc347069c4edc810aec39f12ab86f734829ab6d0c99d89af9e9,2024-11-21T07:58:53.627000
|
||||
CVE-2023-25921,0,0,f72a487373fc04597a1201466c7f2d8d56c50717e5bd21fbde587ac436cc3f45,2024-12-13T20:53:05.783000
|
||||
CVE-2023-25922,0,0,0f1b8f78298cca9f068ffab08027b1337d94c98e2e6d7df4df0fdc8dba2aaec7,2024-12-13T20:59:47.813000
|
||||
@ -221033,7 +221033,7 @@ CVE-2023-2730,0,0,3311bc47a08de3cec2a39f64e644a5d5e79fe45fe6ccc5819deb28235498f0
|
||||
CVE-2023-27300,0,0,2731d707de1e6137ea37ccb1442ea1cbd992ea5ff26bc94a835093c579079405,2024-11-21T07:52:36.353000
|
||||
CVE-2023-27301,0,0,e75569c03530c3787db8a5025aaab05ee1c08fac50fc8089fc27bbc2e8472b25,2024-11-21T07:52:36.463000
|
||||
CVE-2023-27303,0,0,eaba63aa37eb9af5018680bdd423400f9bb61ff48e38b570d90bcfc6fc3388c9,2024-11-21T07:52:36.580000
|
||||
CVE-2023-27304,0,0,0cc477c992ee1b38ae38bbdc46238b14feb337e2b454b418b8dab36b98667dc7,2024-11-21T07:52:36.693000
|
||||
CVE-2023-27304,0,1,a501e65e3e5e550e7f4b34c3cc05177415e4066170476ccfb2c5465e18a13d85,2025-01-17T18:15:20.303000
|
||||
CVE-2023-27305,0,0,4cf303d0c0928a90e24c0a02412c953ca387fd40216cdb277dcd541ec2552dd6,2024-11-21T07:52:36.803000
|
||||
CVE-2023-27306,0,0,847b158e63f2fc7a89b9766d995e5e48514f49c69fc074204576112481970259,2024-11-21T07:52:36.923000
|
||||
CVE-2023-27307,0,0,213313277f2b73db10152e58d2dba3376cab552d70210ef03d7d5a0122e0a747,2024-11-21T07:52:37.050000
|
||||
@ -221119,7 +221119,7 @@ CVE-2023-2738,0,0,935afffba4de04fc2776d13f93d9bc63c51d6e63056330c8371d2f5d680acc
|
||||
CVE-2023-27380,0,0,67014c4fe3f5d5e70301815925d527e1ceaf695a18f615266d79465043d9dd12,2024-11-21T07:52:47.567000
|
||||
CVE-2023-27382,0,0,3af1284ca3cc9a9ef6f32f436a11e87b1e2c39e9aa793f75ed35fd294e60c763,2024-11-21T07:52:47.700000
|
||||
CVE-2023-27383,0,0,ff72c34031f2d18b8438601938a0c6cd6898ab303a6a45cd5796a58c389b624a,2024-11-21T07:52:47.817000
|
||||
CVE-2023-27384,0,0,6504a55fe0ffca21f7605fabdf0a7b2260b2c2ce952fc153e652bb9e0e1e8fd6,2024-11-21T07:52:47.937000
|
||||
CVE-2023-27384,0,1,4d39f2e607eae5191b52976973be66e2202d9c4d33b95ac5e065f7ecb16e0a5d,2025-01-17T18:15:20.547000
|
||||
CVE-2023-27385,0,0,c68ecdf016bf2281f407cb9610cd4bbaeed3891f5aa2195ad6bf2208b3c782a6,2024-11-21T07:52:48.053000
|
||||
CVE-2023-27386,0,0,04cd58b2a7b3b5431e9205e8c5b5282f85ecb0f9bb508ed9a544058afccfa782,2024-11-21T07:52:48.180000
|
||||
CVE-2023-27387,0,0,bf6b4d9d64ff88918b16bb6ff92e30a6f67f5bfd7030fde047df0bee3ad6f8ff,2024-11-21T07:52:48.300000
|
||||
@ -221570,7 +221570,7 @@ CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea
|
||||
CVE-2023-27923,0,0,3a143fd60fb8ad11feb760b5ed0965b170454e4647e49db79d5756135e427dea,2024-11-21T07:53:42.473000
|
||||
CVE-2023-27925,0,0,5ca31ace52a2e3cccc0fdb2255ed7d5bbe1b629ee84594ecb1eee3b8e95dc54a,2024-11-21T07:53:42.590000
|
||||
CVE-2023-27926,0,0,92311e685781f75574201f01b5d1ef2b44ddb89904a003df3573343542e48164,2024-11-21T07:53:42.710000
|
||||
CVE-2023-27927,0,0,52779eb444208f1ba62abd320b1a5c02f84dc7b293d3dd48c6ff5c6cf3a83eb7,2024-11-21T07:53:42.827000
|
||||
CVE-2023-27927,0,1,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000
|
||||
CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000
|
||||
CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000
|
||||
CVE-2023-2793,0,0,a02ac57ccfcc6bf1345b991bf0b54c08efcba6693c369c3c8f72453068bd79c2,2024-11-21T07:59:18.110000
|
||||
@ -221663,7 +221663,7 @@ CVE-2023-28010,0,0,cea1c83b1a1de56721d3fff63387ec5e4316025f3be2e1922fd578f16178e
|
||||
CVE-2023-28012,0,0,597f3d542aa3e6d473b0ee06f4f2e30fc7a3c4c261db6e2d7465a4141feca741,2024-11-21T07:53:55.727000
|
||||
CVE-2023-28013,0,0,ca8516e045e8d827755979c2497ae1dcbf1ff4b1ae4c4f57debc7acf63dfc852,2024-11-21T07:53:55.853000
|
||||
CVE-2023-28014,0,0,ae9cd8ad6f351e0324a3851e33ca9a5e2e664060b026db12d466ef4138088fe0,2024-11-21T07:53:55.993000
|
||||
CVE-2023-28015,0,1,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000
|
||||
CVE-2023-28015,0,0,a215b214b6e4032cf568993f369b27e1af532d75c436ebc79d3c86dc0aa5d867,2025-01-17T16:15:29.737000
|
||||
CVE-2023-28016,0,0,0ea99d77c33f9c7f63039000d06d08b21178affc71516064cbbfab51ae1cb932,2024-11-21T07:53:56.240000
|
||||
CVE-2023-28017,0,0,35716eab1dbf086839b9951cc0fa716a1f08b1df0f6dd81d881099e22403968f,2024-11-21T07:53:56.363000
|
||||
CVE-2023-28018,0,0,2094804c51d0176650ceccc697a32d6ba95bbcbf330493713ccb998d3d224411,2024-11-21T07:53:56.500000
|
||||
@ -222025,7 +222025,7 @@ CVE-2023-28380,0,0,ab6a7a500298be9ef83244b76d2b0ab34530ee1d27727ed37830671bc6501
|
||||
CVE-2023-28381,0,0,1a9707f277ef8a423a186132cbd8b4225a287d1b1d7725f1112d0c37de025b98,2024-11-21T07:54:57.673000
|
||||
CVE-2023-28382,0,0,54474447f09dc7eb708c86707f5aa7484af8959e42f6d0e871698326dab881d3,2025-01-15T16:15:26.460000
|
||||
CVE-2023-28383,0,0,48697de1cca90d6b3ae134dc9ce22dcb6a22b4802be54231637854c435aacd58,2024-11-21T07:54:57.887000
|
||||
CVE-2023-28384,0,0,e957b9384de65ebb6a80a839cb3cd2ea8a514b08919aa116c79524b409a5f376,2024-11-21T07:54:57.990000
|
||||
CVE-2023-28384,0,1,4aa33c82e76bb6f8b4b0942e1b075d8e06f17782150f9a17400d8fd319ec11ad,2025-01-17T17:15:07.697000
|
||||
CVE-2023-28385,0,0,61bd73f4c07fb2f7be9167196c277434b81452ce75602fd8f2e661a62695b4ea,2024-11-21T07:54:58.083000
|
||||
CVE-2023-28386,0,0,3d8c94f9f394dc7e85a4ca0e062a20b7cf4b75bb1621666ff00503e30a10da09,2024-12-09T18:15:19.273000
|
||||
CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb1395ac,2024-11-21T07:54:58.317000
|
||||
@ -222043,7 +222043,7 @@ CVE-2023-28397,0,0,4bff9ed10c02507982d7b9dab6671245255794a218efdc6bf229f1abb9748
|
||||
CVE-2023-28398,0,0,2aabdbc180b2d9821f7c6981a841f35d5201adbb04843a3da9d33c58786be7c5,2024-11-21T07:54:59.510000
|
||||
CVE-2023-28399,0,0,111e9d6b4464164ec693f6735189466b823de7819518dc53ec80cbfa558e019c,2025-01-09T21:15:22.560000
|
||||
CVE-2023-2840,0,0,0555537b6851b1fe0f6a1eeae24d6aca47261971d05f2008fe758de20f6417ba,2024-11-21T07:59:23.673000
|
||||
CVE-2023-28400,0,0,67a025af7ef4baf741188bdcf00c3ad589d6aec1acd29840c9e7a073fa94c0cc,2024-11-21T07:54:59.713000
|
||||
CVE-2023-28400,0,1,d2704defd653ccb34a33fe61fb32d5cdc1e9e3155cf972a3d09da48df74e31d6,2025-01-17T17:15:08.363000
|
||||
CVE-2023-28401,0,0,102355fdd79556c54d740c7afa362a52f2c638a67b948508ee1e87ffe44821d9,2024-11-21T07:54:59.807000
|
||||
CVE-2023-28402,0,0,c38e72831463b69c6b40624d71abcb938422de02ddbe9d1a7ec65f3416f64165,2024-11-21T07:54:59.930000
|
||||
CVE-2023-28404,0,0,8cba623eb88a12f1ff1c663d93cba5426a2b008fd2ff25ef48ad773dee2738e3,2024-11-21T07:55:00.030000
|
||||
@ -222289,12 +222289,12 @@ CVE-2023-28647,0,0,6e622e4c8c506d34225481f32977a08d6344f5c37a9e28afb412ed024963a
|
||||
CVE-2023-28648,0,0,858ff9277a18ca9a6568baa82146abca15de5820e777ceee09d8606939c08232,2024-11-21T07:55:44.227000
|
||||
CVE-2023-28649,0,0,b546ed1247b528c80127d17229ccdf396336cfa9f485e93db64beff6ef3a7373,2024-12-09T18:15:20.430000
|
||||
CVE-2023-2865,0,0,4ca47513f5d6c6a421ad8e01776d00552671f81eb53474ef196889d12cfa70d1,2024-11-21T07:59:27.100000
|
||||
CVE-2023-28650,0,0,1450dfd4e00e9813b9f852d7a370533d90f4dbe8459b3ea198bdd944c6ccfc68,2024-11-21T07:55:44.473000
|
||||
CVE-2023-28650,0,1,eb49d182b6197d597a763add36dcef3af56c2de51acaec560234488e891091f6,2025-01-17T18:15:21.340000
|
||||
CVE-2023-28651,0,0,f7cb336db603427fd325f39326faadfed8890a1591be62055f8fc4903963d889,2025-01-09T21:15:22.740000
|
||||
CVE-2023-28652,0,0,ff42aa9eecf10ae50957c0e1ecd97ffcd5926fcdca37afd4572284e734c4f3d4,2024-11-21T07:55:44.680000
|
||||
CVE-2023-28652,0,1,fe4235591b4c07f5e3485ad090b6ce9d4d95c115269d5c6ab90efc13f7f374f9,2025-01-17T18:15:21.607000
|
||||
CVE-2023-28653,0,0,85425f9a644d94dcc88660335cf1fba4048b509d7b414b67f0faa690535532b2,2024-11-21T07:55:44.780000
|
||||
CVE-2023-28654,0,0,131327885e5fa2643b72e4d86d04cdaa97dcfd352bd1c6dbe7aa3f5c6b65815c,2024-11-21T07:55:44.897000
|
||||
CVE-2023-28655,0,0,8409128c7a1b366a01a25f870d9615353d35f13c524988216bf809a856adddca,2024-11-21T07:55:45.003000
|
||||
CVE-2023-28655,0,1,6686d9a13539db5cf9c93492ef593c530700e40eb842775590ba3529e11a8526,2025-01-17T18:15:21.850000
|
||||
CVE-2023-28656,0,0,71923347f2d14def6102f4bf85546159cbcf14358f9ea6a41c9c6f7bdf0458ca,2024-11-21T07:55:45.103000
|
||||
CVE-2023-28657,0,0,b598ea5dd934ee0fcc5ee876e12d99ee8cec046c6f6f43a4f6bea3784038d2c5,2025-01-09T20:15:32.300000
|
||||
CVE-2023-28658,0,0,4721cc7813fa8c14291ea10a6bd934084fd896731e35e1047a44b653e020baa0,2024-11-21T07:55:45.320000
|
||||
@ -222359,7 +222359,7 @@ CVE-2023-28712,0,0,65d46ac765e466c7b19911f8fe09fff905333a780340064cdf6d30726ab5b
|
||||
CVE-2023-28713,0,0,0c63ac3fc393e79d8eb979361877f48466e2baf57ce0eccdfd761ffa103b8706,2025-01-09T20:15:32.550000
|
||||
CVE-2023-28714,0,0,7963e328f5538c35128d9e328b5ad35d468e921ea64ebebd603d2bde06d9db28,2024-11-21T07:55:51.683000
|
||||
CVE-2023-28715,0,0,639383fbbab5d4f6889d81c843a9748eac9707d5ee8b338fa759de273f23cf9c,2024-11-21T07:55:51.827000
|
||||
CVE-2023-28716,0,0,b7087015f3c47188165e814a63a01569dc6584313b021a53e9f89c7fb622fab3,2024-11-21T07:55:51.953000
|
||||
CVE-2023-28716,0,1,42e0d8096fb1f7bfe4f3c119d4a3f0ef669a7c634429090ac53fcf3d97ed21d4,2025-01-17T17:15:08.537000
|
||||
CVE-2023-28718,0,0,f847f98e8b25e13dddbbfc5d671ea260cbe9537c6d0d2d7c291bab4c19d69849,2024-11-21T07:55:52.073000
|
||||
CVE-2023-2872,0,0,c809c535f35d54173eac0975d903d1696c449f170ba2895550c167a12d662551,2024-11-21T07:59:27.960000
|
||||
CVE-2023-28720,0,0,ac09d331d5cfd20938bb7223dd423e76cc8964f995f8c7729deac6115c29c8ea,2024-11-21T07:55:52.187000
|
||||
@ -222744,7 +222744,7 @@ CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3e
|
||||
CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000
|
||||
CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000
|
||||
CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000
|
||||
CVE-2023-29150,0,0,53fd9d7666e4c7481ad461d2c290eea5e35316c6b0e762d9d695758c393300a2,2024-11-21T07:56:37.140000
|
||||
CVE-2023-29150,0,1,c2f33a58cfaa7e9c12e1da6a90a6dfb46bfd0d9dec7fa728bf1442451c2a122d,2025-01-17T18:15:22.093000
|
||||
CVE-2023-29151,0,0,727047795af5b498bb8bb582c46dd36be3631963786c95d5e8a4ca6f1c857b84,2024-11-21T07:56:37.237000
|
||||
CVE-2023-29152,0,0,eceffce06206d987481c535a3ea7c671bd8caa5cd08c017b9a186e3d386a055d,2024-11-21T07:56:37.357000
|
||||
CVE-2023-29153,0,0,4a8bc2238fb5bbbda2a2410b86d68f6271586134e8d4666b131c2ea851408a47,2024-11-21T07:56:37.470000
|
||||
@ -222763,7 +222763,7 @@ CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a8
|
||||
CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000
|
||||
CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000
|
||||
CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000
|
||||
CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000
|
||||
CVE-2023-29169,0,1,1f1155f544b4cef09f3c22f102bc2105a854d1e4172805984714266e7b7a0f86,2025-01-17T18:15:22.337000
|
||||
CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34
|
||||
CVE-2023-29170,0,0,a14eee9c3b65ac3bd8d74bcf4947cbc176ea7dede3e441303f55531eb26d21b7,2024-11-21T07:56:39.230000
|
||||
CVE-2023-29171,0,0,209e525798550871fedb6e85e35b4c826a5963d1b417ebdf34529996104307bb,2024-11-21T07:56:39.340000
|
||||
@ -224593,7 +224593,7 @@ CVE-2023-31759,0,0,a2d84b0a8dca779bd4a75f12eaed410b890b68e8e762e9e85d5ea4a9f199b
|
||||
CVE-2023-3176,0,0,999fe1ea7317073fe2b31bb323d98a6f29f6d8081642f27e32d077db6c6b4e5e,2024-11-21T08:16:37.740000
|
||||
CVE-2023-31761,0,0,5b67bf26500bf4283d4625610816cb1fea1c4f34676ccb4e96c23468ee410707,2024-11-21T08:02:15.193000
|
||||
CVE-2023-31762,0,0,74ed2cc1b24d33344283a6a9f3444e0b89de3bf42393ee059f6f223b7fd77e5e,2024-11-21T08:02:15.327000
|
||||
CVE-2023-31763,0,0,529cb6c35ab3508fbb4fe5b768b5a89cfedf5e45655775944ccb778d70d078ce,2024-11-21T08:02:15.463000
|
||||
CVE-2023-31763,0,1,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000
|
||||
CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000
|
||||
CVE-2023-31779,0,0,57d1dd015d41bdb7a16d9d6f14cf7992f409481c534697d1fe2caa03c46dac25,2024-11-21T08:02:15.617000
|
||||
CVE-2023-3178,0,0,3137810340e9e86c4c3b5db496a9f5d0dabc9dbc8cd8490fceb40dfc4e419573,2024-11-21T08:16:38.017000
|
||||
@ -224612,7 +224612,7 @@ CVE-2023-31807,0,0,767b5f080466fa8df5df923ded96cba99455e65929a37edf8f27f16c63dcd
|
||||
CVE-2023-31808,0,0,4b91e1f555e81a8997ddae2e290898c6d0be80669ff94777a810f5c7a28d6784,2024-11-21T08:02:17.140000
|
||||
CVE-2023-3181,0,0,f85113ad48f7de9b5138016b5a769db3ba1263ef4e9bd2ae1e4348037f618738,2024-11-21T08:16:38.460000
|
||||
CVE-2023-31813,0,0,8e8fc395bcbeac8e899865e7f66dbb1c6df21b82d10cdc9a327fabcc1831a1ae,2023-12-16T02:15:07.263000
|
||||
CVE-2023-31814,0,0,7a627986bb85e8e35b669fb28e3cdea34a3c6eec5454bcdf5d5b8d2da970f381,2024-11-21T08:02:17.297000
|
||||
CVE-2023-31814,0,1,63e15e3e48004d4af1bddab36ab4ec66f76fbc3890eef88216b584ab5e7988f8,2025-01-17T18:15:23.030000
|
||||
CVE-2023-31816,0,0,adbf1d16e4cc0799caba61ef60180156a31de4b8c68096c52a492443b815a87f,2024-11-21T08:02:17.440000
|
||||
CVE-2023-31818,0,0,e2293c2ab2a56409b4ddc5add2c2e04bfaa690b925948f5dfb2f11b0fa3fe3f6,2024-11-21T08:02:17.570000
|
||||
CVE-2023-31819,0,0,f8ffea9ec7bbc711c06c9fb7fdeb8d6590e2c99b3e86e7a8fedc11e5f8dc25dc,2024-11-21T08:02:17.720000
|
||||
@ -224623,7 +224623,7 @@ CVE-2023-31822,0,0,45613132497589a9dcb950e1f37ac3a395cbe029e376bf9556698be4e3a27
|
||||
CVE-2023-31823,0,0,0ce96b85f0042f0b6d51089686bb1cbb368a5ff87b8ac60c040e2010e668d2c1,2024-11-21T08:02:18.273000
|
||||
CVE-2023-31824,0,0,1f194dcc013dbea37681faeac319ede47ce10cb4422c1beef9219e2bc0a23d81,2024-11-21T08:02:18.413000
|
||||
CVE-2023-31825,0,0,03dbe4b1a5682614e9eab4c399d6d51c119b6e7b094e5b42da6f242bce34bafa,2024-11-21T08:02:18.570000
|
||||
CVE-2023-31826,0,0,262ced0a2e626dbfd2a116dba5aa150ca6fa01a95f2a5e4879a4b55e3ad96f54,2024-11-21T08:02:18.720000
|
||||
CVE-2023-31826,0,1,94ad697a1cf2f06936284069cbcf1523df00d869d08e163fd3260b126185eab1,2025-01-17T18:15:24.380000
|
||||
CVE-2023-3183,0,0,53da3111600f6b312ce92b28909fdc893a3ab679b13c31964b17fca0c5c6dac0,2024-11-21T08:16:38.710000
|
||||
CVE-2023-3184,0,0,5a98f666e0a46484595c3fa08341e96998bbd480baa7f5b498adc629dfeb2239,2024-11-21T08:16:38.857000
|
||||
CVE-2023-31842,0,0,216b8f15018b084ece08520bbe6db9754d2bfd5a6c33dfcefd31c96d920099ee,2024-11-21T08:02:18.863000
|
||||
@ -224639,7 +224639,7 @@ CVE-2023-31854,0,0,1afe22a18848e9c434b0c259f6d2c90301fa42928d2094ebf0bc1b4b52fc6
|
||||
CVE-2023-31856,0,0,ce256db1525fce6a46e28d9cc8111df499b2085637139fa8706530beb5896492,2024-11-21T08:02:20.267000
|
||||
CVE-2023-31857,0,0,7bd3853f2c55682965431fa0d6799811d368a0e716fd1913e523e8cb2e1eb410,2024-11-21T08:02:20.413000
|
||||
CVE-2023-3186,0,0,14a8a3e02f8d6ed26188c9f463e876e766ad72b9a21434e816a4de3953e3d487,2024-11-21T08:16:39.013000
|
||||
CVE-2023-31860,0,0,b19f93d6a0c37e48d579870939cf38501c29b9fec1e4af7e585d4bb8b6a49d17,2024-11-21T08:02:20.550000
|
||||
CVE-2023-31860,0,1,c8cd823357aabe2248349ead353aa43605af9164cf40845a237ab4fd189848d1,2025-01-17T17:15:08.863000
|
||||
CVE-2023-31861,0,0,00ed8b460a421cbea6dd8b076a614dfb6e50c87d17fb1a33433f66e14cf7477d,2025-01-16T15:15:10.720000
|
||||
CVE-2023-31862,0,0,e5d2282f2c43ebaed31f9de83715b1445773fd7849c890a179b5317ad27e92a4,2024-11-21T08:02:20.827000
|
||||
CVE-2023-31867,0,0,3f97c746a106b59feb7da8efbb130c3ebd33dce765f13b1306b2c553d6ba473a,2024-11-21T08:02:20.963000
|
||||
@ -224708,9 +224708,9 @@ CVE-2023-31983,0,0,ef58504e0a637118d6f8845dd53840a1d2db8ad16799a879832aa8e940c8d
|
||||
CVE-2023-31985,0,0,bd98f2530ab95ee94061aa53e90417410a462732cff960d98902197614bfe101,2024-11-21T08:02:28.473000
|
||||
CVE-2023-31986,0,0,4554667e4b44524c54a58b9599dc684ffccd4e428d7fd728ba8c634cc47230b6,2024-11-21T08:02:28.607000
|
||||
CVE-2023-3199,0,0,3090d868ba2232b79a6345d288a327f64a94c462d32135357515a4c0d92e958f,2024-11-21T08:16:40.807000
|
||||
CVE-2023-31994,0,0,8f3259b7baaa21013a3ed60deaccd9028d223659ec6283d27b8b7206dc79d99b,2024-11-21T08:02:28.753000
|
||||
CVE-2023-31995,0,0,fd73938999eb646be2e37ed7c0ede7812f9d86f32a33bf7da0a61b1076e2ef3c,2024-11-21T08:02:29.403000
|
||||
CVE-2023-31996,0,0,5bb80e295e15fdb70abb0cfcbfb03a96a8d6ce706d3028dd7b043d4557847bbc,2024-11-21T08:02:29.653000
|
||||
CVE-2023-31994,0,1,f52d122711ee0b067c08e1d09861ac42925c6e7f35be5acf7e4bdc9abaee5571,2025-01-17T17:15:09.097000
|
||||
CVE-2023-31995,0,1,7b0c1be4afc967363ddd9adb4811ac5626f5b72b8d18cee0978a04ff5aed9f62,2025-01-17T17:15:09.840000
|
||||
CVE-2023-31996,0,1,8addd81106eaa0f63a624672d923cf5a11a3c2aa0439ab8109e4f0cc63f3e2ea,2025-01-17T17:15:10.213000
|
||||
CVE-2023-31997,0,0,23a6860242c9df6be185c42cfd4a4a473fe5b3dfcafad46e19bcae2a47554244,2024-11-26T19:15:20.320000
|
||||
CVE-2023-31998,0,0,ac25b80b9728b3ab0412e032d163754f5150cf9245971c8f4f1d63d9f7860f81,2024-11-21T08:02:29.997000
|
||||
CVE-2023-31999,0,0,4453265e6b17508561fd877c6ee02695732cb6b46320f037e8dc6cfcebeb75c8,2024-11-21T08:02:30.127000
|
||||
@ -234977,7 +234977,7 @@ CVE-2023-45585,0,0,ae76bf0d2278756cf8178bb595651b14f13c7b9a7bccf13bd28d7b4108cbf
|
||||
CVE-2023-45586,0,0,6b565c71ab704bd8e631f209959d1898851432ed4bb3fc8b2b21c0a6ef49fb65,2024-11-21T08:27:00.740000
|
||||
CVE-2023-45587,0,0,025d5ccaec3461c7aae70d71ac1f3ff5df6906dcd056c99dca83a5aac53bbe47,2024-11-21T08:27:00.890000
|
||||
CVE-2023-4559,0,0,6d3dd9975708c32ae11f782d8520452850e9b29b83aba9a24d0d60628e2c25a2,2024-11-21T08:35:25.270000
|
||||
CVE-2023-45590,0,0,6524e3cd1fe04a3ebb0f01ad1b0473d8c7217e18eba48abc93f18386ca01fba8,2024-11-21T08:27:01.027000
|
||||
CVE-2023-45590,0,1,05ecf04760c6be91163ac0bd5d4f759690d034198a058ca36f4c11671ed8f2dc,2025-01-17T17:08:31.843000
|
||||
CVE-2023-45591,0,0,45936665370901cf6bd6f3c4d1fb0775d3e157fe83efb64965918cf648dd4184,2024-11-21T08:27:01.167000
|
||||
CVE-2023-45592,0,0,668bbe96709a91593d310b83f278f0ab698a6defdb9b3a305c9d33af64243101,2024-11-21T08:27:01.310000
|
||||
CVE-2023-45593,0,0,15650ee38208d7c8cffe49c3f51f946f93a352336d9e31486e0ce70c376d733a,2024-11-21T08:27:01.460000
|
||||
@ -236485,7 +236485,7 @@ CVE-2023-47537,0,0,2e59328fe99d373a050967f8884554343bd03b198b96f65b133b83e4d7c66
|
||||
CVE-2023-4754,0,0,0b14f0921b6667a528d8f56fea2f4c9f7f951287cede8fa8335afbbdb458b076,2024-11-21T08:35:54.460000
|
||||
CVE-2023-47540,0,0,30ad5bce1a8ff12a551ea717bec4c760ac5e6136be380d2d553098d927c9acd4,2024-12-23T14:55:53.860000
|
||||
CVE-2023-47541,0,0,3da53a23394974b989fe8799af46c85743ab703fa3c735d56b01dc047fc3d5b3,2024-12-23T14:57:00.153000
|
||||
CVE-2023-47542,0,0,2c301ea3fc1923df3d1786b1c81f5d6312992d198827db876d7bcd4ba7084720,2024-11-21T08:30:25.520000
|
||||
CVE-2023-47542,0,1,308ff121ada77a017b97131c594f13cddaa5bbd0edbee9d59a4996597c3587ab,2025-01-17T17:11:28.947000
|
||||
CVE-2023-47543,0,0,0ab4ae9e1b35d4494e8292afb33e27cd1002b0f28bfd138a7061de1fa51ed1f9,2025-01-02T18:29:53.643000
|
||||
CVE-2023-47544,0,0,37c99d07aab35bc0bebf060938c609faefc3158817cf4b2a384b1ee52ef99508,2024-11-21T08:30:25.707000
|
||||
CVE-2023-47545,0,0,4f687d84e6811695356b024af283b6469f1342f0a2079897109fb36bb91ed5d4,2024-11-21T08:30:25.830000
|
||||
@ -237508,7 +237508,7 @@ CVE-2023-48780,0,0,c639956bfab0ce7bfd5af6156a8111806fc286d7ec80bb19f8083e2bac841
|
||||
CVE-2023-48781,0,0,443c0eaace84c8a3023340ca81970964577a0302cfc23bcb008a36d2a89d846b,2024-11-21T08:32:25.940000
|
||||
CVE-2023-48782,0,0,95b480354037833708e5ea1bd8952550f6b86c93b127b2df8fe28ea859382cba,2024-11-21T08:32:26.063000
|
||||
CVE-2023-48783,0,0,a3d3d9c515425dc9d4a6694931094094bce0ad1bf598561f8cce66e53871e146,2024-11-21T08:32:26.210000
|
||||
CVE-2023-48784,0,0,fad171fd5c14eb35c1913cc0abf8a8b72cc534253e00f688d3b68ba966faf302,2024-11-21T08:32:26.347000
|
||||
CVE-2023-48784,0,1,a38b3df2a0990eb78b00856db4b44b3faece592632429972af2d3ba4bfd6241e,2025-01-17T17:19:51.033000
|
||||
CVE-2023-48788,0,0,117cd7d9101610b085c354a97190a21e5f1fc93ca8e7af0fad52f3fe309ccf1e,2024-11-21T08:32:26.470000
|
||||
CVE-2023-48789,0,0,a75c9ff9546aa54d9359b6e268e1a22aa2503ad9ca18484e9fc035ee69b14a93,2025-01-02T18:33:37.333000
|
||||
CVE-2023-4879,0,0,7e121044884b2046f6043a8b7bc58233964c3dd37019fffa4c062abaafb80dde,2024-11-21T08:36:10.673000
|
||||
@ -240096,8 +240096,8 @@ CVE-2023-52543,0,0,5283d1b3068666f9df1d4bd34373b734822e71b72480090d12dd8445b86c1
|
||||
CVE-2023-52544,0,0,406148b07c3e067d8a9476be53ce0c11d92291c013d48a8edbe35d723499379b,2024-11-21T08:40:00.890000
|
||||
CVE-2023-52545,0,0,9a8fc8901aa644cde1d29ca0a0573e4a085058e72b5ee8839f817feebb241a74,2024-11-21T08:40:01.073000
|
||||
CVE-2023-52546,0,0,595e1c1b42c7971cff7132e9cb85749c3833d2ddda52158da49cbfedf79cf606,2024-12-09T13:54:48.487000
|
||||
CVE-2023-52547,0,0,8137c1d12289f1a7f98ca28b5eeaf4141cb9fd996bf309fb636147e5123add7c,2024-11-21T08:40:01.370000
|
||||
CVE-2023-52548,0,0,041a4244e394c3d794809c7145324075f3f7c8df545d2b61c18f23ceec55ccd7,2024-11-21T08:40:01.510000
|
||||
CVE-2023-52547,0,1,13cfbe1c918f5a4b0cd0a89536bf425d70e25d07630d011e3b1655a8627d09ed,2025-01-17T18:32:12.300000
|
||||
CVE-2023-52548,0,1,5e9b74916239ca79bb24807d83861f84cd24ded664a5de58fa1b70ca1489bc61,2025-01-17T18:31:57.740000
|
||||
CVE-2023-52549,0,0,ee9009133fbe9f80d74dff5352f9b88a18a64ffd6ce72d5c26cd7d7807302fcc,2024-11-21T08:40:01.647000
|
||||
CVE-2023-5255,0,0,b25817cf164b6b92e839f9fb2ed96a7d7247900cb99b8587774e529fa151fa4e,2024-11-21T08:41:23.090000
|
||||
CVE-2023-52550,0,0,df02f2239718e53b99444de87a20222af6feaf7990812f74cec672b0ce4ff90b,2024-11-21T08:40:01.840000
|
||||
@ -240275,9 +240275,9 @@ CVE-2023-52706,0,0,834345482be0d546ba50b0cb794dcb116ce50eb7b30eea30e56c36d1bfaa6
|
||||
CVE-2023-52707,0,0,1bc7b595266b548d6027993e063414952e1e09f68ff73fe8319f05c3207dc492,2025-01-06T20:39:33.220000
|
||||
CVE-2023-52708,0,0,79d1647a46a1e762e1f72065b91297259c43d8680df6c2128c54f559c8998f6f,2025-01-06T20:39:58.813000
|
||||
CVE-2023-5271,0,0,57c69f88684b23484c89729e90ea1a49339f972575180d1b4d31fadcdba0e1a2,2024-12-23T15:18:44.853000
|
||||
CVE-2023-52710,0,0,047e81a360897731f880d0599d295390f5494134b8904c6c7f6a32cc4bcc9d22,2024-11-21T08:40:24.760000
|
||||
CVE-2023-52711,0,0,cc83855bf8e359d211f376a5ee43650e9cad5f7403105f7df8dba026dfcb6788,2024-11-21T08:40:24.883000
|
||||
CVE-2023-52712,0,0,65525446b7fe131921c52f55da75710a708ef74b13614948d7ca7ba37ec14414,2024-11-21T08:40:24.993000
|
||||
CVE-2023-52710,0,1,9bbd1f7a1a4ed012966ab0abb1a3fc7deb2b0ba4106e8e59e3113756325b8d92,2025-01-17T18:32:39.963000
|
||||
CVE-2023-52711,0,1,d29b43a79a6ec43805b15017ff2a9696d678c401f57fa7f6617f0b13154b0601,2025-01-17T18:29:39.560000
|
||||
CVE-2023-52712,0,1,d1b8d695e6cb234f9215c75edf54a720cfc64714a12f2c0ba8d6f0c02b1ba711,2025-01-17T18:29:32.770000
|
||||
CVE-2023-52713,0,0,de6af38550e0c85a611046675f7763ec3d45059f76427f0389872a42693db02b,2024-11-21T08:40:25.107000
|
||||
CVE-2023-52714,0,0,de14f64658c68077a848c9d7169099f947c3064891aa288f876f46274f59a0ec,2024-11-21T08:40:25.300000
|
||||
CVE-2023-52715,0,0,40c133c7a650afa62e84d50889abdc2f10bf115a6958fb8619bb9f86fb85544c,2024-12-09T18:05:04.807000
|
||||
@ -243093,7 +243093,7 @@ CVE-2024-0833,0,0,db4819518cb18b8e54473fd58f5324fec270a35183944967d2c342881ebc73
|
||||
CVE-2024-0834,0,0,4909462b05092a27a61fc0c22b9068b69fa51b5caf1c544fca449cadfb1bfd00,2024-11-21T08:47:28.510000
|
||||
CVE-2024-0835,0,0,9af51f6890e6470dad21ae7757ef0efed2c1f2e67204635a479a146277d8662f,2024-11-21T08:47:28.640000
|
||||
CVE-2024-0836,0,0,cd82249cdfcb5ab173c90bf4120548bfdb723d07f1e7b14e20f0d32f1d9c1e6a,2024-11-21T08:47:28.770000
|
||||
CVE-2024-0837,0,0,54f84e3002cfdda564fee9168d6c1c7df787ca0f6cd3259ca2097134909dbeda,2024-11-21T08:47:28.917000
|
||||
CVE-2024-0837,0,1,458cffc92e81f947eb35db9c7d429f14a4acc2bc97686886fbd06698e9828d72,2025-01-17T17:47:27.833000
|
||||
CVE-2024-0838,0,0,65c3c84015040543239e3e8dfad6fe5d4d6702f7df313f51a124b3b4f9fdd8a5,2024-12-27T15:57:28.327000
|
||||
CVE-2024-0839,0,0,49086e11eae50fdeaa0fd1455d8cc94d52d9a0af6af252bac9ff62fabed8f3b8,2024-11-21T08:47:29.143000
|
||||
CVE-2024-0840,0,0,ca8aa458c2576a35731bcb5034c90e7663554fbe2d4d8fb60f218a463413d155,2024-11-21T08:47:29.257000
|
||||
@ -244996,7 +244996,7 @@ CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab
|
||||
CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000
|
||||
CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000
|
||||
CVE-2024-1202,0,0,a098cbd545693e5d361995e28174ffa246c4ae019a07a45a38ebe2abdfe163e3,2024-11-21T08:50:01.790000
|
||||
CVE-2024-12022,0,0,8ddb6cca3fbeae75228ec6bf3688dd732e1771ac09aec57ec3253b8f7ff26581,2025-01-07T04:15:07.677000
|
||||
CVE-2024-12022,0,1,4b0c4a5413ab235f6d4162bb8baa2320652f2e63275aee3944d2530558cd3296,2025-01-17T17:15:10.533000
|
||||
CVE-2024-12024,0,0,a8f5c653a0f41818f117c378be0858d1b5c96c482668ecfb6f6099471186e39b,2025-01-10T17:56:30.330000
|
||||
CVE-2024-12025,0,0,48a6a81843ce463d9a84b144c8201ecb34a901e35178968cb10c7b2b1d7242fe,2024-12-18T04:15:07.347000
|
||||
CVE-2024-12026,0,0,cbdee4f4d341b218f2a9910c9db7c968e1470cd32e93684865d3bd2934d626d1,2024-12-07T02:15:18.520000
|
||||
@ -245064,7 +245064,7 @@ CVE-2024-1212,0,0,c6c0d98b39fe69ac963e13ef16e93aec1a62abd1466de44e7788f638a4921c
|
||||
CVE-2024-12121,0,0,03702b315699ac0a86731f33a73d0aefd1ecc16bf8d72dc7730c1bb362033b62,2024-12-19T02:15:22.610000
|
||||
CVE-2024-12122,0,0,2085a2ad9176305a3af7546ac3413558f58015df8bc020f0278e8be2ceaa6a06,2025-01-09T11:15:11.860000
|
||||
CVE-2024-12123,0,0,3314f70340307f7968d2c224d2753ec462f128bd5dd04a8f7d840d35f281e69e,2024-12-04T04:15:04.430000
|
||||
CVE-2024-12124,0,0,546dc01e2004b604a5fc415ca243f058dc4bcf606929b3949091b081b3f7e353,2025-01-07T05:15:14.340000
|
||||
CVE-2024-12124,0,1,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae9478697896b9,2025-01-17T17:15:10.653000
|
||||
CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000
|
||||
CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000
|
||||
CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000
|
||||
@ -245131,7 +245131,7 @@ CVE-2024-12204,0,0,dd2419f837ae2e8153f295f52cb2a01f412a1909c214527d0037cf9f21b9c
|
||||
CVE-2024-12205,0,0,3f132fb045992282c7f82c5a064b4363ee95bb769165d08b8391a552ea18c9e1,2025-01-08T05:15:09.667000
|
||||
CVE-2024-12206,0,0,2d268b18f02f4bd906dad5a4345fbb5bf68ec20740bfded288226575e3fdc866,2025-01-09T11:15:12.070000
|
||||
CVE-2024-12207,0,0,4215076d4c349db5508fc90ade02423810084b601173785e651a4489dedc1db2,2025-01-07T05:15:16.080000
|
||||
CVE-2024-12208,0,0,853007bc09d49f6c092cb33c65061bfc51c7e3b97e6ede52f3abfcbb921361cd,2025-01-07T05:15:16.270000
|
||||
CVE-2024-12208,0,1,570ae5920f0e6b28dc0cde719aa86834356ad1572351e3f8a72e245ec26cd554,2025-01-17T17:15:10.740000
|
||||
CVE-2024-12209,0,0,965d45920161ad8379a478313464ecb572a2b8b8ed1bf056a1646168e0b8105f,2024-12-08T06:15:04.823000
|
||||
CVE-2024-1221,0,0,c833d2d1840e5e81b3c325295532e3c4cac8ba514abb434d638a7c419bdc43e8,2024-11-21T08:50:04.920000
|
||||
CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000
|
||||
@ -245270,7 +245270,7 @@ CVE-2024-12381,0,0,68b33f6b694aa45ef73ff06945e737e58ccb7b1c7ea2cfeb4d826136c48b3
|
||||
CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2e87,2024-12-13T19:24:25.137000
|
||||
CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000
|
||||
CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000
|
||||
CVE-2024-1239,0,0,a515a367dab4b48d00e7f390a15c0d107266b53b28358b9f5ebf3476b0a625f5,2024-11-21T08:50:08.180000
|
||||
CVE-2024-1239,0,1,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000
|
||||
CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000
|
||||
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
|
||||
CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000
|
||||
@ -245395,7 +245395,7 @@ CVE-2024-12536,0,0,a925f1a48eff74b537962fd623796390384e9d276d37e7a9cb0d9ba10f946
|
||||
CVE-2024-12538,0,0,09768d3293edcfe78eeb71291a6d043c617de31a086c72fbf20722cd5259fcb2,2025-01-07T04:15:08.720000
|
||||
CVE-2024-12539,0,0,bf2bc8684b4967ec9692452689aaa296f660969c9ab0dd0ec9b638e64908ab0d,2024-12-17T21:15:07.183000
|
||||
CVE-2024-1254,0,0,44df8e919ae544d26fc82110d33f6e7af1fff88011a3bcb100ca7209bc278c91,2024-11-21T08:50:09.993000
|
||||
CVE-2024-12540,0,0,e5d4dce4760b17e4b41f398ec25e8f7eaa8cdf3185b056e79b164244a895d465,2025-01-07T04:15:08.917000
|
||||
CVE-2024-12540,0,1,1e9177edb7465f712456efac18d30bb1c07ecf12cf850b80b24f92b8890041f6,2025-01-17T17:15:10.807000
|
||||
CVE-2024-12541,0,0,385c32a941f81d7511af495bf3f4a826789a0d8e4c91de10d32c3c91b10da450,2025-01-07T04:15:09.083000
|
||||
CVE-2024-12542,0,0,90711ddee5ff9893a7ce0cd38bbc7f3f75598e4dbe4af03512315507d947e910,2025-01-09T11:15:14.550000
|
||||
CVE-2024-12545,0,0,6a7eb673c2bd6339a922da465bf51ae458a826273537fb084388303f81560e28,2025-01-04T08:15:06.363000
|
||||
@ -245539,6 +245539,7 @@ CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca
|
||||
CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000
|
||||
CVE-2024-12753,0,0,4271c9d86ac6ffc21783ff22aa4d21dfabf207717e4c237171a1fe2075c45756,2024-12-30T21:15:06.400000
|
||||
CVE-2024-12754,0,0,df24fa8ce9df112eb8cb8438eca3154b7b11a8ee42e16751c31ec0de51ba4cbc,2024-12-30T17:15:07.127000
|
||||
CVE-2024-12757,1,1,01072d625822b49e01384e601159c9c64ccc9d51e280e2ccbf25f2d79b8491d5,2025-01-17T18:15:24.690000
|
||||
CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000
|
||||
CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000
|
||||
CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000
|
||||
@ -245812,7 +245813,7 @@ CVE-2024-13142,0,0,83e0842aea5b2cb3dd06404d668eb9948718605f09db4c9056bc023c82417
|
||||
CVE-2024-13143,0,0,5b98fd73f844e22877d6840bd4c9a6249f752b17b68060c8d46233d630dea32e,2025-01-06T00:15:05.460000
|
||||
CVE-2024-13144,0,0,421356c7c2f8738fb679788721a3f3f954ae7a1eb9d21a080e8a08af1c17c712,2025-01-06T00:15:05.633000
|
||||
CVE-2024-13145,0,0,d619d4a0aac8850d0c75f520a9103dfd5ad1c1ab851866f38b7082760726771a,2025-01-06T01:15:06.253000
|
||||
CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000
|
||||
CVE-2024-1315,0,1,8cb70de4b1449c82043b2652cd95d6eb6d48aeb35344f66e409dc981ea33e526,2025-01-17T17:30:38.363000
|
||||
CVE-2024-13153,0,0,e5372006a19c4f2229d5d82f2f00e097ecc1dd71c1df06bd0280614a58d1fbcf,2025-01-09T09:15:07.243000
|
||||
CVE-2024-13154,0,0,8b848cb4ffbbf3d5300b505058bccc136fae4b33341f37a24f40fb8ac9f235ba,2025-01-13T21:15:11.970000
|
||||
CVE-2024-13156,0,0,41775375a80c93fa0950178962cf86cfd1e2c8b60f46eda85c616b6213d4e16e,2025-01-14T09:15:20.910000
|
||||
@ -245994,7 +245995,7 @@ CVE-2024-1350,0,0,ce11ba75737d3c0dc14aea45038ee6ef39f1db647d13879ee3f248d09a8169
|
||||
CVE-2024-13502,0,0,e35d372750cc88cf9cffae844c3d280bfcd57c36093969e074e189ae9463f58a,2025-01-17T14:15:31.147000
|
||||
CVE-2024-13503,0,0,7576f806eda86dcd6b291425bfcddf3d4f266c37af3d5042d8bdb800498b7aa7,2025-01-17T14:15:31.317000
|
||||
CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000
|
||||
CVE-2024-1352,0,0,85cabdc392d08eea6a3af07faeea17433d56015caabb9ac17b4ff2bf52f31c91,2024-11-21T08:50:23.583000
|
||||
CVE-2024-1352,0,1,80e73adafdfe15b995501384770910e119d96dba6ac79b22584e1c2a8e29f667,2025-01-17T17:23:55.973000
|
||||
CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000
|
||||
CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000
|
||||
CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000
|
||||
@ -246049,7 +246050,7 @@ CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628
|
||||
CVE-2024-1404,0,0,72e7bfa50d663f6618ea5cb7b36bb28904508f29cf1e05b2cbe5def310af3816,2024-11-21T08:50:30.790000
|
||||
CVE-2024-1405,0,0,f1f20b7fcf6fcb7016c5464ac9de09f0711e13473f6f7d4ae7139e675dbe1403,2024-11-21T08:50:30.937000
|
||||
CVE-2024-1406,0,0,6b28f10833aa0266c21bf391a699e38b0fbc18d07df506bf50ade27d766794c5,2024-11-21T08:50:31.093000
|
||||
CVE-2024-1407,0,1,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000
|
||||
CVE-2024-1407,0,0,aea146a24e9e07a019a2882d28a7220b14386947f663004dd47c26ab47e7f0fa,2025-01-17T15:05:23.520000
|
||||
CVE-2024-1408,0,0,6ef60a72951d16c0b9e728b84742a4d35c67925763670f067b8c3c5941c31590,2024-11-21T08:50:31.397000
|
||||
CVE-2024-1409,0,0,7962f407df3c3ae50439b2eca79b45057e814b108e0e2b019b6d191d89933849,2024-11-21T08:50:31.520000
|
||||
CVE-2024-1410,0,0,5e6f7cca224df908329417aec1336b7ff4ef9e141a0c106289cba50bfd976a14,2024-11-21T08:50:31.643000
|
||||
@ -246070,7 +246071,7 @@ CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a
|
||||
CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000
|
||||
CVE-2024-1426,0,0,23b1a7306f53e67c5a563c9eb21d3cdb5365fa187ec8c954a68012e8a35c2dc8,2024-11-21T08:50:33.500000
|
||||
CVE-2024-1427,0,0,045d36306302d266d38f2f3182a2a05490c1c0ad4388299e4f45dc3722894b2a,2024-11-21T08:50:33.653000
|
||||
CVE-2024-1428,0,0,3cd64d4a3fa95db0c0830882d4e3074eb351510266e9e0c2b39fd04a5a4216fe,2024-11-21T08:50:33.803000
|
||||
CVE-2024-1428,0,1,7796e13a2999d1217a0322c4c01e6866cfb2671a8159abaf43ba19808bf938a3,2025-01-17T17:48:58.150000
|
||||
CVE-2024-1429,0,0,5058e99ef8f14eb515834ad0343e76a35ce86f45fd71d223b1d90d473652ec8f,2024-11-21T08:50:33.927000
|
||||
CVE-2024-1430,0,0,3bc978d4dd692ba7ee4a7cc4d11c20fe662c755ea27eb731ad29addddec20cba,2024-11-21T08:50:34.050000
|
||||
CVE-2024-1431,0,0,1230d8600678d12f7d6985eeb6243f7c0dc22668eba8d5138026b4c6a9e8e477,2024-11-21T08:50:34.230000
|
||||
@ -246098,15 +246099,15 @@ CVE-2024-1453,0,0,0227e7a01863c94405e531357cdb0c10b796444052d7a86292908c61c86741
|
||||
CVE-2024-1454,0,0,efee886e7293fa134cee300a2fdd8efed7a47176b613af6fe8be478634f8010f,2024-11-21T08:50:37.150000
|
||||
CVE-2024-1455,0,0,e455ef50023fd394d707ee63f10df4453b9d4808077ff1d6df4f5071b048364b,2024-11-21T08:50:37.310000
|
||||
CVE-2024-1456,0,0,8633e71f4c77a0e946debb84f2a4c8ad3ebd080d1f02a90e0c9dc34b01539861,2024-11-21T08:50:37.443000
|
||||
CVE-2024-1458,0,0,ec3c20bc97fb6748d28a5192421ff51abc4fc396fdfc1241392bb352efb114cb,2024-11-21T08:50:37.560000
|
||||
CVE-2024-1458,0,1,64c7a0990a0e5ef06a6e068d0f77c7374d95774ca4d8bc6bad25be47e5b94f2b,2025-01-17T18:25:27.900000
|
||||
CVE-2024-1459,0,0,9213d5c5950fb349885acd6f33d7518e8e2bb30c455edfe98d707606280d0440,2024-11-22T12:15:18.250000
|
||||
CVE-2024-1460,0,0,f3508d6268168ff51da7bae2a13425bf7bbfb604f01657b6170165d3f033d6f0,2024-11-21T08:50:37.957000
|
||||
CVE-2024-1461,0,0,f584e3dbeb8031a8d480cb017e172e2d88e2d972ca75e28d7328042b55e0ef9c,2024-11-21T08:50:38.083000
|
||||
CVE-2024-1461,0,1,8dba5338edac7720c236df8c7d75c36d10f5b1986f4c4e03d386744d26d52663,2025-01-17T18:24:39.060000
|
||||
CVE-2024-1462,0,0,22404aaf8a49dc841b4dfb8015ef3d92bcfb9afb2b174c3158b4a5b6857e5937,2024-11-21T08:50:38.210000
|
||||
CVE-2024-1463,0,0,402ad10a9076e0d12b27e422fbf08211b1e50d8b2cda28da6995c2d0d67aa49b,2025-01-09T17:37:21.223000
|
||||
CVE-2024-1464,0,0,774ba0954367abdcfc9850ebba4296f304d8bfcdbba1a93325f46f442fb6af2e,2024-11-21T08:50:38.453000
|
||||
CVE-2024-1465,0,0,5ee667cd15d63ff1bbe794bed1e8ceb6109854a7af40827b767f317b47dc50fd,2024-11-21T08:50:38.583000
|
||||
CVE-2024-1466,0,0,8462e6000ae5180e55e19d0c1e3e4e7bfb5efcb71a99f4875c7c2804764d132a,2024-11-21T08:50:38.723000
|
||||
CVE-2024-1464,0,1,5381513a296e0115ec061d8021538ebcb7a85f8770f33c8709fe5ce514f2b318,2025-01-17T18:23:39.073000
|
||||
CVE-2024-1465,0,1,6e2482f9a41a51ae12b482537f83a337bec29ff5e6cdb76e1e42ee95e1d60318,2025-01-17T18:20:39.593000
|
||||
CVE-2024-1466,0,1,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe9e,2025-01-17T18:18:00.443000
|
||||
CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000
|
||||
CVE-2024-1468,0,0,85909a6551afb5c9ed643a3adcc66d39fbe3b663e240971373eb4ce702b3469c,2024-11-21T08:50:38.970000
|
||||
CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000
|
||||
@ -246257,7 +246258,7 @@ CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13a
|
||||
CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000
|
||||
CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000
|
||||
CVE-2024-1637,0,0,b7437c704fbfb1b3fca1af15d0ef06f6ecbdc8f18471c8100476373d9e2e55cd,2024-11-21T08:50:58.600000
|
||||
CVE-2024-1638,0,1,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000
|
||||
CVE-2024-1638,0,0,3645fc3fd5a53c71cfa58f98ad075d1348bbc5dcf758960e5203009589cfd13a,2025-01-17T16:26:03.767000
|
||||
CVE-2024-1639,0,0,de447f38a3507556188a654289532a72df4270ff11bdecd8ce53d967434870bc,2024-11-21T08:50:58.857000
|
||||
CVE-2024-1640,0,0,5a1a433d9c4fff99641db26e31a901ba05b22ce24bea862e61bd65501e5ebeaf,2024-11-21T08:50:59.030000
|
||||
CVE-2024-1641,0,0,b0df7adf6fe0b4743c932c7cebd3b80c6d328f692d983d1d9ad69f21762a38a0,2024-11-21T08:50:59.157000
|
||||
@ -247353,7 +247354,7 @@ CVE-2024-20906,0,0,b4d72f656cf19f941cb7a69e3c7a565591c3735c1ab6b1104f219eb9464e8
|
||||
CVE-2024-20907,0,0,9de2ea9ebaa4c3fac2611c739233ad03c8e983e9691002701b71e49fbffb565d,2024-11-27T16:32:05.720000
|
||||
CVE-2024-20908,0,0,e474d686b39416846ee4634efb324374d3301b95c4cba0a19fa75306b0cac4d0,2024-11-21T08:53:24.567000
|
||||
CVE-2024-20909,0,0,e43d2b35de49633667df467f3c5d76ceef589ccb2fb385fce0db3081ab7dffa6,2024-11-27T16:32:02.417000
|
||||
CVE-2024-2091,0,0,ed67c4fdff53bdb98073a15f2bb6c16b7511d3ac2ec4c3ab94c7ebb85210e54c,2024-11-21T09:09:01.480000
|
||||
CVE-2024-2091,0,1,93bc41da0198455afcea975292628c6f37c463bc63f01893faeaf48ffb1acf07,2025-01-17T18:35:09.950000
|
||||
CVE-2024-20910,0,0,0bebdc0efa26f8e0ead70e258e2c32c4d75b4b13d5813b7de7da8abdb4d78871,2024-11-21T08:53:24.803000
|
||||
CVE-2024-20911,0,0,44ed94f6571ba1ed6ab71ecc01af753b87e7e45ad9412fbc292b9940946694a8,2024-11-27T16:31:58.250000
|
||||
CVE-2024-20912,0,0,4e4c54d5b304f113a69d58829f20fa3206b36f29bc855bce84ffcddf8905f158,2024-11-21T08:53:25.047000
|
||||
@ -249088,7 +249089,7 @@ CVE-2024-23120,0,0,ac06c2c8db62927ae0ff0b52d59bb679bc1d15c17597778456fb9ce2f4737
|
||||
CVE-2024-23121,0,0,f927b1f7d7032f240c6a22fe10e3d2651315dc82dec1abe13791c8df2c776bd6,2024-11-21T08:56:58.800000
|
||||
CVE-2024-23122,0,0,ea802f83148f077bdcacee0853bb097b88aa7ceae9c8e0c76ab719a3e8347479,2024-11-21T08:56:58.993000
|
||||
CVE-2024-23123,0,0,89e1dd12c90aff262f16a0b9365760f22dc8506be190b933a3cedf3239423eec,2024-11-21T08:56:59.180000
|
||||
CVE-2024-23124,0,0,3b1c96fd882b953a33460a38ff4c1b12232b92cb58f94c23614efc884e43af35,2024-11-21T08:56:59.373000
|
||||
CVE-2024-23124,0,1,cf624f3b7cab7fb6fee299c2ba5a965e125ffc8d32f57a5bc3192c1a58f0ad11,2025-01-17T18:15:25.030000
|
||||
CVE-2024-23125,0,0,554e34bed34462f3c5363e8b180e04e5c1d1cc8bc89dab422d642a824457d1a0,2024-11-21T08:56:59.570000
|
||||
CVE-2024-23126,0,0,f8e5b5479f3c4daf2ec0a157b4f70ad1b3649cbac015e49b433a4827e6695343,2024-11-21T08:56:59.750000
|
||||
CVE-2024-23127,0,0,e62634191327f3ef7db3dc55bd00ca620754343e9d8fb17493a6507775a8363d,2024-11-21T08:56:59.940000
|
||||
@ -251320,7 +251321,7 @@ CVE-2024-26125,0,0,2c3257bf64e1f9bb73b26a4fbfc8be684d1eca4cc144ede6e81b1ca262a90
|
||||
CVE-2024-26126,0,0,0704f19f338f2bb0acb508b253d0a2da44d884d4f86de92b6da40568e6480cad,2024-11-21T09:01:59.287000
|
||||
CVE-2024-26127,0,0,a7e023b5ba5da3ad7af563324822a120bd0bfe59d4cb07ca927224a3bef75883,2024-11-21T09:01:59.407000
|
||||
CVE-2024-26128,0,0,6ec59e3a008feca6738de761b3be3df5c35466eb2f92117550b0e2c3bfd06b31,2024-12-20T19:30:47.733000
|
||||
CVE-2024-26129,0,1,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000
|
||||
CVE-2024-26129,0,0,f3bebf0a876bf9290099b17bc3b0dcddcfeb88c750973d938b315f43b9df0e21,2025-01-17T15:44:18.993000
|
||||
CVE-2024-2613,0,0,d197187bcc99168b56c5741e81bf4f56ddcbecc0552953fc5cd8c3d8ca371b17,2024-11-21T09:10:07.777000
|
||||
CVE-2024-26130,0,0,59dbefc86c1031aba378031c672a5f376743b0d682ff90d25ffac7caadc4d1ea,2024-11-21T09:01:59.757000
|
||||
CVE-2024-26131,0,0,5c8faf51f9ca570157c419a7436117ec2134b688a4a3d15d5026f55b0af4029a,2024-11-21T09:01:59.880000
|
||||
@ -251346,6 +251347,11 @@ CVE-2024-2615,0,0,52dd24226966af2d36ba382439ed9857bee488a41878b8821cda0b5db9bfb8
|
||||
CVE-2024-26150,0,0,760c01f2b0f4e8d4df72d58246936122b365d4d76ec3a16d18feb7c7ba59ab64,2024-11-21T09:02:02.207000
|
||||
CVE-2024-26151,0,0,d276b8c1a24abc1e1732baa2c78d7170250cc1d720b3056de0124851234c0d6a,2024-11-21T09:02:02.330000
|
||||
CVE-2024-26152,0,0,1dc6dc3291bda60bcd1869d37f2cb2c8de669324c74d8c14c98db460ad6f3160,2024-11-21T09:02:02.457000
|
||||
CVE-2024-26153,1,1,8c3ae9d2191858fd283b4e2f045e9afabdf52853492d2134f5e3c0013293cdc1,2025-01-17T17:15:10.927000
|
||||
CVE-2024-26154,1,1,7a55563f56bdbef2620b8c6a609d390524041b120bd24f125f40f1983869dda1,2025-01-17T17:15:11.147000
|
||||
CVE-2024-26155,1,1,9d6b88e7dbfad19e0aa14afa460da6171af4b161cec0634841d95815c20f7672,2025-01-17T17:15:11.327000
|
||||
CVE-2024-26156,1,1,5ab58b3651faaafae4e5f4c0ea29eb006a0c55d0423cdf2a04d4a07b8a66b5c1,2025-01-17T17:15:11.533000
|
||||
CVE-2024-26157,1,1,29cbdb0747048f6bf38c1a2fd7f90815e3a23c4798446d9d3ff85458ea1e4770,2025-01-17T17:15:11.697000
|
||||
CVE-2024-26158,0,0,09fc1d75121ad09ea3a275f9cccd32b38ff46d4cb1778bb89e6ac29161fd0e25,2024-12-06T15:40:50.143000
|
||||
CVE-2024-26159,0,0,1b48fef43c59f3ec54fb486cca3f3676b117339286d3339609cb0579c3d1ce4c,2024-12-05T03:06:07.380000
|
||||
CVE-2024-2616,0,0,3c1888c11eeab37d5acfcf6bb075f78798d2b23b1d25b092860d7147320c3bea,2024-11-21T09:10:08.330000
|
||||
@ -253073,7 +253079,7 @@ CVE-2024-28188,0,0,e75215c635ecc7d09582fbef46324329d57c09d369f24af90d98772bf8f31
|
||||
CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da9b1,2024-11-21T09:05:59.537000
|
||||
CVE-2024-2819,0,0,6daecd2bbfb467d8a24e5dcfb2faf4c02588ef96e9150250558dcd9fe5f2ba9b,2024-11-21T09:10:36.070000
|
||||
CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000
|
||||
CVE-2024-28191,0,1,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000
|
||||
CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000
|
||||
CVE-2024-28192,0,0,7710241b372f15cd48783ff863776a66f46b4b3cd57ca39601c199ddf835e1a2,2024-11-21T09:05:59.927000
|
||||
CVE-2024-28193,0,0,7ef66a28dd1ff57f0c0b025e8167ec6baa56982b11f2bb9d0c45c5587f2e1e2b,2024-11-21T09:06:00.070000
|
||||
CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000
|
||||
@ -253104,7 +253110,7 @@ CVE-2024-28231,0,0,879955e0d3b6b3f4d0d07366e36d2b8c1d2a204b3e9eb4c9d2fa328320c75
|
||||
CVE-2024-28232,0,0,4016560842e5dbe0556f8c825e8c7f66803aa1fc46a7caeb391820502d6b268b,2024-11-21T09:06:03.400000
|
||||
CVE-2024-28233,0,0,9dfb6a281036a246e6a8c7797767e8821a8200df2339f7f383cd7903646892b5,2024-11-21T09:06:03.527000
|
||||
CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b115274823f,2025-01-02T17:49:55.720000
|
||||
CVE-2024-28235,0,1,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000
|
||||
CVE-2024-28235,0,0,f9c80821f34b650e72ffd4fc2fa6535c9df1dafab141b6f3941dee35e5200ab7,2025-01-17T15:42:02.050000
|
||||
CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000
|
||||
CVE-2024-28237,0,0,6596ca9e95c7bbdbdf1ce7fad38ad1f3d78868edb778ee33c83d80a6c532886b,2025-01-08T16:22:58.707000
|
||||
CVE-2024-28238,0,0,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000
|
||||
@ -254220,13 +254226,13 @@ CVE-2024-29982,0,0,32bee63f46b19e8d6975cc6983b6808d51edf6687a8f1c8ed2a0a94e65adc
|
||||
CVE-2024-29983,0,0,344b9d2199881b2661a68e9af52fece38d7f15e18fcc01ca69668f2b65328c8a,2025-01-15T19:07:16.507000
|
||||
CVE-2024-29984,0,0,1e929976d60d8d8c80a8b4b034fd4acc9655224e09e9042f98560c9a35205d22,2025-01-15T18:43:37.357000
|
||||
CVE-2024-29985,0,0,95b40f746fa954c9414076d1fb815efea23aa50e94505fc471b09342077083a5,2025-01-15T18:43:11.970000
|
||||
CVE-2024-29986,0,1,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000
|
||||
CVE-2024-29987,0,1,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000
|
||||
CVE-2024-29986,0,0,c7a48b45fa85b2be350d14f1dcd7617f411bd376aeeadea5098cc879e7ab792b,2025-01-17T15:49:13.390000
|
||||
CVE-2024-29987,0,0,3db0be8e2e8e8950285668cfb120c3ef829f603d26ba54e6433e77c4a9095196,2025-01-17T15:50:06.500000
|
||||
CVE-2024-29988,0,0,fdcc2acd38f912b5ac21e5fcea047a785698bc825da3363822d605015d6209b0,2024-11-29T16:28:51.757000
|
||||
CVE-2024-29989,0,0,56c8da873d916d5205300f56ed402933d12560adf2d90e379890eed42730b04d,2025-01-09T13:56:22.663000
|
||||
CVE-2024-2999,0,0,2ad67e6bafa77ccafcc440f8e6b2fdd38c9778d3b6a3320578b33ffe57141c4d,2024-11-21T09:11:01.453000
|
||||
CVE-2024-29990,0,0,09bb0ef28e55e7dacd2c0d3199d83d74de19808b3493191cd8e55fd6c96d3414,2025-01-09T13:52:27.430000
|
||||
CVE-2024-29991,0,1,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000
|
||||
CVE-2024-29991,0,0,cd645e5ead4eec0ac48818b0a2222b1b5c15461a2165de3d056209f8c6933bd8,2025-01-17T15:50:57.133000
|
||||
CVE-2024-29992,0,0,644115a5ada5fd5eaed583dff910388cd7f6edd044c415d410798c64ac367a76,2025-01-09T14:45:52.750000
|
||||
CVE-2024-29993,0,0,8ee39683bcc6bbc416a9ae96b7bc55ff379fb32e28c9270e9552fcd426131466,2025-01-09T14:37:56.660000
|
||||
CVE-2024-29994,0,0,f65b69994d750908f737db869af19a3c1faa7da239f527bc4d8473a3cc86632d,2025-01-16T19:10:54.100000
|
||||
@ -254295,7 +254301,7 @@ CVE-2024-30051,0,0,5ec7db5e17e429ad755582fa5375a88e7eac6c3de3113f00754fbbb45b33c
|
||||
CVE-2024-30052,0,0,0c318c74f7faa87993deeda3866261297ec0ddb2746c0eda81dbb9b59e40e3d0,2024-11-21T09:11:08.930000
|
||||
CVE-2024-30053,0,0,65fd346c7990f2cdd0711ae82d91c16e78b5a16baa5880e2cffcb953ec779622,2025-01-08T18:09:06.970000
|
||||
CVE-2024-30054,0,0,208fd51c6e44baf0d897570f55f50e9e26e7f0682cb01924b044db6a064f4934,2025-01-08T17:57:54.547000
|
||||
CVE-2024-30055,0,1,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000
|
||||
CVE-2024-30055,0,0,7a063445f0c749e5121d2c630b4adf37da4d1e9be2032d4aa22099b62a50ba82,2025-01-17T15:51:50.370000
|
||||
CVE-2024-30056,0,0,347fe50793d58ce0b74c4538ee1704257557dffe94bc7f90d6a7514a4e57a2be,2025-01-08T20:20:05.590000
|
||||
CVE-2024-30057,0,0,ba33c9985864f7902ef361ee4e4e325819ac2bc85f178562cda86ff59e397ce3,2024-11-21T09:11:09.533000
|
||||
CVE-2024-30058,0,0,20262ca43dabc2c08aa015c0c48b80c60a8e2b5adb6e58d04501640e7acc003a,2024-11-21T09:11:09.667000
|
||||
@ -255923,7 +255929,7 @@ CVE-2024-32146,0,0,d7252d00cb33a5d498332bf97ef76d87efb5a38467744dde48f75adf29561
|
||||
CVE-2024-32147,0,0,0015a72344f3020594d938609bf1336e585f7e37db5d3978f4116a4c5b174873,2024-11-21T09:14:33.310000
|
||||
CVE-2024-32148,0,0,bcbcb84cdf067050c2de05f2b2117ff412680d783b9484863f82a8a6e2a92a10,2024-11-21T09:14:33.430000
|
||||
CVE-2024-32149,0,0,e0c6e240bf305db98fa85abfaf803a0c1cbaf878c7d8f6ce0402b338521663c9,2024-11-21T09:14:33.557000
|
||||
CVE-2024-3215,0,1,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000
|
||||
CVE-2024-3215,0,0,eebc8f122824f262d5800a68e017f8d1eb44dc50bf1d0f94588f4df85ee62b8c,2025-01-17T15:03:21.703000
|
||||
CVE-2024-32151,0,0,6ef8771c34640d7f13180ea9ea6a01f89209f8312db5eeac2c929f25738557d1,2024-11-26T11:21:59.167000
|
||||
CVE-2024-32152,0,0,17251408a63ed517f0bdd7cd945d039fc818a169725454c1d9b534ef050e436b,2024-11-21T09:14:33.683000
|
||||
CVE-2024-3216,0,0,6e9522f1c7c9e9a3f76fb9a1485b608987693fafdd4c6cd3272aed28685da99b,2024-11-21T09:29:10.010000
|
||||
@ -256723,10 +256729,10 @@ CVE-2024-33146,0,0,171629cc4b8cb62195d164515a6fed4d8999741d196bb0f46c6f160081fc7
|
||||
CVE-2024-33147,0,0,c2cfd2d98b97ea5fdcb835818c9cad8c555afacce5b3b33cc198b2c0c2ba88be,2024-11-21T09:16:34.300000
|
||||
CVE-2024-33148,0,0,2ee283993abecdd7aea3eb59900cb3b6cc9343c210c9948918a7a2beecc034d8,2024-11-21T09:16:34.530000
|
||||
CVE-2024-33149,0,0,d43e332631e90db62a378f49f2cf8a062308e47f9d7a2517b540f3e0dac713f1,2024-11-21T09:16:34.763000
|
||||
CVE-2024-3315,0,0,147f97c493fc524e9b618f92596e58ed1d424e789310fc8b1cc391b05a1ea242,2024-11-21T09:29:22.670000
|
||||
CVE-2024-3315,0,1,e98ec5c2219d8a677fdb86f16335eacd9f6d03801c8a70ecb07c7bf871cb992d,2025-01-17T18:13:08.297000
|
||||
CVE-2024-33153,0,0,481314339668aaf169249d85fd2b6e9627ecf80bba0d1e9713ac541257b23ab0,2024-11-21T09:16:34.973000
|
||||
CVE-2024-33155,0,0,fdf923dee29327949bc8bb3302e7b608f6177ab22c676a11a94533e29c6e2def,2024-11-21T09:16:35.187000
|
||||
CVE-2024-3316,0,0,e0385a047eae736d56fa7774a4819a8e38f51b8b96e680f666f810bc895aa910,2024-11-21T09:29:22.837000
|
||||
CVE-2024-3316,0,1,098aeca75fce567e175a1215c88d935de40f13c8ed1cdac936f1abcb274d6bf2,2025-01-17T18:05:50.107000
|
||||
CVE-2024-33161,0,0,bfd6ab00b53005b4160e045b162320b83cb8a5f21cb9faf3e3e69d505f0c9e2d,2024-11-21T09:16:35.457000
|
||||
CVE-2024-33164,0,0,4c5ec4d6c3445b968e7db0a41e1381ba58914545669a129a94c9838b9164e330,2024-11-21T09:16:35.903000
|
||||
CVE-2024-3317,0,0,2300ffb19702a15d6babc122c587a264a1a6930b14e95b1445b1a2f5a5cdb317,2024-11-21T09:29:22.997000
|
||||
@ -257100,13 +257106,13 @@ CVE-2024-33749,0,0,f12371c90977a51378783144de48785764dc249964e292b81c628eeced6df
|
||||
CVE-2024-3375,0,0,9705036410c25948012494141e27b48a4ee424b1500d49272b52c98930b4fb01,2024-11-21T09:29:29.443000
|
||||
CVE-2024-33752,0,0,303257eae9122abbdacdf0312dd251da9cbaf8817e28d2e256d7349a5b409390,2024-11-21T09:17:26.520000
|
||||
CVE-2024-33753,0,0,d6dd9a560aacef7fbfdb8e582f966b14086954aa85705d5f248034003e649ad3,2024-11-21T09:17:26.740000
|
||||
CVE-2024-3376,0,0,092de719ff3e0b505e3632d0bd47da3bcd5d657b0208533d3e02409827184b57,2024-11-21T09:29:29.570000
|
||||
CVE-2024-3376,0,1,d0b726129a0cb4aa357ddbea81c1414fafc204c7b2176615db21f058e6802519,2025-01-17T17:41:21.647000
|
||||
CVE-2024-33763,0,0,1e99603accd6dab0b74b0083676bbb54ce1319eb251cb7662607692e2fc57aef,2024-11-21T09:17:26.930000
|
||||
CVE-2024-33764,0,0,6af47bd6c4a3dca716e33159039af29ff3b524b01eaeb6a1f2c644c72e853c6c,2024-11-21T09:17:27.127000
|
||||
CVE-2024-33766,0,0,03eec9cc0fd600612d151defefb0e31ff4e0c9a3876ab639dc77d4c88cc5a358,2024-12-04T17:15:12.700000
|
||||
CVE-2024-33767,0,0,b80958f05e128719de0648dd8cae5c2d8a3e5faf8f3e970a0e7ab179c3bfc022,2024-11-21T09:17:27.407000
|
||||
CVE-2024-33768,0,0,6bfd88d3b1297a873ea532d4c8a7bbd94c13baa508d333d99b1c9978e541270c,2024-11-21T09:17:27.533000
|
||||
CVE-2024-3377,0,0,2f7b71339dc9c8a4dca130edf1c6e7db5d640bb443c45acc1b81e08e2d799f2d,2024-11-21T09:29:29.710000
|
||||
CVE-2024-3377,0,1,d8ca10a55411d4c80f26dc1944f5e959ac69d5da65bf6d27cff0d4b4c6ab3d94,2025-01-17T17:35:40.243000
|
||||
CVE-2024-33771,0,0,ed0b49470c65e3871d1940fa0b3cbacf7ab413d179c5d64a9d938d0a4abdc56b,2024-11-21T09:17:27.720000
|
||||
CVE-2024-33772,0,0,a6a00fe9413924c4a4b26071283f7474a04c107e4dee0d16d05d331c8ad95c1b,2024-11-21T09:17:27.913000
|
||||
CVE-2024-33773,0,0,56f82f3734f8ba835b2e983e98b73956fee4286b1269d584a86ea254d75725ee,2024-11-21T09:17:28.097000
|
||||
@ -257444,7 +257450,7 @@ CVE-2024-34153,0,0,0130eed18b1a9a87fe4a501a0193d13a00438732c37407da9f8fd10e2ff55
|
||||
CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16960,2024-11-21T09:18:12.633000
|
||||
CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000
|
||||
CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000
|
||||
CVE-2024-3416,0,1,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000
|
||||
CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000
|
||||
CVE-2024-34161,0,0,2c366ee1b57d461f68e85fe2d68570b44da9298dbc452eb855b30363fe2b90fc,2024-11-21T09:18:13.217000
|
||||
CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000
|
||||
CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000
|
||||
@ -257452,18 +257458,18 @@ CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b8
|
||||
CVE-2024-34165,0,0,05db88a6da35010dc20b3e8a9d223822b8683997a0c67d0b2d4f9d52b701ab91,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34166,0,0,b65e3f742ada4aa97bbad2fd2ef9b5642c8b234eddbb763ea26559729ad0d782,2025-01-14T16:15:29.033000
|
||||
CVE-2024-34167,0,0,b64f17228e82af8e3cfbfc8cc266e318fd2d8ce529ce993856d797ebadc36da9,2024-11-15T14:00:09.720000
|
||||
CVE-2024-3417,0,1,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000
|
||||
CVE-2024-3417,0,0,bdab5d917a48a8a1821c742aa73efca4bd901071499f9740f9ccc4c5be08a292,2025-01-17T15:52:40.257000
|
||||
CVE-2024-34170,0,0,5d43fe9fb1c0c5ca40611077a724b542eaa2e023bbe67fbf24d729c47b6470ee,2024-11-15T14:00:09.720000
|
||||
CVE-2024-34171,0,0,eebe78f5b25cec30dcd14a8f47bfb97c41cf65760a12406709beda21c627599d,2024-11-21T09:18:13.917000
|
||||
CVE-2024-3418,0,1,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000
|
||||
CVE-2024-3419,0,1,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000
|
||||
CVE-2024-3418,0,0,5b37f144b543ccf9c1fdf31235e4f0b08177daf6601d1970c61f41972a2c4f70,2025-01-17T16:35:52.327000
|
||||
CVE-2024-3419,0,0,5609ebee6b75427f51462c4bf1bad06b058fabd1f0b077b6421465dcf80625e9,2025-01-17T15:35:15.880000
|
||||
CVE-2024-34191,0,0,e746afd9a92f9dff6e4ada85c106d8b00b6270936c8e514e831f73fb24a6a2a3,2024-11-21T09:18:14.050000
|
||||
CVE-2024-34193,0,0,8446fc40425660bbb6c8faef1d786a3a74e2e9b3c7e39f75ac6bb75d99f360f8,2024-11-21T09:18:14.267000
|
||||
CVE-2024-34195,0,0,7b2b923be1f39c81e8f2094bddad2be6ed9b0bc12f72616acced47e2f24d4bcf,2024-08-30T15:59:08.873000
|
||||
CVE-2024-34196,0,0,2a0e6ad915887cb7c9651bb279549110d78b7b88d707afa20e4abe342cff21a5,2024-11-21T09:18:14.660000
|
||||
CVE-2024-34198,0,0,e2696bcaf016e336b09510488bbf039e6a5097a3cbd9eb67814b2f340c9fcdfe,2024-08-29T20:36:45.497000
|
||||
CVE-2024-34199,0,0,94c50635c16fea9c525571c62b1cb43b7f636cac29ea803ba2bd2ee61ce52389,2024-11-21T09:18:15.107000
|
||||
CVE-2024-3420,0,1,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000
|
||||
CVE-2024-3420,0,0,235e81ce2a6456b4c3528236b2b8cb675de7a5afeb31250d9470bf500087445e,2025-01-17T15:24:53.263000
|
||||
CVE-2024-34200,0,0,27e9d45db103eb5460a1a1cb3bfb76d60f31d6a9bd7b2a9bab39305be55f805b,2024-11-21T09:18:15.337000
|
||||
CVE-2024-34201,0,0,5bd793720e4992bf4857da402a400e18ebfefbdbaf38794a60325a551dacbd74,2024-11-21T09:18:15.563000
|
||||
CVE-2024-34202,0,0,cf9bad4b83a5394bd60c41bc93dcc1e3c923cf8f2ca02251f5f5ea3f115e28df,2024-11-21T09:18:15.790000
|
||||
@ -257473,7 +257479,7 @@ CVE-2024-34205,0,0,8d36985104ff5d5e120aea9cb4bce9e1f31a2da5102693a76352bda9c549d
|
||||
CVE-2024-34206,0,0,945078f994a796433d592f08bcc7a2ed915743a5f69a10a672d804d02d45662a,2024-11-21T09:18:16.650000
|
||||
CVE-2024-34207,0,0,ee087726f9078c9026d8651cbe397c80879d18133b733e62347b6235647be16c,2024-11-21T09:18:16.863000
|
||||
CVE-2024-34209,0,0,23a0086974f749b70babda4a61b3cd611f85f71fd52536d4fc99d9fef3a3a1a4,2024-11-21T09:18:17.070000
|
||||
CVE-2024-3421,0,1,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000
|
||||
CVE-2024-3421,0,0,d594bb52f1c58a8215d924dee019782aad3af0e674d642bbb0b31f04a7c91225,2025-01-17T15:22:26.840000
|
||||
CVE-2024-34210,0,0,5ab268367892a7ed66ca9f970f4f449d8840eaff0c9063f4a35282a4b3fd6034,2024-11-21T09:18:17.283000
|
||||
CVE-2024-34211,0,0,ac334ae6e5cb8a1d967262bc4c496b0210ce6d92661fd47d7167a29a9a7cc9dc,2024-11-21T09:18:17.500000
|
||||
CVE-2024-34212,0,0,f932dcb31169cf40186f594cc95fc35ae4efb6b9b581f9f5bcd98eca1d85c35e,2024-11-21T09:18:17.733000
|
||||
@ -257482,7 +257488,7 @@ CVE-2024-34215,0,0,e6cddb986c9b85172cf3b1fa1cc572977eefc052534144ada951fb8e0fa4a
|
||||
CVE-2024-34217,0,0,e75b7e7eac7040fd4961b5eeb39d860bff29689de9e80a56b29cd2f45991c310,2024-11-21T09:18:18.453000
|
||||
CVE-2024-34218,0,0,209c3963a8dea0aeb75193e0a4f4688e9c10ef53892b4d2abe98b260daca377d,2024-11-21T09:18:18.677000
|
||||
CVE-2024-34219,0,0,d04dc7f4bd443b20338ba824e66b3ed379623b6bac0958da54f08cfc0407971e,2024-11-21T09:18:18.893000
|
||||
CVE-2024-3422,0,1,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000
|
||||
CVE-2024-3422,0,0,c5e33d89fe868529516f307763b824bad88f241a3d369dba2ceec9edcf54bee7,2025-01-17T15:18:05.700000
|
||||
CVE-2024-34220,0,0,ea3b638a0ad7e7b5b21e6837c13d51fd0282a71ba173fdb7f01e6006ada82a85,2024-11-21T09:18:19.117000
|
||||
CVE-2024-34221,0,0,5bdb0fc79cd75e9a7f818a361c57194b1225b8358331fcf3592024f663afd166,2024-11-21T09:18:19.333000
|
||||
CVE-2024-34222,0,0,0c26215edbf7be7db1f1ad76aecbebfdeed9b1a3a427504e193a4c98f675c75c,2024-11-21T09:18:19.557000
|
||||
@ -257493,7 +257499,7 @@ CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4c
|
||||
CVE-2024-3423,0,0,d93fa2aa82d74348c343103dd41dfdcb78f23bbbf018959a0d2f38920066aca6,2024-11-21T09:29:34.370000
|
||||
CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000
|
||||
CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000
|
||||
CVE-2024-3424,0,1,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000
|
||||
CVE-2024-3424,0,0,e0718adbebcf95028a75e1d01668f5e86810db0c5f9d10c5b9f35accf22b943e,2025-01-17T16:39:48.853000
|
||||
CVE-2024-34240,0,0,a6cc74a4b7e6ac1ff4630f4dda1cfe0067255faac0d07ac084685fd926fc750d,2024-11-21T09:18:21.180000
|
||||
CVE-2024-34241,0,0,e6b9fe6b441390d6d7cebe002b321929ea0e881ede166ad6eb49a567d3b43c57,2024-11-21T09:18:21.420000
|
||||
CVE-2024-34243,0,0,ab2b6cc30302098b272d3d3616ac174369a493b8cecc500f7c3250ac61308f25,2024-11-21T09:18:21.647000
|
||||
@ -257501,15 +257507,15 @@ CVE-2024-34244,0,0,c0de0ab156df18aaf776b84719fdfc1b4932e2d3f59ca3253b2c3b8740d66
|
||||
CVE-2024-34245,0,0,e6fd27a6271a5f5585096a1b7b99399bdc11d0aefde030caef76f62e04f9a659,2024-11-21T09:18:22.043000
|
||||
CVE-2024-34246,0,0,3e22ad074fe9d91e948d79151371bfaf86765e202dbc830978a91d2fe9e4241b,2024-11-21T09:18:22.303000
|
||||
CVE-2024-34249,0,0,3dab1167fd4f27a134b3ac9112bd70fe01cb7720cfdffee84276a73a90df12df,2024-11-21T09:18:22.590000
|
||||
CVE-2024-3425,0,1,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000
|
||||
CVE-2024-3425,0,0,a90f5fd9482260993a1c666cc30b626f78264ee37c1b278b42d772c34fbba782,2025-01-17T16:43:20.130000
|
||||
CVE-2024-34250,0,0,9ed02b35edbbbb26b151553fdc0aa392154afe3a9b2196b878ecf4ad1d34aadb,2024-11-21T09:18:22.880000
|
||||
CVE-2024-34251,0,0,fd07ec3cb070a3ae80f69dded9157369c3f0df86b00ea0fcf962e7e317fa75d0,2024-11-21T09:18:23.187000
|
||||
CVE-2024-34252,0,0,3c13aff3fdad9ff41dabf1e45dc15b69fc8f7be09feb79dac572b3754bae489a,2024-11-21T09:18:23.470000
|
||||
CVE-2024-34255,0,0,d19f6d83e426b3cebffe58f2c412d7bd0aa9d6a92605a880b672c30923e8e6b2,2024-11-21T09:18:23.707000
|
||||
CVE-2024-34256,0,0,bc98fd7190fcd122da0b5cd3b0e20bec504d7930a3a44be4b14317b7d5a4dc9a,2024-11-21T09:18:23.973000
|
||||
CVE-2024-34257,0,0,9334e0dc917b4c810f0435df51ac13770da0c132d8236e8b356e47e3fecaec9e,2024-11-21T09:18:24.203000
|
||||
CVE-2024-3426,0,1,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000
|
||||
CVE-2024-3427,0,0,16acd00baaee8833427ce732a1683b4733501d48836096a2b47715bfe7bfaf47,2024-11-21T09:29:34.933000
|
||||
CVE-2024-3426,0,0,73be6abb7480d3dc75fa7179a8378ac5a00ffa797782a4fc7730e81f88b3bded,2025-01-17T16:56:52.770000
|
||||
CVE-2024-3427,0,1,6d2c58ef390e816481f4abfc3a3695a143bfb0d9c0cce52634f39617c254b53e,2025-01-17T17:02:59.153000
|
||||
CVE-2024-34273,0,0,b2d5bd0db28edc08b98857b038ad9abcd63178cec6ca2b16d62e526c095d82eb,2024-11-21T09:18:24.437000
|
||||
CVE-2024-34274,0,0,15fd2109f2bacc33eb25ace43e53125aefa94083620124221c093ea11690842f,2024-11-21T09:18:24.653000
|
||||
CVE-2024-3428,0,0,3038c9702cc204891c747b542f4612e219eee1881f1fe769520d370fc294fda5,2025-01-17T13:44:10.790000
|
||||
@ -259995,7 +260001,7 @@ CVE-2024-37426,0,0,3293d67bf998ead79e31c0d3ab1db91404f4d097e7d7c778732752052388c
|
||||
CVE-2024-37427,0,0,ca62e1a1fb136dd5921e721be945658c95f18d221b28bab4e797b9c114f2e12e,2024-11-01T20:24:53.730000
|
||||
CVE-2024-37428,0,0,e0967feb0808fdb437078244ff52b2d8e71358f0e68724f3d851c25c00e914b4,2024-11-21T09:23:49.880000
|
||||
CVE-2024-37429,0,0,5f8575bf5ff94ebcdae86f116fd20534f9071936711e2c54792c3462f65eb058,2024-11-21T09:23:50.013000
|
||||
CVE-2024-3743,0,1,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000
|
||||
CVE-2024-3743,0,0,cbbaba2349ad95e3e1f0e168451b11bbaf4d8b8fb6234bd916a79a6edcb6b4d4,2025-01-17T15:03:47.047000
|
||||
CVE-2024-37430,0,0,ddd123a7460cd354e7c0ed943ed5fc44297b333202a2cdd449df9cadc0cb77ba,2024-11-21T09:23:50.140000
|
||||
CVE-2024-37431,0,0,b496291512c08284b73bb4e9ff47c34844386c77487b67fd4a8733b21890f892,2025-01-02T12:15:19.650000
|
||||
CVE-2024-37432,0,0,aa8f36053b0942c9c26f582f8f5dd0c866a94355bfb57fd6a4fbe735eb72ea35,2024-11-21T09:23:50.263000
|
||||
@ -266164,6 +266170,7 @@ CVE-2024-45827,0,0,14b2e3c223bee3e57f3f499ba2a6632d8d5cb7e001c1dd0d7aff42ddb6920
|
||||
CVE-2024-45828,0,0,73bbe0dd60535323b4b9452d4adddfba7eb9c9fe8494d20ce8a68ff41c4895cf,2025-01-11T13:15:21.450000
|
||||
CVE-2024-45829,0,0,ab7f0021bb7a93beaac116d04129f4163df742a680ddbc4de2302713f584254c,2024-11-05T19:38:57.827000
|
||||
CVE-2024-4583,0,0,785a5bb3a36957836b7a383b7765b0b67cf9852b800aeb286c820ff0407ffb78,2024-11-21T09:43:09.317000
|
||||
CVE-2024-45832,1,1,d75bfc3e389f08270f7efbda4f6a9926c8035de2d7487181b2202066be5a30a1,2025-01-17T17:15:11.870000
|
||||
CVE-2024-45833,0,0,ae7b140338ecffbe1ee920d82db8b77234d8b98166b6071308a3a15f45eb4089,2024-09-23T13:43:42.073000
|
||||
CVE-2024-45835,0,0,702ff79a19ec21ea639e2383e91f88244f4dc786df2938ac17e866b8515461ee,2024-11-01T14:20:56.350000
|
||||
CVE-2024-45836,0,0,5680ea0def6f9713e80f70cc8753dae36b28506dd79a8f561bc910ac3bc36a66,2024-10-03T00:35:53.797000
|
||||
@ -267760,8 +267767,8 @@ CVE-2024-48120,0,0,b0e650c739b138b707281499471fca0d2a4e71d5ab6d1ef4874ee3da12ecc
|
||||
CVE-2024-48121,0,0,3214bee7da8e3f509f7412f3e279397011d850b12d106151290f87bcfd743976,2025-01-15T21:15:13.063000
|
||||
CVE-2024-48122,0,0,ef4dbe73ddcbe3747d75bc0f305c7993ceeca917a7b17b9ddb38c3b776858056,2025-01-15T21:15:13.200000
|
||||
CVE-2024-48123,0,0,1ce64456a782985d4c9c698673e093b6139525cfb44a23952e0fe7744f609606,2025-01-15T21:15:13.340000
|
||||
CVE-2024-48125,0,0,c3755bd226434427c2b180f569b2230179d5af35e7843e7c981f9561e09afddd,2025-01-15T21:15:13.477000
|
||||
CVE-2024-48126,0,0,a82082fdb76a284967c26fe2fcc716154230021a5b401682f7689f4e75b72428,2025-01-15T21:15:13.613000
|
||||
CVE-2024-48125,0,1,52b4c432cd9d44248f4716ba7255cd00638eb9bcc133a6e2c0153681beb1d818,2025-01-17T18:15:25.547000
|
||||
CVE-2024-48126,0,1,39da822ea5af8f88748dbe07438d4c6a18c6f0004db8538062615ee5258f4755,2025-01-17T18:15:25.800000
|
||||
CVE-2024-4813,0,0,53589647721842c051dd9f712ddb32f92956eced2bba5aa7c708a955b3cd0fb3,2024-11-21T09:43:40.333000
|
||||
CVE-2024-48138,0,0,1cf669aa62b7ce9fd297b61c1300f02586ab21a6411386c8391a654aac137760,2024-11-01T12:57:35.843000
|
||||
CVE-2024-48139,0,0,1d758cb962b76524a06521373672f481daf5d3617952ffba3fa119154194d14e,2024-10-25T19:35:12.730000
|
||||
@ -268309,7 +268316,7 @@ CVE-2024-4913,0,0,8f1077ca1f909bbf49b8f2a274026fe5a87623cec281204da7efc615ad191b
|
||||
CVE-2024-49132,0,0,a869c7f291d5f7192227780fdd0e95f330808e8aa6cad44f6af8f94cb45de649,2025-01-14T17:48:33.683000
|
||||
CVE-2024-49138,0,0,286dc37677622c63dcdad4f86c15d7e8b98bbb3aa097b7516a11d8c38b7b5d16,2024-12-13T18:09:53.140000
|
||||
CVE-2024-4914,0,0,c1e4acb17def81a0854cc115da953100335e1c8f9a391685fb384320f3256d4e,2024-11-21T09:43:51.437000
|
||||
CVE-2024-49142,0,1,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000
|
||||
CVE-2024-49142,0,0,ac3f0e339c64577ee94c5cce8f7af0a14953dfe9dfcf0444a49b9bca8ee7873a,2025-01-17T15:09:15.647000
|
||||
CVE-2024-49147,0,0,6fba53ba9d6b385fdc5b31747e6fa75096746742b3ab2cf525cf8f2b1550ed5c,2025-01-10T18:09:53.377000
|
||||
CVE-2024-4915,0,0,0db50bbbf81e6509cf2f04f7c74802ee1539c5988eb17e78bcc8e3a916243d8d,2024-11-21T09:43:51.583000
|
||||
CVE-2024-4916,0,0,46062bb382c89200b166e2e86c9831624440cd917b76f7208234261e0e99e402,2024-11-21T09:43:51.723000
|
||||
@ -269571,7 +269578,7 @@ CVE-2024-50626,0,0,ee346cb1a02e9d6ceaf318c396c6bbfc04e63993edcd6528fb39c33b5fb34
|
||||
CVE-2024-50627,0,0,54f35ecd4423ba348ca66129853a9258eaef3460345ced0ea32309ba3face4cb,2024-12-11T17:15:17.200000
|
||||
CVE-2024-50628,0,0,0643f111de6b649c82d0d465a05ff1bea2d7a2ca8f3d6abb1fa505b9869b41b4,2024-12-11T17:15:17.350000
|
||||
CVE-2024-5063,0,0,d66483573e96022ccfb509c4cd99c3f2ab64b3e900fde1922f4af776a81cdb65,2024-11-21T09:46:53.250000
|
||||
CVE-2024-50633,0,0,bffa469638f740cac5bce5ceb980b8f0c4d11ecde1ec474e9ebfaf88e77990a1,2025-01-16T18:15:24.337000
|
||||
CVE-2024-50633,0,1,d0153926c6a02e76397a49275cdaba4d567a050b25f3435171b670652de25f8e,2025-01-17T18:15:26.043000
|
||||
CVE-2024-50634,0,0,75c75741b4ff07a7223817b405561d2122b2e965df2d36431c234973c9416179,2024-11-14T20:40:43.690000
|
||||
CVE-2024-50636,0,0,35ef03dd8175dba345c3fb32a6b071a45c850c144fdf90f5aef46a21c35cb9c9,2024-11-19T19:35:14.833000
|
||||
CVE-2024-50637,0,0,d977347a448c3f65e92048b639a2e3e6ff98b542be1611660d9dca9c5510503b,2024-11-07T14:15:16.780000
|
||||
@ -269686,13 +269693,13 @@ CVE-2024-50947,0,0,b5c008650b1de4762f100f17a965e455e14b58a340b5da1077acb62ce0721
|
||||
CVE-2024-50948,0,0,a83a95d033c1f852658f7838a2af99f42aaba2f1b7026fbced6a0131c0382cea,2024-12-04T22:15:22.627000
|
||||
CVE-2024-5095,0,0,435f4b1943c8e810fb8465989f6b408e8982e554cc5e9afb3bd58dc0f211a716,2024-11-21T09:46:57.340000
|
||||
CVE-2024-50953,0,0,aaae13e550df547900d535976c765e7cfcbd4c5ca420ae827af2927bdbd375a0,2025-01-16T16:15:31.227000
|
||||
CVE-2024-50954,0,0,477775d2966f5589398f5cc34462d3c653cd70d54eda8068d474e05199a05ce7,2025-01-15T17:15:16.517000
|
||||
CVE-2024-50954,0,1,18bee49920c53fb8283b1524ffbd022141797de9d8bf6bf69cc613e4bb16be47,2025-01-17T18:15:26.310000
|
||||
CVE-2024-50955,0,0,b7968787a5cfb7ac17e9f82a1b15116d586dfbbc8f589b423fc4833d2d57ec69,2024-11-21T22:15:09.370000
|
||||
CVE-2024-50956,0,0,cd8ccb18453c11262209c6e4973c32ca207270a933eedc52f0d4a58126b3fbdd,2024-11-25T20:15:09.383000
|
||||
CVE-2024-5096,0,0,daa79798869c51db70b1632345a0375a73fb203efe69c41a72ad3f88eb45ffa1,2024-11-21T09:46:57.483000
|
||||
CVE-2024-50965,0,0,bbc6a73cd1df7f436fec355cc047fda3682a22f2410fb27edce07ce2659c6e83,2024-11-22T18:15:17.690000
|
||||
CVE-2024-50966,0,0,8759d183e73952bff599171ed5ad82ca5c1dd2759a5c3c752a1139d7e8657cee,2024-11-08T19:01:03.880000
|
||||
CVE-2024-50967,1,1,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000
|
||||
CVE-2024-50967,0,0,589ebd6191f76ed94425205288f44cae53f55dc05cbb669a22f2f9923cf99b93,2025-01-17T15:15:12.313000
|
||||
CVE-2024-50968,0,0,78b03157ec5aa0254f7c1725ce9821a722c029c0393b3cb5157be12ac87dda1f,2024-11-20T17:35:28.470000
|
||||
CVE-2024-50969,0,0,942a1110d4bba45b7082f409f1f8ba045dde6ceb8185c473e2c03a45d00fb696,2024-11-21T09:45:02.800000
|
||||
CVE-2024-5097,0,0,38195c0534e73d2ad413d1039a29854ec06ed3467b0a0463cfee2c9d3a6d6ccf,2024-11-21T09:46:57.623000
|
||||
@ -271389,6 +271396,7 @@ CVE-2024-5368,0,0,0267b73ce86fd5c42a4c0cf503f4bdead8427924f402a3554f435c1bc916f4
|
||||
CVE-2024-53680,0,0,8f6a0e7e0ab328aba846c45a5169e8953dc6dbfca85d9cca37f56439e3715008,2025-01-11T13:15:25.710000
|
||||
CVE-2024-53681,0,0,b5981a5f23a050c58621754137465bbe9a27a78bd67559fa015494e5b655da4f,2025-01-15T13:15:10.963000
|
||||
CVE-2024-53682,0,0,8fff7fe6ed56d7be9465617e7f5434428ac8e26e2cf3262f7b6c754f477833c1,2025-01-11T13:15:25.860000
|
||||
CVE-2024-53683,1,1,8ed3f44393e22eea3f080e26403389aa2eeebf5c0860ee00e51eb42f73e4ab91,2025-01-17T17:15:12.053000
|
||||
CVE-2024-53685,0,0,f14f882249b9db19115e9f5bd40c211ab0535cda9ea0386cce46e0a1a952c567,2025-01-17T14:15:32.120000
|
||||
CVE-2024-53687,0,0,db69b3a3aa7d0b6527150d997ca94f951ff7fdd68c92c6f81dd6f27f46185a16,2025-01-11T13:15:26.120000
|
||||
CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000
|
||||
@ -271697,7 +271705,7 @@ CVE-2024-54098,0,0,fcf0a7b4b42a408ef14e2cdd83601e83ad8a047dacc93336f07058716f90e
|
||||
CVE-2024-54099,0,0,256f48ffd68ad9fa5138803838c0141f4287c0f26c618e01fad47b5eef64495e,2025-01-10T18:29:23.150000
|
||||
CVE-2024-5410,0,0,cce7b181ee3076dc24a31460b418b1921efa7dac4bb8604c266edd1c195e07b4,2024-11-21T09:47:35.930000
|
||||
CVE-2024-54100,0,0,40cea7c72a838645d4d4129dd8cb348c8ad2f756f8f2e526c035f7424171b78f,2025-01-14T18:32:54.897000
|
||||
CVE-2024-54101,0,0,b28cbee4fde9c770888478d7d50338a6e8959ae8cd4abd6f917e1c088fc4ab93,2024-12-12T12:15:23.763000
|
||||
CVE-2024-54101,0,1,8efc0d479ad38c214523a161299fa1bc431fa727996542f76023b3a82305d936,2025-01-17T18:09:53.447000
|
||||
CVE-2024-54102,0,0,321dcb146364267c789b6dd20cd279989263c444f9a47d81a6e8ddb19d3e09d0,2025-01-14T18:04:39.450000
|
||||
CVE-2024-54103,0,0,521378467b2ba6dcd27ca36115f9ecdab36f5f26a2021270812eb31426c0502d,2024-12-12T20:15:40.217000
|
||||
CVE-2024-54104,0,0,b5d2bab146798e653b7f0c16aaf328d32a4beaf04fab7d328eae5e47092e960c,2024-12-12T20:16:31.800000
|
||||
@ -272077,7 +272085,7 @@ CVE-2024-54529,0,0,be90cc5d5d809d1a3746b39c45f75d946f866e9a1f3852b3648566e8b40f1
|
||||
CVE-2024-5453,0,0,a2ec805a779750f157f5864949edd755631f777b8533cba1597f48b2163330b0,2024-11-21T09:47:42.923000
|
||||
CVE-2024-54531,0,0,4ac4afc6f09e7ffcf7b8ffd70d60f30d481febc6558e33c0b30a021721851ee6,2024-12-16T21:15:08.113000
|
||||
CVE-2024-54534,0,0,0a85dec86735f55fea4f61a67c35ec7283b453bf2b186b2f2a85ccae12df64e3,2024-12-13T19:15:09.890000
|
||||
CVE-2024-54535,0,0,be256317681c38b876d8afffa28833fae912c494d09f5fe9974200b1678cbe2e,2025-01-16T20:36:12.483000
|
||||
CVE-2024-54535,0,1,206bf99a3aa890b83364e2d0aff86c3b8f6596e8472b76b2fdf32b4a4989a18f,2025-01-17T18:15:26.610000
|
||||
CVE-2024-54538,0,0,7edb6abe162912ee005c390ccfee8e5c4c4cb96a25890eec5d650424cab9c014,2025-01-06T15:11:09.817000
|
||||
CVE-2024-54540,0,0,cec5648fa22fe0cc733814d4be0bb9219cc980c202703a2aa5266fee5fe4c719,2025-01-16T15:15:13.697000
|
||||
CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000
|
||||
@ -272103,6 +272111,7 @@ CVE-2024-54677,0,0,7738db23e6dfe0ca7bf4e6721884297e1312bf0f9f87462addf38007bea25
|
||||
CVE-2024-54679,0,0,381ad7e6890c67d9b6c47b47a43cd175dd5b1319ea7d6b78a90445a532dafd14,2024-12-06T15:15:09.693000
|
||||
CVE-2024-5468,0,0,83f1a353a5b95b83c36aafd7fb0e880d8454855ef6bbd816a181cff50dcb4279,2024-11-21T09:47:44.527000
|
||||
CVE-2024-54680,0,0,23c42810796888c623043dfa17bf2c05e67e8cb1f0dd95a5d3bb0378d9b39a60,2025-01-16T15:17:54.520000
|
||||
CVE-2024-54681,1,1,253e5dec99c9346d03e651bfd86679c7c1afa29b9d10690c2c2c73d3edd05e49,2025-01-17T17:15:12.227000
|
||||
CVE-2024-54682,0,0,014e168d2df7708ff5f91a3c7e1142a04001293f3734328797e32d8f370d3481,2024-12-16T08:15:05.513000
|
||||
CVE-2024-54683,0,0,35ec2d70086ae912ff4eae7d82bb097dcf57dbd99c9eaf862ef970893175a37f,2025-01-16T15:18:09.453000
|
||||
CVE-2024-54687,0,0,edfa64742c2d4dcf37d41c46572e277e022b38f127cbca49510f62103a2ed788,2025-01-13T20:15:28.927000
|
||||
@ -273168,7 +273177,7 @@ CVE-2024-57159,0,0,15583a75064e55d87bf75fed70e73d79d360d20391d0e99a0f639f7334a51
|
||||
CVE-2024-5716,0,0,3d427df7306e5a73dc01967e843a1c8b689a272b3aba62391281a97b5c9d3d70,2024-11-22T20:15:10.100000
|
||||
CVE-2024-57160,0,0,cfd418c2294a4aad4ffaf0f6e6c02c6c9c462f90fd047701ea5321fce5ab1453,2025-01-16T16:15:32.817000
|
||||
CVE-2024-57161,0,0,7d001b6ede91e7126dba3cd73d4b23f42855fc1336561bd2cb109c174d7ee6df,2025-01-16T16:15:32.937000
|
||||
CVE-2024-57162,0,0,b1e0cf18e266cbe55d44930aeeee1d897cfa1bcb86f690acd1626cef8a0545f2,2025-01-16T16:15:33.063000
|
||||
CVE-2024-57162,0,1,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000
|
||||
CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000
|
||||
CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000
|
||||
CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000
|
||||
@ -273225,21 +273234,21 @@ CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff117
|
||||
CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000
|
||||
CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000
|
||||
CVE-2024-57575,0,0,0325e9b9beebc39d453bf2fb98a790fc58c0448755bf827de5d20c6d07a85690,2025-01-16T21:15:16.537000
|
||||
CVE-2024-57577,0,0,86ceef2dbb95c37e54c3b90cd4d3ebd8b74724e0a4ac66d71462560ea6c0aff6,2025-01-16T21:15:16.740000
|
||||
CVE-2024-57578,0,0,a8a3c07649abdae35839bc68d147c5787c95c3770dcd835902b0c2ccfa15a666,2025-01-16T21:15:16.893000
|
||||
CVE-2024-57579,0,0,5ba17d368e5dbe193f489ec4d6c9a22186058bf13a707672ef5429e8fb28ede2,2025-01-16T21:15:17.057000
|
||||
CVE-2024-57577,0,1,bae775b370a8acb307c4cb68af424e3eba8ab59b46dde10579b517ba186c6837,2025-01-17T18:15:27.893000
|
||||
CVE-2024-57578,0,1,c3279c5dafbf0cdd4403337b162aba3068d6b8d4f0424f16fe98dbf2bcb27771,2025-01-17T18:15:28.430000
|
||||
CVE-2024-57579,0,1,0233c9ac7198ab370ea173147491e5d577f0db0cbec488179ef90a735ff73434,2025-01-17T18:15:28.983000
|
||||
CVE-2024-5758,0,0,c078716fbf80b259c8ceac06415d3d039d4ef773f8ae701649c6b0b1483ee99e,2024-06-13T21:15:57.543000
|
||||
CVE-2024-57580,0,0,40ce06b8b3bad391b0423dce669bb66461a68e864c0ab61b351a2049f79d8d33,2025-01-16T21:15:17.223000
|
||||
CVE-2024-57581,0,0,ba8a50519c95b9165041173ef8a2abb403c689b63326baa2909a14502c81be34,2025-01-16T21:15:17.437000
|
||||
CVE-2024-57582,0,0,1d36287388fe01061acd621e5fd71ef6ba928983d1172795a92a2d624d34f9cd,2025-01-16T21:15:17.627000
|
||||
CVE-2024-57580,0,1,bdb0b94b78717db32044fb1ebf152be16356daef98584c7a2fbebb19f878301b,2025-01-17T17:15:12.410000
|
||||
CVE-2024-57581,0,1,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad2e3,2025-01-17T17:15:12.597000
|
||||
CVE-2024-57582,0,1,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000
|
||||
CVE-2024-57583,0,0,0a9b32a2c9e5a9aa7a9b9841c10dc898724b6f12184bcb5639e412fb8b164e68,2025-01-16T21:15:17.800000
|
||||
CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000
|
||||
CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000
|
||||
CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000
|
||||
CVE-2024-57611,0,0,6fae1f378c2de7211d8601642d793b718892b838d45e3641195667b838c7ac2a,2025-01-16T16:15:33.893000
|
||||
CVE-2024-57615,0,0,3b154d15d9d342606b70482eb9cc2d6a4cc130a8065aa7d0da89540a1bd1ede9,2025-01-14T01:15:09.833000
|
||||
CVE-2024-57616,0,0,7470c60d8605d9c063b37e649a0109bc38842816df47856772ca2131f8a175f6,2025-01-14T01:15:09.947000
|
||||
CVE-2024-57617,0,0,216302b4e1a3d5a8c021085fb6cfebcd9359b852e85ad845706a7528c42cb425,2025-01-14T01:15:10.060000
|
||||
CVE-2024-57615,0,1,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000
|
||||
CVE-2024-57616,0,1,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000
|
||||
CVE-2024-57617,0,1,fc37a9143f7697345ef8ba885edb5924334e0ba6c92722d5e2e2d86f18a312b3,2025-01-17T18:15:29.803000
|
||||
CVE-2024-57618,0,0,71f87f6663ee1ef40a6261800f5cbef1a4e202c68cadd758bd9595ac1ec388f3,2025-01-16T21:15:17.943000
|
||||
CVE-2024-57619,0,0,ce9b917af0f01e2c94f858dbfb420a55aded7c18073a3201f781d8208b5592cd,2025-01-15T17:15:18.470000
|
||||
CVE-2024-5762,0,0,c0d3df55e57fc9acf7b150356443c67a5f0ff2ceca17905a4d2ee526faf1413e,2024-08-23T16:43:19.497000
|
||||
@ -273267,7 +273276,7 @@ CVE-2024-57639,0,0,81c18119d0796036207b52600fc301d317795cf7d5d03a2144ee581f0cbeb
|
||||
CVE-2024-5764,0,0,b7612214e0b4c36a7adafd04d08b4fff0bd1bfea33c567d6f09d0bd135904604,2024-11-06T16:41:00.277000
|
||||
CVE-2024-57640,0,0,823f369a4e2512904de0df496d9844ebefb1caff102a1b29f5249371b8eb5e9b,2025-01-15T16:15:30.570000
|
||||
CVE-2024-57641,0,0,6e122f8000b5036a35ba9684cd03b685662827038107eaaf29a6c154497ed980,2025-01-15T16:15:30.750000
|
||||
CVE-2024-57642,0,0,5d41527b8eba6a05efbeb7957f944b909619e65db0c2a503a1ffa7feaae96b0d,2025-01-14T01:15:12.873000
|
||||
CVE-2024-57642,0,1,071107a624b8ce997fd26421425efc402383b312771c18eeb873b78aa96ffdfa,2025-01-17T18:15:30.030000
|
||||
CVE-2024-57643,0,0,ba698b452eaa8706043a8e92fd8ea179cc020ce88d0d466280f0183a4e4e911c,2025-01-16T16:15:34.030000
|
||||
CVE-2024-57644,0,0,914574fe0b7a114777c2567fd96e73785d33e0046c4e449438fad7358a5594a5,2025-01-15T16:15:30.943000
|
||||
CVE-2024-57645,0,0,e6113a0ab42f5baeb6ef1e12e65104eacf5948c5f09dd54b54f3011c787894d1,2025-01-15T16:15:31.120000
|
||||
@ -273327,7 +273336,7 @@ CVE-2024-57764,0,0,3cd9e45ed954c368ca54c9cbce60c96dcde31d52c07d079203117bd00108d
|
||||
CVE-2024-57765,0,0,6f15a3a607d40a0f75d69003588b78a560775ad59d258daea1d42c4f28b5e872,2025-01-15T00:15:34.323000
|
||||
CVE-2024-57766,0,0,e0e048b4421fccb07d8708542e32dcef1a59cbb8b6e613b7067f5ff9210d3a7b,2025-01-15T00:15:34.433000
|
||||
CVE-2024-57767,0,0,4f47def2a552fd83c7f1d4d6e4ae3f549133dbbf6dd763e021c9ec2612ee896f,2025-01-15T00:15:34.543000
|
||||
CVE-2024-57768,0,0,dfbe7adf9c1441490d4a473b51ff96f30462e0fe2c48818a67e3bff0cdd4d06f,2025-01-16T18:15:26.003000
|
||||
CVE-2024-57768,0,1,e00f69a24549670426cf3162728515b005047dfd2006716c80c3c15216823f81,2025-01-17T18:15:30.633000
|
||||
CVE-2024-57769,0,0,aea34cf08a50e96f92a70cd4d77c89677f767e9d8b6997dc91b80d05d2f4ccd4,2025-01-16T18:15:26.240000
|
||||
CVE-2024-5777,0,0,36540573098e4e57e2480cda4540050e04f465dce04feabfdc311a1dd5bf4bae,2024-06-12T08:15:51.113000
|
||||
CVE-2024-57770,0,0,8a53671804fae0721e612ad4b61e46de8b57d7cd0199ba1a2b0e09a6e9e11664,2025-01-16T18:15:26.477000
|
||||
@ -276719,7 +276728,7 @@ CVE-2024-9669,0,0,01f51557b08d693308fd168dc79c271cc8144ffce3e2ae9dbbb591d8bfa035
|
||||
CVE-2024-9670,0,0,bfd2d3b76924bcef9fde3b4b6223f9e716f28991a60568363900e08f18fbb441,2024-10-15T12:57:46.880000
|
||||
CVE-2024-9671,0,0,8da8355260be5bb56e0e5351a4b43035f95e0a0ad3494b67b9bb7fbd8d577c66,2024-12-04T08:15:07.357000
|
||||
CVE-2024-9672,0,0,061e80a15aeea3b03a12d8109775a38b18a9082ea48b25cd40a1b2c0322c9214,2024-12-10T00:15:22.893000
|
||||
CVE-2024-9673,0,0,160515eb8f09fd336d7ce6380098aac12ba2c5c30d65868d874d0b5bf3432905,2025-01-08T07:15:27.980000
|
||||
CVE-2024-9673,0,1,c836764540f1e4671a3678fdc4656eb5e3fdeb2561ecec798df30be3de129dbc,2025-01-17T17:15:12.997000
|
||||
CVE-2024-9674,0,0,dcc152f68b1f7c703678ea1798dc92c1fa87e3588d3559438d5c688c6e83e0d4,2024-10-22T14:02:50.473000
|
||||
CVE-2024-9675,0,0,e9c4b6e85b7ecac779c2e255c4d61b9639221ef958972d67d9f8fb136bf98c92,2024-12-13T18:15:22.507000
|
||||
CVE-2024-9676,0,0,f274ca1f33ebade4ed690e9a2c29367dd55071e678cc70655f57d1ab479c60a8,2024-11-26T09:15:06.820000
|
||||
@ -277136,6 +277145,7 @@ CVE-2025-0408,0,0,a96acf9e81a811691f8b520b286233eef15e7059c8d8320ce584a1b7a8c2ed
|
||||
CVE-2025-0409,0,0,5b16b7910d2f3bb912034acec9ddfb80ff7cbc22bd69b75269b1a49c27f02634,2025-01-13T18:15:21.430000
|
||||
CVE-2025-0410,0,0,5453cf245c45b2e030c2d84dab023e8fd21c521b8dd76be3a4a1bd41b630f4d8,2025-01-13T18:15:21.730000
|
||||
CVE-2025-0412,0,0,bfbf47e0956b1bfccce4c3a829b70c8095a189edb5636c3ef3ebd81177784d3c,2025-01-13T04:15:06.477000
|
||||
CVE-2025-0430,1,1,3df411857494f23f4104c7f6ca6fdc22130d91a76d6c4544b3161220203412c9,2025-01-17T18:15:30.920000
|
||||
CVE-2025-0434,0,0,6b09fdee4a1c3fd4134245b9fe1d0b966b891282ee9f6481cd52455196ff3273,2025-01-15T15:15:14.273000
|
||||
CVE-2025-0435,0,0,12a908c6bc976560385e7102d635ad66ec30f16edcaf6473415ff2f9c1a74a6e,2025-01-15T15:15:14.430000
|
||||
CVE-2025-0436,0,0,857240181b7b3c09b957ab2dbad6e416781a51bbb4f39b3bb16f673e65f24a93,2025-01-15T15:15:14.620000
|
||||
@ -277183,10 +277193,12 @@ CVE-2025-0501,0,0,fbfcc714bfa842cdf14ebe8af7abc835756e267ba83725e6c74f3794f29c65
|
||||
CVE-2025-0502,0,0,3f983c4e65bc0e78af8f9f866ec1bd6cbe586e74611a52dc0d65bfadf6586674,2025-01-15T18:15:24.650000
|
||||
CVE-2025-0518,0,0,f6f7f54f47c0cc56f86ba02b126d49c24a3e7530d58da45540d2064eda773818,2025-01-16T17:15:12.577000
|
||||
CVE-2025-0527,0,0,d2b51becab8c01f94a687e28d364a879eb752a601305b6821988eb5f9c5bbc2f,2025-01-17T14:15:32.840000
|
||||
CVE-2025-0528,1,1,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000
|
||||
CVE-2025-0529,1,1,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000
|
||||
CVE-2025-0530,1,1,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
|
||||
CVE-2025-0531,1,1,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
|
||||
CVE-2025-0528,0,0,6c404f196d5f78f3d36dbdeae73139303627cc7e51e1d652340c0b4eab91a824,2025-01-17T15:15:12.430000
|
||||
CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266bd,2025-01-17T15:15:12.670000
|
||||
CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000
|
||||
CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000
|
||||
CVE-2025-0532,1,1,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000
|
||||
CVE-2025-0533,1,1,00c854b2342ff9edb13ef61155d7cae29025b472a6af5e1d39d09a6ad67d9690,2025-01-17T18:15:31.577000
|
||||
CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000
|
||||
CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000
|
||||
CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000
|
||||
@ -277360,23 +277372,23 @@ CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb
|
||||
CVE-2025-21360,0,0,1f25a63fd6925175ed8d8d2e1f8b5dc753b0e006a806367a61359ecb27a1425f,2025-01-14T18:16:01.470000
|
||||
CVE-2025-21361,0,0,804d0233cc132fe798add3b592d7f7064997d09b5448edddf8d4a0a9f30d78ed,2025-01-14T18:16:01.637000
|
||||
CVE-2025-21362,0,0,f17a56e11ed70d97b1fec4ab21c8742e9afb6632f3e2d692fb4aae8c406af704,2025-01-15T00:15:43.533000
|
||||
CVE-2025-21363,0,1,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000
|
||||
CVE-2025-21364,0,1,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000
|
||||
CVE-2025-21365,0,1,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000
|
||||
CVE-2025-21366,0,1,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000
|
||||
CVE-2025-21370,0,1,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
|
||||
CVE-2025-21372,0,1,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
|
||||
CVE-2025-21374,0,1,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000
|
||||
CVE-2025-21378,0,1,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000
|
||||
CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000
|
||||
CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000
|
||||
CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000
|
||||
CVE-2025-21366,0,0,a59588c0dfff3655b9552370538e4464b57213529c36230194728bdd056ea6c3,2025-01-17T15:12:20.677000
|
||||
CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64fb9,2025-01-17T15:33:41.967000
|
||||
CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000
|
||||
CVE-2025-21374,0,0,647c2786031d8d5e656a7f7a9897fa7fdffa380202d1a48a0e8645650230f151,2025-01-17T15:39:11.143000
|
||||
CVE-2025-21378,0,0,8563cdc4f723521e024d93d0f16be451079ad89ee525de26bf7cf2240043c88e,2025-01-17T15:42:41.810000
|
||||
CVE-2025-21380,0,0,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000
|
||||
CVE-2025-21382,0,1,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000
|
||||
CVE-2025-21382,0,0,3c6d5b43ac1fffd63bc71b85e6cb04dc92fa63d60f606431672c7237b3224fe0,2025-01-17T15:42:09.233000
|
||||
CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000
|
||||
CVE-2025-21389,0,1,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
|
||||
CVE-2025-21393,0,1,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
|
||||
CVE-2025-21395,0,1,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
|
||||
CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000
|
||||
CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000
|
||||
CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000
|
||||
CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000
|
||||
CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000
|
||||
CVE-2025-21405,0,1,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
|
||||
CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000
|
||||
CVE-2025-21409,0,0,3bf5836a71fbbaa0695b5c54fccc80deb4b92732317730f3aa826e45ebb1b888,2025-01-16T20:33:29.353000
|
||||
CVE-2025-21411,0,0,d2e29cedca2f1fe913d6878a152d5e3cf8623634997c4c44b466ea286fc6f7de,2025-01-16T20:33:43.177000
|
||||
CVE-2025-21413,0,0,92246b94b6ff8ad6af923e8c9e956388783c15bc49ee5b2dd584abbbec41314d,2025-01-16T20:33:54.607000
|
||||
@ -277684,7 +277696,7 @@ CVE-2025-22824,0,0,fb201e5b5828770ff11d00a29d3f8e00f0da01f397b44ffb8e7c8ad29623f
|
||||
CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000
|
||||
CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000
|
||||
CVE-2025-22828,0,0,146919e8038c633aebea97dab991ef56f9be23b958183120e0167c3ba087763b,2025-01-13T19:15:11.373000
|
||||
CVE-2025-22904,0,0,0d689dab7d93efe5e3619f41b65ed2e226865052631c380e622bfad8a4d89cc2,2025-01-16T03:15:06.313000
|
||||
CVE-2025-22904,0,1,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000
|
||||
CVE-2025-22905,0,0,abc87a85c7bc7d9d749537f6e4185a3608bb9fb9938aa6d93312fdeb15cc69d3,2025-01-16T15:15:15.180000
|
||||
CVE-2025-22906,0,0,c442b828ae2bdbc2d39f15b231587f53bcedbd794c904b4144293ba283dc2985,2025-01-16T15:15:15.357000
|
||||
CVE-2025-22907,0,0,afe94c593034a06a548c8df5f439a7a34ed21665762277eb367e4b3ea8c24c00,2025-01-16T15:15:15.547000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user