Auto-Update: 2024-12-03T09:01:38.528083+00:00

This commit is contained in:
cad-safe-bot 2024-12-03 09:04:50 +00:00
parent 996df17623
commit e7974b4c00
12 changed files with 552 additions and 40 deletions

View File

@ -2,13 +2,13 @@
"id": "CVE-2023-0142",
"sourceIdentifier": "security@synology.com",
"published": "2023-06-13T07:15:46.203",
"lastModified": "2024-11-28T07:15:04.477",
"lastModified": "2024-12-03T08:15:04.313",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Uncontrolled search path element vulnerability in Backup Management functionality in Synology DiskStation Manager (DSM) before 7.0.1-42218-7 and 7.1-42661 allows remote authenticated users with administrator privileges to read or write arbitrary files via unspecified vectors."
"value": "Uncontrolled search path element vulnerability in Backup Management functionality in Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.0.1-42218-7 and 7.1-42661 allows remote authenticated users with administrator privileges to read or write arbitrary files via unspecified vectors."
}
],
"metrics": {
@ -58,7 +58,7 @@
"weaknesses": [
{
"source": "security@synology.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -2,13 +2,13 @@
"id": "CVE-2024-0854",
"sourceIdentifier": "security@synology.com",
"published": "2024-01-24T10:15:09.533",
"lastModified": "2024-11-28T08:15:03.713",
"lastModified": "2024-12-03T08:15:05.673",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "URL redirection to untrusted site ('Open Redirect') vulnerability in file access component in Synology DiskStation Manager (DSM) before 7.0.1-42218-7, 7.1.1-42962-7 and 7.2.1-69057-2 allows remote authenticated users to conduct phishing attacks via unspecified vectors."
"value": "URL redirection to untrusted site ('Open Redirect') vulnerability in file access component in Synology DiskStation Manager (DSM) before 6.2.4-25556-8, 7.0.1-42218-7, 7.1.1-42962-7 and 7.2.1-69057-2 allows remote authenticated users to conduct phishing attacks via unspecified vectors."
},
{
"lang": "es",

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11453",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:05.830",
"lastModified": "2024-12-03T08:15:05.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The WordPress Pinterest Plugin \u2013 Make a Popup, User Profile, Masonry and Gallery Layout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'gs_pin_widget' shortcode in all versions up to, and including, 1.8.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/gs-pinterest-portfolio/tags/1.8.8/includes/shortcode.php#L202",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3200115/gs-pinterest-portfolio/trunk/includes/shortcode.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/425cd0be-d17e-4c2b-bf29-3b850905a88e?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11461",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.043",
"lastModified": "2024-12-03T08:15:06.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Form Data Collector plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 2.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/form-data-collector/tags/2.2.3/index.php#L165",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3199031%40form-data-collector&new=3199031%40form-data-collector&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6dba72ee-7c38-4e10-9c0c-35d12aa83442?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11707",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.223",
"lastModified": "2024-12-03T08:15:06.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The My auctions allegro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'page' parameter in all versions up to, and including, 3.6.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3197924%40my-auctions-allegro-free-edition&new=3197924%40my-auctions-allegro-free-edition&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3198824%40my-auctions-allegro-free-edition&new=3198824%40my-auctions-allegro-free-edition&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/57a78696-5892-4621-992f-5e4a7d8fa965?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11732",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.383",
"lastModified": "2024-12-03T08:15:06.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The BP Profile Shortcodes Extra plugin for WordPress is vulnerable to time-based SQL Injection via the \u2018tab\u2019 parameter in all versions up to, and including, 2.6.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/bp-profile-shortcodes-extra/tags/2.6.0/inc/bppsc-shortcodes-extra.php#L1694",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/bp-profile-shortcodes-extra/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7324a4e-ff45-4908-bcaa-379b130f73c0?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-11805",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.553",
"lastModified": "2024-12-03T08:15:06.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Quick License Manager \u2013 WooCommerce Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'submit_qlm_products' parameter in all versions up to, and including, 2.4.17 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3198437/quick-license-manager/trunk?contextall=1&old=3198391&old_path=%2Fquick-license-manager%2Ftrunk",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c781c8a-1ffb-438b-bf78-9d386fbd16eb?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2024-11853",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.710",
"lastModified": "2024-12-03T08:15:06.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The jAlbum Bridge plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018ar\u2019 parameter in all versions up to, and including, 2.0.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/jalbum-bridge/tags/2.0.15/jalbum-bridge.php#L41",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3198794/",
"source": "security@wordfence.com"
},
{
"url": "https://wordpress.org/plugins/jalbum-bridge/#developers",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/72b50c83-7128-4e38-9a5e-0954928ff002?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,64 @@
{
"id": "CVE-2024-11898",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T08:15:06.857",
"lastModified": "2024-12-03T08:15:06.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Scratch & Win \u2013 Giveaways and Contests. Boost subscribers, traffic, repeat visits, referrals, sales and more plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swin-campaign' shortcode in all versions up to, and including, 2.6.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/browser/scratch-win-giveaways-for-website-facebook/tags/2.6.9/socialscratchwin.php#L155",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3199234%40scratch-win-giveaways-for-website-facebook&new=3199234%40scratch-win-giveaways-for-website-facebook&sfp_email=&sfph_mail=",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b7f3f0f-5f02-41d7-ac37-ecdde74fc532?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2024-9058",
"sourceIdentifier": "security@wordfence.com",
"published": "2024-12-03T07:15:04.230",
"lastModified": "2024-12-03T07:15:04.230",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Element Pack Elementor Addons (Header Footer, Template Library, Dynamic Grid & Carousel, Remote Arrows) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Lightbox widget in all versions up to, and including, 5.10.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.trac.wordpress.org/changeset/3189994/bdthemes-element-pack-lite",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e343ea3-996c-47c7-9480-e6264cbded98?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2024-12-03T07:00:35.449982+00:00
2024-12-03T09:01:38.528083+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2024-12-03T06:15:10.393000+00:00
2024-12-03T08:15:06.857000+00:00
```
### Last Data Feed Release
@ -33,33 +33,29 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
271965
271973
```
### CVEs added in the last Commit
Recently added CVEs: `14`
Recently added CVEs: `8`
- [CVE-2024-10484](CVE-2024/CVE-2024-104xx/CVE-2024-10484.json) (`2024-12-03T06:15:07.617`)
- [CVE-2024-10893](CVE-2024/CVE-2024-108xx/CVE-2024-10893.json) (`2024-12-03T06:15:08.500`)
- [CVE-2024-49410](CVE-2024/CVE-2024-494xx/CVE-2024-49410.json) (`2024-12-03T06:15:08.880`)
- [CVE-2024-49411](CVE-2024/CVE-2024-494xx/CVE-2024-49411.json) (`2024-12-03T06:15:09.033`)
- [CVE-2024-49412](CVE-2024/CVE-2024-494xx/CVE-2024-49412.json) (`2024-12-03T06:15:09.167`)
- [CVE-2024-49413](CVE-2024/CVE-2024-494xx/CVE-2024-49413.json) (`2024-12-03T06:15:09.303`)
- [CVE-2024-49414](CVE-2024/CVE-2024-494xx/CVE-2024-49414.json) (`2024-12-03T06:15:09.430`)
- [CVE-2024-49415](CVE-2024/CVE-2024-494xx/CVE-2024-49415.json) (`2024-12-03T06:15:09.570`)
- [CVE-2024-49416](CVE-2024/CVE-2024-494xx/CVE-2024-49416.json) (`2024-12-03T06:15:09.697`)
- [CVE-2024-49417](CVE-2024/CVE-2024-494xx/CVE-2024-49417.json) (`2024-12-03T06:15:09.847`)
- [CVE-2024-49418](CVE-2024/CVE-2024-494xx/CVE-2024-49418.json) (`2024-12-03T06:15:09.977`)
- [CVE-2024-49419](CVE-2024/CVE-2024-494xx/CVE-2024-49419.json) (`2024-12-03T06:15:10.120`)
- [CVE-2024-49420](CVE-2024/CVE-2024-494xx/CVE-2024-49420.json) (`2024-12-03T06:15:10.253`)
- [CVE-2024-49421](CVE-2024/CVE-2024-494xx/CVE-2024-49421.json) (`2024-12-03T06:15:10.393`)
- [CVE-2024-11453](CVE-2024/CVE-2024-114xx/CVE-2024-11453.json) (`2024-12-03T08:15:05.830`)
- [CVE-2024-11461](CVE-2024/CVE-2024-114xx/CVE-2024-11461.json) (`2024-12-03T08:15:06.043`)
- [CVE-2024-11707](CVE-2024/CVE-2024-117xx/CVE-2024-11707.json) (`2024-12-03T08:15:06.223`)
- [CVE-2024-11732](CVE-2024/CVE-2024-117xx/CVE-2024-11732.json) (`2024-12-03T08:15:06.383`)
- [CVE-2024-11805](CVE-2024/CVE-2024-118xx/CVE-2024-11805.json) (`2024-12-03T08:15:06.553`)
- [CVE-2024-11853](CVE-2024/CVE-2024-118xx/CVE-2024-11853.json) (`2024-12-03T08:15:06.710`)
- [CVE-2024-11898](CVE-2024/CVE-2024-118xx/CVE-2024-11898.json) (`2024-12-03T08:15:06.857`)
- [CVE-2024-9058](CVE-2024/CVE-2024-90xx/CVE-2024-9058.json) (`2024-12-03T07:15:04.230`)
### CVEs modified in the last Commit
Recently modified CVEs: `0`
Recently modified CVEs: `2`
- [CVE-2023-0142](CVE-2023/CVE-2023-01xx/CVE-2023-0142.json) (`2024-12-03T08:15:04.313`)
- [CVE-2024-0854](CVE-2024/CVE-2024-08xx/CVE-2024-0854.json) (`2024-12-03T08:15:05.673`)
## Download and Usage

View File

@ -213116,7 +213116,7 @@ CVE-2023-0138,0,0,0f9ccca9b74539caf9bf1274a26e12b16eff6998a1ad1c1003e4e4bdb44e51
CVE-2023-0139,0,0,2a1d06ec16cbeb0f42802443463825b23acd36452e12ef549d5a1ce04deec709,2023-11-25T11:15:13.543000
CVE-2023-0140,0,0,2ab5ec9e9acd6659ed75cd30d7b68abf8235bc4af57f2a36dc58df75bf340d2a,2023-11-25T11:15:13.633000
CVE-2023-0141,0,0,2cb1e4440abf0032ef49cf1ab95073658cbf263e8f5270d6f9a5d41ec61c8650,2023-11-25T11:15:13.760000
CVE-2023-0142,0,0,5e9aeabc5a9967a4f5714513157b5cf282111286b4af2af621fec5e554b0434a,2024-11-28T07:15:04.477000
CVE-2023-0142,0,1,0c7e924277e96fad531f647b42de568fe1dae5f8e560eb49156d02ea2e710ec5,2024-12-03T08:15:04.313000
CVE-2023-0143,0,0,c52bc7813dfc6659f9c59afb905330880b0986c1d9bf153f3ef70aa31d452894,2023-11-07T03:59:43.137000
CVE-2023-0144,0,0,5f9e4ac72968ef219e9d39533d3ff53192a456ee89fe5e9aace6023ca65ee9e2,2023-11-07T03:59:43.350000
CVE-2023-0145,0,0,eed30560a0871467c4d1ebfbc7a0d489db6a1815578450029ed9cf29da6cdcf3,2023-11-07T03:59:43.550000
@ -242543,7 +242543,7 @@ CVE-2024-0848,0,0,e0e26015fce7454a8ecd0b62d6bfcebc24339b5d12fceee5ba30ea769681be
CVE-2024-0849,0,0,3d9186cbdefe9b879cc8d1763ec900b7d18820b531adac823e565a400881f9bb,2024-09-05T23:15:11.673000
CVE-2024-0851,0,0,f71017226a428253d7e6f7557fb0ae0457b9beec038f9e66758c71c8032e7938,2024-05-28T12:39:28.377000
CVE-2024-0853,0,0,3c910daae8e71e1ce70b1329a110fcfb56e12ff4cd703e160872830a02778b72,2024-05-03T13:15:21.320000
CVE-2024-0854,0,0,6f3673c1790a3b2810043a27ad744b7e692d554b3d876ca60b4a195695e82514,2024-11-28T08:15:03.713000
CVE-2024-0854,0,1,ec5d60d861e7fb141da9bc8f0fb18adcb88ed69e2ca6710ed7702b7c5bd77ede,2024-12-03T08:15:05.673000
CVE-2024-0855,0,0,61bb12eb398f3f222f6fe0c4603d214af7ba9f6d4fd218198b137421ef268723,2024-08-08T21:35:01.813000
CVE-2024-0856,0,0,cdf686922dc6dc53a8573a4e6d7fe25c3162a97d00eaaeaf4df6f669bee7cf43,2024-08-05T19:35:01.477000
CVE-2024-0857,0,0,135b818be9db5d9ae259c8ee8260201b0eed5c0f5f2f59c834f8ec0a79ea8407,2024-08-22T17:23:44.947000
@ -243043,7 +243043,7 @@ CVE-2024-10477,0,0,ec5d3377a9eba885093e83f0ffc2c5214a9fc83d05d2bcf419cfa0429899b
CVE-2024-10478,0,0,a63bf38a8bfa46322ffe79a3260a2e62e4168a517fb088dc75202387c0a46091,2024-10-29T14:34:04.427000
CVE-2024-10479,0,0,2cf095341510f03aced116cfbd158587751b5caab0b78f9cc79bac97953009f3,2024-10-29T14:34:04.427000
CVE-2024-1048,0,0,2f01cec4b27d0961417641b66cfc5a0fef8e061182b01c0d7a954dc28bdc8a2f,2024-09-16T16:15:12.907000
CVE-2024-10484,1,1,cfc6eede1df3b39f4709d402340f7fd6c7b0dde4f6a05c7bc473a031666f3752,2024-12-03T06:15:07.617000
CVE-2024-10484,0,0,cfc6eede1df3b39f4709d402340f7fd6c7b0dde4f6a05c7bc473a031666f3752,2024-12-03T06:15:07.617000
CVE-2024-10486,0,0,6b6a9c7c1d7688efbd788cfa89c1b8eec85247981e0e8dab673908aaadf969ce,2024-11-19T21:57:32.967000
CVE-2024-10487,0,0,78655a991e24aa9dd082cd3faff3773a1cc1b0ed3ddfc55ae09b7e96ee30ac89,2024-11-01T12:57:35.843000
CVE-2024-10488,0,0,045961a4da52daca0a2cd9eefa7cb2efdc030f8f660cedb82c9b820a312a0393,2024-11-01T12:57:35.843000
@ -243319,7 +243319,7 @@ CVE-2024-10886,0,0,dbb0fce1f84e13fbc68880e115c84f1055ea586a69373d4f7dec78acdd1fa
CVE-2024-10887,0,0,6f1c620112f0531885feb58bf605da1bdf3e2be3ee69e7f92d5d01d446076f44,2024-11-13T17:01:16.850000
CVE-2024-1089,0,0,9442709e929187c1b992d082c3eaeec9226480f80fc28198e3a73f4a684640d5,2024-02-29T13:49:29.390000
CVE-2024-10891,0,0,75368c42ada2eff64310eb4f2bf04c277030b9ed62814601df628d2e55a629ad,2024-11-20T10:15:05.273000
CVE-2024-10893,1,1,1e02db477629e0f5f43dc3a572525605befae0d3ba45f0ae221c6a9f0c6047d6,2024-12-03T06:15:08.500000
CVE-2024-10893,0,0,1e02db477629e0f5f43dc3a572525605befae0d3ba45f0ae221c6a9f0c6047d6,2024-12-03T06:15:08.500000
CVE-2024-10895,0,0,595bc2f289687b30c5fe4f154f1211dd293d99cd45db772babe4d8ed8c825807,2024-11-27T07:15:08.347000
CVE-2024-10896,0,0,e962891bb7ff0bd290fd7c88332bde91f2f69d0bdc8b8df6012dc8f056efaa3b,2024-11-29T16:15:08.880000
CVE-2024-10897,0,0,5090338464622dc9d5ece2556a5b89ff3e6aa995d53aa797095eaa9a0db6f534,2024-11-20T16:09:16.643000
@ -243639,8 +243639,10 @@ CVE-2024-11431,0,0,b8bb7503cec0f1c97409d5d96fa693f0c0a3c2fbf2f6e1d737e15cdb7da79
CVE-2024-1144,0,0,546e0bd85767acb1f88a8198b87bd681b7ca87705a2ab38d3ca6ac16bba85f8b,2024-03-19T13:26:46
CVE-2024-11446,0,0,58ee3306e8d72a71b4c73e9400de7c4b9a7a44ede260329876f7cb058e66c8ed,2024-11-23T07:15:04.820000
CVE-2024-1145,0,0,fa713ba5e7e18de90151eee1a4726d9f9f0863a5fccb48575e3f29ec11b8835c,2024-03-19T13:26:46
CVE-2024-11453,1,1,5a92196f1949efd85a5ee687acf7700234668e98610de2c7d4557dd8f3aebb90,2024-12-03T08:15:05.830000
CVE-2024-11458,0,0,6849bad28a4b41fcdd85ffcf4846b0c6058567a8a7be243965c5d4ff08dab5b5,2024-11-28T09:15:04.640000
CVE-2024-1146,0,0,c681ac136637104b7d43e23a49d30f381f11dad3f3f7ec48919504256a9e5b2a,2024-03-19T13:26:46
CVE-2024-11461,1,1,ddca8d6b2db926cfca3eee24bf3b6aa5eb08e9faad161d3c0076b0f9ecc87254,2024-12-03T08:15:06.043000
CVE-2024-11463,0,0,ec04c7e81fa0a01468a3fa77b8e3ee0a2d478d739fbf8b7cd12d4c8bed3fd0d3,2024-11-23T04:15:08.893000
CVE-2024-1147,0,0,5da69e40e8a720c3c3c366cde1a8363ffbcff6346e82168cfd4c7602d33328bd,2024-03-21T12:58:51.093000
CVE-2024-11477,0,0,47ede4582a757f3d8a2482f5720bb8d1160cb660e47ba0cb5bbe4f95d03eaff1,2024-11-22T21:15:08.613000
@ -243823,10 +243825,12 @@ CVE-2024-11703,0,0,e983d143affae3fe0df24c337c8810ae7731133ae347091f674c58908251a
CVE-2024-11704,0,0,2b7b550cc939bccaee7258fd0a9f771da470ed456c481083dde13c083b054c7f,2024-11-27T16:15:13.837000
CVE-2024-11705,0,0,b00958231cd75a51aaf41f507045209bb5b601f8c6cb2be613795f56225c7da5,2024-11-27T16:15:14
CVE-2024-11706,0,0,1b96fbb1c831be79b72164c44aa56f72093a93485fb6eb748f832788631279b2,2024-11-26T17:15:23.010000
CVE-2024-11707,1,1,0754803a170e0831f66c99e53b47cf1098effd65abf2b17a1244c3f488060a20,2024-12-03T08:15:06.223000
CVE-2024-11708,0,0,5872b1f165a61acebbe70a5730336bc20a16b17ac8491536799290291f1eb8e9,2024-11-27T15:15:24.747000
CVE-2024-1171,0,0,59f6a72a19a26da04118a5786af1566b99863895f524fbe4b34406571782a615,2024-02-29T13:49:29.390000
CVE-2024-1172,0,0,11b44e5ce5101f5b7c8ab7c5bd49458795761e0ba5cf2024c3b79ca4ef4be57d,2024-02-29T13:49:29.390000
CVE-2024-1173,0,0,d3495940fb5216c0fbed831a88233211893c24cb888781ac48f1d76bb3bc26ba,2024-05-02T18:00:37.360000
CVE-2024-11732,1,1,9ac5f8faeb8d3d023aef30c0e1c16293895e21fbeef4db588eecb4bcce0a9632,2024-12-03T08:15:06.383000
CVE-2024-1174,0,0,1a20d0936daa8c05ea33a8dfff3a4c4c734ee1e57e74d832a558685298d668aa,2024-08-28T21:35:03.473000
CVE-2024-11742,0,0,67990b8c6d291afd926a35484e6c0e210504d9728dfca33a0ba1469d0b959cb7,2024-11-26T20:15:25.703000
CVE-2024-11743,0,0,4f6422c96bd4f753ba6c7b4e725945a7686018b3a7c5c8f40a5c1bd59c112f03,2024-11-26T20:15:25.930000
@ -243857,6 +243861,7 @@ CVE-2024-11800,0,0,452e646ca4272df50dba618a6bbe5597902065fb71dbf212269417af86b3c
CVE-2024-11801,0,0,9f7fb4a596ccaeab8fec5833422864785f9b02d4e4cdf4de8584f0f02ff993f7,2024-11-28T00:15:05.873000
CVE-2024-11802,0,0,6f4d24723a8ed97073be195e50e0db56014f2b2ea65777a9a07412229fff3a98,2024-11-28T00:15:06.007000
CVE-2024-11803,0,0,81a74b13e4dbf770a17aeec0a98f9e92d283ae44a8459caff765261ca92e6496,2024-11-28T00:15:06.143000
CVE-2024-11805,1,1,c4320a41ca0d4edd118e9ad964bb3b250fee875896f75cfe07057a59cde52b29,2024-12-03T08:15:06.553000
CVE-2024-1181,0,0,3ab1ccda9f702c4fc6b350844c2c0edd9e45550807a44d2d8746213d5ed7378e,2024-03-20T13:00:16.367000
CVE-2024-11817,0,0,878ee2179044a99d330d167a93477de960b6cf592f6203d72eec9805c4d5d74a,2024-11-26T23:15:04.990000
CVE-2024-11818,0,0,db7694cd2fdcae7c78aac428fa42653e88b1d41dfdd73e2502c588c9613c4f73,2024-11-27T00:15:17.727000
@ -243867,6 +243872,7 @@ CVE-2024-11828,0,0,246e1e2eab57884aa3d4d52a63d8c3c77eefda7cf137c7c25e51217c37ae6
CVE-2024-1183,0,0,b9ca697d85173799c910606842f064c322818be1aee71b1208c43495b066c09a,2024-04-16T13:24:07.103000
CVE-2024-1184,0,0,0bd0336a802b5a07ef17cf4c3337487d1573b3f8590cc13c2e3f9ac276b1f143,2024-05-17T02:35:16.900000
CVE-2024-1185,0,0,a60268243ee8d3dcf82e9c185863da8146ac8c49246dc744f2663ef723b40081,2024-06-26T15:15:19.220000
CVE-2024-11853,1,1,c70345c399e57b281a218378a22a846eb5d7cd1f69686e8d6c992b2449c02ac9,2024-12-03T08:15:06.710000
CVE-2024-11856,0,0,20144f62e7f4edae2d8f1729fbe98f20a8d619a96145aa244e22c04511e4c37d,2024-12-02T03:15:13.713000
CVE-2024-1186,0,0,b01b3a0462d1f7a1a803ca8f493a6219bd71eed48ddf8d36021e6ca2af3e1767,2024-05-17T02:35:17.110000
CVE-2024-11860,0,0,8f2a0fbf19059c6c3c8a5836cc661c7d3bd0f5aaad2633071ac71b0a6a9605c7,2024-11-27T17:15:10.010000
@ -243874,6 +243880,7 @@ CVE-2024-11862,0,0,6d3560dff7bd57ea41736e55020db21367a02a743a7c33eb7522f1239d06c
CVE-2024-1187,0,0,3fcd8394fe17b53cc850805fb2de93d28c688f808245fcfde96cd99bc903bbab,2024-05-17T02:35:17.220000
CVE-2024-1188,0,0,6744ad4ad1ed370f6488ba44c137b6887619ea6ff1a51ee5f48fd0aec905e09b,2024-05-17T02:35:17.327000
CVE-2024-1189,0,0,b364c59b0d964a14f93b1e1b61d95f98aeb338db4ea440a29e1d18c3cc27c9d5,2024-05-17T02:35:17.427000
CVE-2024-11898,1,1,0456808eb2a54e3b5ec4a2165ac77afd50bb67da5ab4fe9c475ae45285713587,2024-12-03T08:15:06.857000
CVE-2024-1190,0,0,97174d698ee0a283db94af4be93c59e8a1814d898054ed7eb2fd6bfac02921e8,2024-05-17T02:35:17.533000
CVE-2024-1191,0,0,6e38ed7db5944087a721298d0ec64e89db09082a4119551dba4b0f62276916e5,2024-05-17T02:35:17.640000
CVE-2024-11918,0,0,3593929fa79fd2ff3075ff0960153853c146cae2b4c652e91826347f06e81c6b,2024-11-28T06:15:08.347000
@ -265640,19 +265647,19 @@ CVE-2024-49407,0,0,185fb4d197a20a2fd5c00166c54cb21b6f23e70e47219be5351c4b74645df
CVE-2024-49408,0,0,149c9b51e819ccba45a2c72527777ad37a4918fbc30028405603199091d50e6e,2024-11-13T00:51:31.050000
CVE-2024-49409,0,0,fb6c3bdd794b93a497ebe414844b68d0cddd991efda164791288563edbe68e62,2024-11-13T00:51:10.317000
CVE-2024-4941,0,0,4a44b53eeef21b9bcc4a70f0f12e019011a282ac818fbf5410cd9bce445ce09d,2024-10-09T16:24:24.433000
CVE-2024-49410,1,1,f79b1fdf9f7d4806719e75c1cb5a2a38d136897402cebef1405853a466ac210d,2024-12-03T06:15:08.880000
CVE-2024-49411,1,1,7e67a35926b397ca5c6a0b14403657f9d4f268a4ebe0741fac12d2b88da5f500,2024-12-03T06:15:09.033000
CVE-2024-49412,1,1,3ef65158464af1280f653d3819a23a0d4f1edf585b2c2693e2aafc6fd8231ae4,2024-12-03T06:15:09.167000
CVE-2024-49413,1,1,f3ed9355769c11e05235353878a903b0b28d2691aa4ae8d23e50a27ec566853e,2024-12-03T06:15:09.303000
CVE-2024-49414,1,1,2a082bc67d8632e6e7272afbe8e0c5742db57e8c89d95bfe1ab838b45eb13ab5,2024-12-03T06:15:09.430000
CVE-2024-49415,1,1,9542986d2b3f6b7843f134f7b28224f5cbb7fd523b5187904eda1404d132984b,2024-12-03T06:15:09.570000
CVE-2024-49416,1,1,6f8472e6bd10efd1e10971632f910bec66d7ec15379519ee290e96099c9d47d7,2024-12-03T06:15:09.697000
CVE-2024-49417,1,1,9b56fb4f744baacba917c26eadfa627ff484a35ca0ccf4c8dd33e46a6918ac71,2024-12-03T06:15:09.847000
CVE-2024-49418,1,1,0c3d4a6cede8bf8224922c42ea1874e0ca4a5edfb19189038b6a8f59b724e06d,2024-12-03T06:15:09.977000
CVE-2024-49419,1,1,bdd5a9391e73a76918e6c5de4d45969d9c28b85d6f00a971d29cf94b409d1969,2024-12-03T06:15:10.120000
CVE-2024-49410,0,0,f79b1fdf9f7d4806719e75c1cb5a2a38d136897402cebef1405853a466ac210d,2024-12-03T06:15:08.880000
CVE-2024-49411,0,0,7e67a35926b397ca5c6a0b14403657f9d4f268a4ebe0741fac12d2b88da5f500,2024-12-03T06:15:09.033000
CVE-2024-49412,0,0,3ef65158464af1280f653d3819a23a0d4f1edf585b2c2693e2aafc6fd8231ae4,2024-12-03T06:15:09.167000
CVE-2024-49413,0,0,f3ed9355769c11e05235353878a903b0b28d2691aa4ae8d23e50a27ec566853e,2024-12-03T06:15:09.303000
CVE-2024-49414,0,0,2a082bc67d8632e6e7272afbe8e0c5742db57e8c89d95bfe1ab838b45eb13ab5,2024-12-03T06:15:09.430000
CVE-2024-49415,0,0,9542986d2b3f6b7843f134f7b28224f5cbb7fd523b5187904eda1404d132984b,2024-12-03T06:15:09.570000
CVE-2024-49416,0,0,6f8472e6bd10efd1e10971632f910bec66d7ec15379519ee290e96099c9d47d7,2024-12-03T06:15:09.697000
CVE-2024-49417,0,0,9b56fb4f744baacba917c26eadfa627ff484a35ca0ccf4c8dd33e46a6918ac71,2024-12-03T06:15:09.847000
CVE-2024-49418,0,0,0c3d4a6cede8bf8224922c42ea1874e0ca4a5edfb19189038b6a8f59b724e06d,2024-12-03T06:15:09.977000
CVE-2024-49419,0,0,bdd5a9391e73a76918e6c5de4d45969d9c28b85d6f00a971d29cf94b409d1969,2024-12-03T06:15:10.120000
CVE-2024-4942,0,0,ec40ecb2c6f2c92030124cf4a899658443926a41ec90982de736f0fdfba6bcb7,2024-07-23T21:09:15.900000
CVE-2024-49420,1,1,26e83b01c6154e5bb6d2468b0c940434be7fd73d02aba38fbe76cbe1074bd96f,2024-12-03T06:15:10.253000
CVE-2024-49421,1,1,6882d6adbea940f20429ce5fee8046d0fa1148c8a74ea30caff971267c5832e7,2024-12-03T06:15:10.393000
CVE-2024-49420,0,0,26e83b01c6154e5bb6d2468b0c940434be7fd73d02aba38fbe76cbe1074bd96f,2024-12-03T06:15:10.253000
CVE-2024-49421,0,0,6882d6adbea940f20429ce5fee8046d0fa1148c8a74ea30caff971267c5832e7,2024-12-03T06:15:10.393000
CVE-2024-4943,0,0,c3255ca69e7d3076031772cbfca36198fc76d9c4ad7b4e1b0b2d1944b2bfd408,2024-05-21T12:37:59.687000
CVE-2024-4944,0,0,4c179510d1e03e5badefb2baa5976b22075fd8af2558d89d09a0401516cd83b3,2024-08-22T15:06:05.480000
CVE-2024-4945,0,0,30a0ab1a0c03dbd140fcf7c71669ea9d01e0f4e5f56736f7caa84678a6833359,2024-06-04T19:20:54.767000
@ -271251,6 +271258,7 @@ CVE-2024-9050,0,0,78b9638634d0ff28e0659c218fd386df1d4e4f7c5c88d6469370350eb2679b
CVE-2024-9051,0,0,e0f892f6090989bc65bfe2c27d48e7e51216899c12a8aa5d44d38bf2b4829ddc,2024-10-15T12:58:51.050000
CVE-2024-9054,0,0,8ac0760d3aa06e14d98991152c0b4a90664b0b925ad15b2f9f9f67c478cb9754,2024-10-17T15:19:32.803000
CVE-2024-9057,0,0,1e7730ffd6c424e386d911bdf2bfee9e4291e522521f210193a354376f62eabc,2024-10-15T13:58:19.960000
CVE-2024-9058,1,1,3c4249771363eaf8f1ee3f2a724fa89fffa22e0f0b5c258bc3a4c06bb10f565a,2024-12-03T07:15:04.230000
CVE-2024-9059,0,0,4d4eca66fdabff300ba12a6c3aa840e717659fd399e0c46eca6a0c562dee781c,2024-11-19T15:53:56.680000
CVE-2024-9060,0,0,362dff7d92c4f79cdb773c7965db43bbd7eb0923ce5f0445c06b15d2c9fc0e79,2024-10-04T13:51:25.567000
CVE-2024-9061,0,0,68964a8d24a934fad1df20bd8f6d5ba6a330caf51ca0e0445a293becf4ee4892,2024-10-30T21:11:17.450000

Can't render this file because it is too large.