Auto-Update: 2025-01-06T15:00:21.015734+00:00

This commit is contained in:
cad-safe-bot 2025-01-06 15:03:44 +00:00
parent 9bd5e9123c
commit f8fa73a8d0
26 changed files with 1446 additions and 185 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-42867",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.200",
"lastModified": "2024-12-27T19:15:06.147",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:20:04.917",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,31 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apple:garageband:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.4.9",
"matchCriteriaId": "78ED0789-F3CD-4105-A3FA-3DBE0705A9F9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/120299",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11356",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-06T06:15:06.177",
"lastModified": "2025-01-06T06:15:06.177",
"lastModified": "2025-01-06T14:15:07.233",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The tourmaster WordPress plugin before 5.3.4 does not sanitise and escape some parameters when outputting them in the page, which could allow unauthenticated users to perform Cross-Site Scripting attacks."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/d70df54e-e99e-4539-9fd9-002c0642137e/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-11849",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-06T06:15:06.390",
"lastModified": "2025-01-06T06:15:06.390",
"lastModified": "2025-01-06T14:15:07.883",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Pods WordPress plugin before 3.2.8.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/85b25a5b-c30b-4a2a-96c1-f05b4eba8a9b/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12302",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-06T06:15:06.487",
"lastModified": "2025-01-06T06:15:06.487",
"lastModified": "2025-01-06T14:15:08.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Icegram Engage WordPress plugin before 3.1.32 does not sanitise and escape some of its Campaign settings, which could allow authors and above to perform Stored Cross-Site Scripting attacks"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/ed860dac-8c4a-482f-8826-31f1a894b6ce/",

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-12311",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-01-06T06:15:06.583",
"lastModified": "2025-01-06T06:15:06.583",
"lastModified": "2025-01-06T14:15:08.153",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,30 @@
"value": "The Email Subscribers by Icegram Express WordPress plugin before 5.7.44 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.2,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://wpscan.com/vulnerability/5e00ba37-da7f-4703-a0b9-65237696fbdd/",

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-12794",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-19T18:15:09.963",
"lastModified": "2024-12-19T18:15:09.963",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:40:23.127",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -111,7 +131,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -122,24 +142,64 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:codezips:e-commerce_site:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448FA2B8-9265-4027-B054-7BCE8AD7278A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/laowuzi/cve/blob/main/E-commerce/E-commerce_editorder.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.288975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.288975",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.466241",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13075",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T18:15:26.570",
"lastModified": "2025-01-02T20:16:04.217",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:57:56.690",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,28 +142,73 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289828",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289828",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472183",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472183",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13076",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T18:15:27.293",
"lastModified": "2025-01-02T20:16:04.437",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:51:54.247",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,28 +142,71 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289829",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.289829",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472185",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472185",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13077",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T19:15:07.880",
"lastModified": "2024-12-31T19:15:07.880",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:51:06.337",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,64 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289830",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.289830",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472186",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13078",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T19:15:08.067",
"lastModified": "2025-01-02T20:16:04.620",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:49:59.017",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,71 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289831",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.289831",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472187",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/land-record-system-using-php-and-mysql/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13079",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T20:15:27.937",
"lastModified": "2025-01-02T18:15:16.243",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:49:38.193",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,72 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289832",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289832",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472188",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/land-record-system-using-php-and-mysql/",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13080",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T20:15:28.157",
"lastModified": "2024-12-31T20:15:28.157",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:47:35.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,64 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289833",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289833",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472190",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13081",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T21:15:07.670",
"lastModified": "2024-12-31T21:15:07.670",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:47:13.503",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,64 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289834",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289834",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472192",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13082",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T21:15:08.730",
"lastModified": "2024-12-31T21:15:08.730",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:46:40.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,64 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289835",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289835",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472193",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13083",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T22:15:07.167",
"lastModified": "2024-12-31T22:15:07.167",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:45:40.307",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,65 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289836",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289836",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472194",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13084",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T22:15:07.783",
"lastModified": "2024-12-31T22:15:07.783",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:44:57.910",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,63 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289837",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.289837",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472195",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-13085",
"sourceIdentifier": "cna@vuldb.com",
"published": "2024-12-31T23:15:07.440",
"lastModified": "2024-12-31T23:15:07.440",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:43:13.437",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -76,6 +76,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -107,7 +127,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -118,24 +138,65 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:land_record_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B0685340-1C6A-4AE3-8DD7-4E43E6ACC910"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.289838",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?id.289838",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?submit.472196",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-20665",
"sourceIdentifier": "secure@microsoft.com",
"published": "2024-04-09T17:15:32.413",
"lastModified": "2024-11-21T08:52:52.547",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:33:29.733",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -36,6 +36,26 @@
},
"exploitabilityScore": 0.2,
"impactScore": 5.9
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
]
},
@ -49,16 +69,138 @@
"value": "CWE-693"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.10240.20596",
"matchCriteriaId": "E7BDA51E-51E0-487D-A25F-2477213B563E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.10240.20596",
"matchCriteriaId": "A607FDAE-53FE-49DA-806F-0533F5ECC108"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
"versionEndExcluding": "10.0.14393.6897",
"matchCriteriaId": "6CA18E04-75AD-4BC1-BCF7-B7C3DD33D9D3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
"versionEndExcluding": "10.0.14393.6897",
"matchCriteriaId": "8E68CF86-FB36-4E0E-A919-D7010E1D9CEE"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5696",
"matchCriteriaId": "7C50F3D5-1329-4563-BB59-9C50E2EEC237"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19044.4291",
"matchCriteriaId": "1BE5B3C6-9F18-44A0-95CC-B4CD358794BF"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.19045.4291",
"matchCriteriaId": "23C51F9B-0BF1-414C-BFA5-4F5B81413E9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22000.2899",
"matchCriteriaId": "39B18FD8-656D-46D2-8BDE-AF030C278E02"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22621.3447",
"matchCriteriaId": "54B49649-55CB-4BFF-BB50-592662435694"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.22631.3447",
"matchCriteriaId": "79409538-C0CE-4051-80C3-383220427D0B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.14393.6897",
"matchCriteriaId": "412F0026-BBE6-4F7D-ABC2-56E9F1791122"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.17763.5696",
"matchCriteriaId": "4EAAB276-D0E4-41CA-8A25-4DE9FC90543E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.20348.2402",
"matchCriteriaId": "7103C832-A4FB-4373-8A93-291E7A89B4AA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
"versionEndExcluding": "10.0.25398.830",
"matchCriteriaId": "F2B61B79-FEE5-4041-918D-6FE2C92771DC"
}
]
}
]
}
],
"references": [
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665",
"source": "secure@microsoft.com"
"source": "secure@microsoft.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20665",
"source": "af854a3a-2127-422b-91ae-364da2661108"
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44211",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.410",
"lastModified": "2024-12-20T17:15:15.053",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T13:58:21.267",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-59"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44223",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.523",
"lastModified": "2024-12-27T19:15:08.647",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T13:38:02.493",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -40,6 +60,16 @@
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -51,10 +81,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-44231",
"sourceIdentifier": "product-security@apple.com",
"published": "2024-12-20T04:15:05.620",
"lastModified": "2024-12-20T17:15:15.277",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T13:35:56.217",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
@ -39,10 +59,42 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:apple:macos:15.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F3B4B03A-A23F-4431-BFAF-B52C14B2C0B9"
}
]
}
]
}
],
"references": [
{
"url": "https://support.apple.com/en-us/121564",
"source": "product-security@apple.com"
"source": "product-security@apple.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-49336",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2024-12-19T18:15:22.850",
"lastModified": "2024-12-19T18:15:22.850",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-01-06T14:29:06.027",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -19,7 +19,7 @@
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
@ -36,6 +36,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
@ -51,10 +71,30 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ibm:security_guardium:11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B4F327AB-9F53-402C-9BFA-F66F20A83B40"
}
]
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7179369",
"source": "psirt@us.ibm.com"
"source": "psirt@us.ibm.com",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,13 +2,20 @@
"id": "CVE-2024-51074",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-11-22T16:15:33.860",
"lastModified": "2024-11-25T21:15:20.390",
"lastModified": "2025-01-06T14:15:08.603",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Incorrect access control in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to arbitrarily change odometer readings in the vehicle by targeting the instrument cluster through the unsecured CAN network."
"value": "Incorrect access control in KIA Seltos vehicle instrument cluster with software and hardware v1.0 allows attackers to arbitrarily change odometer readings in the vehicle by targeting the instrument cluster through the unsecured CAN network. NOTE: this is disputed by the supplier because the CAN bus is not externally exposed, and because the packets can only increase the odometer reading (which has no value to an adversary)."
},
{
"lang": "es",

View File

@ -0,0 +1,37 @@
{
"id": "CVE-2024-5594",
"sourceIdentifier": "security@openvpn.net",
"published": "2025-01-06T14:15:08.807",
"lastModified": "2025-01-06T14:15:08.807",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenVPN before 2.6.11 does not santize PUSH_REPLY messages properly which attackers can use to inject unexpected arbitrary data into third-party executables or plug-ins."
}
],
"metrics": {},
"weaknesses": [
{
"source": "security@openvpn.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-1287"
}
]
}
],
"references": [
{
"url": "https://community.openvpn.net/openvpn/wiki/CVE-2024-5594",
"source": "security@openvpn.net"
},
{
"url": "https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07634.html",
"source": "security@openvpn.net"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-01-06T13:00:19.701762+00:00
2025-01-06T15:00:21.015734+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-01-06T12:15:06.627000+00:00
2025-01-06T14:57:56.690000+00:00
```
### Last Data Feed Release
@ -33,40 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
275785
275786
```
### CVEs added in the last Commit
Recently added CVEs: `20`
Recently added CVEs: `1`
- [CVE-2024-12970](CVE-2024/CVE-2024-129xx/CVE-2024-12970.json) (`2025-01-06T12:15:06.573`)
- [CVE-2024-21464](CVE-2024/CVE-2024-214xx/CVE-2024-21464.json) (`2025-01-06T11:15:06.537`)
- [CVE-2024-23366](CVE-2024/CVE-2024-233xx/CVE-2024-23366.json) (`2025-01-06T11:15:07.977`)
- [CVE-2024-33041](CVE-2024/CVE-2024-330xx/CVE-2024-33041.json) (`2025-01-06T11:15:08.157`)
- [CVE-2024-33055](CVE-2024/CVE-2024-330xx/CVE-2024-33055.json) (`2025-01-06T11:15:08.310`)
- [CVE-2024-33059](CVE-2024/CVE-2024-330xx/CVE-2024-33059.json) (`2025-01-06T11:15:08.470`)
- [CVE-2024-33061](CVE-2024/CVE-2024-330xx/CVE-2024-33061.json) (`2025-01-06T11:15:08.617`)
- [CVE-2024-33067](CVE-2024/CVE-2024-330xx/CVE-2024-33067.json) (`2025-01-06T11:15:08.770`)
- [CVE-2024-43063](CVE-2024/CVE-2024-430xx/CVE-2024-43063.json) (`2025-01-06T11:15:08.930`)
- [CVE-2024-43064](CVE-2024/CVE-2024-430xx/CVE-2024-43064.json) (`2025-01-06T11:15:09.073`)
- [CVE-2024-45541](CVE-2024/CVE-2024-455xx/CVE-2024-45541.json) (`2025-01-06T11:15:09.230`)
- [CVE-2024-45542](CVE-2024/CVE-2024-455xx/CVE-2024-45542.json) (`2025-01-06T11:15:09.390`)
- [CVE-2024-45546](CVE-2024/CVE-2024-455xx/CVE-2024-45546.json) (`2025-01-06T11:15:09.540`)
- [CVE-2024-45547](CVE-2024/CVE-2024-455xx/CVE-2024-45547.json) (`2025-01-06T11:15:09.707`)
- [CVE-2024-45548](CVE-2024/CVE-2024-455xx/CVE-2024-45548.json) (`2025-01-06T11:15:09.887`)
- [CVE-2024-45550](CVE-2024/CVE-2024-455xx/CVE-2024-45550.json) (`2025-01-06T11:15:10.050`)
- [CVE-2024-45553](CVE-2024/CVE-2024-455xx/CVE-2024-45553.json) (`2025-01-06T11:15:10.207`)
- [CVE-2024-45555](CVE-2024/CVE-2024-455xx/CVE-2024-45555.json) (`2025-01-06T11:15:10.383`)
- [CVE-2024-45558](CVE-2024/CVE-2024-455xx/CVE-2024-45558.json) (`2025-01-06T11:15:10.550`)
- [CVE-2024-45559](CVE-2024/CVE-2024-455xx/CVE-2024-45559.json) (`2025-01-06T11:15:10.720`)
- [CVE-2024-5594](CVE-2024/CVE-2024-55xx/CVE-2024-5594.json) (`2025-01-06T14:15:08.807`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `23`
- [CVE-2023-49508](CVE-2023/CVE-2023-495xx/CVE-2023-49508.json) (`2025-01-06T12:15:06.627`)
- [CVE-2023-42867](CVE-2023/CVE-2023-428xx/CVE-2023-42867.json) (`2025-01-06T14:20:04.917`)
- [CVE-2024-11356](CVE-2024/CVE-2024-113xx/CVE-2024-11356.json) (`2025-01-06T14:15:07.233`)
- [CVE-2024-11849](CVE-2024/CVE-2024-118xx/CVE-2024-11849.json) (`2025-01-06T14:15:07.883`)
- [CVE-2024-12302](CVE-2024/CVE-2024-123xx/CVE-2024-12302.json) (`2025-01-06T14:15:08.023`)
- [CVE-2024-12311](CVE-2024/CVE-2024-123xx/CVE-2024-12311.json) (`2025-01-06T14:15:08.153`)
- [CVE-2024-12794](CVE-2024/CVE-2024-127xx/CVE-2024-12794.json) (`2025-01-06T14:40:23.127`)
- [CVE-2024-13075](CVE-2024/CVE-2024-130xx/CVE-2024-13075.json) (`2025-01-06T14:57:56.690`)
- [CVE-2024-13076](CVE-2024/CVE-2024-130xx/CVE-2024-13076.json) (`2025-01-06T14:51:54.247`)
- [CVE-2024-13077](CVE-2024/CVE-2024-130xx/CVE-2024-13077.json) (`2025-01-06T14:51:06.337`)
- [CVE-2024-13078](CVE-2024/CVE-2024-130xx/CVE-2024-13078.json) (`2025-01-06T14:49:59.017`)
- [CVE-2024-13079](CVE-2024/CVE-2024-130xx/CVE-2024-13079.json) (`2025-01-06T14:49:38.193`)
- [CVE-2024-13080](CVE-2024/CVE-2024-130xx/CVE-2024-13080.json) (`2025-01-06T14:47:35.650`)
- [CVE-2024-13081](CVE-2024/CVE-2024-130xx/CVE-2024-13081.json) (`2025-01-06T14:47:13.503`)
- [CVE-2024-13082](CVE-2024/CVE-2024-130xx/CVE-2024-13082.json) (`2025-01-06T14:46:40.910`)
- [CVE-2024-13083](CVE-2024/CVE-2024-130xx/CVE-2024-13083.json) (`2025-01-06T14:45:40.307`)
- [CVE-2024-13084](CVE-2024/CVE-2024-130xx/CVE-2024-13084.json) (`2025-01-06T14:44:57.910`)
- [CVE-2024-13085](CVE-2024/CVE-2024-130xx/CVE-2024-13085.json) (`2025-01-06T14:43:13.437`)
- [CVE-2024-20665](CVE-2024/CVE-2024-206xx/CVE-2024-20665.json) (`2025-01-06T14:33:29.733`)
- [CVE-2024-44211](CVE-2024/CVE-2024-442xx/CVE-2024-44211.json) (`2025-01-06T13:58:21.267`)
- [CVE-2024-44223](CVE-2024/CVE-2024-442xx/CVE-2024-44223.json) (`2025-01-06T13:38:02.493`)
- [CVE-2024-44231](CVE-2024/CVE-2024-442xx/CVE-2024-44231.json) (`2025-01-06T13:35:56.217`)
- [CVE-2024-49336](CVE-2024/CVE-2024-493xx/CVE-2024-49336.json) (`2025-01-06T14:29:06.027`)
- [CVE-2024-51074](CVE-2024/CVE-2024-510xx/CVE-2024-51074.json) (`2025-01-06T14:15:08.603`)
## Download and Usage

View File

@ -233213,7 +233213,7 @@ CVE-2023-42861,0,0,51ef0be30f968445e5bb0e3fe6e386464916f684c592ec33960870427fb70
CVE-2023-42862,0,0,da0a0390e3a6b251cbbd44904ae0343ada1c1e47a22f5cdb9211a360309b1627,2024-11-21T08:23:23.490000
CVE-2023-42865,0,0,6b1adebbfe54199fbd88c1f48a0707dd7d763317de7e8283554c7140f7d3ec4c,2024-11-21T08:23:23.610000
CVE-2023-42866,0,0,4825ed625b05a8c1608b93e75feb0484113e67d00eb04b720f74b3d42b768e19,2024-11-21T08:23:23.730000
CVE-2023-42867,0,0,4f84b583f52edec1ec102d5acc178f0058376a89b714b0c7a3cc859fc7486ee6,2024-12-27T19:15:06.147000
CVE-2023-42867,0,1,a59a0de35750defb2550242cea9df9f6f508011ed263a1760cce6815d999cb89,2025-01-06T14:20:04.917000
CVE-2023-42869,0,0,4b525b2d4d78240e429f6120cff3fbea3a9a62626e791bc07518dbd60f150db6,2024-11-21T08:23:23.850000
CVE-2023-42870,0,0,b052e765ed6b314dbe419b522569170970500fb212cc8d9009eece0ef048ce07,2024-11-21T08:23:23.957000
CVE-2023-42871,0,0,f13ae996b006635f073f8383fb0028141adede656e942393444895575f50667d,2024-11-21T08:23:24.150000
@ -237936,7 +237936,7 @@ CVE-2023-49494,0,0,81ae2af9aba1f0599f724889e50222fc1614d4f34df24851ef830a84c7e56
CVE-2023-4950,0,0,a4648195833b242bd8dc90f4040087dba411d39a1856adc272c663858070dd30,2024-11-21T08:36:19.963000
CVE-2023-49501,0,0,d1d4cf2e652bd9d2b1793967db0891199408ff347661870dbf859b89bae84e59,2024-11-21T08:33:29.360000
CVE-2023-49502,0,0,d0187358d2290dbe6633ea162778b6f0ab90153cb026ab3d49a55b19dc1b8e21,2024-11-21T08:33:29.580000
CVE-2023-49508,0,1,23e3fab68cb910ba43272343c8414a5e51d6003e3a3a2b66bc609d4ae8b09164,2025-01-06T12:15:06.627000
CVE-2023-49508,0,0,23e3fab68cb910ba43272343c8414a5e51d6003e3a3a2b66bc609d4ae8b09164,2025-01-06T12:15:06.627000
CVE-2023-4951,0,0,1bbc4959ac980f797457caaf60413d1bbf7dabd5bc8076002f966e17295d986f,2024-11-21T08:36:20.073000
CVE-2023-49515,0,0,a4c0f2e305f9bd09bbc07b299160e9ee82b974a0de89b6dbf4caf99ad0f89a33,2024-11-21T08:33:29.953000
CVE-2023-49528,0,0,ae59a6a1bbac46ad56a1a54c31382ae08b7998b27d77cdcde165b61ff049b910,2024-11-21T08:33:30.187000
@ -244278,7 +244278,7 @@ CVE-2024-11352,0,0,de3582e15d7397e011d69382c9fedc502b246facf9b57003a974bb327fc47
CVE-2024-11353,0,0,9cdabea534e964700c7cde9ffd2f1a82245a0291b01694ff89cf8e86136ee6b3,2024-12-07T02:15:17.850000
CVE-2024-11354,0,0,87986c107f2d598ec9b5e54e0419b4149d63b452699e5d17cc10ffbc61f46d56,2024-11-26T17:34:55.767000
CVE-2024-11355,0,0,bcd06b7aaf6858bb0e6c5d2b1c10c8ea5c66a082156d2df4f7c406b73d08ca66,2024-11-22T06:15:19.450000
CVE-2024-11356,0,0,f8d8d03a75cfcf96efd6bc394483c99519d50bb66fbf013b33f639a5bd282fa4,2025-01-06T06:15:06.177000
CVE-2024-11356,0,1,e7a629179db8f92c458758e96025db6a9f4ab7e98f0d179ea3a98a7bb8b5cb81,2025-01-06T14:15:07.233000
CVE-2024-11357,0,0,1d7d8f3774cc93c4f64f8dd24ec6d72fa59b1e80d7807762e3b0711933fab190,2025-01-02T06:15:07.887000
CVE-2024-11358,0,0,47cd4959cf6059d3ce512e4a70aacad449e0c8fa7c946c06b27cb8a531be2885,2024-12-16T17:15:07.543000
CVE-2024-11359,0,0,df4c05f348228b2c2882e44a6e533849bb9a56f9c6073e32478ef7ab197c57b9,2024-12-12T06:15:21.157000
@ -244701,7 +244701,7 @@ CVE-2024-11841,0,0,29b2d8ff488587d8a4e1b1dd2198cfdea87c7a6a53f626f6147622127a803
CVE-2024-11842,0,0,b468b59966d33ed9e284180ae3d4b6da56e7697d6ed23bc6f677a3b17c040944,2024-12-27T19:15:07.700000
CVE-2024-11844,0,0,04412f8d1e89e121c8013622c692022d4f804bc36ac5e0beee05cf8987e8ae7f,2024-12-03T09:15:04.473000
CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000
CVE-2024-11849,0,0,bf9357d6c75731c41afc18b42be9243803dfe6b4f2d58b564859df0e15244dcb,2025-01-06T06:15:06.390000
CVE-2024-11849,0,1,8473aa8dbb39ffe86675b3f129e111bbce6418b17bab8f378a854d3fb16c0c29,2025-01-06T14:15:07.883000
CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000
CVE-2024-11852,0,0,fcae6a31251538fa21922d7f8a34f94ee6c6390a3a29cfb5a4e8903a4faa77f7,2024-12-22T02:15:16.510000
CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000
@ -244986,13 +244986,13 @@ CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192e
CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000
CVE-2024-1230,0,0,4e58704ea3cd6d96f1b95bf7630f56ca27fd7e9cf7f7c464007165035f04082e,2024-11-21T08:50:06.710000
CVE-2024-12300,0,0,0328248a8fb43f00ec541ab5455f8917a3d5219f0a666c2cc7f8e41b776c4b36,2024-12-13T04:15:05.073000
CVE-2024-12302,0,0,073760ea6f1570e4c66c7669aa02989f47f363a587e5906dee32d0c024cffb9f,2025-01-06T06:15:06.487000
CVE-2024-12302,0,1,be2d24e288379ff4969bb6910d8961bf9165ff36f8ee6388f83c4a36b8b6f159,2025-01-06T14:15:08.023000
CVE-2024-12305,0,0,273e297c2c3404dceb5aa9b15a9613cb372f4eca60a3a417a7d24dc0972d8e0a,2024-12-09T09:15:04.970000
CVE-2024-12306,0,0,902fb51a4dbdd5670cb1cf5559cf247f9b3ba9c72034fe5330e7316e326e07b4,2024-12-09T09:15:05.293000
CVE-2024-12307,0,0,dd08ec1d0c570e2dfd8ff10541807fa47db4494718b1c9efb61df634a03bf8fd,2024-12-09T09:15:05.433000
CVE-2024-12309,0,0,16d03882c6009566e79b9c8c2443055d4427c7f1e57279e0146963b711b56a47,2024-12-13T09:15:07.810000
CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654fdc,2024-11-21T08:50:06.870000
CVE-2024-12311,0,0,4bf9e72d05b8594d3bb282d32aeb26b53ea71df084f5ef8fcb52eaad71d690ad,2025-01-06T06:15:06.583000
CVE-2024-12311,0,1,815e3491f6c1f7b3abc4a4d287cec4a5fe89f53db46c7d87ecfb8135e71ecf12,2025-01-06T14:15:08.153000
CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000
CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000
CVE-2024-12323,0,0,06bea100acdfcead34fe4d931dfd21a64a280c25bd363945a1e09f063078f508,2024-12-10T15:15:07.300000
@ -245232,7 +245232,7 @@ CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d
CVE-2024-12791,0,0,00e274fb2644dd0737fedef7f600b72a2d7c4a341721b9f72cd4a6ccf93a5a2a,2024-12-19T18:15:08.263000
CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000
CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000
CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000
CVE-2024-12794,0,1,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000
CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000
CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000
CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000
@ -245336,7 +245336,7 @@ CVE-2024-12967,0,0,373940667d19816c3418d961d099af60d3af6231ff28cd91d7af64f003be3
CVE-2024-12968,0,0,473738ee0e0f6b6f86e9a3a8b8a283681eba25a6f3d6076d3cb1c2aa54667b10,2024-12-27T17:15:07.867000
CVE-2024-12969,0,0,bfc800521737ced79f0fdf84fea2951556653a7bc3ba525e5b81eb87e6e86ab2,2024-12-27T17:15:07.993000
CVE-2024-1297,0,0,be31694658346ee468905bb61ed45bf681e56bb20ac49e80e658637c7d9e5bfd,2024-12-31T14:28:27.090000
CVE-2024-12970,1,1,ce16370907cf3d7d7ff5c5aa38fbc190de4af1a2f94a3c047e8f9929c4425823,2025-01-06T12:15:06.573000
CVE-2024-12970,0,0,ce16370907cf3d7d7ff5c5aa38fbc190de4af1a2f94a3c047e8f9929c4425823,2025-01-06T12:15:06.573000
CVE-2024-12976,0,0,43a9acc7b69e46736fdd09ae24588944ab6f6c791f8fe6b3bbe2688255c67125,2024-12-27T19:15:08
CVE-2024-12977,0,0,9458814f2ac9e7493633a6831104d1d77636f0bfc645e189a28897428c96b0b7,2024-12-27T19:15:08.130000
CVE-2024-12978,0,0,04a59dc4b363139238466108de9e8a94b7678b4462324185368dbf91da408f7c,2024-12-27T04:15:05.603000
@ -245422,18 +245422,18 @@ CVE-2024-1307,0,0,791d403fd6ce043b636953425f5891ef42986249387c4cd3003ec2c058fbc7
CVE-2024-13070,0,0,2bcea116957c968caaf0f2b2dd670ac9a0f612c50f9d2c5bf3eb2ee627a8ffe6,2024-12-31T15:15:07.853000
CVE-2024-13072,0,0,84bf422f3b8a7c21e09c757cc41407a792f8a3cc3207316f0bc15bb0ec62e7cf,2024-12-31T15:15:08.083000
CVE-2024-13074,0,0,82c625761bcc4faebb78f7834747785ec87ab3107c377244ca37e3cdc15a076b,2024-12-31T18:15:25.917000
CVE-2024-13075,0,0,d92fe4ba17505ba4973e75c3aa31dc5a4cc50c852bf2ed6d9d6798779938ec68,2025-01-02T20:16:04.217000
CVE-2024-13076,0,0,84a99f289fe02a5cf28be407189cc5ef377d813180497111dc905339a1a24110,2025-01-02T20:16:04.437000
CVE-2024-13077,0,0,b36a34d4540734be38220510b5d34296119f7d8845ccc2461973591d4c725ad2,2024-12-31T19:15:07.880000
CVE-2024-13078,0,0,f841cdf9951f8f62d631c8a4c7d84792f57e84c9e348f86237ab2db28cc9e99a,2025-01-02T20:16:04.620000
CVE-2024-13079,0,0,3727f51fe3cc89e7e50fd09f7933cab41c60cb54a9758cc5aa44064113695d62,2025-01-02T18:15:16.243000
CVE-2024-13075,0,1,2cb13cdf67fdca2c3fead054a5dd1db8b5aa80d267d1df554624c5bb7ed51b62,2025-01-06T14:57:56.690000
CVE-2024-13076,0,1,112637eaa000ca8ff065f2327ed83998dc721c9a700d6a6ae4ef32916cb3aa62,2025-01-06T14:51:54.247000
CVE-2024-13077,0,1,82a1babf4a1d9b2dfecd283d6defb1aa61fff3ef99cf6e7f77d225aa53c1f8b4,2025-01-06T14:51:06.337000
CVE-2024-13078,0,1,7291acf56374c3eeeb64f060b0d1e69876872ca8b8e88146f012144173c5de42,2025-01-06T14:49:59.017000
CVE-2024-13079,0,1,5a9c0171e2f4848774c3795fcb192cd8b9cdcae0b524a0addadfe416efdd2391,2025-01-06T14:49:38.193000
CVE-2024-1308,0,0,b2bb733c7402260f9ace902e9d676967e691f690d52b513a8afbdef713b7d4c5,2024-11-21T08:50:17.413000
CVE-2024-13080,0,0,1c8e2d440193d4ba780437306c4cf53651d6de43caa2d9826661c7b4abb00982,2024-12-31T20:15:28.157000
CVE-2024-13081,0,0,91234c39213749eb5c13a194582c0394636f40bdd089bf3747e332ef70ede7b6,2024-12-31T21:15:07.670000
CVE-2024-13082,0,0,54477787104f4bda28baf3002f70872af0bd5b4676295cc028c86994e3a89921,2024-12-31T21:15:08.730000
CVE-2024-13083,0,0,32b708aac3faa06e2393867cece89bb98495b48a1f0549362c3f7cc78e7abb6e,2024-12-31T22:15:07.167000
CVE-2024-13084,0,0,a50ea27e74e0d88c7f3f84b2049f2b396c45f947ef50cfccbe9c3d67018207c6,2024-12-31T22:15:07.783000
CVE-2024-13085,0,0,583f6589f3745986be745571f05a9c49dd58310f5336b3e79c209e1e8b9df75e,2024-12-31T23:15:07.440000
CVE-2024-13080,0,1,376a4cec2510e9bb91b8ac99ea37fa1922ddf304eac6d60768b73e6454a579a4,2025-01-06T14:47:35.650000
CVE-2024-13081,0,1,4cde7e3fef0cb67973c6747bc854a5c0b024537a6b5407b8f72176e7ffcef06f,2025-01-06T14:47:13.503000
CVE-2024-13082,0,1,821d00f62f130737f4fa2a0cfd42770dd159019d16c467ec665c8a0a558b33ea,2025-01-06T14:46:40.910000
CVE-2024-13083,0,1,1a2720ef5e2b0f78c5a184d63cc5277e40fc2350e65508e227550bab7801181c,2025-01-06T14:45:40.307000
CVE-2024-13084,0,1,adf9bed155b1bdff6036c9a3cc3b5be77cff7d25fd108fae5917224d01f6d618,2025-01-06T14:44:57.910000
CVE-2024-13085,0,1,b364989b605ebd3cb7a9fd89ba82a0e74186880c8e21583fb8d42e57634e17d7,2025-01-06T14:43:13.437000
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
CVE-2024-13092,0,0,c91b73d17c0f98cc2058505aaad304ed0c903dbed81a5c0acc973b3fa326c5d8,2025-01-02T09:15:17.790000
CVE-2024-13093,0,0,30c693dcfee82a408abab68f4aeb856a5d4d0c29c89c2c28c90e10ec4260d37a,2025-01-02T09:15:18.047000
@ -246614,7 +246614,7 @@ CVE-2024-20661,0,0,30e543c400437abc7f96e3109a6c30132015ba4b260c75c12935ac357f961
CVE-2024-20662,0,0,917a258648c4a51eaadafb0946b162ba9ad319c776312b2d34e4c3912032ae0e,2024-11-21T08:52:52.070000
CVE-2024-20663,0,0,98d0ecc071c6881aa086233a4f49226ea03fe88e6a42e7eb2818b7b99ad13c35,2024-11-21T08:52:52.223000
CVE-2024-20664,0,0,d2eb4face0f8f0d0f0a4a04f47040d17c1c6026a1869b44738d228cbc7d850db,2024-11-21T08:52:52.380000
CVE-2024-20665,0,0,644d4382657eb58e6705d430963b13a715603b1c7d8141583e9fe1fba74c6247,2024-11-21T08:52:52.547000
CVE-2024-20665,0,1,ddba14178d893bcbb52fd3cb7ea26310f3edddc497c01a887ad1e2b25a06d853,2025-01-06T14:33:29.733000
CVE-2024-20666,0,0,64613b17d7a3102d1325ccd3f27245ab53ccbff3b654c38bebeb520779d319e8,2024-11-21T08:52:52.700000
CVE-2024-20667,0,0,74b7eaeab6adad7a8d6a11e3aa398b5c550729fc518babae280c377b7f0458cb,2024-11-21T08:52:52.857000
CVE-2024-20669,0,0,373f2687061e10de8497f77e610c1b054ac6aedaeb4b11bc0800a0a32dde59b5,2024-11-21T08:52:52.990000
@ -247431,7 +247431,7 @@ CVE-2024-21460,0,0,bbc35bb85743b24cb381a6829c5bdcd665ae90fe45617113a38e351e4de91
CVE-2024-21461,0,0,b8ed00e9f935c14f7c8ff589a6c471c291b3eab36d44de52ee6255ffad25fecf,2024-11-21T08:54:25.873000
CVE-2024-21462,0,0,bcbc82ba53d1866480b8fd482c19e43e0b78dde416cc6a766bb3446d7bac28c9,2024-11-21T08:54:26.687000
CVE-2024-21463,0,0,a1851904124a020600ad4c9445d48b896f0d4532a9c867b668e208a6b9bdcbba,2024-11-21T08:54:27.220000
CVE-2024-21464,1,1,268db82f7c4decef1481aaed9da390422a5c340d11247b7365ac11823aea5232,2025-01-06T11:15:06.537000
CVE-2024-21464,0,0,268db82f7c4decef1481aaed9da390422a5c340d11247b7365ac11823aea5232,2025-01-06T11:15:06.537000
CVE-2024-21465,0,0,f28128125b5e1a84044a749ab740f960fd012337488e5de839191b04efcf90ad,2024-11-21T08:54:27.423000
CVE-2024-21466,0,0,df004bc4c4677aba92f60dd08ca0577dd1ffc9a32b586a3bd8893ce9e4ad210b,2024-11-21T08:54:27.980000
CVE-2024-21467,0,0,63521bb6f92e531d4bfcb6b0eed69a9688a59d6e337966a6b7682d8bc9335a39,2024-11-26T15:46:26.137000
@ -248836,7 +248836,7 @@ CVE-2024-23362,0,0,a9c1a4ca06b7e84f3ee5e603d9cb8d6a849416b5aaef36dc4087c56cd34cf
CVE-2024-23363,0,0,b929ee6c16d557196594ea8ea75afe87ecf60c3c3fa389f565db8a6d87a69155,2024-11-21T08:57:36.620000
CVE-2024-23364,0,0,92b9c955a190e0f7988a265e74d2e2e61407eb429f6463ea32a27f54b1b1d636,2024-09-03T12:59:02.453000
CVE-2024-23365,0,0,00039caffc3c0a9aa17c21d65288fdfa63db6afc09492a7d6f8ebce8d8ae54c2,2024-09-03T12:59:02.453000
CVE-2024-23366,1,1,02302580fc0299484a8bf5057ad914f1a3a4db01109ce4e64fb7430e4b0e2383,2025-01-06T11:15:07.977000
CVE-2024-23366,0,0,02302580fc0299484a8bf5057ad914f1a3a4db01109ce4e64fb7430e4b0e2383,2025-01-06T11:15:07.977000
CVE-2024-23368,0,0,b2f512c479cfd6ff7ceb55face2c60799ea87250aa89c6478e5ec1ffaf580e8f,2024-11-21T08:57:37.290000
CVE-2024-23369,0,0,7004519158a8d3cb9d79373d32f5689062b600a6ed9e64041c9c4aa11e898c8b,2024-10-16T20:30:19.067000
CVE-2024-2337,0,0,04ebb312faf7a4a0b6a127bf56097a2a7eda8f9ca03897ecb8aa2895a9ed60cf,2024-11-21T09:09:32.557000
@ -256158,7 +256158,7 @@ CVE-2024-33037,0,0,004b5e473e32e61ba89e464690eb52425842309fdbb691ce74e4f1fe5ca07
CVE-2024-33038,0,0,3fa95bcb86da6690578028a8fd1c5bf34e8f52fe062a9d486732742636ea2fe2,2024-09-04T17:21:28.943000
CVE-2024-33039,0,0,c70cd5c8387baec87864315064b8cd71824c91bfe9bffb94509e0271db4159ed,2024-12-11T16:15:37
CVE-2024-33040,0,0,ec89092e2f81a4db83f210a851ea365544915c884404ba5019a0b6e1e6743860,2024-12-12T15:21:35.590000
CVE-2024-33041,1,1,fb5ae64a40f4b872c599bec077de2cf56209f197626d5b849f24a168cc65d477,2025-01-06T11:15:08.157000
CVE-2024-33041,0,0,fb5ae64a40f4b872c599bec077de2cf56209f197626d5b849f24a168cc65d477,2025-01-06T11:15:08.157000
CVE-2024-33042,0,0,cb5fc696225b31902209ef8ef520020bd65113c14578e54cac28b7b4036e44fd,2024-09-04T17:08:07.433000
CVE-2024-33043,0,0,888d59d76f2b08f2775279205fe97ef80c2d9ac568503f1a140b40b0aecf1319,2024-12-20T14:33:22.363000
CVE-2024-33044,0,0,2d7b18559a893802d33431e8ff7cb5b7a9add59de5079930cd1c576a25dcc1c0,2024-12-12T15:23:26.007000
@ -256172,18 +256172,18 @@ CVE-2024-33051,0,0,32ce4c3eacc9e21c4175acb628649cb84f4d7cc6f2643c5301f869cbf4644
CVE-2024-33052,0,0,a5d8e7449a09efaab4e8a36068f440af976c17a80eacaa3425868abb37d97949,2024-09-04T17:18:07.783000
CVE-2024-33053,0,0,3880bbdd10137ef63185c17bdb708273cc216500aa528571fafa89df1e94ba75,2024-12-12T15:23:57.243000
CVE-2024-33054,0,0,eb35959fe5046cee87f0e8375744b9b7bc2ba82e7db4c375d7ced8537946b5f5,2024-09-04T17:06:47.337000
CVE-2024-33055,1,1,bf23714a88a34d953acad88be0163778517e670dd4538435308364f84bac9dd5,2025-01-06T11:15:08.310000
CVE-2024-33055,0,0,bf23714a88a34d953acad88be0163778517e670dd4538435308364f84bac9dd5,2025-01-06T11:15:08.310000
CVE-2024-33056,0,0,0b7f547ee3c89f47ebb165988f3996dbfd5d0b368f985cca939e232e93a6befa,2024-12-12T15:25:15.440000
CVE-2024-33057,0,0,1c92c61ecb7a8765b124d1e703614674040ea44a90e7d048beb7b1c44c6de717,2024-09-04T17:06:24.843000
CVE-2024-33059,1,1,f061aacd21fb2658c82f91356f41645818a6b5e092df8a0cba9bd3f1b5cedb57,2025-01-06T11:15:08.470000
CVE-2024-33059,0,0,f061aacd21fb2658c82f91356f41645818a6b5e092df8a0cba9bd3f1b5cedb57,2025-01-06T11:15:08.470000
CVE-2024-3306,0,0,093d5328c842e15a972b71e278c2d0dbdec8004a861bda133bd4338bd1cf6d54,2024-09-19T14:43:51.830000
CVE-2024-33060,0,0,d63fb9907aa3cb0bc7501efbfaa4a069641c9b88fabbf41becf835cca562c14e,2024-09-04T17:06:08.407000
CVE-2024-33061,1,1,a45b1e729ebb5b9bb038b7fafb5c5028a4fbcb6b9643409dfc42bc0664669b94,2025-01-06T11:15:08.617000
CVE-2024-33061,0,0,a45b1e729ebb5b9bb038b7fafb5c5028a4fbcb6b9643409dfc42bc0664669b94,2025-01-06T11:15:08.617000
CVE-2024-33063,0,0,653997ca09ab3cc513e42e57788b4aeaeb606731b2b1f5440bf511b2642493be,2024-12-12T15:26:19.350000
CVE-2024-33064,0,0,02367680089235514c560f68b202c9e04de82b07dbfb786741881f3459cd7935,2024-10-16T19:52:54.483000
CVE-2024-33065,0,0,820aeb82046c04074680c0efb639ca176e5bd0cb7e0d09e06a9618e10b57f782,2024-10-16T19:50:45.190000
CVE-2024-33066,0,0,323275c133034cf4224fb00037d116cf25466127dfeb2577a4ca56f8f20e540b,2024-10-16T19:49:40.333000
CVE-2024-33067,1,1,fb59dae36a5bf0ad8508db8803a155df789fe3e6c3caa06195243c275d307002,2025-01-06T11:15:08.770000
CVE-2024-33067,0,0,fb59dae36a5bf0ad8508db8803a155df789fe3e6c3caa06195243c275d307002,2025-01-06T11:15:08.770000
CVE-2024-33068,0,0,1d4eb491ffd27751b128ddbcdd27665d885fb6c0654a60e64c8908848b5f2e57,2024-11-07T20:07:29.220000
CVE-2024-33069,0,0,4a5a5f18faff9786c7e7eff1069eadfad4725803a4dd186adcecf1b88d434afa,2024-10-16T19:48:32.207000
CVE-2024-3307,0,0,5392e910a9f18aa74f00667d7fa40ed94d60062bc5e8b43b55756ba9f0da5e3e,2024-11-21T09:29:21.743000
@ -263444,8 +263444,8 @@ CVE-2024-43050,0,0,42271ce6ad3806c1a44b603d2bbc55cdacd28a664360bd8e0ae1272488c01
CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b9d5,2024-12-12T15:28:54.787000
CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000
CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000
CVE-2024-43063,1,1,612df8035a06126aab6f71180a90da3cf5da239f499f515f4fe2684622f6ceb1,2025-01-06T11:15:08.930000
CVE-2024-43064,1,1,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000
CVE-2024-43063,0,0,612df8035a06126aab6f71180a90da3cf5da239f499f515f4fe2684622f6ceb1,2025-01-06T11:15:08.930000
CVE-2024-43064,0,0,a66b7e3f07db805b059e4fc51b71eff2120fb28826686e53b5baccb1ae81e1f2,2025-01-06T11:15:09.073000
CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000
CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000
CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000
@ -264510,7 +264510,7 @@ CVE-2024-44205,0,0,479ce40b4658e11ccfe7113f730a76d2315c870d209a012f733f4449cc380
CVE-2024-44206,0,0,d8e5aac347cb04d8524629aaf70121480231b4f8b4280238ac4fc071f1a60444,2024-11-21T21:15:21.477000
CVE-2024-44207,0,0,df8e300cf7f6b361cf79cc82a13f930868069c30b911e0bc1e5fb07b5725fa64,2024-10-04T17:31:41.970000
CVE-2024-44208,0,0,0f110c58ea3b1936a6fa272413b21f60fe5e44f11a840cf53eeb8d5bd692f5ed,2024-10-30T19:35:18.340000
CVE-2024-44211,0,0,c9c4cbbd82019994e55fa96cebc5a169527b6d90089393f019e2d19b6df0ca80,2024-12-20T17:15:15.053000
CVE-2024-44211,0,1,8ffcfc397958e8711bea7b409479ee053bed8240f8d62c68d05ebb9da012e9a8,2025-01-06T13:58:21.267000
CVE-2024-44212,0,0,7535d563779e625850b85dac200bcdac9ff61370543d5a527301902571d866fd,2024-12-20T19:15:06.570000
CVE-2024-44213,0,0,d54c85400318007c85dac3cf8abc38cb1350827f6126f81634ef8d1828179ea9,2024-10-30T19:35:19.187000
CVE-2024-44215,0,0,e32762ff0bf2f6f2e22b7422e9deddd79856979cb2bda3d837557df7bdb5d6cf,2024-10-30T21:35:06.770000
@ -264520,13 +264520,13 @@ CVE-2024-44218,0,0,f11365ca91eee54b03c90ea2492115b72c14e7e1b502a66bb17b9ea40f969
CVE-2024-4422,0,0,88e38c8f81c558e863db276496d3d3966ccaae5dc31d3db1528474edcaac1cce,2024-11-21T09:42:47.860000
CVE-2024-44220,0,0,bad2b508e552d1a09c11c8017d22721370fec111da93bdc30606a926bfe3892d,2024-12-18T18:37:48.003000
CVE-2024-44222,0,0,73a3c689e7090451963deac3a94c7bd82e8f2ad14cb50c55b40009dcf9370f17,2024-10-30T17:25:30.903000
CVE-2024-44223,0,0,cdaafb7ad1aa4136c4b407107cef3b200110a403661fd356994d4b6de36be0d7,2024-12-27T19:15:08.647000
CVE-2024-44223,0,1,e7c24ca22da306873e19ce1beaefb0f8a859aa352b193df7d6f03bb6b9e568ac,2025-01-06T13:38:02.493000
CVE-2024-44224,0,0,d84e8efd72c988effe9ed335d10230fb30a5bb6791d136b0cee7bff3626fafa4,2024-12-20T19:15:06.757000
CVE-2024-44225,0,0,bebf76d665c6ac22f676be1b98259b9a9d870957d2984f48dd9ae887f391c1cd,2024-12-20T19:15:06.937000
CVE-2024-44228,0,0,233a9fa817aba532dc55e3bf55f1e7e1e04a30b62b44a655772ef05440625188,2024-10-30T20:35:27.570000
CVE-2024-44229,0,0,79811515ccef73d41159136745a09e4e9b2ae027bbfa748a8533cf5125c53ff1,2024-10-29T23:15:03.437000
CVE-2024-4423,0,0,904bfc58b1909282d82661cafb70a1a74dc795b741ee1a78c704e0498aedee0e,2024-11-21T09:42:47.973000
CVE-2024-44231,0,0,63eaf7b89c80e2b6f9288b9e173d5041f87f7d6191463179a32995e4218eac06,2024-12-20T17:15:15.277000
CVE-2024-44231,0,1,50b5a6efbd657ac5be338774290c79c41a056afd4d50503f4277fcf86f278b3c,2025-01-06T13:35:56.217000
CVE-2024-44232,0,0,c9e60a0c1965d8b25770744bfea513326538d2727d3411f3ea53393806685d07,2024-11-04T21:35:07.233000
CVE-2024-44233,0,0,faa9cc95169f99a6ba5b7b809b52a3296f8f8d5cfb2ab7775af98f1caeb58709,2024-11-04T22:35:07.613000
CVE-2024-44234,0,0,1b996be4e23122b67d229b562bc4172f47ad474e322c6880a3e7f0b7746d3c2c,2024-11-04T21:35:08.147000
@ -265317,17 +265317,17 @@ CVE-2024-45528,0,0,ff006d3788a72915c0ea7e0acb04c7bc391e0a5989792ab2fc5081b004438
CVE-2024-4553,0,0,9862f42eb10f611dc9aec9c57d4f4f13e8047cde599ac2416b7f996e777484e8,2024-11-21T09:43:05.533000
CVE-2024-45537,0,0,597f8cb0bc693defc5493b35ff64dd73b6ef5e1561e8374a576856f0f629ae61,2024-10-01T20:41:33.207000
CVE-2024-4554,0,0,29103eb4d0b8fc6eb1c1a81b44a6bbfd0c979fea9590f8c8dd85408f98483465,2024-09-19T18:15:10.433000
CVE-2024-45541,1,1,51274b640375a2820e7f1484fb3f070939b71fb0a749b6e02a71928f4ae9c1b4,2025-01-06T11:15:09.230000
CVE-2024-45542,1,1,a56b1bce0adf91d9dad8cf087012b8ec7884408c3d93039936f8404c4eb87d4b,2025-01-06T11:15:09.390000
CVE-2024-45546,1,1,8403fc698bd5f592c2ef44e8b2c55cfb5649e2fd452892ff27b0c2584c28d968,2025-01-06T11:15:09.540000
CVE-2024-45547,1,1,4dc3eed2ac1b3c54c9ff2888a99f52b0a8b71ade207943bbae56c90042492d6c,2025-01-06T11:15:09.707000
CVE-2024-45548,1,1,3d56484871c5f989d6bd26cb413e0b687cf5563ecad273db2c9df0909a2aa015,2025-01-06T11:15:09.887000
CVE-2024-45541,0,0,51274b640375a2820e7f1484fb3f070939b71fb0a749b6e02a71928f4ae9c1b4,2025-01-06T11:15:09.230000
CVE-2024-45542,0,0,a56b1bce0adf91d9dad8cf087012b8ec7884408c3d93039936f8404c4eb87d4b,2025-01-06T11:15:09.390000
CVE-2024-45546,0,0,8403fc698bd5f592c2ef44e8b2c55cfb5649e2fd452892ff27b0c2584c28d968,2025-01-06T11:15:09.540000
CVE-2024-45547,0,0,4dc3eed2ac1b3c54c9ff2888a99f52b0a8b71ade207943bbae56c90042492d6c,2025-01-06T11:15:09.707000
CVE-2024-45548,0,0,3d56484871c5f989d6bd26cb413e0b687cf5563ecad273db2c9df0909a2aa015,2025-01-06T11:15:09.887000
CVE-2024-4555,0,0,42addb69d2a25e76680bd75ca9680f4458507a72790c92c0c02ea27cb2860a95,2024-09-12T15:13:25.520000
CVE-2024-45550,1,1,b0789fdd4961d36c08190b6dbce2260108f9777f2e0a44de8894dfe1e7a2da96,2025-01-06T11:15:10.050000
CVE-2024-45553,1,1,6c4f6e446b91e4d791279b00cecb9bdc5aa80c60e2b3c4a228bac5b39437acef,2025-01-06T11:15:10.207000
CVE-2024-45555,1,1,7fbff62653b149bd141f389e0b75ef05ec9b9bc8e4a8762678686006a6181419,2025-01-06T11:15:10.383000
CVE-2024-45558,1,1,98e955ee35293bb99ece2d059213abbe054f9d5bf8112563dd64a49acb170aa1,2025-01-06T11:15:10.550000
CVE-2024-45559,1,1,3817efc707280a2061c6d619f118d1fdf9eaa12e9f052dd916e5cb009c17ceb1,2025-01-06T11:15:10.720000
CVE-2024-45550,0,0,b0789fdd4961d36c08190b6dbce2260108f9777f2e0a44de8894dfe1e7a2da96,2025-01-06T11:15:10.050000
CVE-2024-45553,0,0,6c4f6e446b91e4d791279b00cecb9bdc5aa80c60e2b3c4a228bac5b39437acef,2025-01-06T11:15:10.207000
CVE-2024-45555,0,0,7fbff62653b149bd141f389e0b75ef05ec9b9bc8e4a8762678686006a6181419,2025-01-06T11:15:10.383000
CVE-2024-45558,0,0,98e955ee35293bb99ece2d059213abbe054f9d5bf8112563dd64a49acb170aa1,2025-01-06T11:15:10.550000
CVE-2024-45559,0,0,3817efc707280a2061c6d619f118d1fdf9eaa12e9f052dd916e5cb009c17ceb1,2025-01-06T11:15:10.720000
CVE-2024-4556,0,0,d3c0d9c7da9d7922d293ea55522a02a915493dd034ff9fc52c8d9c8976cd2d90,2024-09-12T15:09:55.107000
CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000
CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000
@ -267711,7 +267711,7 @@ CVE-2024-49331,0,0,fc33cda51d0ae00f7fe88fbdfa0860d165096722e67220af6538ac02d3a62
CVE-2024-49332,0,0,163fc61e1aa5949d0dc085fe875d10ef86a8206eb7889644482dca315618c25c,2024-10-24T15:49:34.827000
CVE-2024-49334,0,0,c834d2b3cc4ff6e9dea6658a6f1e0bf3ee35911e84a97a8c123fb548c9607113,2024-10-23T16:08:01.277000
CVE-2024-49335,0,0,3160ec720c602cc52406d525d62eec9c1419d94d6b3a852f9810bce5470fe4e2,2024-10-24T14:50:16.557000
CVE-2024-49336,0,0,013d94bdede5c6aa3853d5f953f494546c44f449943374ac3dffd0be4fc5f0f4,2024-12-19T18:15:22.850000
CVE-2024-49336,0,1,74b5d6ca5a527605069a19da7232fb13c834e91072ba01d322d091e1df5fa9ca,2025-01-06T14:29:06.027000
CVE-2024-4934,0,0,c48302b0b85313af5a6e75f2285d80b1e442db3b1b019c52648c5cb5dff0b2d3,2024-11-21T09:43:54.343000
CVE-2024-49340,0,0,121e4a69718b7eafa91c4d48c066b6562f54cd89bd7dd643eed0f1ac402e3c12,2024-11-08T15:06:21.730000
CVE-2024-49351,0,0,9d2fc2a435b61fd62d7b18f4f752bd55144b2c0d48ce521b6a020db1fccb6d13,2024-11-26T04:15:05.457000
@ -268989,7 +268989,7 @@ CVE-2024-51066,0,0,be8d42488560dde278907528220628acd7b9c959e1434a1bf1dbead4fac8f
CVE-2024-5107,0,0,cfd74aa13a9fbc85357817a74c8babd68a8bc1d5dfe9424bcc7079ee3a2d17ae,2024-11-21T09:46:59.060000
CVE-2024-51072,0,0,d31050b6f86bd1474c576a9adbed44a1fd96845f76da230b11a2e0afed15fe64,2024-11-26T18:15:19.603000
CVE-2024-51073,0,0,47550b86e87b9ad893be36bd036661bdba14fc9cfd111004954e770bf76aece7,2024-11-25T21:15:19.847000
CVE-2024-51074,0,0,46fa6d6a32acbe3d13af5177a97c0d6dfeb90ac011f6faf886199af6e54749db,2024-11-25T21:15:20.390000
CVE-2024-51074,0,1,5347cb1f0cf92dbf57bc95ee2581b58d2c08c673802ec81440eb1887778f199e,2025-01-06T14:15:08.603000
CVE-2024-51075,0,0,24a9c25e3ffc707f200389e741ea19b266840c341bd7e1a60e2cb6faa61d87dc,2024-11-04T13:41:29.567000
CVE-2024-51076,0,0,e5e3ed6e47651290142238cae400834ab55b60425e57165275989efcabaab333,2024-11-04T13:41:48.267000
CVE-2024-5108,0,0,f2b37ea1b0a2eaf40b91f0a0decdc81067dcde7a11d14f062144b5c6307c4de6,2024-11-21T09:46:59.207000
@ -271490,6 +271490,7 @@ CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c8981452067
CVE-2024-5591,0,0,e2235dc9118cc79b3ae0a586a8dc702d3b6ecde665fe3ab616de0261ded7cef3,2025-01-03T15:15:10.813000
CVE-2024-55917,0,0,a2dca5ced3d5dcd8acfac3cb6ea6554a4664068c0ef8ff9f8ad449c34b6bc417,2024-12-31T17:15:09.140000
CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000
CVE-2024-5594,1,1,42d88bff5e048997716e90f34250051c97a61e331f41209cc6dc6bb22fb4b491,2025-01-06T14:15:08.807000
CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000
CVE-2024-55947,0,0,694ecef04fd68cc6252e9a6f0180b35d880ee528dac800d937aa08150e860bb0,2024-12-24T16:15:25.463000
CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22362,2024-12-16T20:15:13.683000

Can't render this file because it is too large.