From 087533d190c22daa9ec62d253e314937d28ae2eb Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 13 Feb 2025 17:04:07 +0000 Subject: [PATCH] Auto-Update: 2025-02-13T17:00:40.639248+00:00 --- CVE-2011/CVE-2011-45xx/CVE-2011-4595.json | 6 +- CVE-2013/CVE-2013-16xx/CVE-2013-1636.json | 14 +- CVE-2014/CVE-2014-04xx/CVE-2014-0496.json | 6 +- CVE-2015/CVE-2015-94xx/CVE-2015-9457.json | 6 +- CVE-2019/CVE-2019-167xx/CVE-2019-16782.json | 10 +- CVE-2020/CVE-2020-175xx/CVE-2020-17519.json | 13 +- CVE-2021/CVE-2021-306xx/CVE-2021-30666.json | 4 +- CVE-2021/CVE-2021-307xx/CVE-2021-30761.json | 4 +- CVE-2021/CVE-2021-307xx/CVE-2021-30762.json | 4 +- CVE-2021/CVE-2021-309xx/CVE-2021-30983.json | 4 +- CVE-2022/CVE-2022-316xx/CVE-2022-31631.json | 10 +- CVE-2022/CVE-2022-387xx/CVE-2022-38745.json | 24 +- CVE-2022/CVE-2022-445xx/CVE-2022-44570.json | 18 +- CVE-2022/CVE-2022-445xx/CVE-2022-44571.json | 18 +- CVE-2022/CVE-2022-445xx/CVE-2022-44572.json | 14 +- CVE-2023/CVE-2023-06xx/CVE-2023-0614.json | 22 +- CVE-2023/CVE-2023-07xx/CVE-2023-0738.json | 32 ++- CVE-2023/CVE-2023-08xx/CVE-2023-0835.json | 22 +- CVE-2023/CVE-2023-09xx/CVE-2023-0922.json | 22 +- CVE-2023/CVE-2023-15xx/CVE-2023-1579.json | 22 +- CVE-2023/CVE-2023-15xx/CVE-2023-1582.json | 22 +- CVE-2023/CVE-2023-16xx/CVE-2023-1611.json | 22 +- CVE-2023/CVE-2023-206xx/CVE-2023-20652.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20653.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20663.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20664.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20665.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20666.json | 32 ++- CVE-2023/CVE-2023-206xx/CVE-2023-20670.json | 32 ++- CVE-2023/CVE-2023-247xx/CVE-2023-24797.json | 32 ++- CVE-2023/CVE-2023-247xx/CVE-2023-24798.json | 32 ++- CVE-2023/CVE-2023-247xx/CVE-2023-24799.json | 32 ++- CVE-2023/CVE-2023-248xx/CVE-2023-24800.json | 32 ++- CVE-2023/CVE-2023-252xx/CVE-2023-25210.json | 32 ++- CVE-2023/CVE-2023-252xx/CVE-2023-25211.json | 32 ++- CVE-2023/CVE-2023-252xx/CVE-2023-25212.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25303.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25305.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25355.json | 32 ++- CVE-2023/CVE-2023-253xx/CVE-2023-25356.json | 32 ++- CVE-2023/CVE-2023-256xx/CVE-2023-25693.json | 24 +- CVE-2023/CVE-2023-256xx/CVE-2023-25695.json | 24 +- CVE-2023/CVE-2023-267xx/CVE-2023-26733.json | 32 ++- CVE-2023/CVE-2023-267xx/CVE-2023-26750.json | 32 ++- CVE-2023/CVE-2023-267xx/CVE-2023-26776.json | 32 ++- CVE-2023/CVE-2023-267xx/CVE-2023-26777.json | 32 ++- CVE-2023/CVE-2023-268xx/CVE-2023-26855.json | 32 ++- CVE-2023/CVE-2023-268xx/CVE-2023-26856.json | 32 ++- CVE-2023/CVE-2023-268xx/CVE-2023-26857.json | 32 ++- CVE-2023/CVE-2023-268xx/CVE-2023-26866.json | 32 ++- CVE-2023/CVE-2023-269xx/CVE-2023-26921.json | 32 ++- CVE-2023/CVE-2023-269xx/CVE-2023-26974.json | 32 ++- CVE-2023/CVE-2023-269xx/CVE-2023-26976.json | 32 ++- CVE-2023/CVE-2023-275xx/CVE-2023-27530.json | 18 +- CVE-2023/CVE-2023-277xx/CVE-2023-27770.json | 32 ++- CVE-2023/CVE-2023-283xx/CVE-2023-28342.json | 32 ++- CVE-2023/CVE-2023-287xx/CVE-2023-28708.json | 24 +- CVE-2023/CVE-2023-482xx/CVE-2023-48267.json | 12 +- CVE-2024/CVE-2024-06xx/CVE-2024-0604.json | 86 +++++- CVE-2024/CVE-2024-10xx/CVE-2024-1049.json | 74 ++++- CVE-2024/CVE-2024-120xx/CVE-2024-12011.json | 56 ++++ CVE-2024/CVE-2024-120xx/CVE-2024-12012.json | 56 ++++ CVE-2024/CVE-2024-120xx/CVE-2024-12013.json | 56 ++++ CVE-2024/CVE-2024-125xx/CVE-2024-12586.json | 39 ++- CVE-2024/CVE-2024-131xx/CVE-2024-13119.json | 39 ++- CVE-2024/CVE-2024-131xx/CVE-2024-13120.json | 39 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1447.json | 94 ++++++- CVE-2024/CVE-2024-16xx/CVE-2024-1697.json | 84 +++++- CVE-2024/CVE-2024-22xx/CVE-2024-2202.json | 84 +++++- CVE-2024/CVE-2024-23xx/CVE-2024-2326.json | 54 +++- CVE-2024/CVE-2024-23xx/CVE-2024-2362.json | 26 +- CVE-2024/CVE-2024-280xx/CVE-2024-28047.json | 36 ++- CVE-2024/CVE-2024-29xx/CVE-2024-2936.json | 74 ++++- CVE-2024/CVE-2024-334xx/CVE-2024-33469.json | 20 +- CVE-2024/CVE-2024-362xx/CVE-2024-36293.json | 12 +- CVE-2024/CVE-2024-370xx/CVE-2024-37020.json | 36 ++- CVE-2024/CVE-2024-392xx/CVE-2024-39286.json | 36 ++- CVE-2024/CVE-2024-393xx/CVE-2024-39356.json | 36 ++- CVE-2024/CVE-2024-393xx/CVE-2024-39365.json | 36 ++- CVE-2024/CVE-2024-398xx/CVE-2024-39813.json | 36 ++- CVE-2024/CVE-2024-419xx/CVE-2024-41917.json | 36 ++- CVE-2024/CVE-2024-424xx/CVE-2024-42405.json | 36 ++- CVE-2024/CVE-2024-472xx/CVE-2024-47264.json | 32 ++- CVE-2024/CVE-2024-472xx/CVE-2024-47265.json | 32 ++- CVE-2024/CVE-2024-536xx/CVE-2024-53689.json | 93 +------ CVE-2024/CVE-2024-565xx/CVE-2024-56571.json | 37 +-- CVE-2024/CVE-2024-579xx/CVE-2024-57915.json | 156 +---------- CVE-2024/CVE-2024-59xx/CVE-2024-5933.json | 8 +- CVE-2025/CVE-2025-04xx/CVE-2025-0426.json | 60 +++++ CVE-2025/CVE-2025-12xx/CVE-2025-1224.json | 14 +- CVE-2025/CVE-2025-216xx/CVE-2025-21698.json | 41 +-- CVE-2025/CVE-2025-217xx/CVE-2025-21701.json | 33 +++ CVE-2025/CVE-2025-224xx/CVE-2025-22480.json | 56 ++++ CVE-2025/CVE-2025-242xx/CVE-2025-24200.json | 89 +++++- CVE-2025/CVE-2025-249xx/CVE-2025-24903.json | 60 +++++ CVE-2025/CVE-2025-249xx/CVE-2025-24904.json | 64 +++++ CVE-2025/CVE-2025-252xx/CVE-2025-25287.json | 68 +++++ CVE-2025/CVE-2025-253xx/CVE-2025-25352.json | 21 ++ CVE-2025/CVE-2025-253xx/CVE-2025-25354.json | 21 ++ CVE-2025/CVE-2025-253xx/CVE-2025-25355.json | 21 ++ CVE-2025/CVE-2025-253xx/CVE-2025-25356.json | 21 ++ CVE-2025/CVE-2025-253xx/CVE-2025-25357.json | 21 ++ CVE-2025/CVE-2025-258xx/CVE-2025-25897.json | 21 ++ CVE-2025/CVE-2025-258xx/CVE-2025-25898.json | 21 ++ CVE-2025/CVE-2025-258xx/CVE-2025-25899.json | 21 ++ CVE-2025/CVE-2025-259xx/CVE-2025-25900.json | 44 +++ CVE-2025/CVE-2025-259xx/CVE-2025-25901.json | 21 ++ CVE-2025/CVE-2025-265xx/CVE-2025-26511.json | 56 ++++ CVE-2025/CVE-2025-265xx/CVE-2025-26543.json | 32 ++- README.md | 96 +++---- _state.csv | 284 +++++++++++--------- 111 files changed, 3438 insertions(+), 700 deletions(-) create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12011.json create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12012.json create mode 100644 CVE-2024/CVE-2024-120xx/CVE-2024-12013.json create mode 100644 CVE-2025/CVE-2025-04xx/CVE-2025-0426.json create mode 100644 CVE-2025/CVE-2025-217xx/CVE-2025-21701.json create mode 100644 CVE-2025/CVE-2025-224xx/CVE-2025-22480.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24903.json create mode 100644 CVE-2025/CVE-2025-249xx/CVE-2025-24904.json create mode 100644 CVE-2025/CVE-2025-252xx/CVE-2025-25287.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25352.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25354.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25355.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25356.json create mode 100644 CVE-2025/CVE-2025-253xx/CVE-2025-25357.json create mode 100644 CVE-2025/CVE-2025-258xx/CVE-2025-25897.json create mode 100644 CVE-2025/CVE-2025-258xx/CVE-2025-25898.json create mode 100644 CVE-2025/CVE-2025-258xx/CVE-2025-25899.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25900.json create mode 100644 CVE-2025/CVE-2025-259xx/CVE-2025-25901.json create mode 100644 CVE-2025/CVE-2025-265xx/CVE-2025-26511.json diff --git a/CVE-2011/CVE-2011-45xx/CVE-2011-4595.json b/CVE-2011/CVE-2011-45xx/CVE-2011-4595.json index da25d2594fc..dec98258a21 100644 --- a/CVE-2011/CVE-2011-45xx/CVE-2011-4595.json +++ b/CVE-2011/CVE-2011-45xx/CVE-2011-4595.json @@ -2,7 +2,7 @@ "id": "CVE-2011-4595", "sourceIdentifier": "secalert@redhat.com", "published": "2020-01-10T14:15:09.950", - "lastModified": "2024-11-21T01:32:37.467", + "lastModified": "2025-02-13T16:11:58.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,8 +85,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:caseproof:pretty_link:1.5.2:*:*:*:lite:wordpress:*:*", - "matchCriteriaId": "212AAB0D-CDB3-48EA-8D71-D47B50BFA1C9" + "criteria": "cpe:2.3:a:caseproof:prettylinks:1.5.2:*:*:*:free:wordpress:*:*", + "matchCriteriaId": "F4EB0693-AD62-4850-9712-5F9A8384A138" } ] } diff --git a/CVE-2013/CVE-2013-16xx/CVE-2013-1636.json b/CVE-2013/CVE-2013-16xx/CVE-2013-1636.json index e40d5cdd296..f394bf15a9f 100644 --- a/CVE-2013/CVE-2013-16xx/CVE-2013-1636.json +++ b/CVE-2013/CVE-2013-16xx/CVE-2013-1636.json @@ -2,7 +2,7 @@ "id": "CVE-2013-1636", "sourceIdentifier": "cve@mitre.org", "published": "2014-03-12T14:55:26.600", - "lastModified": "2024-11-21T01:50:02.760", + "lastModified": "2025-02-13T16:03:03.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -63,19 +63,19 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:blair_williams:pretty_link_lite:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:caseproof:prettylinks:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.6.2", - "matchCriteriaId": "E9BBCB0D-945C-4DBE-8FE0-6BBFDAFB99BE" + "matchCriteriaId": "E8B2E67D-328E-464E-9515-11CCA4981683" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:blair_williams:pretty_link_lite:1.6.0:*:*:*:*:*:*:*", - "matchCriteriaId": "8457DC09-67FD-4CB4-B8C3-26F8C06F7B50" + "criteria": "cpe:2.3:a:caseproof:prettylinks:1.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "7DC8B0DD-82DA-4E41-A4B1-B3B80AF1C920" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:blair_williams:pretty_link_lite:1.6.1:*:*:*:*:*:*:*", - "matchCriteriaId": "413F06E0-5DB1-411D-902D-C62CD70631E7" + "criteria": "cpe:2.3:a:caseproof:prettylinks:1.6.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F4F7FED3-B2CC-45A3-B681-6C8CB4A49A50" } ] } diff --git a/CVE-2014/CVE-2014-04xx/CVE-2014-0496.json b/CVE-2014/CVE-2014-04xx/CVE-2014-0496.json index f3d48465b4e..290610ad418 100644 --- a/CVE-2014/CVE-2014-04xx/CVE-2014-0496.json +++ b/CVE-2014/CVE-2014-04xx/CVE-2014-0496.json @@ -2,8 +2,8 @@ "id": "CVE-2014-0496", "sourceIdentifier": "psirt@adobe.com", "published": "2014-01-15T16:13:04.100", - "lastModified": "2025-02-10T21:15:10.953", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T15:58:31.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -75,7 +75,7 @@ "description": [ { "lang": "en", - "value": "CWE-399" + "value": "CWE-416" } ] }, diff --git a/CVE-2015/CVE-2015-94xx/CVE-2015-9457.json b/CVE-2015/CVE-2015-94xx/CVE-2015-9457.json index d5e448f432a..9b69fc876d7 100644 --- a/CVE-2015/CVE-2015-94xx/CVE-2015-9457.json +++ b/CVE-2015/CVE-2015-94xx/CVE-2015-9457.json @@ -2,7 +2,7 @@ "id": "CVE-2015-9457", "sourceIdentifier": "cve@mitre.org", "published": "2019-10-10T16:15:10.940", - "lastModified": "2024-11-21T02:40:40.910", + "lastModified": "2025-02-13T16:11:58.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:caseproof:pretty_link:*:*:*:*:lite:*:*:*", + "criteria": "cpe:2.3:a:caseproof:prettylinks:*:*:*:*:free:*:*:*", "versionEndExcluding": "1.6.8", - "matchCriteriaId": "CADD39DB-4230-4A96-8BB3-48272B5EEAB5" + "matchCriteriaId": "46780791-D64C-407D-BE90-EF0B259A5170" } ] } diff --git a/CVE-2019/CVE-2019-167xx/CVE-2019-16782.json b/CVE-2019/CVE-2019-167xx/CVE-2019-16782.json index 33ec99ca656..3b6a58a8abd 100644 --- a/CVE-2019/CVE-2019-167xx/CVE-2019-16782.json +++ b/CVE-2019/CVE-2019-167xx/CVE-2019-16782.json @@ -2,7 +2,7 @@ "id": "CVE-2019-16782", "sourceIdentifier": "security-advisories@github.com", "published": "2019-12-18T20:15:16.180", - "lastModified": "2024-11-21T04:31:10.920", + "lastModified": "2025-02-13T15:37:40.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -115,16 +115,16 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionEndExcluding": "1.6.12", - "matchCriteriaId": "9D82859F-CE7F-46CD-B8AD-323A5DAF4DAF" + "matchCriteriaId": "D920538B-B12B-4CB6-B04C-4ED0122B1ACE" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.0.0", "versionEndExcluding": "2.0.8", - "matchCriteriaId": "08C26D46-A794-46E5-B417-9FAC01552413" + "matchCriteriaId": "75BDB863-165A-4446-855E-25243469A538" } ] } diff --git a/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json b/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json index 2c77ea361ac..b02ea665b4a 100644 --- a/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json +++ b/CVE-2020/CVE-2020-175xx/CVE-2020-17519.json @@ -2,8 +2,8 @@ "id": "CVE-2020-17519", "sourceIdentifier": "security@apache.org", "published": "2021-01-05T12:15:12.680", - "lastModified": "2024-11-21T05:08:16.523", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:47:51.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -193,6 +193,7 @@ "url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2%40%3Cdev.flink.apache.org%3E", "source": "security@apache.org", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -200,6 +201,7 @@ "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cannounce.apache.org%3E", "source": "security@apache.org", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -230,6 +232,7 @@ "url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1%40%3Cissues.flink.apache.org%3E", "source": "security@apache.org", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -237,6 +240,7 @@ "url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d%40%3Cissues.flink.apache.org%3E", "source": "security@apache.org", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -244,6 +248,7 @@ "url": "https://lists.apache.org/thread.html/r90890afea72a9571d666820b2fe5942a0a5f86be406fa31da3dd0922%40%3Cannounce.apache.org%3E", "source": "security@apache.org", "tags": [ + "Mailing List", "Not Applicable" ] }, @@ -317,6 +322,7 @@ "url": "https://lists.apache.org/thread.html/r4e1b72bfa789ea5bc20b8afe56119200ed25bdab0eb80d664fa5bfe2%40%3Cdev.flink.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -324,6 +330,7 @@ "url": "https://lists.apache.org/thread.html/r6843202556a6d0bce9607ebc02e303f68fc88e9038235598bde3b50d%40%3Cannounce.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -354,6 +361,7 @@ "url": "https://lists.apache.org/thread.html/r88b55f3ebf1f8f4e1cc61f030252aaef4b77060b56557a243abb92a1%40%3Cissues.flink.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mailing List", "Vendor Advisory" ] }, @@ -361,6 +369,7 @@ "url": "https://lists.apache.org/thread.html/r88f427865fb6aa6e6378efe07632a1906b430365e15e3b9621aabe1d%40%3Cissues.flink.apache.org%3E", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ + "Mailing List", "Vendor Advisory" ] }, diff --git a/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json b/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json index b5b3d6d61a2..01644540d5b 100644 --- a/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json +++ b/CVE-2021/CVE-2021-306xx/CVE-2021-30666.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30666", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T15:15:13.553", - "lastModified": "2025-01-29T18:15:40.907", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:49:28.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json b/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json index 412bdb45cd6..b7725a83b1d 100644 --- a/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json +++ b/CVE-2021/CVE-2021-307xx/CVE-2021-30761.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30761", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T14:15:10.257", - "lastModified": "2025-01-29T18:15:41.363", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:49:19.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json b/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json index d69bcc91406..09683a26ee1 100644 --- a/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json +++ b/CVE-2021/CVE-2021-307xx/CVE-2021-30762.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30762", "sourceIdentifier": "product-security@apple.com", "published": "2021-09-08T14:15:10.300", - "lastModified": "2025-01-29T18:15:41.597", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:49:10.863", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json b/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json index 724bccf0d4d..9a5ca65fe5a 100644 --- a/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json +++ b/CVE-2021/CVE-2021-309xx/CVE-2021-30983.json @@ -2,8 +2,8 @@ "id": "CVE-2021-30983", "sourceIdentifier": "product-security@apple.com", "published": "2021-08-24T19:15:23.507", - "lastModified": "2025-01-29T18:15:42.993", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:48:52.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json index f405b310f05..4c25b1c2ace 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31631.json @@ -2,13 +2,17 @@ "id": "CVE-2022-31631", "sourceIdentifier": "security@php.net", "published": "2025-02-12T22:15:29.007", - "lastModified": "2025-02-12T23:15:09.593", + "lastModified": "2025-02-13T16:15:35.670", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In PHP versions 8.0.* before 8.0.27, 8.1.* before 8.1.15, 8.2.* before 8.2.2 when using PDO::quote() function to quote user-supplied data for SQLite, supplying an overly long string may cause the driver to incorrectly quote the data, which may further lead to SQL injection vulnerabilities." + }, + { + "lang": "es", + "value": "En las versiones de PHP 8.0.* anteriores a 8.0.27, 8.1.* anteriores a 8.1.15, 8.2.* anteriores a 8.2.2, cuando se usa la funci\u00f3n PDO::quote() para citar datos proporcionados por el usuario para SQLite, proporcionar una cadena demasiado larga puede provocar que el controlador cite incorrectamente los datos, lo que puede generar vulnerabilidades de inyecci\u00f3n SQL." } ], "metrics": { @@ -55,6 +59,10 @@ { "url": "https://security.netapp.com/advisory/ntap-20230223-0007/", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://bugs.php.net/bug.php?id=81740", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json b/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json index fd659ee4fcf..83ed6e60a5a 100644 --- a/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json +++ b/CVE-2022/CVE-2022-387xx/CVE-2022-38745.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38745", "sourceIdentifier": "security@apache.org", "published": "2023-03-24T16:15:08.130", - "lastModified": "2024-11-21T07:17:00.937", + "lastModified": "2025-02-13T15:15:11.950", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json index 624f071fa81..a670c93e0db 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44570.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44570", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:11.090", - "lastModified": "2024-11-21T07:28:08.923", + "lastModified": "2025-02-13T15:37:40.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,31 +66,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "1.5.0", "versionEndExcluding": "2.0.9.2", - "matchCriteriaId": "B5F0D19B-77F4-422D-B31F-7FBF40FE9DDA" + "matchCriteriaId": "9BA75CAC-3827-43F4-BB00-E53CF292C99B" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.1.4.2", - "matchCriteriaId": "C1B66022-6E77-4CFA-B55F-5BC1182A23E2" + "matchCriteriaId": "88472664-E928-4495-B5F3-48791F54AA0F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.2.0", "versionEndExcluding": "2.2.6.1", - "matchCriteriaId": "49B7FE1A-545A-451A-ACEE-075BD917FA1D" + "matchCriteriaId": "D64B9931-BE5C-4284-8233-7572FB46B296" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.4.1", - "matchCriteriaId": "35AF318D-7357-4AE6-9337-9CF86E817D49" + "matchCriteriaId": "523AAE89-E040-4954-BDAF-9D738E44D02B" } ] } diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json index 915c03e3bcf..e035f038edd 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44571.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44571", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:11.153", - "lastModified": "2024-11-21T07:28:09.063", + "lastModified": "2025-02-13T15:37:40.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,31 +66,31 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.0.0", "versionEndExcluding": "2.0.9.2", - "matchCriteriaId": "1DF1BBB2-39B9-442F-86BC-243A2A951A24" + "matchCriteriaId": "0FFB3E60-D2AF-42BC-9C54-4542F15FB5BC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.1.4.2", - "matchCriteriaId": "C1B66022-6E77-4CFA-B55F-5BC1182A23E2" + "matchCriteriaId": "88472664-E928-4495-B5F3-48791F54AA0F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.2.0", "versionEndExcluding": "2.2.6.1", - "matchCriteriaId": "49B7FE1A-545A-451A-ACEE-075BD917FA1D" + "matchCriteriaId": "D64B9931-BE5C-4284-8233-7572FB46B296" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "3.0.0.0", "versionEndExcluding": "3.0.4.1", - "matchCriteriaId": "3C1AC2F2-87C8-4BAD-A1BD-FEA1041998D1" + "matchCriteriaId": "EFDFB2FB-F5BF-4138-AE0E-358E1D1424FB" } ] } diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json index 5bffa44a8df..e635b5018e6 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44572.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44572", "sourceIdentifier": "support@hackerone.com", "published": "2023-02-09T20:15:11.220", - "lastModified": "2024-11-21T07:28:09.180", + "lastModified": "2025-02-13T15:37:40.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -66,23 +66,23 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionEndExcluding": "2.0.9.2", - "matchCriteriaId": "C3DCA512-83FE-4A97-A7F7-FC664C52AE2A" + "matchCriteriaId": "4726EA3A-2F00-4BE6-A0D5-1DCDF9E93CC7" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.1.4.2", - "matchCriteriaId": "C1B66022-6E77-4CFA-B55F-5BC1182A23E2" + "matchCriteriaId": "88472664-E928-4495-B5F3-48791F54AA0F" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.2.0", "versionEndExcluding": "2.2.4.1", - "matchCriteriaId": "7ADE4A55-881C-4242-B146-E2E0F9D03DB9" + "matchCriteriaId": "68D93C0C-48AF-42AF-91C0-5E38C7FD73FE" } ] } diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json index 1fe5da0d987..42bee8ea4d5 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0614.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0614", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T23:15:06.957", - "lastModified": "2024-11-21T07:37:29.347", + "lastModified": "2025-02-13T15:15:12.557", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 } ] }, diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0738.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0738.json index 46d8a8e1039..e8753e2dab8 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0738.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0738.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0738", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-04-04T23:15:07.273", - "lastModified": "2024-11-21T07:37:43.727", + "lastModified": "2025-02-13T16:15:37.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0835.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0835.json index 6d924f6d885..572f3f80fe5 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0835.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0835.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0835", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-04-04T23:15:07.310", - "lastModified": "2024-11-21T07:37:55.543", + "lastModified": "2025-02-13T16:15:37.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 } ] }, diff --git a/CVE-2023/CVE-2023-09xx/CVE-2023-0922.json b/CVE-2023/CVE-2023-09xx/CVE-2023-0922.json index f6c42ac6885..11c5a8f6ca3 100644 --- a/CVE-2023/CVE-2023-09xx/CVE-2023-0922.json +++ b/CVE-2023/CVE-2023-09xx/CVE-2023-0922.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0922", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T23:15:07.000", - "lastModified": "2024-11-21T07:38:06.260", + "lastModified": "2025-02-13T15:15:12.780", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 4.2 } ] }, diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1579.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1579.json index f08405b02a7..a07b6397faa 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1579.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1579.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1579", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T23:15:07.043", - "lastModified": "2024-11-21T07:39:28.990", + "lastModified": "2025-02-13T15:15:12.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-15xx/CVE-2023-1582.json b/CVE-2023/CVE-2023-15xx/CVE-2023-1582.json index a7514948530..1506dd28fef 100644 --- a/CVE-2023/CVE-2023-15xx/CVE-2023-1582.json +++ b/CVE-2023/CVE-2023-15xx/CVE-2023-1582.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1582", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-05T20:15:07.663", - "lastModified": "2024-11-21T07:39:29.237", + "lastModified": "2025-02-13T15:15:13.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-16xx/CVE-2023-1611.json b/CVE-2023/CVE-2023-16xx/CVE-2023-1611.json index 9f995a665fe..7a03c8814ba 100644 --- a/CVE-2023/CVE-2023-16xx/CVE-2023-1611.json +++ b/CVE-2023/CVE-2023-16xx/CVE-2023-1611.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1611", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T22:15:06.967", - "lastModified": "2024-11-21T07:39:32.193", + "lastModified": "2025-02-13T15:15:13.357", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.0, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.2 } ] }, diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20652.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20652.json index 60bf1f7e690..35ffbb1eeb9 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20652.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20652.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20652", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:08.353", - "lastModified": "2024-11-21T07:41:17.753", + "lastModified": "2025-02-13T16:15:37.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20653.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20653.json index b1ccba1ab23..93375cbb187 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20653.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20653.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20653", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:08.407", - "lastModified": "2024-11-21T07:41:17.877", + "lastModified": "2025-02-13T16:15:37.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20663.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20663.json index 553805305ca..79e2fb96e98 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20663.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20663.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20663", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:08.973", - "lastModified": "2024-11-21T07:41:19.120", + "lastModified": "2025-02-13T16:15:37.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20664.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20664.json index 75e39e2f25f..201e44b5c21 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20664.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20664.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20664", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.023", - "lastModified": "2024-11-21T07:41:19.240", + "lastModified": "2025-02-13T15:15:13.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20665.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20665.json index 162d4c74bc3..e0506c69dd1 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20665.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20665.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20665", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.077", - "lastModified": "2024-11-21T07:41:19.363", + "lastModified": "2025-02-13T15:15:13.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20666.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20666.json index de25b571c02..7ec35aba2a1 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20666.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20666.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20666", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.130", - "lastModified": "2024-11-21T07:41:19.483", + "lastModified": "2025-02-13T15:15:14.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20670.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20670.json index 75061dd1c10..eb9c7fc1a77 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20670.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20670.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20670", "sourceIdentifier": "security@mediatek.com", "published": "2023-04-06T18:15:09.183", - "lastModified": "2024-11-21T07:41:19.597", + "lastModified": "2025-02-13T15:15:14.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24797.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24797.json index 932097838b4..ed511ed1be8 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24797.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24797.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24797", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.647", - "lastModified": "2024-11-21T07:48:25.187", + "lastModified": "2025-02-13T15:15:14.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json index 1795b505b72..dc0f0049234 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24798.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24798", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.687", - "lastModified": "2024-11-21T07:48:25.343", + "lastModified": "2025-02-13T15:15:14.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24799.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24799.json index 9369ce3e4a6..153c760240b 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24799.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24799.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24799", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.720", - "lastModified": "2024-11-21T07:48:25.490", + "lastModified": "2025-02-13T15:15:15.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-248xx/CVE-2023-24800.json b/CVE-2023/CVE-2023-248xx/CVE-2023-24800.json index 3349d1b7735..9c81dd5552d 100644 --- a/CVE-2023/CVE-2023-248xx/CVE-2023-24800.json +++ b/CVE-2023/CVE-2023-248xx/CVE-2023-24800.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24800", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.757", - "lastModified": "2024-11-21T07:48:25.623", + "lastModified": "2025-02-13T15:15:15.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25210.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25210.json index 2afdc45fb89..b06e8c67395 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25210.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25210.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25210", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.793", - "lastModified": "2024-11-21T07:49:18.817", + "lastModified": "2025-02-13T15:15:15.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25211.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25211.json index 2b8d692110d..f6bde83315f 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25211.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25211.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25211", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.827", - "lastModified": "2024-11-21T07:49:18.947", + "lastModified": "2025-02-13T15:15:15.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-252xx/CVE-2023-25212.json b/CVE-2023/CVE-2023-252xx/CVE-2023-25212.json index 20072f298f0..262f11edfa6 100644 --- a/CVE-2023/CVE-2023-252xx/CVE-2023-25212.json +++ b/CVE-2023/CVE-2023-252xx/CVE-2023-25212.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25212", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-07T02:15:07.867", - "lastModified": "2024-11-21T07:49:19.073", + "lastModified": "2025-02-13T15:15:15.907", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25303.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25303.json index 7688485b600..db84bc59796 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25303.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25303.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25303", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.603", - "lastModified": "2024-11-21T07:49:23.910", + "lastModified": "2025-02-13T16:15:38.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25305.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25305.json index f4319952212..536450172ca 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25305.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25305.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25305", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.643", - "lastModified": "2024-11-21T07:49:24.173", + "lastModified": "2025-02-13T16:15:38.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25355.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25355.json index 9a9103c541c..527b34eaf38 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25355.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25355.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25355", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.680", - "lastModified": "2024-11-21T07:49:26.080", + "lastModified": "2025-02-13T16:15:38.707", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25356.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25356.json index d75cefe8b86..dc08b2f3b2d 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25356.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25356.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25356", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.713", - "lastModified": "2024-11-21T07:49:26.200", + "lastModified": "2025-02-13T16:15:38.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-88" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json index e0dbdb55192..0fd3e541b54 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25693.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25693", "sourceIdentifier": "security@apache.org", "published": "2023-02-24T12:15:30.720", - "lastModified": "2024-11-21T07:49:57.050", + "lastModified": "2025-02-13T15:15:16.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json b/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json index c9fa377c538..8ad2aa297ca 100644 --- a/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json +++ b/CVE-2023/CVE-2023-256xx/CVE-2023-25695.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25695", "sourceIdentifier": "security@apache.org", "published": "2023-03-15T10:15:09.940", - "lastModified": "2024-11-21T07:49:57.180", + "lastModified": "2025-02-13T15:15:16.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26733.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26733.json index f20cc72874a..7b76557a30d 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26733.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26733.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26733", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.940", - "lastModified": "2024-11-21T07:51:53.427", + "lastModified": "2025-02-13T16:15:39.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26750.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26750.json index 6f2055431f5..42668564138 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26750.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26750.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26750", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.983", - "lastModified": "2024-11-21T07:51:53.710", + "lastModified": "2025-02-13T16:15:39.263", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -52,6 +72,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26776.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26776.json index ec48a6b6a3f..a3f8fec1b1e 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26776.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26776.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26776", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.063", - "lastModified": "2024-11-21T07:51:55.793", + "lastModified": "2025-02-13T16:15:39.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-267xx/CVE-2023-26777.json b/CVE-2023/CVE-2023-267xx/CVE-2023-26777.json index d9df6373cdf..f0819c6eef4 100644 --- a/CVE-2023/CVE-2023-267xx/CVE-2023-26777.json +++ b/CVE-2023/CVE-2023-267xx/CVE-2023-26777.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26777", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.103", - "lastModified": "2024-11-21T07:51:55.937", + "lastModified": "2025-02-13T16:15:39.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26855.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26855.json index 342f2215858..efcf3a9149d 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26855.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26855.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26855", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T02:15:07.113", - "lastModified": "2024-11-21T07:52:00.573", + "lastModified": "2025-02-13T16:15:39.787", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-330" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-330" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26856.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26856.json index 19b290e722c..125338d4b65 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26856.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26856.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26856", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-05T14:15:07.517", - "lastModified": "2024-11-21T07:52:00.700", + "lastModified": "2025-02-13T16:15:39.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26857.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26857.json index 4a773e025f1..efb7defc6f8 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26857.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26857", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-05T14:15:07.547", - "lastModified": "2024-11-21T07:52:00.830", + "lastModified": "2025-02-13T16:15:40.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26866.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26866.json index bd7382f6089..78cc331c5f6 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26866.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26866.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26866", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T13:15:08.750", - "lastModified": "2024-11-21T07:52:01.840", + "lastModified": "2025-02-13T16:15:40.353", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26921.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26921.json index 1265c5c5d1e..a995e83edb0 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26921.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26921.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26921", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.143", - "lastModified": "2024-11-21T07:52:04.213", + "lastModified": "2025-02-13T16:15:40.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26974.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26974.json index 3529c1f1234..6ecfcc25ba3 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26974.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26974.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26974", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.307", - "lastModified": "2024-11-21T07:52:08.363", + "lastModified": "2025-02-13T16:15:40.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26976.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26976.json index 919a9fcdbe3..5b6a6f671b0 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26976.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26976.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26976", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T02:15:07.157", - "lastModified": "2024-11-21T07:52:08.503", + "lastModified": "2025-02-13T16:15:40.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json index 739ae42cb4e..5f376ca7d9e 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27530.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27530", "sourceIdentifier": "support@hackerone.com", "published": "2023-03-10T22:15:10.497", - "lastModified": "2024-11-21T07:53:06.430", + "lastModified": "2025-02-13T15:37:40.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -96,30 +96,30 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionEndExcluding": "2.0.9.3", - "matchCriteriaId": "ABB9DD7F-2F39-4C38-9683-57AA06B525C3" + "matchCriteriaId": "C1EDB027-19EA-4F3A-A3A1-46E03D679C7C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.1.0", "versionEndExcluding": "2.1.4.3", - "matchCriteriaId": "6E69D220-E282-40B2-938F-F416FF5F2FE3" + "matchCriteriaId": "8ECC0192-9B71-4425-AE18-EDE8A7488392" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "2.2.0", "versionEndExcluding": "2.2.6.3", - "matchCriteriaId": "35858B11-E928-4F12-ADF8-6F61BA96352B" + "matchCriteriaId": "FCBE71F2-9736-4E4D-8A71-2D1FF559A9F1" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:rack_project:rack:*:*:*:*:*:ruby:*:*", + "criteria": "cpe:2.3:a:rack:rack:*:*:*:*:*:ruby:*:*", "versionStartIncluding": "3.0.0", "versionEndExcluding": "3.0.4.2", - "matchCriteriaId": "79788C0A-E1F1-42EE-9858-B04B10F8FA6B" + "matchCriteriaId": "33317DE1-F0A7-4DB2-9F7C-20084C9035BD" } ] } diff --git a/CVE-2023/CVE-2023-277xx/CVE-2023-27770.json b/CVE-2023/CVE-2023-277xx/CVE-2023-27770.json index 64fc54253dd..cadd872c898 100644 --- a/CVE-2023/CVE-2023-277xx/CVE-2023-27770.json +++ b/CVE-2023/CVE-2023-277xx/CVE-2023-27770.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27770", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:09.710", - "lastModified": "2024-11-21T07:53:27.690", + "lastModified": "2025-02-13T16:15:41.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-426" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28342.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28342.json index ed8f0566182..a58875f1524 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28342.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28342.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28342", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-05T19:15:09.517", - "lastModified": "2024-11-21T07:54:53.183", + "lastModified": "2025-02-13T16:15:41.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json b/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json index e392d168a1b..737ae9532b7 100644 --- a/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json +++ b/CVE-2023/CVE-2023-287xx/CVE-2023-28708.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28708", "sourceIdentifier": "security@apache.org", "published": "2023-03-22T11:15:10.623", - "lastModified": "2024-11-21T07:55:50.893", + "lastModified": "2025-02-13T15:15:16.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,13 +32,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json b/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json index 81e38fe4ef1..7faf89e126c 100644 --- a/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json +++ b/CVE-2023/CVE-2023-482xx/CVE-2023-48267.json @@ -2,13 +2,17 @@ "id": "CVE-2023-48267", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:30.303", - "lastModified": "2025-02-12T22:15:30.303", + "lastModified": "2025-02-13T16:15:43.243", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in some Intel(R) System Security Report and System Resources Defense firmware may allow a privileged user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "Restricciones de b\u00fafer inadecuadas en algunos Intel(R) System Security Report and System Resources Defense pueden permitir que un usuario privilegiado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -82,7 +86,7 @@ "weaknesses": [ { "source": "secure@intel.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,6 +99,10 @@ { "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01203.html", "source": "secure@intel.com" + }, + { + "url": "https://www.dell.com/support/kbdoc/en-us/000236851/dsa-2025-002", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0604.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0604.json index a4421bd76c6..d3c70a68753 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0604.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0604.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0604", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:23.123", - "lastModified": "2024-11-21T08:46:59.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:54:45.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,103 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fooplugins:foogallery:*:*:*:*:-:wordpress:*:*", + "versionEndIncluding": "2.4.7", + "matchCriteriaId": "26955972-3FCC-4CE0-B1B1-CC70ADC812B0" + } + ] + } + ] + } + ], "references": [ { "url": "https://advisory.abay.sh/cve-2024-0604", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Ffoogallery%2Ftags%2F2.4.7&old=3035688&new_path=%2Ffoogallery%2Ftags%2F2.4.9&new=3035688&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d17d9610-d0fd-419d-a7ea-e9c313f1c542?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://advisory.abay.sh/cve-2024-0604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=%2Ffoogallery%2Ftags%2F2.4.7&old=3035688&new_path=%2Ffoogallery%2Ftags%2F2.4.9&new=3035688&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d17d9610-d0fd-419d-a7ea-e9c313f1c542?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1049.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1049.json index 5b52ca13468..3f144c49edf 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1049.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1049.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1049", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T04:15:08.190", - "lastModified": "2024-11-21T08:49:40.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:48:07.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:godaddy:coblocks:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.6", + "matchCriteriaId": "8BBAC74A-D6B9-4783-8265-628F20AD1C15" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049222%40vimeography&new=3049222%40vimeography&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56d1d152-946f-47c9-b0d5-76513370677f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049222%40vimeography&new=3049222%40vimeography&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/56d1d152-946f-47c9-b0d5-76513370677f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json new file mode 100644 index 00000000000..0d1b35bcb08 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12011.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12011", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2025-02-13T16:15:43.750", + "lastModified": "2025-02-13T16:15:43.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CWE-126 \u201cBuffer Over-read\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The information disclosure can be triggered by leveraging a memory leak affecting the web server. A remote unauthenticated attacker can exploit this vulnerability in order to leak valid authentication tokens from the process memory associated to users currently logged to the system and bypass the authentication mechanism." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] + } + ], + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12011", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json new file mode 100644 index 00000000000..ca980baaad6 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12012.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12012", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2025-02-13T16:15:43.913", + "lastModified": "2025-02-13T16:15:43.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CWE-598 \u201cUse of GET Request Method with Sensitive Query Strings\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. Both the SHA-1 hash of the password as well as the session tokens are included as part of the URL and therefore exposed to information leakage scenarios. An attacker capable of accessing such values (e.g., victim browser, network traffic inspection) can exploit this vulnerability to leak both the password hash as well as session tokens and bypass the authentication mechanism using a pass-the-hash attack." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12012", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json new file mode 100644 index 00000000000..bdba72ef2b3 --- /dev/null +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12013.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-12013", + "sourceIdentifier": "prodsec@nozominetworks.com", + "published": "2025-02-13T16:15:44.050", + "lastModified": "2025-02-13T16:15:44.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A CWE-1392 \u201cUse of Default Credentials\u201d was discovered affecting the 130.8005 TCP/IP Gateway running firmware version 12h. The device exposes an FTP server with default and easy-to-guess admin credentials. A remote attacker capable of interacting with the FTP server could gain access and perform changes over resources exposed by the service such as configuration files where password hashes are saved or where network settings are stored." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "prodsec@nozominetworks.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1392" + } + ] + } + ], + "references": [ + { + "url": "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2024-12013", + "source": "prodsec@nozominetworks.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json index f89869cdc83..9e3ef5229dc 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12586.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12586", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.607", - "lastModified": "2025-02-13T06:15:20.607", + "lastModified": "2025-02-13T15:15:17.200", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The Chalet-Montagne.com Tools WordPress plugin through 2.7.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/2ce05a44-762b-4aaf-b88a-92c830fd8ec4/", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json index 1f3a31852ee..19445c62fb6 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13119.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13119", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.763", - "lastModified": "2025-02-13T06:15:20.763", + "lastModified": "2025-02-13T15:15:17.360", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/32600a45-a8cd-446c-9aa2-0621a02a9754/", diff --git a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json index d19bc9a9a52..139355c92dd 100644 --- a/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json +++ b/CVE-2024/CVE-2024-131xx/CVE-2024-13120.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13120", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-13T06:15:20.917", - "lastModified": "2025-02-13T06:15:20.917", + "lastModified": "2025-02-13T15:15:17.520", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content WordPress plugin before 4.15.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/5b70798c-c30d-42e6-ac72-821c5568b9b5/", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1447.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1447.json index b50af30b696..b2e3d1b8e38 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1447.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1447.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1447", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:50.990", - "lastModified": "2024-11-21T08:50:36.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:49:07.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:athemes:sydney_toolbox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.26", + "matchCriteriaId": "55C7AA70-0F5C-4F5B-B743-C9967A3A3065" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/sydney-toolbox/trunk/inc/elementor/block-slider.php#L679", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sydney-toolbox/trunk/inc/elementor/block-slider.php#L692", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035233%40sydney-toolbox%2Ftrunk&old=2980978%40sydney-toolbox%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1227f3bc-0bb3-4b80-ad69-2d4314fafbe4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sydney-toolbox/trunk/inc/elementor/block-slider.php#L679", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/sydney-toolbox/trunk/inc/elementor/block-slider.php#L692", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3035233%40sydney-toolbox%2Ftrunk&old=2980978%40sydney-toolbox%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1227f3bc-0bb3-4b80-ad69-2d4314fafbe4?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1697.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1697.json index 7c24f06d939..f249da536ce 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1697.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1697.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1697", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T02:15:46.940", - "lastModified": "2024-11-21T08:51:06.673", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:48:38.990", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelocation:custom_woocommerce_checkout_fields_editor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.3.1", + "matchCriteriaId": "C96B21C1-7ED6-4145-A9E1-D4F333A00275" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/add-fields-to-checkout-page-woocommerce/tags/1.2.9/classes/class-wc-checkout-field-editor.php#L1775", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/add-fields-to-checkout-page-woocommerce/tags/1.3.2/classes/class-wc-checkout-field-editor.php#L1788", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a92f44b-6f2b-439c-8245-ace189740425?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/add-fields-to-checkout-page-woocommerce/tags/1.2.9/classes/class-wc-checkout-field-editor.php#L1775", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/add-fields-to-checkout-page-woocommerce/tags/1.3.2/classes/class-wc-checkout-field-editor.php#L1788", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9a92f44b-6f2b-439c-8245-ace189740425?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2202.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2202.json index 729b690a576..d05b49b1285 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2202.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2202.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2202", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T03:15:12.523", - "lastModified": "2024-11-21T09:09:14.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:48:25.923", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:siteorigin:page_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.29.7", + "matchCriteriaId": "EB9CD59B-7E80-4040-9549-FA995BEF788D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/siteorigin-panels/trunk/widgets/widgets.php#L911", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3053935%40siteorigin-panels&new=3053935%40siteorigin-panels&sfp_email=&sfph_mail=#file31", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52116a6f-506f-4eeb-9bcc-19900ef38101?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/siteorigin-panels/trunk/widgets/widgets.php#L911", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3053935%40siteorigin-panels&new=3053935%40siteorigin-panels&sfp_email=&sfph_mail=#file31", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/52116a6f-506f-4eeb-9bcc-19900ef38101?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json index 0d67dd23669..114970628ac 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2326.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2326", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-23T04:15:08.757", - "lastModified": "2024-11-21T09:09:30.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:32:17.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:caseproof:prettylinks:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "3.6.3", + "matchCriteriaId": "6842B1E1-1B7B-4499-A833-EBFDEC4F19AF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049386%40pretty-link&new=3049386%40pretty-link&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97d78b4b-568e-43e7-bebf-091179c321f6?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3049386%40pretty-link&new=3049386%40pretty-link&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/97d78b4b-568e-43e7-bebf-091179c321f6?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json index 01a5a23c171..ddeb2409e8d 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2362.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2362", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-06T19:15:54.767", - "lastModified": "2024-11-21T09:09:35.783", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:09:46.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -85,6 +85,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -92,13 +93,24 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.3:*:*:*:*:linux:*:*", - "matchCriteriaId": "E666F6FD-3676-45F0-B9AD-8F379DD828E9" + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.3:*:*:*:*:*:*:*", + "matchCriteriaId": "E23D6C42-9640-4B38-9791-7E87866C7A7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" }, { - "vulnerable": true, - "criteria": "cpe:2.3:a:lollms:lollms_web_ui:9.3:*:*:*:*:windows:*:*", - "matchCriteriaId": "8141A73F-A080-4E27-9C0B-6F8EA1CD0BC2" + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" } ] } diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json index 446436a24a2..34bd3e992b8 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28047.json @@ -2,13 +2,17 @@ "id": "CVE-2024-28047", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:31.983", - "lastModified": "2025-02-12T22:15:31.983", + "lastModified": "2025-02-13T15:15:17.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation in UEFI firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "La validaci\u00f3n de entrada incorrecta en el firmware UEFI para algunos procesadores Intel(R) puede permitir que un usuario privilegiado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 4.0 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2936.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2936.json index 09403ea79d2..f62ec557b57 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2936.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2936", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-29T06:15:08.450", - "lastModified": "2024-11-21T09:10:52.830", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:31:06.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:athemes:sydney_toolbox:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.27", + "matchCriteriaId": "F50BCB63-E3B7-4CEA-BDE7-DF0A5DB5DA19" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059286%40sydney-toolbox&new=3059286%40sydney-toolbox&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0b20d638-82cb-48ce-96fa-fd42d06f649f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3059286%40sydney-toolbox&new=3059286%40sydney-toolbox&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0b20d638-82cb-48ce-96fa-fd42d06f649f?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json b/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json index 122a8aa5516..1d32572befd 100644 --- a/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json +++ b/CVE-2024/CVE-2024-334xx/CVE-2024-33469.json @@ -2,13 +2,17 @@ "id": "CVE-2024-33469", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T23:15:08.903", - "lastModified": "2025-02-12T22:15:33.940", + "lastModified": "2025-02-13T15:15:18.157", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Team Amaze Amaze File Manager v.3.8.5 and fixed in v.3.10 allows a local attacker to execute arbitrary code via the onCreate method of DatabaseViewerActivity.java." + }, + { + "lang": "es", + "value": "Un problema en Team Amaze Amaze File Manager v.3.8.5 y solucionado en v.3.10 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del m\u00e9todo onCreate de DatabaseViewerActivity.java." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.1, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:N", + "baseScore": 7.9, + "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", - "scope": "UNCHANGED", + "scope": "CHANGED", "confidentialityImpact": "LOW", - "integrityImpact": "LOW", + "integrityImpact": "HIGH", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.5, - "impactScore": 2.5 + "impactScore": 4.7 } ] }, @@ -42,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-94" + "value": "CWE-77" } ] } diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json index 39a0265a23f..0eed01a6c29 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36293.json @@ -2,13 +2,17 @@ "id": "CVE-2024-36293", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:35.040", - "lastModified": "2025-02-12T22:15:35.040", + "lastModified": "2025-02-13T16:16:23.727", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the EDECCSSA user leaf function for some Intel(R) Processors with Intel(R) SGX may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "Un control de acceso inadecuado en la funci\u00f3n de hoja de usuario EDECCSSA para algunos procesadores Intel(R) con Intel(R) SGX puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { @@ -82,7 +86,7 @@ "weaknesses": [ { "source": "secure@intel.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -95,6 +99,10 @@ { "url": "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01213.html", "source": "secure@intel.com" + }, + { + "url": "https://www.dell.com/support/kbdoc/en-us/000283897/dsa-2025-041-security-update-for-dell-poweredge-server-for-intel-2025-security-advisories-2025-1-ipu", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json index 9428357bb59..1d876974075 100644 --- a/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json +++ b/CVE-2024/CVE-2024-370xx/CVE-2024-37020.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37020", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:35.190", - "lastModified": "2025-02-12T22:15:35.190", + "lastModified": "2025-02-13T15:15:18.320", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sequence of processor instructions leads to unexpected behavior in the Intel(R) DSA V1.0 for some Intel(R) Xeon(R) Processors may allow an authenticated user to potentially enable denial of service via local access." + }, + { + "lang": "es", + "value": "La secuencia de instrucciones del procesador genera un comportamiento inesperado en Intel(R) DSA V1.0 para algunos procesadores Intel(R) Xeon(R) y puede permitir que un usuario autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:L", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-1281" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1281" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json index 02097db570e..084e1db91c0 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39286.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39286", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:36.223", - "lastModified": "2025-02-12T22:15:36.223", + "lastModified": "2025-02-13T16:16:29.157", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect execution-assigned permissions in the Linux kernel mode driver for the Intel(R) 800 Series Ethernet Driver before version 1.15.4 may allow an authenticated user to potentially enable information disclosure via local access." + }, + { + "lang": "es", + "value": "Los permisos de ejecuci\u00f3n asignados incorrectamente en el controlador de modo kernel de linux para el controlador Ethernet Intel(R) serie 800 anterior a la versi\u00f3n 1.15.4 pueden permitir que un usuario autenticado habilite potencialmente la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-279" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-279" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json index f11cef37079..b280f58047f 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39356.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39356", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:36.527", - "lastModified": "2025-02-12T22:15:36.527", + "lastModified": "2025-02-13T15:15:18.507", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "NULL pointer dereference in some Intel(R) PROSet/Wireless WiFi and Killer\u00e2\u201e\u00a2 WiFi software for Windows before version 23.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access." + }, + { + "lang": "es", + "value": "La desreferencia de puntero NULL en algunos programas Intel(R) PROSet/Wireless WiFi y Killer\u2122 WiFi para Windows anteriores a la versi\u00f3n 23.80 puede permitir que un usuario no autenticado habilite potencialmente la denegaci\u00f3n de servicio a trav\u00e9s del acceso adyacente." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json index 8df744666f1..28af6e9462d 100644 --- a/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json +++ b/CVE-2024/CVE-2024-393xx/CVE-2024-39365.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39365", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:36.670", - "lastModified": "2025-02-12T22:15:36.670", + "lastModified": "2025-02-13T15:15:18.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for the FPGA Support Package for the Intel(R) oneAPI DPC++/C++ Compiler software for Windows before version 2024.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para el paquete de soporte FPGA para el software del compilador Intel(R) oneAPI DPC++/C++ para Windows anterior a la versi\u00f3n 2024.2 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json index 3daf87402c5..1bca431da45 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39813.json @@ -2,13 +2,17 @@ "id": "CVE-2024-39813", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:37.567", - "lastModified": "2025-02-12T22:15:37.567", + "lastModified": "2025-02-13T15:15:18.883", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some EPCT software before version 1.42.8.0 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para algunos programas EPCT anteriores a la versi\u00f3n 1.42.8.0 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json index 46f08e6c541..6c461675986 100644 --- a/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json +++ b/CVE-2024/CVE-2024-419xx/CVE-2024-41917.json @@ -2,13 +2,17 @@ "id": "CVE-2024-41917", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:38.160", - "lastModified": "2025-02-12T22:15:38.160", + "lastModified": "2025-02-13T16:16:29.390", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Time-of-check time-of-use race condition for some Intel(R) Battery Life Diagnostic Tool software before version 2.4.1 may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La condici\u00f3n de tiempo de uso y tiempo de verificaci\u00f3n ejecuci\u00f3n para algunos programas de software de Intel(R) Battery Life Diagnostic Tool anteriores a la versi\u00f3n 2.4.1 puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 6.0 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json index 7c59c04e83f..50d012a36a4 100644 --- a/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json +++ b/CVE-2024/CVE-2024-424xx/CVE-2024-42405.json @@ -2,13 +2,17 @@ "id": "CVE-2024-42405", "sourceIdentifier": "secure@intel.com", "published": "2025-02-12T22:15:38.477", - "lastModified": "2025-02-12T22:15:38.477", + "lastModified": "2025-02-13T15:15:19.117", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Uncontrolled search path for some Intel(R) Quartus(R) Prime Software before version 23.1.1 Patch 1.01std may allow an authenticated user to potentially enable escalation of privilege via local access." + }, + { + "lang": "es", + "value": "La ruta de b\u00fasqueda no controlada para alg\u00fan software Intel(R) Quartus(R) Prime anterior a la versi\u00f3n 23.1.1 Patch 1.01std puede permitir que un usuario autenticado habilite potencialmente la escalada de privilegios a trav\u00e9s del acceso local." } ], "metrics": { @@ -76,6 +80,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -89,6 +113,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json index 1ed23052b0a..af5fa367091 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47264.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47264", "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:09.990", - "lastModified": "2025-02-13T07:15:09.990", + "lastModified": "2025-02-13T15:15:19.400", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json index e8ecf71ce00..55a3b27a393 100644 --- a/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47265.json @@ -2,7 +2,7 @@ "id": "CVE-2024-47265", "sourceIdentifier": "security@synology.com", "published": "2025-02-13T07:15:10.207", - "lastModified": "2025-02-13T07:15:10.207", + "lastModified": "2025-02-13T15:15:19.600", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json b/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json index 4e3f58e3f55..267d908f4dd 100644 --- a/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json +++ b/CVE-2024/CVE-2024-536xx/CVE-2024-53689.json @@ -2,98 +2,15 @@ "id": "CVE-2024-53689", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-11T13:15:26.313", - "lastModified": "2025-01-16T16:21:09.993", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-13T16:16:29.787", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: Fix potential deadlock while freezing queue and acquiring sysfs_lock\n\nFor storing a value to a queue attribute, the queue_attr_store function\nfirst freezes the queue (->q_usage_counter(io)) and then acquire\n->sysfs_lock. This seems not correct as the usual ordering should be to\nacquire ->sysfs_lock before freezing the queue. This incorrect ordering\ncauses the following lockdep splat which we are able to reproduce always\nsimply by accessing /sys/kernel/debug file using ls command:\n\n[ 57.597146] WARNING: possible circular locking dependency detected\n[ 57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: G W\n[ 57.597162] ------------------------------------------------------\n[ 57.597168] ls/4605 is trying to acquire lock:\n[ 57.597176] c00000003eb56710 (&mm->mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0\n[ 57.597200]\n but task is already holding lock:\n[ 57.597207] c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, at: iterate_dir+0x94/0x1d4\n[ 57.597226]\n which lock already depends on the new lock.\n\n[ 57.597233]\n the existing dependency chain (in reverse order) is:\n[ 57.597241]\n -> #5 (&sb->s_type->i_mutex_key#3){++++}-{4:4}:\n[ 57.597255] down_write+0x6c/0x18c\n[ 57.597264] start_creating+0xb4/0x24c\n[ 57.597274] debugfs_create_dir+0x2c/0x1e8\n[ 57.597283] blk_register_queue+0xec/0x294\n[ 57.597292] add_disk_fwnode+0x2e4/0x548\n[ 57.597302] brd_alloc+0x2c8/0x338\n[ 57.597309] brd_init+0x100/0x178\n[ 57.597317] do_one_initcall+0x88/0x3e4\n[ 57.597326] kernel_init_freeable+0x3cc/0x6e0\n[ 57.597334] kernel_init+0x34/0x1cc\n[ 57.597342] ret_from_kernel_user_thread+0x14/0x1c\n[ 57.597350]\n -> #4 (&q->debugfs_mutex){+.+.}-{4:4}:\n[ 57.597362] __mutex_lock+0xfc/0x12a0\n[ 57.597370] blk_register_queue+0xd4/0x294\n[ 57.597379] add_disk_fwnode+0x2e4/0x548\n[ 57.597388] brd_alloc+0x2c8/0x338\n[ 57.597395] brd_init+0x100/0x178\n[ 57.597402] do_one_initcall+0x88/0x3e4\n[ 57.597410] kernel_init_freeable+0x3cc/0x6e0\n[ 57.597418] kernel_init+0x34/0x1cc\n[ 57.597426] ret_from_kernel_user_thread+0x14/0x1c\n[ 57.597434]\n -> #3 (&q->sysfs_lock){+.+.}-{4:4}:\n[ 57.597446] __mutex_lock+0xfc/0x12a0\n[ 57.597454] queue_attr_store+0x9c/0x110\n[ 57.597462] sysfs_kf_write+0x70/0xb0\n[ 57.597471] kernfs_fop_write_iter+0x1b0/0x2ac\n[ 57.597480] vfs_write+0x3dc/0x6e8\n[ 57.597488] ksys_write+0x84/0x140\n[ 57.597495] system_call_exception+0x130/0x360\n[ 57.597504] system_call_common+0x160/0x2c4\n[ 57.597516]\n -> #2 (&q->q_usage_counter(io)#21){++++}-{0:0}:\n[ 57.597530] __submit_bio+0x5ec/0x828\n[ 57.597538] submit_bio_noacct_nocheck+0x1e4/0x4f0\n[ 57.597547] iomap_readahead+0x2a0/0x448\n[ 57.597556] xfs_vm_readahead+0x28/0x3c\n[ 57.597564] read_pages+0x88/0x41c\n[ 57.597571] page_cache_ra_unbounded+0x1ac/0x2d8\n[ 57.597580] filemap_get_pages+0x188/0x984\n[ 57.597588] filemap_read+0x13c/0x4bc\n[ 57.597596] xfs_file_buffered_read+0x88/0x17c\n[ 57.597605] xfs_file_read_iter+0xac/0x158\n[ 57.597614] vfs_read+0x2d4/0x3b4\n[ 57.597622] ksys_read+0x84/0x144\n[ 57.597629] system_call_exception+0x130/0x360\n[ 57.597637] system_call_common+0x160/0x2c4\n[ 57.597647]\n -> #1 (mapping.invalidate_lock#2){++++}-{4:4}:\n[ 57.597661] down_read+0x6c/0x220\n[ 57.597669] filemap_fault+0x870/0x100c\n[ 57.597677] xfs_filemap_fault+0xc4/0x18c\n[ 57.597684] __do_fault+0x64/0x164\n[ 57.597693] __handle_mm_fault+0x1274/0x1dac\n[ 57.597702] handle_mm_fault+0x248/0x48\n---truncated---" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: block: Fix potential deadlock while frozen queue and acquires sysfs_lock Para almacenar un valor en un atributo de cola, la funci\u00f3n queue_attr_store primero congela la cola (->q_usage_counter(io)) y luego adquiere ->sysfs_lock. Esto no parece correcto ya que el orden habitual deber\u00eda ser adquirir ->sysfs_lock antes de congelar la cola. Este orden incorrecto provoca el siguiente splat lockdep que siempre podemos reproducir simplemente accediendo al archivo /sys/kernel/debug usando el comando ls: [ 57.597146] ADVERTENCIA: posible dependencia de bloqueo circular detectada [ 57.597154] 6.12.0-10553-gb86545e02e8c #20 Tainted: GW [ 57.597162] ------------------------------------------------------ [ 57.597168] ls/4605 est\u00e1 intentando adquirir el bloqueo: [ 57.597176] c00000003eb56710 (&mm->mmap_lock){++++}-{4:4}, at: __might_fault+0x58/0xc0 [ 57.597200] pero la tarea ya tiene el bloqueo: [ 57.597207] c0000018e27c6810 (&sb->s_type->i_mutex_key#3){++++}-{4:4}, en: iterate_dir+0x94/0x1d4 [ 57.597226] cuyo bloqueo ya depende del nuevo bloqueo. [ 57.597233] la cadena de dependencia existente (en orden inverso) es: [ 57.597241] -> #5 (&sb->s_type->i_mutex_key#3){++++}-{4:4}: [ 57.597255] down_write+0x6c/0x18c [ 57.597264] start_creating+0xb4/0x24c [ 57.597274] debugfs_create_dir+0x2c/0x1e8 [ 57.597283] blk_register_queue+0xec/0x294 [ 57.597292] add_disk_fwnode+0x2e4/0x548 [ 57.597302] brd_alloc+0x2c8/0x338 [ 57.597309] brd_init+0x100/0x178 [ 57.597317] hacer_una_initcall+0x88/0x3e4 [ 57.597326] kernel_init_freeable+0x3cc/0x6e0 [ 57.597334] kernel_init+0x34/0x1cc [ 57.597342] retirar_del_subproceso_usuario_kernel+0x14/0x1c [ 57.597350] -> #4 (&q->debugfs_mutex){+.+.}-{4:4}: [ 57.597362] __mutex_lock+0xfc/0x12a0 [ 57.597370] blk_register_queue+0xd4/0x294 [ 57.597379] add_disk_fwnode+0x2e4/0x548 [ 57.597388] brd_alloc+0x2c8/0x338 [ 57.597395] brd_init+0x100/0x178 [ 57.597402] hacer_una_llamada_inicio+0x88/0x3e4 [ 57.597410] kernel_init_freeable+0x3cc/0x6e0 [ 57.597418] kernel_init+0x34/0x1cc [ 57.597426] ret_desde_hilo_usuario_kernel+0x14/0x1c [ 57.597434] -> #3 (&q->sysfs_lock){+.+.}-{4:4}: [ 57.597446] __mutex_lock+0xfc/0x12a0 [ 57.597454] queue_attr_store+0x9c/0x110 [ 57.597462] sysfs_kf_write+0x70/0xb0 [ 57.597471] kernfs_fop_write_iter+0x1b0/0x2ac [ 57.597480] vfs_write+0x3dc/0x6e8 [ 57.597488] ksys_write+0x84/0x140 [ 57.597495] excepci\u00f3n_de_llamada_del_sistema+0x130/0x360 [ 57.597504] llamada_del_sistema_com\u00fan+0x160/0x2c4 [ 57.597516] -> #2 (&q->q_contador_de_uso(io)#21){++++}-{0:0}: [ 57.597530] __submit_bio+0x5ec/0x828 [ 57.597538] enviar_bio_noacct_nocheck+0x1e4/0x4f0 [ 57.597547] iomap_readahead+0x2a0/0x448 [ 57.597556] xfs_vm_readahead+0x28/0x3c [ 57.597564] leer_p\u00e1ginas+0x88/0x41c [ 57.597571] page_cache_ra_unbounded+0x1ac/0x2d8 [ 57.597580] filemap_get_pages+0x188/0x984 [ 57.597588] filemap_read+0x13c/0x4bc [ 57.597596] xfs_file_buffered_read+0x88/0x17c [ 57.597605] xfs_file_read_iter+0xac/0x158 [ 57.597614] vfs_read+0x2d4/0x3b4 [ 57.597622] ksys_read+0x84/0x144 [ 57.597629] excepci\u00f3n_llamada_sistema+0x130/0x360 [ 57.597637] llamada_sistema_com\u00fan+0x160/0x2c4 [ 57.597647] -> #1 (asignaci\u00f3n.invalidar_bloqueo#2){++++}-{4:4}: [ 57.597661] lectura_abajo+0x6c/0x220 [ 57.597669] error_mapa_archivo+0x870/0x100c [ 57.597677] error_mapa_archivo_xfs+0xc4/0x18c [ 57.597684] __error_do+0x64/0x164 [ 57.597693] __error_gestionar_mm+0x1274/0x1dac [ 57.597702] handle_mm_fault+0x248/0x48 ---truncado---" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-667" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.11", - "versionEndExcluding": "6.12.6", - "matchCriteriaId": "97C759FD-3999-4EA7-B961-1CADF641F560" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", - "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/be26ba96421ab0a8fa2055ccf7db7832a13c44d2", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/f1a494df8350da2e673618627cb392a8669825dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56571.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56571.json index 5554f802ffa..35f83ba0e5e 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56571.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56571.json @@ -2,44 +2,15 @@ "id": "CVE-2024-56571", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:16.077", - "lastModified": "2024-12-27T15:15:16.077", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:16:43.213", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: uvcvideo: Require entities to have a non-zero unique ID\n\nPer UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero\nunique ID.\n\n```\nEach Unit and Terminal within the video function is assigned a unique\nidentification number, the Unit ID (UID) or Terminal ID (TID), contained in\nthe bUnitID or bTerminalID field of the descriptor. The value 0x00 is\nreserved for undefined ID,\n```\n\nSo, deny allocating an entity with ID 0 or an ID that belongs to a unit\nthat is already added to the list of entities.\n\nThis also prevents some syzkaller reproducers from triggering warnings due\nto a chain of entities referring to themselves. In one particular case, an\nOutput Unit is connected to an Input Unit, both with the same ID of 1. But\nwhen looking up for the source ID of the Output Unit, that same entity is\nfound instead of the input entity, which leads to such warnings.\n\nIn another case, a backward chain was considered finished as the source ID\nwas 0. Later on, that entity was found, but its pads were not valid.\n\nHere is a sample stack trace for one of those cases.\n\n[ 20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd\n[ 20.830206] usb 1-1: Using ep0 maxpacket: 8\n[ 20.833501] usb 1-1: config 0 descriptor??\n[ 21.038518] usb 1-1: string descriptor 0 read error: -71\n[ 21.038893] usb 1-1: Found UVC 0.00 device (2833:0201)\n[ 21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!\n[ 21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!\n[ 21.042218] ------------[ cut here ]------------\n[ 21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0\n[ 21.043195] Modules linked in:\n[ 21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444\n[ 21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014\n[ 21.044639] Workqueue: usb_hub_wq hub_event\n[ 21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0\n[ 21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 <0f> 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00\n[ 21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246\n[ 21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1\n[ 21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290\n[ 21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000\n[ 21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003\n[ 21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000\n[ 21.049648] FS: 0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000\n[ 21.050271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[ 21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0\n[ 21.051136] PKRU: 55555554\n[ 21.051331] Call Trace:\n[ 21.051480] \n[ 21.051611] ? __warn+0xc4/0x210\n[ 21.051861] ? media_create_pad_link+0x2c4/0x2e0\n[ 21.052252] ? report_bug+0x11b/0x1a0\n[ 21.052540] ? trace_hardirqs_on+0x31/0x40\n[ 21.052901] ? handle_bug+0x3d/0x70\n[ 21.053197] ? exc_invalid_op+0x1a/0x50\n[ 21.053511] ? asm_exc_invalid_op+0x1a/0x20\n[ 21.053924] ? media_create_pad_link+0x91/0x2e0\n[ 21.054364] ? media_create_pad_link+0x2c4/0x2e0\n[ 21.054834] ? media_create_pad_link+0x91/0x2e0\n[ 21.055131] ? _raw_spin_unlock+0x1e/0x40\n[ 21.055441] ? __v4l2_device_register_subdev+0x202/0x210\n[ 21.055837] uvc_mc_register_entities+0x358/0x400\n[ 21.056144] uvc_register_chains+0x1fd/0x290\n[ 21.056413] uvc_probe+0x380e/0x3dc0\n[ 21.056676] ? __lock_acquire+0x5aa/0x26e0\n[ 21.056946] ? find_held_lock+0x33/0xa0\n[ 21.057196] ? kernfs_activate+0x70/0x80\n[ 21.057533] ? usb_match_dy\n---truncated---" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: media: uvcvideo: Requerir que las entidades tengan un ID \u00fanico distinto de cero Seg\u00fan la especificaci\u00f3n UVC 1.1+ 3.7.2, las unidades y terminales deben tener un ID \u00fanico distinto de cero. ``` A cada Unidad y Terminal dentro de la funci\u00f3n de video se le asigna un n\u00famero de identificaci\u00f3n \u00fanico, el ID de Unidad (UID) o el ID de Terminal (TID), contenido en el campo bUnitID o bTerminalID del descriptor. El valor 0x00 est\u00e1 reservado para ID indefinido, ``` Por lo tanto, deniega la asignaci\u00f3n de una entidad con ID 0 o un ID que pertenezca a una unidad que ya se haya a\u00f1adido a la lista de entidades. Esto tambi\u00e9n evita que algunos reproductores syzkaller activen advertencias debido a una cadena de entidades que se refieren a s\u00ed mismos. En un caso particular, una Unidad de Salida est\u00e1 conectada a una Unidad de Entrada, ambas con el mismo ID de 1. Pero al buscar el ID de origen de la Unidad de Salida, se encuentra esa misma entidad en lugar de la entidad de entrada, lo que genera dichas advertencias. En otro caso, una cadena hacia atr\u00e1s se consider\u00f3 terminada ya que el ID de origen era 0. M\u00e1s tarde, se encontr\u00f3 esa entidad, pero sus pads no eran v\u00e1lidos. Aqu\u00ed hay un seguimiento de pila de muestra para uno de esos casos. [ 20.650953] usb 1-1: nuevo dispositivo USB de alta velocidad n\u00famero 2 usando dummy_hcd [ 20.830206] usb 1-1: Usando ep0 maxpacket: 8 [ 20.833501] usb 1-1: config 0 descriptor?? [ 21.038518] usb 1-1: descriptor de cadena 0 error de lectura: -71 [ 21.038893] usb 1-1: Se encontr\u00f3 el dispositivo UVC 0.00 (2833:0201) [ 21.039299] uvcvideo 1-1:0.0: \u00a1El tipo de entidad para la entidad Output 1 no se inicializ\u00f3! [ 21.041583] uvcvideo 1-1:0.0: \u00a1El tipo de entidad para la entidad Entrada 1 no se inicializ\u00f3! [ 21.042218] ------------[ cortar aqu\u00ed ]------------ [ 21.042536] ADVERTENCIA: CPU: 0 PID: 9 en drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0 [ 21.043195] M\u00f3dulos vinculados en: [ 21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 No contaminado 6.11.0-rc7-00030-g3480e43aeccf #444 [ 21.044101] Nombre del hardware: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014 [ 21.044639] Cola de trabajo: usb_hub_wq evento_hub [ 21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0 [ 21.045508] C\u00f3digo: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 <0f> 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00 [ 21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246 [ 21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1 [ 21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290 [ 21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000 [ 21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003 [ 21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000 [ 21.049648] FS: 0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000 [ 21.050271] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0 [ 21.051136] PKRU: 55555554 [ 21.051331] Rastreo de llamadas: [ 21.051480] [ 21.051611] ? __warn+0xc4/0x210 [ 21.051861] ? media_create_pad_link+0x2c4/0x2e0 [ 21.052252] ? report_bug+0x11b/0x1a0 [ 21.052540] ? trace_hardirqs_on+0x31/0x40 [ 21.052901] ? handle_bug+0x3d/0x70 [ 21.053197] ? exc_invalid_op+0x1a/0x50 [ 21.053511] ? asm_exc_invalid_op+0x1a/0x20 [ 21.053924] ? media_create_pad_link+0x91/0x2e0 [ 21.054364] ? media_create_pad_link+0x2c4/0x2e0 [ 21.054834] ? __v4l2_device_register_subdev+0x202/0x210 [ 21.055837] uvc_mc_register_entities+0x358/0x400 [ 21.056144] uvc_register_chains+0x1fd/0x290 [ 21.056413] uvc_probe+0x380e/0x3dc0 [ 21.056676] ? __lock_acquire+0x5aa/0x26e0 [ 21.056946] ? find_held_lock+0x33/0xa0 [ 21.057196] ? kernfs_activate+0x70/0x80 [ 21.057533] ? usb_match_dy ---truncado---" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/19464d73225224dca31e2fd6e7d6418facf5facb", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/3dd075fe8ebbc6fcbf998f81a75b8c4b159a6195", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4f74bd307f078c0605b9f6f1edb8337dee35fa2e", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/72ed66623953106d15825513c82533a03ba29ecd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/b11813bc2f4eee92695075148c9ba996f54feeba", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bde4e7c1527151b596089b3f984818ab537eeb7f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57915.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57915.json index 4577154f826..f490146bea3 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57915.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57915.json @@ -2,161 +2,15 @@ "id": "CVE-2024-57915", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-01-19T12:15:25.673", - "lastModified": "2025-02-02T11:15:13.920", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T16:16:43.287", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null\n\nConsidering that in some extreme cases, when performing the\nunbinding operation, gserial_disconnect has cleared gser->ioport,\nwhich triggers gadget reconfiguration, and then calls gs_read_complete,\nresulting in access to a null pointer. Therefore, ep is disabled before\ngserial_disconnect sets port to null to prevent this from happening.\n\nCall trace:\n gs_read_complete+0x58/0x240\n usb_gadget_giveback_request+0x40/0x160\n dwc3_remove_requests+0x170/0x484\n dwc3_ep0_out_start+0xb0/0x1d4\n __dwc3_gadget_start+0x25c/0x720\n kretprobe_trampoline.cfi_jt+0x0/0x8\n kretprobe_trampoline.cfi_jt+0x0/0x8\n udc_bind_to_driver+0x1d8/0x300\n usb_gadget_probe_driver+0xa8/0x1dc\n gadget_dev_desc_UDC_store+0x13c/0x188\n configfs_write_iter+0x160/0x1f4\n vfs_write+0x2d0/0x40c\n ksys_write+0x7c/0xf0\n __arm64_sys_write+0x20/0x30\n invoke_syscall+0x60/0x150\n el0_svc_common+0x8c/0xf8\n do_el0_svc+0x28/0xa0\n el0_svc+0x24/0x84" - }, - { - "lang": "es", - "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: usb: gadget: u_serial: Deshabilitar ep antes de configurar el puerto como nulo para corregir el bloqueo causado por el puerto nulo Teniendo en cuenta que en algunos casos extremos, al realizar la operaci\u00f3n de desvinculaci\u00f3n, gserial_disconnect ha borrado gser->ioport, lo que desencadena la reconfiguraci\u00f3n del gadget y luego llama a gs_read_complete, lo que da como resultado el acceso a un puntero nulo. Por lo tanto, ep se deshabilita antes de que gserial_disconnect configure el puerto como nulo para evitar que esto suceda. Rastreo de llamadas: gs_read_complete+0x58/0x240 usb_gadget_giveback_request+0x40/0x160 dwc3_remove_requests+0x170/0x484 dwc3_ep0_out_start+0xb0/0x1d4 __dwc3_gadget_start+0x25c/0x720 kretprobe_trampoline.cfi_jt+0x0/0x8 kretprobe_trampoline.cfi_jt+0x0/0x8 udc_bind_to_driver+0x1d8/0x300 usb_gadget_probe_driver+0xa8/0x1dc gadget_dev_desc_UDC_store+0x13c/0x188 configfs_write_iter+0x160/0x1f4 vfs_write+0x2d0/0x40c ksys_write+0x7c/0xf0 __arm64_sys_write+0x20/0x30 invocar_llamada_al_sistema+0x60/0x150 el0_svc_common+0x8c/0xf8 do_el0_svc+0x28/0xa0 el0_svc+0x24/0x84" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", - "baseScore": 5.5, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 3.6 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-476" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "2.6.27", - "versionEndExcluding": "6.1.125", - "matchCriteriaId": "E4E3F6ED-7590-470C-831C-BC7A27AB02D1" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.2", - "versionEndExcluding": "6.6.72", - "matchCriteriaId": "33E12097-C88A-45B4-9677-2A961A08DD3E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionStartIncluding": "6.7", - "versionEndExcluding": "6.12.10", - "matchCriteriaId": "02D604F6-10D1-4F7B-A022-0888406A1121" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*", - "matchCriteriaId": "62567B3C-6CEE-46D0-BC2E-B3717FBF7D13" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*", - "matchCriteriaId": "5A073481-106D-4B15-B4C7-FB0213B8E1D4" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc3:*:*:*:*:*:*", - "matchCriteriaId": "DE491969-75AE-4A6B-9A58-8FC5AF98798F" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc4:*:*:*:*:*:*", - "matchCriteriaId": "93C0660D-7FB8-4FBA-892A-B064BA71E49E" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc5:*:*:*:*:*:*", - "matchCriteriaId": "034C36A6-C481-41F3-AE9A-D116E5BE6895" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:6.13:rc6:*:*:*:*:*:*", - "matchCriteriaId": "8AF9DC49-2085-4FFB-A7E3-73DFAFECC7F2" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/0c50f00cc29948184af05bda31392fff5821f4f3", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/1062b648bff63ed62b2d47a045e08ea9741d98ea", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/13014969cbf07f18d62ceea40bd8ca8ec9d36cec", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/3d730e8758c75b68a0152ee1ac48a270ea6725b4", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/8e122d780a0f19aefd700dbd0b0e3ed3af0ae97f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/d2de56cc45ee447f005d63217e84988b4f02faa9", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/f5f33fb57aae12e4b0add79e0242f458ea0bc510", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json index 9bdb2468486..318a56682f9 100644 --- a/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json +++ b/CVE-2024/CVE-2024-59xx/CVE-2024-5933.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5933", "sourceIdentifier": "security@huntr.dev", "published": "2024-06-27T19:15:17.840", - "lastModified": "2024-11-21T09:48:36.263", - "vulnStatus": "Modified", + "lastModified": "2025-02-13T15:43:43.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -82,8 +82,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:lollms:lollms_webui:-:*:*:*:*:*:*:*", - "matchCriteriaId": "CBDA7C0A-5EEC-4F3F-BA31-A87414C9217E" + "criteria": "cpe:2.3:a:lollms:lollms_web_ui:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0447480-50CE-4682-B3B1-B8F021C5C731" } ] } diff --git a/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json b/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json new file mode 100644 index 00000000000..fef63ed2d4c --- /dev/null +++ b/CVE-2025/CVE-2025-04xx/CVE-2025-0426.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-0426", + "sourceIdentifier": "jordan@liggitt.net", + "published": "2025-02-13T16:16:48.417", + "lastModified": "2025-02-13T16:16:48.417", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "jordan@liggitt.net", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/kubernetes/kubernetes/issues/130016", + "source": "jordan@liggitt.net" + }, + { + "url": "https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8", + "source": "jordan@liggitt.net" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json index 7400434105a..fe468d61ef3 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1224.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1224", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T20:15:40.030", - "lastModified": "2025-02-12T20:15:40.030", + "lastModified": "2025-02-13T15:15:20.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as critical was found in ywoa up to 2024.07.03. This vulnerability affects the function listNameBySql of the file com/cloudweb/oa/mapper/xml/UserMapper.xml. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component." + }, + { + "lang": "es", + "value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en ywoa hasta la versi\u00f3n 2024.07.03. Esta vulnerabilidad afecta a la funci\u00f3n listNameBySql del archivo com/cloudweb/oa/mapper/xml/UserMapper.xml. La manipulaci\u00f3n conduce a una inyecci\u00f3n SQL. El ataque se puede iniciar de forma remota. El exploit se ha divulgado al p\u00fablico y puede utilizarse. La actualizaci\u00f3n a la versi\u00f3n 2024.07.04 puede solucionar este problema. Se recomienda actualizar el componente afectado." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -132,6 +136,10 @@ { "url": "https://vuldb.com/?id.295210", "source": "cna@vuldb.com" + }, + { + "url": "https://gitee.com/r1bbit/yimioa/issues/IBI731", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21698.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21698.json index f341d199ee0..080785980fb 100644 --- a/CVE-2025/CVE-2025-216xx/CVE-2025-21698.json +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21698.json @@ -2,48 +2,15 @@ "id": "CVE-2025-21698", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2025-02-12T14:15:32.900", - "lastModified": "2025-02-12T14:15:32.900", - "vulnStatus": "Received", + "lastModified": "2025-02-13T16:16:48.690", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nRevert \"usb: gadget: u_serial: Disable ep before setting port to null to fix the crash caused by port being null\"\n\nThis reverts commit 13014969cbf07f18d62ceea40bd8ca8ec9d36cec.\n\nIt is reported to cause crashes on Tegra systems, so revert it for now." + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "metrics": {}, - "references": [ - { - "url": "https://git.kernel.org/stable/c/086fd062bc3883ae1ce4166cff5355db315ad879", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/20ce02f2f73af331dec76d3b8b78b18f4699db05", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/33233b06ad15730d0463e8f152db2eca15c7f498", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/3d8f4dc8c78ffd77a4106614977c1e51531690f7", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/76e7577bb89b327abdf72d4c0d486074a17f712a", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/99c866bea85efdebfb6953a8a305f21ef5ca4991", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/bb50dc2aa49dcb5cc81205d814c08337b5da28ac", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/f8b8883ad76d36ee890b18311096af7af7d7a921", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - } - ] + "references": [] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json new file mode 100644 index 00000000000..3939595f13b --- /dev/null +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21701.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2025-21701", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-02-13T15:15:20.867", + "lastModified": "2025-02-13T15:15:20.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: avoid race between device unregistration and ethnl ops\n\nThe following trace can be seen if a device is being unregistered while\nits number of channels are being modified.\n\n DEBUG_LOCKS_WARN_ON(lock->magic != lock)\n WARNING: CPU: 3 PID: 3754 at kernel/locking/mutex.c:564 __mutex_lock+0xc8a/0x1120\n CPU: 3 UID: 0 PID: 3754 Comm: ethtool Not tainted 6.13.0-rc6+ #771\n RIP: 0010:__mutex_lock+0xc8a/0x1120\n Call Trace:\n \n ethtool_check_max_channel+0x1ea/0x880\n ethnl_set_channels+0x3c3/0xb10\n ethnl_default_set_doit+0x306/0x650\n genl_family_rcv_msg_doit+0x1e3/0x2c0\n genl_rcv_msg+0x432/0x6f0\n netlink_rcv_skb+0x13d/0x3b0\n genl_rcv+0x28/0x40\n netlink_unicast+0x42e/0x720\n netlink_sendmsg+0x765/0xc20\n __sys_sendto+0x3ac/0x420\n __x64_sys_sendto+0xe0/0x1c0\n do_syscall_64+0x95/0x180\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\n\nThis is because unregister_netdevice_many_notify might run before the\nrtnl lock section of ethnl operations, eg. set_channels in the above\nexample. In this example the rss lock would be destroyed by the device\nunregistration path before being used again, but in general running\nethnl operations while dismantle has started is not a good idea.\n\nFix this by denying any operation on devices being unregistered. A check\nwas already there in ethnl_ops_begin, but not wide enough.\n\nNote that the same issue cannot be seen on the ioctl version\n(__dev_ethtool) because the device reference is retrieved from within\nthe rtnl lock section there. Once dismantle started, the net device is\nunlisted and no reference will be found." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/12e070eb6964b341b41677fd260af5a305316a1f", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/2f29127e94ae9fdc7497331003d6860e9551cdf3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/4dc880245f9b529fa8f476b5553c799d2848b47b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b382ab9b885cbb665e0e70a727f101c981b4edf3", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json new file mode 100644 index 00000000000..58a42b7d823 --- /dev/null +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22480.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22480", + "sourceIdentifier": "security_alert@emc.com", + "published": "2025-02-13T16:16:48.777", + "lastModified": "2025-02-13T16:16:48.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Dell SupportAssist OS Recovery versions prior to 5.5.13.1 contain a symbolic link attack vulnerability. A low-privileged attacker with local access could potentially exploit this vulnerability, leading to arbitrary file deletion and Elevation of Privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security_alert@emc.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.0, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security_alert@emc.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-61" + } + ] + } + ], + "references": [ + { + "url": "https://www.dell.com/support/kbdoc/en-us/000275712/dsa-2025-051", + "source": "security_alert@emc.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json index b1a6a20127c..a2a0c235fc6 100644 --- a/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json +++ b/CVE-2025/CVE-2025-242xx/CVE-2025-24200.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24200", "sourceIdentifier": "product-security@apple.com", "published": "2025-02-10T19:15:40.107", - "lastModified": "2025-02-13T02:00:01.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-13T16:24:24.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -44,6 +64,16 @@ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Apple iOS and iPadOS Incorrect Authorization Vulnerability", "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,22 +85,69 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.7.5", + "matchCriteriaId": "2D76DB6B-CB2C-4E13-B6A0-8EAAF97BA82A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "18.0", + "versionEndExcluding": "18.3.1", + "matchCriteriaId": "A77F4D69-3C11-4074-A7E6-C85767F026EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3.1", + "matchCriteriaId": "FCFC977D-A942-42CC-80CD-6DE07C4870AB" + } + ] + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122173", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122174", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2025/Feb/7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2025/Feb/8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json new file mode 100644 index 00000000000..9b12110ecd0 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24903.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24903", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-13T16:16:48.913", + "lastModified": "2025-02-13T16:16:48.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "libsignal-service-rs is a Rust version of the libsignal-service-java library which implements the core functionality to communicate with Signal servers. Prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, any contact may forge a sync message, impersonating another device of the local user. The origin of sync messages is not checked. Patched libsignal-service can be found after commit 82d70f6720e762898f34ae76b0894b0297d9b2f8. The `Metadata` struct contains an additional `was_encrypted` field, which breaks the API, but should be easily resolvable. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/whisperfish/libsignal-service-rs/commit/82d70f6720e762898f34ae76b0894b0297d9b2f8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/whisperfish/libsignal-service-rs/security/advisories/GHSA-r58q-66g9-h6g8", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json b/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json new file mode 100644 index 00000000000..788bf0d24b3 --- /dev/null +++ b/CVE-2025/CVE-2025-249xx/CVE-2025-24904.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-24904", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-13T16:16:49.053", + "lastModified": "2025-02-13T16:16:49.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "libsignal-service-rs is a Rust version of the libsignal-service-java library which implements the core functionality to communicate with Signal servers. Prior to commit 82d70f6720e762898f34ae76b0894b0297d9b2f8, plaintext content envelopes could be injected by a server or a malicious client, and may have been able to bypass the end-to-end encryption and authentication. The vulnerability is fixed per 82d70f6720e762898f34ae76b0894b0297d9b2f8. The `Metadata` struct contains an additional `was_encrypted` field, which breaks the API, but should be easily resolvable. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/whisperfish/libsignal-service-rs/commit/82d70f6720e762898f34ae76b0894b0297d9b2f8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/whisperfish/libsignal-service-rs/security/advisories/GHSA-hrrc-wpfw-5hj2", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json b/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json new file mode 100644 index 00000000000..54258e672e5 --- /dev/null +++ b/CVE-2025/CVE-2025-252xx/CVE-2025-25287.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-25287", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-13T16:16:49.187", + "lastModified": "2025-02-13T16:16:49.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Lakeus is a simple skin made for MediaWiki. Starting in version 1.8.0 and prior to versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0, Lakeus is vulnerable to store cross-site scripting via malicious system messages, though editing the messages requires high privileges. Those with `(editinterface)` rights can edit system messages that are improperly handled in order to send raw HTML. In the case of `lakeus-footermessage`, this will affect all users if the server is configured to link back to this repository. Otherwise, the system messages in themeDesigner.js are only used when the user enables it in their preferences. Versions 1.3.1+REL1.39, 1.3.1+REL1.42, and 1.4.0 contain a patch." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lakejason0/mediawiki-skins-Lakeus/blob/82ad2cd341f85b814a6a0f37969e6210ebf2521d/includes/SkinLakeus.php#L27", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lakejason0/mediawiki-skins-Lakeus/blob/82ad2cd341f85b814a6a0f37969e6210ebf2521d/resources/themeDesigner.js", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lakejason0/mediawiki-skins-Lakeus/commit/fb79928f06efa47677fff27e0f4755eb32b1c8d9", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lakejason0/mediawiki-skins-Lakeus/security/advisories/GHSA-mq77-3q68-v64v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25352.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25352.json new file mode 100644 index 00000000000..51fe7e8e8b3 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25352.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25352", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.343", + "lastModified": "2025-02-13T16:16:49.343", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /admin/aboutus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the pagetitle POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20About.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25354.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25354.json new file mode 100644 index 00000000000..1ac352689fe --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25354.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25354", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.433", + "lastModified": "2025-02-13T16:16:49.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection was found in /admin/admin-profile.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the contactnumber POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20contact.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25355.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25355.json new file mode 100644 index 00000000000..0c76db549a5 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25355.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25355", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.530", + "lastModified": "2025-02-13T16:16:49.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the fromdate POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20fromdate.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25356.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25356.json new file mode 100644 index 00000000000..319584e32f1 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25356.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25356", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.613", + "lastModified": "2025-02-13T16:16:49.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /admin/bwdates-reports-details.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the \" todate\" POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20tadate.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json b/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json new file mode 100644 index 00000000000..18827ada4c2 --- /dev/null +++ b/CVE-2025/CVE-2025-253xx/CVE-2025-25357.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25357", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.700", + "lastModified": "2025-02-13T16:16:49.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability was found in /admin/contactus.php in PHPGurukul Land Record System v1.0, which allows remote attackers to execute arbitrary code via the email POST request parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Santoshcyber1/CVE-wirteup/blob/main/Phpgurukul/Land%20record/SQL%20Injection%20Emails.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json new file mode 100644 index 00000000000..cf1e5387332 --- /dev/null +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25897", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.790", + "lastModified": "2025-02-13T16:16:49.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'ip' parameter at /userRpm/WanStaticIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_3.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json new file mode 100644 index 00000000000..048a8f7fe28 --- /dev/null +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25898.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25898", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.867", + "lastModified": "2025-02-13T16:16:49.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the pskSecret parameter at /userRpm/WlanSecurityRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_1.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json new file mode 100644 index 00000000000..20c13484065 --- /dev/null +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25899.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25899", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:49.953", + "lastModified": "2025-02-13T16:16:49.953", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the 'gw' parameter at /userRpm/WanDynamicIpV6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_2.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json new file mode 100644 index 00000000000..0b301489863 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25900.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-25900", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:50.037", + "lastModified": "2025-02-13T16:16:50.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11 via the username and password parameters at /userRpm/PPPoEv6CfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_4.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json new file mode 100644 index 00000000000..4e4a49a06e3 --- /dev/null +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-25901", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-13T16:16:50.180", + "lastModified": "2025-02-13T16:16:50.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A buffer overflow vulnerability was discovered in TP-Link TL-WR841ND V11, triggered by the dnsserver1 and dnsserver2 parameters at /userRpm/WanSlaacCfgRpm.htm. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted packet." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json new file mode 100644 index 00000000000..e66fd370b26 --- /dev/null +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26511.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-26511", + "sourceIdentifier": "security-alert@netapp.com", + "published": "2025-02-13T16:16:50.270", + "lastModified": "2025-02-13T16:16:50.270", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Systems running the Instaclustr \nfork of Stratio's Cassandra-Lucene-Index plugin versions 4.0-rc1-1.0.0 \nthrough 4.0.16-1.0.0 and 4.1.2-1.0.0 through 4.1.8-1.0.0, installed into\n Apache Cassandra version 4.x, are susceptible to a vulnerability which \nwhen successfully exploited could allow authenticated Cassandra users to\n remotely bypass RBAC and escalate their privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-alert@netapp.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-alert@netapp.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/instaclustr/cassandra-lucene-index/security/advisories/GHSA-mrqp-q7vx-v2cx", + "source": "security-alert@netapp.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json index 06c179166f6..c53929a4612 100644 --- a/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json +++ b/CVE-2025/CVE-2025-265xx/CVE-2025-26543.json @@ -2,7 +2,7 @@ "id": "CVE-2025-26543", "sourceIdentifier": "audit@patchstack.com", "published": "2025-02-13T14:16:19.707", - "lastModified": "2025-02-13T14:16:19.707", + "lastModified": "2025-02-13T15:15:21.080", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "references": [ diff --git a/README.md b/README.md index f8f1335b60f..f4bb1263ca4 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-13T15:00:33.937314+00:00 +2025-02-13T17:00:40.639248+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-13T14:28:17.323000+00:00 +2025-02-13T16:54:45.640000+00:00 ``` ### Last Data Feed Release @@ -33,60 +33,64 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281248 +281268 ``` ### CVEs added in the last Commit -Recently added CVEs: `28` +Recently added CVEs: `20` -- [CVE-2025-1270](CVE-2025/CVE-2025-12xx/CVE-2025-1270.json) (`2025-02-13T13:15:09.273`) -- [CVE-2025-1271](CVE-2025/CVE-2025-12xx/CVE-2025-1271.json) (`2025-02-13T13:15:09.433`) -- [CVE-2025-26538](CVE-2025/CVE-2025-265xx/CVE-2025-26538.json) (`2025-02-13T14:16:19.100`) -- [CVE-2025-26539](CVE-2025/CVE-2025-265xx/CVE-2025-26539.json) (`2025-02-13T14:16:19.383`) -- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T14:16:19.707`) -- [CVE-2025-26545](CVE-2025/CVE-2025-265xx/CVE-2025-26545.json) (`2025-02-13T14:16:20.043`) -- [CVE-2025-26547](CVE-2025/CVE-2025-265xx/CVE-2025-26547.json) (`2025-02-13T14:16:20.347`) -- [CVE-2025-26549](CVE-2025/CVE-2025-265xx/CVE-2025-26549.json) (`2025-02-13T14:16:20.663`) -- [CVE-2025-26550](CVE-2025/CVE-2025-265xx/CVE-2025-26550.json) (`2025-02-13T14:16:20.993`) -- [CVE-2025-26551](CVE-2025/CVE-2025-265xx/CVE-2025-26551.json) (`2025-02-13T14:16:21.450`) -- [CVE-2025-26552](CVE-2025/CVE-2025-265xx/CVE-2025-26552.json) (`2025-02-13T14:16:21.787`) -- [CVE-2025-26558](CVE-2025/CVE-2025-265xx/CVE-2025-26558.json) (`2025-02-13T14:16:22.130`) -- [CVE-2025-26561](CVE-2025/CVE-2025-265xx/CVE-2025-26561.json) (`2025-02-13T14:16:22.450`) -- [CVE-2025-26562](CVE-2025/CVE-2025-265xx/CVE-2025-26562.json) (`2025-02-13T14:16:22.607`) -- [CVE-2025-26567](CVE-2025/CVE-2025-265xx/CVE-2025-26567.json) (`2025-02-13T14:16:22.763`) -- [CVE-2025-26568](CVE-2025/CVE-2025-265xx/CVE-2025-26568.json) (`2025-02-13T14:16:22.910`) -- [CVE-2025-26569](CVE-2025/CVE-2025-265xx/CVE-2025-26569.json) (`2025-02-13T14:16:23.070`) -- [CVE-2025-26570](CVE-2025/CVE-2025-265xx/CVE-2025-26570.json) (`2025-02-13T14:16:23.223`) -- [CVE-2025-26571](CVE-2025/CVE-2025-265xx/CVE-2025-26571.json) (`2025-02-13T14:16:23.360`) -- [CVE-2025-26572](CVE-2025/CVE-2025-265xx/CVE-2025-26572.json) (`2025-02-13T14:16:23.507`) -- [CVE-2025-26574](CVE-2025/CVE-2025-265xx/CVE-2025-26574.json) (`2025-02-13T14:16:23.653`) -- [CVE-2025-26577](CVE-2025/CVE-2025-265xx/CVE-2025-26577.json) (`2025-02-13T14:16:23.797`) -- [CVE-2025-26578](CVE-2025/CVE-2025-265xx/CVE-2025-26578.json) (`2025-02-13T14:16:23.990`) -- [CVE-2025-26580](CVE-2025/CVE-2025-265xx/CVE-2025-26580.json) (`2025-02-13T14:16:24.250`) -- [CVE-2025-26582](CVE-2025/CVE-2025-265xx/CVE-2025-26582.json) (`2025-02-13T14:16:24.407`) +- [CVE-2024-12011](CVE-2024/CVE-2024-120xx/CVE-2024-12011.json) (`2025-02-13T16:15:43.750`) +- [CVE-2024-12012](CVE-2024/CVE-2024-120xx/CVE-2024-12012.json) (`2025-02-13T16:15:43.913`) +- [CVE-2024-12013](CVE-2024/CVE-2024-120xx/CVE-2024-12013.json) (`2025-02-13T16:15:44.050`) +- [CVE-2025-0426](CVE-2025/CVE-2025-04xx/CVE-2025-0426.json) (`2025-02-13T16:16:48.417`) +- [CVE-2025-21701](CVE-2025/CVE-2025-217xx/CVE-2025-21701.json) (`2025-02-13T15:15:20.867`) +- [CVE-2025-22480](CVE-2025/CVE-2025-224xx/CVE-2025-22480.json) (`2025-02-13T16:16:48.777`) +- [CVE-2025-24903](CVE-2025/CVE-2025-249xx/CVE-2025-24903.json) (`2025-02-13T16:16:48.913`) +- [CVE-2025-24904](CVE-2025/CVE-2025-249xx/CVE-2025-24904.json) (`2025-02-13T16:16:49.053`) +- [CVE-2025-25287](CVE-2025/CVE-2025-252xx/CVE-2025-25287.json) (`2025-02-13T16:16:49.187`) +- [CVE-2025-25352](CVE-2025/CVE-2025-253xx/CVE-2025-25352.json) (`2025-02-13T16:16:49.343`) +- [CVE-2025-25354](CVE-2025/CVE-2025-253xx/CVE-2025-25354.json) (`2025-02-13T16:16:49.433`) +- [CVE-2025-25355](CVE-2025/CVE-2025-253xx/CVE-2025-25355.json) (`2025-02-13T16:16:49.530`) +- [CVE-2025-25356](CVE-2025/CVE-2025-253xx/CVE-2025-25356.json) (`2025-02-13T16:16:49.613`) +- [CVE-2025-25357](CVE-2025/CVE-2025-253xx/CVE-2025-25357.json) (`2025-02-13T16:16:49.700`) +- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-02-13T16:16:49.790`) +- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-13T16:16:49.867`) +- [CVE-2025-25899](CVE-2025/CVE-2025-258xx/CVE-2025-25899.json) (`2025-02-13T16:16:49.953`) +- [CVE-2025-25900](CVE-2025/CVE-2025-259xx/CVE-2025-25900.json) (`2025-02-13T16:16:50.037`) +- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-13T16:16:50.180`) +- [CVE-2025-26511](CVE-2025/CVE-2025-265xx/CVE-2025-26511.json) (`2025-02-13T16:16:50.270`) ### CVEs modified in the last Commit -Recently modified CVEs: `16` +Recently modified CVEs: `89` -- [CVE-2019-7192](CVE-2019/CVE-2019-71xx/CVE-2019-7192.json) (`2025-02-13T14:18:25.263`) -- [CVE-2019-7193](CVE-2019/CVE-2019-71xx/CVE-2019-7193.json) (`2025-02-13T14:16:18.827`) -- [CVE-2019-7194](CVE-2019/CVE-2019-71xx/CVE-2019-7194.json) (`2025-02-13T14:15:31.933`) -- [CVE-2019-7195](CVE-2019/CVE-2019-71xx/CVE-2019-7195.json) (`2025-02-13T14:13:03.560`) -- [CVE-2020-2509](CVE-2020/CVE-2020-25xx/CVE-2020-2509.json) (`2025-02-13T14:22:58.803`) -- [CVE-2020-8468](CVE-2020/CVE-2020-84xx/CVE-2020-8468.json) (`2025-02-13T14:28:17.323`) -- [CVE-2021-36742](CVE-2021/CVE-2021-367xx/CVE-2021-36742.json) (`2025-02-13T14:26:24.660`) -- [CVE-2023-37920](CVE-2023/CVE-2023-379xx/CVE-2023-37920.json) (`2025-02-13T13:50:15.813`) -- [CVE-2024-12582](CVE-2024/CVE-2024-125xx/CVE-2024-12582.json) (`2025-02-13T14:15:28.700`) -- [CVE-2024-56765](CVE-2024/CVE-2024-567xx/CVE-2024-56765.json) (`2025-02-13T14:16:17.130`) -- [CVE-2024-57795](CVE-2024/CVE-2024-577xx/CVE-2024-57795.json) (`2025-02-13T14:16:17.430`) -- [CVE-2024-57857](CVE-2024/CVE-2024-578xx/CVE-2024-57857.json) (`2025-02-13T14:16:17.620`) -- [CVE-2024-57892](CVE-2024/CVE-2024-578xx/CVE-2024-57892.json) (`2025-02-13T14:16:17.800`) -- [CVE-2024-57900](CVE-2024/CVE-2024-579xx/CVE-2024-57900.json) (`2025-02-13T14:16:18.027`) -- [CVE-2025-21633](CVE-2025/CVE-2025-216xx/CVE-2025-21633.json) (`2025-02-13T14:16:18.597`) -- [CVE-2025-21700](CVE-2025/CVE-2025-217xx/CVE-2025-21700.json) (`2025-02-13T14:16:18.803`) +- [CVE-2024-1697](CVE-2024/CVE-2024-16xx/CVE-2024-1697.json) (`2025-02-13T16:48:38.990`) +- [CVE-2024-2202](CVE-2024/CVE-2024-22xx/CVE-2024-2202.json) (`2025-02-13T16:48:25.923`) +- [CVE-2024-2326](CVE-2024/CVE-2024-23xx/CVE-2024-2326.json) (`2025-02-13T16:32:17.897`) +- [CVE-2024-2362](CVE-2024/CVE-2024-23xx/CVE-2024-2362.json) (`2025-02-13T16:09:46.350`) +- [CVE-2024-28047](CVE-2024/CVE-2024-280xx/CVE-2024-28047.json) (`2025-02-13T15:15:17.957`) +- [CVE-2024-2936](CVE-2024/CVE-2024-29xx/CVE-2024-2936.json) (`2025-02-13T16:31:06.233`) +- [CVE-2024-33469](CVE-2024/CVE-2024-334xx/CVE-2024-33469.json) (`2025-02-13T15:15:18.157`) +- [CVE-2024-36293](CVE-2024/CVE-2024-362xx/CVE-2024-36293.json) (`2025-02-13T16:16:23.727`) +- [CVE-2024-37020](CVE-2024/CVE-2024-370xx/CVE-2024-37020.json) (`2025-02-13T15:15:18.320`) +- [CVE-2024-39286](CVE-2024/CVE-2024-392xx/CVE-2024-39286.json) (`2025-02-13T16:16:29.157`) +- [CVE-2024-39356](CVE-2024/CVE-2024-393xx/CVE-2024-39356.json) (`2025-02-13T15:15:18.507`) +- [CVE-2024-39365](CVE-2024/CVE-2024-393xx/CVE-2024-39365.json) (`2025-02-13T15:15:18.687`) +- [CVE-2024-39813](CVE-2024/CVE-2024-398xx/CVE-2024-39813.json) (`2025-02-13T15:15:18.883`) +- [CVE-2024-41917](CVE-2024/CVE-2024-419xx/CVE-2024-41917.json) (`2025-02-13T16:16:29.390`) +- [CVE-2024-42405](CVE-2024/CVE-2024-424xx/CVE-2024-42405.json) (`2025-02-13T15:15:19.117`) +- [CVE-2024-47264](CVE-2024/CVE-2024-472xx/CVE-2024-47264.json) (`2025-02-13T15:15:19.400`) +- [CVE-2024-47265](CVE-2024/CVE-2024-472xx/CVE-2024-47265.json) (`2025-02-13T15:15:19.600`) +- [CVE-2024-53689](CVE-2024/CVE-2024-536xx/CVE-2024-53689.json) (`2025-02-13T16:16:29.787`) +- [CVE-2024-56571](CVE-2024/CVE-2024-565xx/CVE-2024-56571.json) (`2025-02-13T16:16:43.213`) +- [CVE-2024-57915](CVE-2024/CVE-2024-579xx/CVE-2024-57915.json) (`2025-02-13T16:16:43.287`) +- [CVE-2024-5933](CVE-2024/CVE-2024-59xx/CVE-2024-5933.json) (`2025-02-13T15:43:43.267`) +- [CVE-2025-1224](CVE-2025/CVE-2025-12xx/CVE-2025-1224.json) (`2025-02-13T15:15:20.500`) +- [CVE-2025-21698](CVE-2025/CVE-2025-216xx/CVE-2025-21698.json) (`2025-02-13T16:16:48.690`) +- [CVE-2025-24200](CVE-2025/CVE-2025-242xx/CVE-2025-24200.json) (`2025-02-13T16:24:24.953`) +- [CVE-2025-26543](CVE-2025/CVE-2025-265xx/CVE-2025-26543.json) (`2025-02-13T15:15:21.080`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 03b4e52bfd9..a849e3ff1e7 100644 --- a/_state.csv +++ b/_state.csv @@ -51119,7 +51119,7 @@ CVE-2011-4591,0,0,1586c3cc3f249d52ee488cad438838b3238f33f3a340024953ceec09be7d74 CVE-2011-4592,0,0,030de9830e710e5368fdf7267344fbaf36da853e75646ee175b6740e63705cdf,2024-11-21T01:32:37.117000 CVE-2011-4593,0,0,96ea64e120245455534fe31211fc8106a3c8f56eff8e99a3fe0d0ef808d74794,2024-11-21T01:32:37.227000 CVE-2011-4594,0,0,28a29fecde6a8893f9ab35a3e862dcb672ce88a68514d8f13e43cad95fd355d6,2024-11-21T01:32:37.350000 -CVE-2011-4595,0,0,4c74225d48a0cc6d6ddffa3b8ad4f080bf7b50753c234eb9e885a294a6277f67,2024-11-21T01:32:37.467000 +CVE-2011-4595,0,1,f31b27b5a240f9a3fd09c8de482623b18fcdae6561eabc9e4a1f765d1bc7738b,2025-02-13T16:11:58.040000 CVE-2011-4596,0,0,571e3a9a6c2f74d292b760737630ce8dd6ec937703e020a4404576aa61fea0fb,2024-11-21T01:32:37.580000 CVE-2011-4597,0,0,d44fe30e9a9b73aef33a9e599f3f53d4fd48e816db6c41fc0a08fdc9088fb285,2024-11-21T01:32:37.697000 CVE-2011-4598,0,0,d06217c3fb5c00c8c4bae7a4c90ac8148c23e04d4101a9a198a937d649897802,2024-11-21T01:32:37.863000 @@ -59262,7 +59262,7 @@ CVE-2013-1631,0,0,32d9e818f81d85840aec1d6db67d71b029a05e3d352403156a896fcc6431fc CVE-2013-1633,0,0,06cdc0a7f4078bfb542492b0440fca77b9985415cea3b031beec40a59a88cd86,2024-11-21T01:50:02.253000 CVE-2013-1634,0,0,2319f288cb16c3f84352c4515df076fa6e8b9c242642674d98ed683f208254fe,2024-11-21T01:50:02.400000 CVE-2013-1635,0,0,52a25604c74277a83208fd93a35ad0fdc52fff081a3f9708f9cbfeb9839ed745,2024-11-21T01:50:02.577000 -CVE-2013-1636,0,0,8c079ad2c66d42dbdc17c3d66876b6c3ac357cf10a7d994d678ee79165f155c7,2024-11-21T01:50:02.760000 +CVE-2013-1636,0,1,07eece111ca76ec6564e8f1348492212636bb727dcf7a7ebaa21c6b6139a5135,2025-02-13T16:03:03.407000 CVE-2013-1637,0,0,f7306e546c36abd22d9b9702332a5610628804609acd5ec2b1f5129e5abe62c4,2024-11-21T01:50:02.940000 CVE-2013-1638,0,0,77562af1ad747551ead21882f11d6e082b732bd5bc37b27c72c6e23163ec01c0,2024-11-21T01:50:03.100000 CVE-2013-1639,0,0,20360fd784a7385a96103d5f74a10c8b7380a12e18e327ce5608da6727e01121,2024-11-21T01:50:03.260000 @@ -64976,7 +64976,7 @@ CVE-2014-0492,0,0,03f93d8ce786c2a0562eb648cef04536dc058189ab1385b92193137230594f CVE-2014-0493,0,0,d6736e39bcbdc30640a4f22eda5b9de2e6931e3d9214bfe1006a8dd86d9f13b3,2024-11-21T02:02:15.020000 CVE-2014-0494,0,0,b216dd08448909693d7dedd7f0e5e9456415d0652bc28b0873278fa4ae393b2b,2024-11-21T02:02:15.143000 CVE-2014-0495,0,0,f9d59b44d3ef5b3a53abcd380b5d00b1258ed7584e3033050c247ba3762bc1fb,2024-11-21T02:02:15.270000 -CVE-2014-0496,0,0,4abc848dbc44b918144134494ffc34024bc7fcb1cf15a7ecf0a50105e32acc04,2025-02-10T21:15:10.953000 +CVE-2014-0496,0,1,f8e9c1af446b5c14cd248a3a8711754c7e39260778625c8bc49509c0d4cec545,2025-02-13T15:58:31.787000 CVE-2014-0497,0,0,09acb29d7708dbe26b161bee622d518f6f0a428a056d3f913de05063f5fc3508,2024-12-20T14:20:31.267000 CVE-2014-0498,0,0,88f90663f24baca072d2e6789a8eff15e382f355e30e6a7579e1ef31e62c2ca1,2024-11-21T02:02:15.730000 CVE-2014-0499,0,0,105e13a3b56c5ba37800d3c4e5cbe3c4d31b4ff5873800ca629c8a4afc56a38a,2024-11-21T02:02:15.857000 @@ -82120,7 +82120,7 @@ CVE-2015-9453,0,0,f3b5aeee51771347d657a769759dd70e0649de7c7d6fbcc62cf3ef0251378b CVE-2015-9454,0,0,6e24cb87bc72b9b4af006fb91d903d4a1d30b2ba4be44bd5b420b64888ef287c,2024-11-21T02:40:40.480000 CVE-2015-9455,0,0,29f93170e7999ac05b7048a87473eec8e5d694ca65902eb7c12313c6c56ddbae,2024-11-21T02:40:40.620000 CVE-2015-9456,0,0,b91def2bebedb9b71aad89158e2990869a74ff0eb7a156673148676b0eaa825b,2024-11-21T02:40:40.760000 -CVE-2015-9457,0,0,97747e8f3472532f868f01ca211c161deb9fabce7576957e94b45f13c41d0fc5,2024-11-21T02:40:40.910000 +CVE-2015-9457,0,1,36b4f96a9d1bdcc2a5960d84057a70fa1dde28c6a2faf2b6fae5b673604b32aa,2025-02-13T16:11:58.040000 CVE-2015-9458,0,0,7fa31e891095edde7df76407651a674e7953a0a7166fa88ce8bbe2bcf2ba2954,2024-11-21T02:40:41.060000 CVE-2015-9459,0,0,508a23a0f484a21da8567db126c22670bdb93bdc1122e20043234b23d81c2c80,2024-11-21T02:40:41.207000 CVE-2015-9460,0,0,54382937b0b1e0cd68e0fecce1401e2b0909ed8237bd256830d37fc76d3c505c,2024-11-21T02:40:41.370000 @@ -134585,7 +134585,7 @@ CVE-2019-16779,0,0,5ff5c139bdc205f917873de8f8aafd6f013ad5794f8c9d910bc1e22cfd1d1 CVE-2019-1678,0,0,cae4a4acdf965026c5a07c842ad2dbbc668ba0de8738184196ea400ac3d8d2f3,2024-11-21T04:37:04.770000 CVE-2019-16780,0,0,c4144e7ebfb1e9195edbfa2a8ec968085e251c02161cf4e8941286834dc3881d,2024-11-21T04:31:10.637000 CVE-2019-16781,0,0,79c4169233718cafe0760c72e70e5d058d73850b97e99f491b84903387d35abb,2024-11-21T04:31:10.783000 -CVE-2019-16782,0,0,b9963b95d62a4b527fdff1bed657ea14e8e1a5ebec6067fef8d54323d398889e,2024-11-21T04:31:10.920000 +CVE-2019-16782,0,1,c808dc8abc80779cc354de5610c4ae3df89a3a3e3c882f26e788320b986645fd,2025-02-13T15:37:40.953000 CVE-2019-16784,0,0,52aadc87dbd65d5d9098ceeea3078eecd3df9d6003c0884d59a4a07d4363e657,2024-11-21T04:31:11.060000 CVE-2019-16785,0,0,d2a81981c50121b4acf1108aa4fd9956430b13c4d2730162854ca14aadb91a03,2024-11-21T04:31:11.193000 CVE-2019-16786,0,0,fc105fde19ba4daefb7ff6ea9bc1e1243837fa1c3a3ce80126613a4762e7e063,2024-11-21T04:31:11.360000 @@ -141984,10 +141984,10 @@ CVE-2019-7181,0,0,c9ef1610f232f8ad3af4bc7af8d77d7d8d5fa61986869be34826f7c90304f4 CVE-2019-7183,0,0,37217b9c80e4d3d92cfadafc02dccddb3f2aac11b4e740ab67d148b357e01ab3,2024-11-21T04:47:44.140000 CVE-2019-7184,0,0,9c893b465dac642769eae6def5be2469c211cd0eb0f9e9a311924aeae68c4455,2024-11-21T04:47:44.253000 CVE-2019-7185,0,0,835b8e1d9d28366a9aa06cde1038caf9ad3cb7941b1394e2fe9daa0ecda925f1,2024-11-21T04:47:44.363000 -CVE-2019-7192,0,1,6b33121e1fcb9aa3ae848a3cef8c00890d1b66ee55c7b261324f5b19f2345d85,2025-02-13T14:18:25.263000 -CVE-2019-7193,0,1,6d206349e72ef1bc7d39a429528ff326287e5e1052f23aac7aabde73cbe7d6f0,2025-02-13T14:16:18.827000 -CVE-2019-7194,0,1,a43350f74c67d3a599f0b781b4dbc1cd88feefe265d4dc38f34f958cf98b64a7,2025-02-13T14:15:31.933000 -CVE-2019-7195,0,1,943a97eb8b9ef29c551e66149cd8c8f13be7d2dcec393acf7d6e2d7ad26c0d60,2025-02-13T14:13:03.560000 +CVE-2019-7192,0,0,6b33121e1fcb9aa3ae848a3cef8c00890d1b66ee55c7b261324f5b19f2345d85,2025-02-13T14:18:25.263000 +CVE-2019-7193,0,0,6d206349e72ef1bc7d39a429528ff326287e5e1052f23aac7aabde73cbe7d6f0,2025-02-13T14:16:18.827000 +CVE-2019-7194,0,0,a43350f74c67d3a599f0b781b4dbc1cd88feefe265d4dc38f34f958cf98b64a7,2025-02-13T14:15:31.933000 +CVE-2019-7195,0,0,943a97eb8b9ef29c551e66149cd8c8f13be7d2dcec393acf7d6e2d7ad26c0d60,2025-02-13T14:13:03.560000 CVE-2019-7197,0,0,d5f937acfde0c9086aa0bfe59af502bce0e9860fef4f0e726928abce1a665740,2024-11-21T04:47:44.987000 CVE-2019-7198,0,0,b25fed3c68cf30094538eed1380862b90470522189d1fdc2727fac5de0b8fe44,2024-11-21T04:47:45.103000 CVE-2019-7201,0,0,aa884f1aeb73ad412cb8d9962cd20003116139550d408f0059cbfbfeef7b95e9,2024-11-21T04:47:45.237000 @@ -151944,7 +151944,7 @@ CVE-2020-17515,0,0,e985d41556a015babc4f5768a898a415dcb25df916474d461fff0f72c9ccd CVE-2020-17516,0,0,6abd77b8eb30226bde3424beb175e42dd9b7e9f27c49cd13a9e74f0fbd073fcd,2024-11-21T05:08:16.080000 CVE-2020-17517,0,0,814c16622e2d26f0dad0ce1f5b63cc67c17fa65f11dcf48e9bcd861641ad8ffe,2024-11-21T05:08:16.220000 CVE-2020-17518,0,0,96a08f3331ccc5cd4d5aa7535ee57f97c39b8009a3ca480f5d895848a305a31c,2024-11-21T05:08:16.340000 -CVE-2020-17519,0,0,cee4eab6399fcd7af1b869426fe1ee82407bae34a8e895abad18206db2b66fc3,2024-11-21T05:08:16.523000 +CVE-2020-17519,0,1,7a4a135eeb4f0daa82dd011f1f35375e58305db8538f71af7078375a501c8bb0,2025-02-13T16:47:51.753000 CVE-2020-1752,0,0,469f359d0774663ac45c2fc6d9e453e32881592cb34a9374111678c800ac0ffb,2024-11-21T05:11:18.623000 CVE-2020-17520,0,0,3b07efee02f8d78fdedff2528fbf8055bf319a88171c50751e1c758cb6dc35b9,2024-11-21T05:08:16.773000 CVE-2020-17521,0,0,430680b0fc1fc07478b96652d29800ec03e56d146d5bb4920b3cd3fea48ef9ad,2024-11-21T05:08:16.887000 @@ -154673,7 +154673,7 @@ CVE-2020-25086,0,0,406084c58b22bda8f13f3b9d8a02d35e42f1f9c5c9d6980736368bcc90254 CVE-2020-25087,0,0,42bcd614840fd96e5185322268ded6756e513fb4247e189d048207a71104933f,2024-11-21T05:17:14.903000 CVE-2020-25088,0,0,4efc5ef43c5d509698dad0e471c922e40baa3a62a29b95b47c4e4d0ee2cd72aa,2024-11-21T05:17:15.660000 CVE-2020-25089,0,0,ce03dec9de84337ca2b76e9dc2b43f752c171dd99f63389d3e8ed1a77ead189b,2024-11-21T05:17:15.970000 -CVE-2020-2509,0,1,d0240186499c9fcf7c26560370e489b2e01369fbe89587b9ef494e53a444a54e,2025-02-13T14:22:58.803000 +CVE-2020-2509,0,0,d0240186499c9fcf7c26560370e489b2e01369fbe89587b9ef494e53a444a54e,2025-02-13T14:22:58.803000 CVE-2020-25090,0,0,f97f4f0b8403aeaec3fabdb608175369035d212a6ce7f915813e6dc8ad19ad60,2024-11-21T05:17:16.310000 CVE-2020-25091,0,0,a2571d21533f526f643273f2ccf5c565f91d6f4280f190cead3a96d03978584b,2024-11-21T05:17:16.470000 CVE-2020-25092,0,0,48803469f0915f6aae5a2de00a978db0ffe872cf9d3d4aa80bd52005831576ea,2024-11-21T05:17:17.103000 @@ -163567,7 +163567,7 @@ CVE-2020-8464,0,0,cde99c1fc97741bce52d94c4feb16ffb048b50869383304390b8d92336435a CVE-2020-8465,0,0,7351106c577b021182fcdae4cbf8c32cd85778c733278671a297b620666e24d8,2024-11-21T05:38:53.570000 CVE-2020-8466,0,0,dc48662204f51e4360e95b33604e7a509ba98c62100571ad4c466fc4aeed4c92,2024-11-21T05:38:53.680000 CVE-2020-8467,0,0,42d2011bbd52d2f7e9a8a1ccda8c43bb6d33e60838fa016c725c79d8ed78a0ad,2025-02-07T15:01:20.733000 -CVE-2020-8468,0,1,df2cb2fdfcd1642ec9eee4f2eabd2d3bf13797690c7fbc202bb142151d274e4f,2025-02-13T14:28:17.323000 +CVE-2020-8468,0,0,df2cb2fdfcd1642ec9eee4f2eabd2d3bf13797690c7fbc202bb142151d274e4f,2025-02-13T14:28:17.323000 CVE-2020-8469,0,0,4c711e420af63f972cd1320af857c808855086c533d1abb91a0f9112be4def0c,2024-11-21T05:38:54.027000 CVE-2020-8470,0,0,fe2bf0b46476cf81b036789ceca34e3737e912bc6ee74038979e38be2662ebbe,2024-11-21T05:38:54.130000 CVE-2020-8471,0,0,3e4e8c6a62e3cfd24c8790f0420125da6e9f2589aa476edd5d8301e245f73830,2024-11-21T05:38:54.237000 @@ -175044,7 +175044,7 @@ CVE-2021-30662,0,0,c4dfc7192dbb2ce4bea44d273c3ad0bccd8bce5f5b4b72ed9d54ec2ac3781 CVE-2021-30663,0,0,01fddc43cb24486618c3c9e6d0042ec692f86994558aef57efdf67cf73338225,2025-02-03T14:15:32.100000 CVE-2021-30664,0,0,f2057936986b5b73e1cba58f4707641670b3cbaa1c2859e5b4b8f8a2a91dd529,2024-11-21T06:04:23.470000 CVE-2021-30665,0,0,7177f5183cb3e845bc6e7e0274f2c6ba2b866d04a6e42a99d1995a601ede60f3,2025-01-29T18:15:40.653000 -CVE-2021-30666,0,0,c8d966b28ab2162bdc187e4ddd46551051c8e5d13b9608b658212a99ea3f4de2,2025-01-29T18:15:40.907000 +CVE-2021-30666,0,1,8dab9f3ed80515f195857a53e3285adb85698bf6f582aa080b13fbb35f8312f2,2025-02-13T16:49:28.897000 CVE-2021-30667,0,0,ee0c4829017313d8362cc93881a4782426de3146989d6fbd51513180306068f5,2024-11-21T06:04:23.897000 CVE-2021-30668,0,0,ef8eec8272941e6ecce5f78376baeda179f835bab56dbd9979f2308401ea7e74,2024-11-21T06:04:24.030000 CVE-2021-30669,0,0,255edb6eeeef2b9d82c1426ec507a796c296a1b7165c3968f981f24a4fcf5073,2024-11-21T06:04:24.170000 @@ -175133,8 +175133,8 @@ CVE-2021-30757,0,0,bbb6cbedb60e248e5305e74a69b357b4a469743799c8f97c50a3f31398611 CVE-2021-30758,0,0,5710e711f7584088729d7134f2c875b1bd17b4c2a70e55e95850541fe9c2e356,2024-11-21T06:04:39.253000 CVE-2021-30759,0,0,3e8341fcb190e83d0927792b271652862a39014a29b0a334186c85ed8ac443c3,2024-11-21T06:04:39.387000 CVE-2021-30760,0,0,8194b06097f1fe5ca9bd6cb8f456ec25ab21044251f10d4f1beff0ef6e328c61,2024-11-21T06:04:39.530000 -CVE-2021-30761,0,0,f09c37570c4ac91b62e5220250c83bd60267a18f953d3951e4db2f5be769ebdf,2025-01-29T18:15:41.363000 -CVE-2021-30762,0,0,72380467d3e32bcf60534cfff99bd42383c4e2350dde7a2ba787c88f6577fa90,2025-01-29T18:15:41.597000 +CVE-2021-30761,0,1,6e4abe3a4f505ee2b3f14da5363fd419294c66a0de0f3612c1b382b35faaaba7,2025-02-13T16:49:19.133000 +CVE-2021-30762,0,1,1cb262ebd85071c78cad6b0f3202ea9043c1152ce1cc564ef96defa48adc62fb,2025-02-13T16:49:10.863000 CVE-2021-30763,0,0,2bc1048cbf2110a07c22660d54e2af1d52d86065d6ef12db5bca91a8b929a4cd,2024-11-21T06:04:39.913000 CVE-2021-30764,0,0,c8cdda9458e5f87eae78c9b07dca33173f6e730fb3315901b74af0026160ba45,2024-11-21T06:04:40.030000 CVE-2021-30765,0,0,feb6acc7d4a195ffa84ec3805c2c338f01ebffb6f87556768da391ad25f704ef,2024-11-21T06:04:40.160000 @@ -175358,7 +175358,7 @@ CVE-2021-3098,0,0,835bfe7698949a8c470a950db1e0f134601888b6317bdd26aeba665a148685 CVE-2021-30980,0,0,d77bf1443277f7deaf307bda35d982f6ffec0a8744f609f4e27aec2fadda1b82,2024-11-21T06:05:05.397000 CVE-2021-30981,0,0,f7d70faf8df9ced843decba0fce7cee42836abea86d6b28cf9adc987ccbedc6b,2024-11-21T06:05:05.547000 CVE-2021-30982,0,0,aed8c698d26f63eeef6f36ecc917fbfb0a0280890502ce253115bb7bcad4ad9e,2024-11-21T06:05:05.687000 -CVE-2021-30983,0,0,c5437dd1f871fc1a7e5fae93d5a81a0dbb98fc4e513424204a49d7efc541c7be,2025-01-29T18:15:42.993000 +CVE-2021-30983,0,1,8861a597f4d9d1e2cf99a9079b846aed54919325b5fa06796b3fa823072fe2b2,2025-02-13T16:48:52.507000 CVE-2021-30984,0,0,2ce08821af3cc19aa8566ed17e6e0df45851a786ba8737c0304a21337d51b1c7,2024-11-21T06:05:05.953000 CVE-2021-30985,0,0,f417508d966bf92ce21d7b6917f19b99863903e3da2cff874287515c2022ba93,2024-11-21T06:05:06.100000 CVE-2021-30986,0,0,1df860d51308956714720d9bc99b92246e6fde5be8fd9ebdb239b6f12442615f,2024-11-21T06:05:06.227000 @@ -179575,7 +179575,7 @@ CVE-2021-36739,0,0,f26d0be0a721fbe6be03df43ffbc9b3042175c6173cfb23d10478df22eda2 CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000 CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000 CVE-2021-36741,0,0,d280b45653300f468a60e6fac9bd749827b184c0e1831b0373fcedbae7e2d3c9,2025-02-12T19:23:38.797000 -CVE-2021-36742,0,1,2e41644e342db51beeadf18bf8dc0c4d7f3c0355ab530a8109799a1fcf7f4b10,2025-02-13T14:26:24.660000 +CVE-2021-36742,0,0,2e41644e342db51beeadf18bf8dc0c4d7f3c0355ab530a8109799a1fcf7f4b10,2025-02-13T14:26:24.660000 CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000 CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000 CVE-2021-36746,0,0,21132e96a64571a11d67dee583d5cbe254c9677a98c9b6f236f1ceaa252d79a2,2024-11-21T06:14:00.443000 @@ -199890,7 +199890,7 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95 CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000 CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 -CVE-2022-31631,0,0,65b0b3cc30f2a36288a9457337ee54b9c2f86618069af22f8c135904adfc5034,2025-02-12T23:15:09.593000 +CVE-2022-31631,0,1,17b5f30def9bd558fe7850cc522d8b16cde5c00d185e6ef99e1d54dadccdd3d2,2025-02-13T16:15:35.670000 CVE-2022-31635,0,0,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000 CVE-2022-31636,0,0,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000 CVE-2022-31637,0,0,30c8596251895654f5e10b1d0756a872401cb82752723a34976c21eb08a2360a,2025-01-03T20:15:24.413000 @@ -205506,7 +205506,7 @@ CVE-2022-38741,0,0,269b81882a77857041db57c22afeb2ec5343cac9d374c6d761d3da371d568 CVE-2022-38742,0,0,4dc24dff619373dcf18b031989d76b25b076b55537fefca42c1e29141ddc22b4,2024-11-21T07:17:00.580000 CVE-2022-38743,0,0,c06c51cd02bed80270054b361fd58d52d1d0c7400d6b49e5f4a9aedfc687dcc7,2024-11-21T07:17:00.703000 CVE-2022-38744,0,0,135b0e5091ac9867b78fc809f51d1a3fde99120bbf39ace3ece0038925384916,2024-11-21T07:17:00.823000 -CVE-2022-38745,0,0,ac84b3cb683ea85c3894f52105e49a8d1d7e560f03c1d0028543f27d9b883c2f,2024-11-21T07:17:00.937000 +CVE-2022-38745,0,1,8684fdcbbf2ee756f9e4d69b743940724be4fa1c5601f6df84d5bac0bafb856f,2025-02-13T15:15:11.950000 CVE-2022-38749,0,0,4590b0a90d99e7842a5c1d5e2665c814c644c82ac4eb7dc42c276ffb177384e6,2024-11-21T07:17:01.060000 CVE-2022-3875,0,0,f28202247c2f4dd84e959da8b4c584818b9a06ae91ed91dc1c035166e691dfdb,2024-11-21T07:20:24.877000 CVE-2022-38750,0,0,50efcc076e2e507f493d3c0aec3df7d8ca0df5cc01e50b0532f01f8d37758f43,2024-11-21T07:17:01.207000 @@ -209921,9 +209921,9 @@ CVE-2022-44566,0,0,0fb25341dc2372e316a3147efc1b92c35445a94d58499784f3d67a07cc512 CVE-2022-44567,0,0,c8510c37be51c9b2c38ded59d71cf764b5c8a711ed39c654189c1934536ae614,2024-11-21T07:28:08.680000 CVE-2022-44569,0,0,a516cdd31aae1bfc7efb4636a5f8a5f9d6461c4721c73c5d51bba3a8ca4bfa02,2024-11-21T07:28:08.797000 CVE-2022-4457,0,0,7f6ebcc0baa1f187f011058abcb5e79baa262e4f4ede3da3fb955a83874efd25,2024-11-21T07:35:18.203000 -CVE-2022-44570,0,0,5042e390c372bb59a69b5b41f94385747add834b844c5822826e15c14ab3a241,2024-11-21T07:28:08.923000 -CVE-2022-44571,0,0,3d3b2b6a226361340810d466aa90b032a7d87794ec2bb5897c9b18a92d2c1b65,2024-11-21T07:28:09.063000 -CVE-2022-44572,0,0,cfe930b89b2b0a0f1b12d7eeb986cf1a596fc43d7260310d214484533bdd8b72,2024-11-21T07:28:09.180000 +CVE-2022-44570,0,1,2e1f4c6a3e32ab4d95af22abbceed286d4956f89e715c7a200fccfca33b54482,2025-02-13T15:37:40.953000 +CVE-2022-44571,0,1,f792fe00925d8be6d5cbf7dc00f882fa2edae58eb43a8da981c1a09f859cd8eb,2025-02-13T15:37:40.953000 +CVE-2022-44572,0,1,2e947895aa4560611e65fe74203c14741d79e1db2383da30ef7ed36dc58629d3,2025-02-13T15:37:40.953000 CVE-2022-44574,0,0,a175eb8258a6bf38b31ca4013bcbd2926799f5ce592f9f6a10ae015fefe5d74e,2024-11-21T07:28:09.293000 CVE-2022-44575,0,0,f9cc9231170f65a5b3adcd23f0c7ad8b6b101fb60d3e3cd83c0bcddffe8c893c,2024-11-21T07:28:09.410000 CVE-2022-44576,0,0,c0d43c3b5ae1e286ac188117f1c79b47f94c826ce1616991316f95513ab952d6,2024-11-21T07:28:09.523000 @@ -213772,7 +213772,7 @@ CVE-2023-0610,0,0,09cdaf248210d83eee33150f3c63e272a3fc05b57a69f53cf75b4e4fc60530 CVE-2023-0611,0,0,70dba0a865e591942b997039bea2460e9023467baf8e8273a1d7dce201fd51a9,2024-11-21T07:37:29.010000 CVE-2023-0612,0,0,44d27f3a86ff26a3fe334bdb9acde0af078afc7b3046b92bbaa2db8d48e848b7,2024-11-21T07:37:29.123000 CVE-2023-0613,0,0,b5380130fa24d8f3071fe320719b28058d9dd22a2b76d458b077119fd03b66c5,2024-11-21T07:37:29.237000 -CVE-2023-0614,0,0,923147ee7657da60c87dc0cc3789d1a109db1e5c7861202e3f1ab31d92ba1b18,2024-11-21T07:37:29.347000 +CVE-2023-0614,0,1,d8360a315fade40367849f7d8eed10d1ed6f2aa6f6e16fd39d660f0938c62377,2025-02-13T15:15:12.557000 CVE-2023-0615,0,0,2acce67942061ace98d26dab137d1dbe34af920bc99652d6d54b06302cc1c3fa,2024-11-21T07:37:29.450000 CVE-2023-0616,0,0,10310e30c1261b19b64462d1924a6273da2e3bf254a17df54c41f55ba2020b33,2025-01-10T19:15:31.767000 CVE-2023-0617,0,0,691cc18bb8bdbd989d0ff33cb4f5f372eb4b04c5e44de3164da8290f4a638d03,2024-11-21T07:37:29.650000 @@ -213893,7 +213893,7 @@ CVE-2023-0734,0,0,f921de25e0539002a33eb69e20385abb95b87cf69e1e383f877fcca2a34033 CVE-2023-0735,0,0,76fb69986f4f0c25f7e1ed9edf1b53a32953643309ca6b25195a8d5b6198f80a,2024-11-21T07:37:43.387000 CVE-2023-0736,0,0,836438e007cb462f20d0908c83deaadc773892d53876ca3072cd71ab891c53a5,2024-11-21T07:37:43.503000 CVE-2023-0737,0,0,900c62eb035de44f8e952c1ff662a9006b505ae35be3c7c6ada5c788cf357b0a,2024-11-19T14:43:04.257000 -CVE-2023-0738,0,0,9d13f23ccd51eea3769f207ec7b9596dd40452ba8f028542198fd51cfe8e7f29,2024-11-21T07:37:43.727000 +CVE-2023-0738,0,1,735bda8f4eda21e20a4a37ea96d2c786e91f944a6b0f850354d0169b8a2c28d7,2025-02-13T16:15:37.153000 CVE-2023-0739,0,0,a86a9bfc1f98989734289a92da8acfe614c4f3ac292c98475e37cf3b41695960,2024-11-21T07:37:43.830000 CVE-2023-0740,0,0,3ae23c2561c9fd0f6459f6745b8023170771e286797bb0ca71b9ec3de84a5d00,2024-11-21T07:37:43.953000 CVE-2023-0741,0,0,1eaf708f1c064054b74fc527d3d0f136f07a00ffdb069343e0e04f5673bc4efb,2024-11-21T07:37:44.073000 @@ -213984,7 +213984,7 @@ CVE-2023-0831,0,0,8474babc1c55df551fdb8452b5f3c395b895992f4796528f052eefbe027bce CVE-2023-0832,0,0,ba41f2346967ce23a1fad0fa301c2a3277157ab48eef2cebd36ddd0f8cdd981d,2024-11-21T07:37:55.167000 CVE-2023-0833,0,0,f81b6b3cc9236c71eabe9aab2aac33e27e38e08305ea33b572bccb587f566a1f,2024-11-21T07:37:55.277000 CVE-2023-0834,0,0,f547e455350402eb14d9713ee1c5d718a3dd5b6fb1b58e1884afffe07b8d19de,2024-11-21T07:37:55.420000 -CVE-2023-0835,0,0,324d25978f7645fc9a08a1445aa8b8cd1a606a6a3ec407d0706fcdfe881a3f9f,2024-11-21T07:37:55.543000 +CVE-2023-0835,0,1,a9891930ece6dea40b7e4389126adcd46fe85e5e39e2c8f933f450ceb36d22f9,2025-02-13T16:15:37.380000 CVE-2023-0836,0,0,40031da1f2a5ea4805c0baacea6910b41c7aa80a324261de616e2f08889c931a,2024-11-21T07:37:55.647000 CVE-2023-0837,0,0,7b3be44a33690bff444f14e8dbc445da966bed070d4a3fba52e0beabbe425325,2024-11-21T07:37:55.763000 CVE-2023-0838,0,0,69efdc650e292dffa70d5346205426679dbb07638649772819fca39e78fdfebc,2025-02-10T21:15:13.510000 @@ -214068,7 +214068,7 @@ CVE-2023-0917,0,0,a7231a8da1c4d44e142bf303dc21b6784566ff4ddd3681cce4dc781b6b845f CVE-2023-0918,0,0,3991662f18a9da25feb427987e4c4ade19c212ca9558262d1cc8872eda6f4723,2024-11-21T07:38:05.887000 CVE-2023-0919,0,0,5305cf677997835fc8e97f12f98585f9abdf4bd59ff72c678671606015005d50,2024-11-21T07:38:06.010000 CVE-2023-0921,0,0,13e7f89125226c2be46f4ff9448cd445661866b8ff54e902081ec06d99e14908,2024-11-21T07:38:06.130000 -CVE-2023-0922,0,0,94b670c71ad6c5df92066fe0f049322290bc52b352018c4add4f12222ab4bb7a,2024-11-21T07:38:06.260000 +CVE-2023-0922,0,1,cf60c569e8a1822a3b2b032815b27b121e14e27c2704870c00f09b54b60b9b81,2025-02-13T15:15:12.780000 CVE-2023-0923,0,0,7daaca2b1392cdb563ac6de27eca1f70a13e9211557487fd5d694051f34523c2,2024-11-21T07:38:06.380000 CVE-2023-0924,0,0,c8dd3a3537dd275687782fe4de1a780990056b2847afc93ff1e8f9e9c751f38c,2025-01-30T15:15:11.770000 CVE-2023-0925,0,0,e28a97a4ae7f1d44dc7c7c6977b76d9c031188b6d0669741bb545be62d2ef78e,2024-11-21T07:38:06.610000 @@ -214693,9 +214693,9 @@ CVE-2023-1575,0,0,e819143f4da039597b05218fcc62ed6ebb5d67e2f6053ad1a2e91863e72a7c CVE-2023-1576,0,0,ef2f2d7ef5f003955027a9696c660724e0afac7b8354b8ee997b1c99faa02c4b,2023-11-07T04:04:10.800000 CVE-2023-1577,0,0,eebac316a84f88df6baa3c43b2e30d6795bd49eb20845c112b2a2f0fe25f8250,2024-08-13T15:12:55.303000 CVE-2023-1578,0,0,66cb8fc85f3f8aaa619ca3ace9c7471d9015ccf4226c20e3e85976f8a2c0af1e,2024-11-21T07:39:28.870000 -CVE-2023-1579,0,0,a09f9ea20d4489afad75c6675f779ee00ddc78ced5a46dee4363194f9df08622,2024-11-21T07:39:28.990000 +CVE-2023-1579,0,1,50565f642b8bf23b160b8b560fea27c62e4dda0b1d4e3244037eab5b45639d2e,2025-02-13T15:15:12.980000 CVE-2023-1580,0,0,32798eaace1c0176f01112468cdf5b96d13f14e9f4990aca18ec1ec69372613b,2024-11-21T07:39:29.123000 -CVE-2023-1582,0,0,d7533a8699f25582a455b118b835f730420666b0e2d265c935986287618b0953,2024-11-21T07:39:29.237000 +CVE-2023-1582,0,1,4c90582c85b52402703d8543f7d1cf5df40c821228ce0c9c56a2fa4b6a73f7a8,2025-02-13T15:15:13.173000 CVE-2023-1583,0,0,c7a670cc3dc25abf6ca9786d564808c153d4b1aeb47b34ad1b629d1c2067dece,2024-11-21T07:39:29.350000 CVE-2023-1584,0,0,fe4b4caed9583a7c3818b0308f4ea66969cc3bcc4209ac4185cd8ca287ed9751,2024-11-21T07:39:29.470000 CVE-2023-1585,0,0,c56abf514285a2202f0f52b732e55f561c429d4e9705e8ab1bbc7fb1f9e29a6c,2024-11-21T07:39:29.617000 @@ -214722,7 +214722,7 @@ CVE-2023-1607,0,0,9d16a9c1cce69c583a742f7d681f11fd806fddb59db420c66dcab4ada2767d CVE-2023-1608,0,0,89ac583ef7322e4bc552f4aa62d0f6e9ab46964311034170f4eea2153b3f3750,2024-11-21T07:39:31.780000 CVE-2023-1609,0,0,5668dd5598c2873663e49339381d2d11f4abf436b4943c6b6e19cf1a7225a818,2024-11-21T07:39:31.927000 CVE-2023-1610,0,0,1d2c3978ee29298de750514ebfba47cff4f8672b966bb54773a2f741b5861300,2024-11-21T07:39:32.063000 -CVE-2023-1611,0,0,441fec094c3e2c5f624a61337e71f166acdd20f2f2f8b56512a32d1d2efbef66,2024-11-21T07:39:32.193000 +CVE-2023-1611,0,1,fe8aee3f6ecc944fecdb283b941590e5632ae79ad8ea684c0008d206a823111f,2025-02-13T15:15:13.357000 CVE-2023-1612,0,0,03ef46a5564cc6e02dc2f30f75a61a0b553ec9734bd77b592e2a6ae4b7d59bbc,2024-11-21T07:39:32.330000 CVE-2023-1613,0,0,875add8d1a41114d3df41a1c0c2e18acb80939a4eb7457f8a0cb4e0e343a480d,2024-11-21T07:39:32.480000 CVE-2023-1614,0,0,d3ae64829126ce70f25af4f1742c07af420adc653ca1ecde4695f57868d13a04,2025-01-30T15:15:13.400000 @@ -215531,8 +215531,8 @@ CVE-2023-20649,0,0,e578b7d1e0dde5f624a02d937013ff7cf0b25887e0640b542517224614e5c CVE-2023-2065,0,0,6adc1dc6e5421910a8f66b949b10ddd6e35171e99ee7723b2c415c61326c4780,2024-11-21T07:57:52.227000 CVE-2023-20650,0,0,268fd855a65cdab2a0eaeb2cfd59dc51a4a643f54094cc85261c1bbd6d1a24f1,2024-11-21T07:41:17.543000 CVE-2023-20651,0,0,c931350452b735a23e9229b569e270a5f54d60e0e2263fb39c061c2250efc655,2024-11-21T07:41:17.647000 -CVE-2023-20652,0,0,6d0c23e8b4832309a55bae670ccd2735c5ee1c391c580df824713856c5739f08,2024-11-21T07:41:17.753000 -CVE-2023-20653,0,0,17a75bc512d54a287de64227c0f63ac8dfa9c6cd62f98339e0ddb0a6c232f15d,2024-11-21T07:41:17.877000 +CVE-2023-20652,0,1,17cd13e3445ca3b057e9c52c8e29168c960cf6c40ea3e47c6010e04cbf52887f,2025-02-13T16:15:37.597000 +CVE-2023-20653,0,1,2e3a6ce1de65ad8fc2ff0f067002d17f6c3e6a50911a4b2bd06bafbd2ec34c83,2025-02-13T16:15:37.793000 CVE-2023-20654,0,0,a248cb21d0ff5aa290e571631f7026712aa2f0e6dc51485f7f3f566b2bea1c25,2024-11-21T07:41:17.990000 CVE-2023-20655,0,0,50209f9501f598420df854126f3c9e335619766c6de067d751f2a2daf770a8c7,2024-11-21T07:41:18.110000 CVE-2023-20656,0,0,bd06d7fef946b4656fd3f7878c72409dee5792db24a0770391defb0964b62585,2024-11-21T07:41:18.237000 @@ -215543,12 +215543,12 @@ CVE-2023-2066,0,0,14e656716d38ca5db672e6d09b0704ebacfc145d9c104c334c1334bf060d04 CVE-2023-20660,0,0,091e3421b7260d06eddaad80981176e9ee697561eb07711aada4c77d251678ed,2024-11-21T07:41:18.783000 CVE-2023-20661,0,0,b73cac29320f486c5103166919888e4a92c49c5206a8a009e09141fb4400bf86,2024-11-21T07:41:18.897000 CVE-2023-20662,0,0,b4ca1889e7bfbfb6dadfaba4a0260707263b76a5791820d35f90fd90bfcb4120,2024-11-21T07:41:19.003000 -CVE-2023-20663,0,0,054ef45195bb5eb3f1fa3f01aa1975cabc3fd6edb0496c4ff742dedca391f20b,2024-11-21T07:41:19.120000 -CVE-2023-20664,0,0,af500749756a4942da5fad2cd6a52339cfeeb33f827e97898669f8038b65f62c,2024-11-21T07:41:19.240000 -CVE-2023-20665,0,0,dfcb31026b7c30e90be6e3188d6c3b233b3c12e9403d3e657a19e03d0e7ddb42,2024-11-21T07:41:19.363000 -CVE-2023-20666,0,0,3ad2ba12d88061f23a7c0b09598969c2e9597c7160fc17bc5129321b5b838acf,2024-11-21T07:41:19.483000 +CVE-2023-20663,0,1,fc15b45514b6999b181aa06f5c29fe741385e75cebdc777cf426e214a8aa939b,2025-02-13T16:15:37.993000 +CVE-2023-20664,0,1,3a885ea72822238105699286d675a0c066717c7f550cdbd1573d13211c176c50,2025-02-13T15:15:13.603000 +CVE-2023-20665,0,1,bbcda79cd8396576789a07c77fc522b3780a9e8a54feb66f53d5693ed600b946,2025-02-13T15:15:13.987000 +CVE-2023-20666,0,1,c5d2c0fe4d9f9ffdbe1d4fa83d8991d3bf44101616c65a6e41eb579627dbacce,2025-02-13T15:15:14.217000 CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000 -CVE-2023-20670,0,0,e4e5ee151777987fef7de5981cab53d63b02c8c02f20668d5ebefff86242ed80,2024-11-21T07:41:19.597000 +CVE-2023-20670,0,1,3d1330a91e286a1fdca38c9b2f6dca7b756deffe5f4200d26ce3ba4caa636a46,2025-02-13T15:15:14.440000 CVE-2023-20673,0,0,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 CVE-2023-20675,0,0,91492ea9a54e1bfc3d79a683f7dfb3a3f048f71ad7188ef164f152ebe8298300,2024-11-21T07:41:19.950000 @@ -219122,11 +219122,11 @@ CVE-2023-24789,0,0,478a774a25a83944ccf6fe2be0a5de598b6e51ea788134ed3d69cefa03b90 CVE-2023-2479,0,0,4801134ef77265136ffc1bb85eb06ca5e6918eec27800c07ac6e0c5e0435b44f,2024-11-21T07:58:41.860000 CVE-2023-24795,0,0,87acf6ba296c42149b10204dfda61069c3419c9d106dea2f2b51cea8de96d935,2024-11-21T07:48:24.910000 CVE-2023-24796,0,0,0811d8124e097273749efb44bf056e7530d4475a682a12a8354f5594791213f6,2025-02-03T18:15:28.627000 -CVE-2023-24797,0,0,f875e745dd7968f97d42802098176a062f30eb0d60abe3ff2a263296997bd1b3,2024-11-21T07:48:25.187000 -CVE-2023-24798,0,0,9a457477a3d3d59488c5493fc4e2bbf6157bf89848d86e89974d966d0278892d,2024-11-21T07:48:25.343000 -CVE-2023-24799,0,0,7383ae65def80f1d11ab245ac22ddaf1f44923ef62d09fac6d8a8938d039eee2,2024-11-21T07:48:25.490000 +CVE-2023-24797,0,1,82fe4745123461bace6d5d2f0677988eb959e24e2dd509bd732deb950dd29eb9,2025-02-13T15:15:14.623000 +CVE-2023-24798,0,1,981fffa34b4fdb09bbdd97d487dd955ec7d56af0ca3e0a76dc2b53b471d30998,2025-02-13T15:15:14.830000 +CVE-2023-24799,0,1,50b28e2acf121d03751c87c8e57840ea94b9aee29c23a252fb84d47d16b25f3c,2025-02-13T15:15:15.033000 CVE-2023-2480,0,0,223a2acaf49a80ce6277c6688e780a56126fa4cbdf4a2a5c6c2467c3f176f04c,2024-11-21T07:58:41.973000 -CVE-2023-24800,0,0,5eea6466d0abf88db721dec3010db39e104701834a3656a2e81db06ce28a5c33,2024-11-21T07:48:25.623000 +CVE-2023-24800,0,1,c84f39d907f37a6f0df4a8565286293534d17a25d5039ad424eb260f0d1f7364,2025-02-13T15:15:15.230000 CVE-2023-24804,0,0,9e18e814bf9d2f0ee99b3d5ac08f5ac1b5b65e983fa6a98dcc9b24cc99942596,2024-11-21T07:48:25.763000 CVE-2023-24805,0,0,34593b992889d2813b422646e236e18e2dc8889fd5ef712dede0bfa5a98869d0,2024-11-21T07:48:25.890000 CVE-2023-24806,0,0,40e07feae743e1dc0cf98694115b70e6029d70453db169edfc96fbaf6f53f829,2023-11-07T04:08:42.577000 @@ -219531,9 +219531,9 @@ CVE-2023-25201,0,0,958281f4bfe73b245cdfccb570afcd44ea4e910dfc23bbe9a98dadb686678 CVE-2023-25206,0,0,84446d44bc80d35e89c7384c5940f85c723e0e3dad377cd5f317e42cd1d957ed,2024-11-21T07:49:18.553000 CVE-2023-25207,0,0,1a2881e05c7ba32d5e5ac3b80fd03701834373b5213d0404f89e2d2fdb658e4e,2024-11-21T07:49:18.683000 CVE-2023-2521,0,0,b02212fdb6b8803c29eeb43546b04e8b2a6aa0b55495089a864a6db0c5febafc,2025-01-29T17:15:23.937000 -CVE-2023-25210,0,0,61dbd59825de081394929661a58ef96ad92d993913e30770d2111263581b78f3,2024-11-21T07:49:18.817000 -CVE-2023-25211,0,0,1ae33074e7894c183a645976c93dc30ecd9636c069a879841ed321e2eaf5a38f,2024-11-21T07:49:18.947000 -CVE-2023-25212,0,0,ea3f540bdfec12618313d4de4b0916913743ea3d7ce295602d48552d72e4f2f2,2024-11-21T07:49:19.073000 +CVE-2023-25210,0,1,28768e6431c78416f9f9c3028b81ba4b55077b2f9f7598794e3a51fc9890c933,2025-02-13T15:15:15.430000 +CVE-2023-25211,0,1,c10550d535670ad60a27b9f09da9fe3858ad5481b70be927786681159b9a953a,2025-02-13T15:15:15.660000 +CVE-2023-25212,0,1,fda43cad09fa4b96431c812fe78bdec41d3da48f695710271bc29f84f5d2cb2d,2025-02-13T15:15:15.907000 CVE-2023-25213,0,0,8ef9e846887220dda6a2fab9ba4f83e22b3d57462bc47ea49ad73172378cb791,2025-02-12T22:15:29.340000 CVE-2023-25214,0,0,93c765abbb403b20ed42e193aa35af5e2cf191cbede52fb58a839a9fb9305d11,2025-02-12T21:15:11.117000 CVE-2023-25215,0,0,099f8dd0326d29d64c3f7a387cf3756a7e61f9b24726004e7abb98973fb67d6a,2025-02-12T21:15:11.290000 @@ -219576,9 +219576,9 @@ CVE-2023-2529,0,0,e0c597e5f44df4f0fa35a31922c8c63e9eda9621312de091657b5b531d9768 CVE-2023-25292,0,0,3f06b791e0f858743cc9523b1e9506d3377c6b13955495c0f2e922089d530295,2025-01-31T19:15:11.643000 CVE-2023-25295,0,0,a98834b6bd1f87785173f8777c2482cbef1ded510a102976fe5e23312fa33c78,2024-11-21T07:49:23.760000 CVE-2023-2530,0,0,c36e5a9f5a23eb0efcedd6cdd8d45f1a0a10adb98425deae26560f2b5760cd78,2025-01-07T16:15:29.843000 -CVE-2023-25303,0,0,0fff8997fbb0dad0658b1458cb96909339d0a3ee3f17f6cda9f8e25ba49cee9d,2024-11-21T07:49:23.910000 +CVE-2023-25303,0,1,0e0b37f3d5556a7b52f9466ef02672f221d50c1e3df4c4033756bc2697aa978e,2025-02-13T16:15:38.373000 CVE-2023-25304,0,0,28a9fcfe9f8defd2b94db49ca3a63558bcf2cd3ca6efe7b0c3e6f407ffddeb97,2024-11-21T07:49:24.047000 -CVE-2023-25305,0,0,e034ff43c37edb7c066168ed0e8780cecf32ded05354e03285f0640dac3342bf,2024-11-21T07:49:24.173000 +CVE-2023-25305,0,1,d7ff39e2efd1d257e23120861ff0eb92a62220843ac7726f757159de197645f6,2025-02-13T16:15:38.540000 CVE-2023-25306,0,0,edcf081a190ce1746bf6344523ba03f49a546931e1f6e6192e742c750e584b96,2024-11-21T07:49:24.310000 CVE-2023-25307,0,0,169769ff3f98fbbb2d755cb83126804d404a380acff35a8f1b6aa4539f98db5c,2024-11-21T07:49:24.450000 CVE-2023-25309,0,0,12fb26cab8d54fb6e8bd69905a74bdb9e62d267a6541c74cf35ecd6b4a2c3007,2025-01-27T17:15:10.743000 @@ -219596,8 +219596,8 @@ CVE-2023-25347,0,0,7dd18f4e49becbf7027509d47983052d9cc5e16b21885845ebdbbaf2c5086 CVE-2023-25348,0,0,7b24e64ac0df04bfc1b24e00ef9e1851d7c486926aa7bdf9d8bc8b9ef222eb15,2025-02-04T16:15:34.780000 CVE-2023-2535,0,0,ecbc3c1119751bb16ffbe409b3f09b7cc832d1bb36bfa91e0d8b9eb72f3e94ea,2023-11-07T04:12:51.317000 CVE-2023-25350,0,0,7c58eaa57d66254e13765ebf86b30641b26b6ed22bff7e285e4c3070a3c3ec1b,2024-11-21T07:49:25.943000 -CVE-2023-25355,0,0,9299541b7ecf05bd5ebe243bb5dd82e026377da551587252a389f25add8aa48e,2024-11-21T07:49:26.080000 -CVE-2023-25356,0,0,bc80e5960670aea7a44f784b6dd85a7deda11e5c4e218ebb1479839c75b1f5d7,2024-11-21T07:49:26.200000 +CVE-2023-25355,0,1,6b9b62c05e2b1c9a3232a1048d5b259d801a232c11200ed5e06db450c607257e,2025-02-13T16:15:38.707000 +CVE-2023-25356,0,1,5fb606199eca30d5951706e2fbb5a7eba5b39535bfc1c7d9d569d83923c02373,2025-02-13T16:15:38.870000 CVE-2023-25358,0,0,c293b186724c778961eaee7691e3edb8240ff2943c5c22a7bf4907fb0cf4942c,2024-11-21T07:49:26.333000 CVE-2023-2536,0,0,e60d4a8f265160ea26e357549aa6b6606f1601d74332afd7e06d77b41cc5f9c1,2023-11-07T04:12:51.350000 CVE-2023-25360,0,0,58ce236e791e6c503b8d9081ab63cb6a457038077a256f7895482c1b7a8386e1,2024-11-21T07:49:26.480000 @@ -219878,9 +219878,9 @@ CVE-2023-2569,0,0,b5fcde2dfeebfda18c855b22570ea6f947e77e54d9f8def85614e6b654e6ad CVE-2023-25690,0,0,112961116e5069e25eb94f1a550a1fc87d3b9b79db305f98a699aa7f0907fc00,2024-11-21T07:49:56.680000 CVE-2023-25691,0,0,c0329cf3e9ced64bfa489454b12900463c54cf95ea858dfab64660b5653ef2e4,2024-11-21T07:49:56.813000 CVE-2023-25692,0,0,03deeec3568cdf754a2e3f5fa44245f0226eb9aefcea9dc69b6aa5ad2eb56284,2024-11-21T07:49:56.933000 -CVE-2023-25693,0,0,6f344e920a703aa1076795d24e1ef998426e154df2d6edee28728e0e8d1fd9c0,2024-11-21T07:49:57.050000 +CVE-2023-25693,0,1,f2205206093b36c82e011ff8d94205a8f543b01b140d40cb646591f0cdad58d3,2025-02-13T15:15:16.190000 CVE-2023-25694,0,0,691788347499d8910b0fb9d838b2ec03f561930ff4f163b5d5059696a97b673c,2023-11-07T04:09:07.633000 -CVE-2023-25695,0,0,184d56863c864b2f6b4afba628a11822ffbc7f10a4bb31432017cb6bb35fd8fc,2024-11-21T07:49:57.180000 +CVE-2023-25695,0,1,8724ca28e1289c571d00e828e3721f7d8621b76938a65eaf186d6a56f0f050e7,2025-02-13T15:15:16.487000 CVE-2023-25696,0,0,9b30fc8f3c9a71ae427b279858c40ae676558377846bf61fb9aa78e7e7489835,2024-11-21T07:49:57.320000 CVE-2023-25697,0,0,1ddc4535b182d65fccd47e71db42817aa3614e13662ca36b13717dda226bced3,2024-11-21T07:49:57.517000 CVE-2023-25698,0,0,85e697c414fb65361935cfd67798d1168f7dd2b2d5fcdc4e1bbc5dc760604cb7,2024-11-21T07:49:57.657000 @@ -220752,11 +220752,11 @@ CVE-2023-2670,0,0,a1065ad65af6f347a58b017e2eb295fa80d678cde7293a656e61c970c1d3f9 CVE-2023-2671,0,0,97870763a7eedee419e173781ef2c336dd0ecab2dd2d540058c12e1c853bb556,2024-11-21T07:59:03 CVE-2023-2672,0,0,d9b40a95976d1126fc3f4b4942d6b7a876b13432f2f21e468e9c4efe06a210d0,2024-11-21T07:59:03.143000 CVE-2023-2673,0,0,2c76086594f6fa37f5bb831c355e44353ee5d687033bdde9b4d9feafa037c789,2024-11-21T07:59:03.280000 -CVE-2023-26733,0,0,eff87f9e9d591c9e1001c128f595616b246364ebfbce36272ff260ab5f11d3d5,2024-11-21T07:51:53.427000 +CVE-2023-26733,0,1,7816c49b01e73b029332fb42507379d97da0288bd9c02532bff259f9054a5770,2025-02-13T16:15:39.107000 CVE-2023-26735,0,0,95cf64be05faf534a27bc86b26955c67c506fdad8bf08d6a66ad8109aca14550,2025-02-04T16:15:35.973000 CVE-2023-2674,0,0,039137594fe7c7d34bb7f37fd7078029f10c4a0df18a4010fa89d3fbf147de76,2024-11-21T07:59:03.490000 CVE-2023-2675,0,0,07c06275419dcd681decfa003611adff7356076776c10b0fa95b5660ea113d52,2024-11-21T07:59:03.617000 -CVE-2023-26750,0,0,e54d61e2b79845527d951b1846ecbb259f3848ee8e0fd60b3d572036f2ca7e6b,2024-11-21T07:51:53.710000 +CVE-2023-26750,0,1,5680098ce4e41c5b8710965fc30df10382e97cc525ea142f0ea99122882df621,2025-02-13T16:15:39.263000 CVE-2023-26756,0,0,bce96ca42026c1c9876289cdcae313a421d7d8a46aa8a6150cb10b4815701212,2024-11-21T07:51:53.850000 CVE-2023-26758,0,0,908b37d9cca9fd1072df3ed417a71d4ce44a536c4562df8cbc313d8dcb84325e,2024-11-21T07:51:54.003000 CVE-2023-26759,0,0,fa278f1f8d2b0f2f4b3ecb4c07264684400a2def5a730dfa3c154c5f0ca86587,2024-11-21T07:51:54.140000 @@ -220772,8 +220772,8 @@ CVE-2023-26771,0,0,176b6f3e41f0991f2a9366757167e573885ca40e2082c9f94c50d09c90979 CVE-2023-26773,0,0,555807956522350586beb56a5821f27642c16abe7fe007ad64bb68391dd2cc89,2025-02-11T17:15:19.423000 CVE-2023-26774,0,0,a0c85c27dd49096884be57d0d691d198edcc23ad0add3fbed6c6ca66f94266d8,2025-02-11T17:15:19.607000 CVE-2023-26775,0,0,26e8ea96c6437fe98ea914ad8bbce2f756f6023cfc3fc84bec714c33d9f5475e,2024-11-21T07:51:55.647000 -CVE-2023-26776,0,0,96d04136893a22b099a199361961d9e05ed223e7cf136ddb206eae24a6267eeb,2024-11-21T07:51:55.793000 -CVE-2023-26777,0,0,217bf4c1ad1cfc7344e80f621a43a58f265b4819cfa24a4f9060c2e3d63962ca,2024-11-21T07:51:55.937000 +CVE-2023-26776,0,1,ff2ab927e8f5884bd2d8f7a219d01379e070155a0a9ec13c3d08ce5a3cb06196,2025-02-13T16:15:39.447000 +CVE-2023-26777,0,1,cbea9e73008c7a35a91d679fca21b7e92c7c4de9c12a061db45c513fb11d75c1,2025-02-13T16:15:39.623000 CVE-2023-26779,0,0,0a485bcad0cc8dee3ec8eed898e683777a426ff598a8c9be827270982ed9e16a,2024-11-21T07:51:56.077000 CVE-2023-2678,0,0,28713e61f3d17d37117e0cd28c056f9d6e906cf745f99c8588ae8ef38a50eb9e,2024-11-21T07:59:04.050000 CVE-2023-26780,0,0,6c2a3333e5eb4aea0f3d8a22101b101d423ded5eb8efbe18a52a8cc8ef38b8b2,2024-11-21T07:51:56.213000 @@ -220815,9 +220815,9 @@ CVE-2023-26847,0,0,ef024e2d5eb446f2cec6c70e54dd3725d3b3bdd9f23966ce68106d4e18023 CVE-2023-26848,0,0,886a60f66ad9f04f6d10c0612a3254d9072b8015f8d7d8f0d2dccea232273114,2025-02-12T20:15:30.547000 CVE-2023-2685,0,0,d0466b05a2d01e3b4fdb994ec0db3a9d87a0f5a346bbbcf50fed2446d0b31731,2024-11-21T07:59:04.900000 CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f36924b,2025-02-10T16:15:33.720000 -CVE-2023-26855,0,0,d318c0f2979803a6938a814b8b1db4c9411d2b380158228bd9dc2593c4bf9fa0,2024-11-21T07:52:00.573000 -CVE-2023-26856,0,0,7ce0fa02662bca76ccca9e04e34d2231c0fb7192c60e1796c63566fd7de775f2,2024-11-21T07:52:00.700000 -CVE-2023-26857,0,0,45a404213df3e36117174abe38d7ff38cd94f638a818175591071393462e32b5,2024-11-21T07:52:00.830000 +CVE-2023-26855,0,1,72a6531eb988dcf5d74667601b0db11debc7ecc9d10fec80ea6b5e15cf8baf25,2025-02-13T16:15:39.787000 +CVE-2023-26856,0,1,bdf472bd0bc53b7d5acfe01fdb6a149a576f0180ff8a4f241faf4d19028918fd,2025-02-13T16:15:39.953000 +CVE-2023-26857,0,1,e21e327f166ccc2afbd4492ef259c134b672585fcbee5ca9e205c0ce8e68a712,2025-02-13T16:15:40.150000 CVE-2023-26858,0,0,f09034118f8dcaf7e10aa34738ff0e5feddaaa675e607be064cb131bbbadf4b2,2024-11-21T07:52:00.960000 CVE-2023-26859,0,0,a179140c87ebd4b86459c9ecbb765889c33de21f0da40c45371354b42d1fc8ca,2024-11-21T07:52:01.090000 CVE-2023-2686,0,0,b0249e40da84fca5e5393ccc5f3eb8ae24ec76d0f3735f9ce1e6cb23621be6b7,2024-11-21T07:59:05.023000 @@ -220827,7 +220827,7 @@ CVE-2023-26862,0,0,a323e2b2eccf32f003aebb094d3787a2fd1d3fe0e44c7ec1d011fd797c458 CVE-2023-26863,0,0,fa45799bdeec862e091523282c82eae136ca20292826d42a4738bf0162f57b88,2024-05-14T12:39:49.480000 CVE-2023-26864,0,0,dfc6bb834f68467d3d631f71b71357c04e5a6c382d94cc430da2223557bcf230,2024-11-21T07:52:01.560000 CVE-2023-26865,0,0,64ff0babfdda514826b31e14d598dc9ad1ef45c4dc1d8b480dac14aecc6ae28c,2025-02-05T16:15:35.657000 -CVE-2023-26866,0,0,36f65c467324f6f057243a53d1b105307c695820cdad46511f9cd3b40298f733,2024-11-21T07:52:01.840000 +CVE-2023-26866,0,1,ce9a8610b78220f3664f87c02a304933fad2446bf8e455057477c4841d4beb66,2025-02-13T16:15:40.353000 CVE-2023-2687,0,0,8e40be6ff9e7b27e4741692562218cd9bb261ff9c3c786983a9f27137bcfc414,2024-11-21T07:59:05.140000 CVE-2023-26876,0,0,5803bd9c189b236777e9a8b7085a22fe07880b62538beefa014eb4e24c4b9206,2025-02-04T22:15:39.600000 CVE-2023-26877,0,0,819fec43b298c379330673814a83ac2f67016786a169e0e2c35e2972ce86df33,2024-11-21T07:52:02.160000 @@ -220845,7 +220845,7 @@ CVE-2023-26918,0,0,d35475953c7452a05db300575f9a8df61ae7e6e990c6789633f144b55663e CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884d89,2025-02-11T18:15:25.377000 CVE-2023-2692,0,0,ad06513e2f116b8fb6a964da6618fc1d94588cf004f25980806dd3b489093f9f,2024-11-21T07:59:05.780000 CVE-2023-26920,0,0,7032d8fb85b06c0f68b934efb7c1ddc8da00b25992344fdcc0d0ab8b925ca6a8,2024-11-21T07:52:04.053000 -CVE-2023-26921,0,0,cb0b95ae9b306bae4932cfb75750df095a2c8901732b1023cd4bcdb141a22485,2024-11-21T07:52:04.213000 +CVE-2023-26921,0,1,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef63f2,2025-02-13T16:15:40.510000 CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000 CVE-2023-26923,0,0,a32f0d476b87c565247b808c5771feae62c9104227b5b4c6c5968c4b92a3a400,2024-11-21T07:52:04.503000 CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000 @@ -220883,8 +220883,8 @@ CVE-2023-26966,0,0,20620a4079c810d345aa9659d9a695c26cda7892607dc4020c3e9db336a0f CVE-2023-26968,0,0,a40605378aa2ff7df236c2cca85315db9fb08b9c216176847f2089aa2aadf65b,2024-11-21T07:52:08.060000 CVE-2023-26969,0,0,c1a5d9c52adbb2cc58e2c37ebbdb569a934dad998bd6280039a8b9d57768b847,2025-02-07T16:15:35.163000 CVE-2023-2697,0,0,e0c08e3755d3fb0093fcfafbdb7613c26088cf801338d9a8460a4c709b6d3a70,2024-11-21T07:59:06.423000 -CVE-2023-26974,0,0,794d623fd8c36129ee81b4d75b0c9798c8f7f5f90f71c522ba5636ed5af2385b,2024-11-21T07:52:08.363000 -CVE-2023-26976,0,0,c0043fa84a3ad4f2a466492c3ea909dbe38fb37334b4265daf4440153309e135,2024-11-21T07:52:08.503000 +CVE-2023-26974,0,1,ddb2049675944dcb333839c1e37f264444fe2aa6e9b926466393f398812a9900,2025-02-13T16:15:40.673000 +CVE-2023-26976,0,1,86b8122819c1142693a1d8902d4af579919052edf49413a4165ddb562278b55e,2025-02-13T16:15:40.840000 CVE-2023-26978,0,0,1e5a4cdd358294c4ce748cd3a6ab7cc151dfc85b05367acce6f3359789075607,2025-02-12T20:15:31.160000 CVE-2023-26979,0,0,66b0efdaa6eb21ceb345e2387325cc8f012679d8c4c8371b71a022bac4b7d79c,2024-11-21T07:52:08.813000 CVE-2023-2698,0,0,b001f4b031b6063b45565e8d502999daf8f00d862b243efe1ea83c90afe19edf,2024-11-21T07:59:06.553000 @@ -221339,7 +221339,7 @@ CVE-2023-27526,0,0,d7a1d434e76959c028190d433010fe08e597ff596a3d2824503093c4d017a CVE-2023-27527,0,0,4018cf151ca143ca301506e976fdddc86a504d7a900cffded0ee7f8ce9e2b807,2025-01-28T15:15:10.947000 CVE-2023-27529,0,0,688313a7c2d2ac3cbccb9b02f0a2482a012371b810941312b8acbfdb379df9c2,2025-01-16T16:15:28.460000 CVE-2023-2753,0,0,07c6e809a42ad3b510370047ca6a9af0cbf43d74dbab18486dd49105dce46294,2024-11-21T07:59:13.583000 -CVE-2023-27530,0,0,b38d60292378b01f02071b1a709b01b4844b4ce61f4f988722b92fc121e4966a,2024-11-21T07:53:06.430000 +CVE-2023-27530,0,1,aeadc842a185143cc896b3f4a84b4f6644fe59d806432d4781101bb979c36685,2025-02-13T15:37:40.953000 CVE-2023-27531,0,0,470c592a54054490454a11c4bcc4669f0b59dff66b009f26fb795e2e9e988986,2025-01-09T22:15:26.207000 CVE-2023-27532,0,0,6197657f54029169c51ead71db1e6e827ed06db04f0056bfbee40be032c0d053,2025-01-28T22:15:14.430000 CVE-2023-27533,0,0,4454110a1b2f4b69eb0494f7d72ff64548b9621981ce044c5c229000994a20ec,2024-11-21T07:53:06.787000 @@ -221513,7 +221513,7 @@ CVE-2023-27766,0,0,2a11884d53ebc502303962ff7ae643510b292962e1f66545c6169b2b92bb8 CVE-2023-27767,0,0,62381a295ff5713a6ec499cead84275ede04389abcae2e2be9d56340ea30c52b,2024-11-21T07:53:27.270000 CVE-2023-27768,0,0,fc04473ba09ba0a91a1d6f5220c012ff42cb0c83febcbf82c02343dd6dbacf23,2024-11-21T07:53:27.413000 CVE-2023-27769,0,0,0ebdd331185907598b140b9906599e2b72c47d3ab8d5ad87154ea810a1e7c7db,2024-11-21T07:53:27.547000 -CVE-2023-27770,0,0,ed5729dc90cfdfd81e54baf3fc09a238ce78bab89e2f6e2cdc6bf50976f7fc11,2024-11-21T07:53:27.690000 +CVE-2023-27770,0,1,0277aa9983dd53ba4ebc77e25b195be9647ff5b9cc853e2c7170da3d9f91a924,2025-02-13T16:15:41.010000 CVE-2023-27771,0,0,1601262f483cc01b8eb86e0567d650da34ae4e3414ad3c99052e62bcadcff0bf,2024-11-21T07:53:27.830000 CVE-2023-27772,0,0,7ef297c555763637e256ba5f03a2a87e47c9050df35a7e9b311ac060d45c3773,2025-02-07T17:15:26.333000 CVE-2023-27775,0,0,c328c66aa6075952b628655650d586d004c5e1c99d054b10121df930574fbff7,2025-02-08T03:15:09.810000 @@ -222051,7 +222051,7 @@ CVE-2023-28339,0,0,28c8c80e2f8ce8af2465c32d4337cdf8a86c18afe3b61985d49f8355cb8b9 CVE-2023-2834,0,0,e63c9dac15f30931d83cefbc2177860a1a94d254b76bc44ed8548a0364c3b9f7,2024-11-21T07:59:22.907000 CVE-2023-28340,0,0,52b134d20e2ac02ceb625f802afb06138d905f98220d628ba7678e3eddc44842,2025-02-10T21:15:15.530000 CVE-2023-28341,0,0,b3028edc6ce55e79e394da39438042c3ca983d0fa87c613f9d7d58e1e326bf35,2025-02-10T21:15:15.707000 -CVE-2023-28342,0,0,b48a06146b343ef1a8a5d1ead1c599b88258d8dc183207fc8bd02717670f84b7,2024-11-21T07:54:53.183000 +CVE-2023-28342,0,1,18fee8175d4ff620d5229ee51e9303ba964ee5eba79c59be0fe27b29f85630b9,2025-02-13T16:15:41.173000 CVE-2023-28343,0,0,01e9aa909c27ad1e34538f67ec157135bef60235165c440db61313fef70ece6c,2024-11-21T07:54:53.380000 CVE-2023-28344,0,0,41cce1c96858e33d7894efdcf2abe039152de94f9db58f7be69ffda5d396f152,2025-01-14T17:15:09.920000 CVE-2023-28345,0,0,966926b95e6759a46992587ad60be7b2eb3da6a0995862a02bcc4a95c14d4f25,2025-01-14T15:15:10.617000 @@ -222420,7 +222420,7 @@ CVE-2023-28704,0,0,81444333f594fd3c4bb1fccab64959fceafa2247eb6d76eade7a5ee66f6e5 CVE-2023-28705,0,0,633e93f2abbfe32eac130caecf9dbf200eb0b7241a0562391f74551796c9d166,2024-11-21T07:55:50.380000 CVE-2023-28706,0,0,31cfb54c83e8f3256846b9edb5e4df6397935d269481cb23b2428c03a6fb51a8,2024-11-21T07:55:50.497000 CVE-2023-28707,0,0,39a8864ac84d334c292902462e2dea685fd6a257296a3a9b213b45d9bd3d252a,2024-11-21T07:55:50.700000 -CVE-2023-28708,0,0,824b703f8121d9bd9a04212bb2ffd7506f7445d5d6db7149a572690f4293292b,2024-11-21T07:55:50.893000 +CVE-2023-28708,0,1,213dd0ca84b38762955081fa28f29894346d38eab6bf88cdfe927ea9c6bf5dd3,2025-02-13T15:15:16.783000 CVE-2023-28709,0,0,1f8997916979efc09e0e50e3feb95c383382119e241fe51bfadf3d647cec9452,2024-11-21T07:55:51.010000 CVE-2023-2871,0,0,9963d737338d1dcbf342e59567089fa5cad495ca211d1334b518ed637ed18664,2024-11-21T07:59:27.813000 CVE-2023-28710,0,0,ce34d2d0e8ca43012d88bcf114ec97313ddf643684933f5972ac5e1517b7ef74,2024-11-21T07:55:51.147000 @@ -229399,7 +229399,7 @@ CVE-2023-37917,0,0,51c759821fc20c5b2c69e11c0e017e5ffebe80f98cd2eae5673deec44edee CVE-2023-37918,0,0,6f0880e032fa0d82b5e0d452ab365518bdbe0117ecd986fa899a39dc18be7c61,2024-11-21T08:12:28.140000 CVE-2023-37919,0,0,4fbb86481c3cfb031e8a503bb71b218ec50f136c41aa7a3d29b77cd8590c2348,2024-11-21T08:12:28.270000 CVE-2023-3792,0,0,3afa82c6f554a716ffba2d2f86a382a3375d5636ac47c6f5be56ea62511da55f,2024-11-21T08:18:04.510000 -CVE-2023-37920,0,1,2869cc89393c8bc07220f5f38629c4ad5603db1a9f36f9b7301ad84944ec5e97,2025-02-13T13:50:15.813000 +CVE-2023-37920,0,0,2869cc89393c8bc07220f5f38629c4ad5603db1a9f36f9b7301ad84944ec5e97,2025-02-13T13:50:15.813000 CVE-2023-37921,0,0,2e13620c16e9e4a10da39a426c7aeb74e8b6ac6fdaa368d98e3a9b0d340c9455,2024-11-21T08:12:28.557000 CVE-2023-37922,0,0,b017b26be93e63740acf4bbe8bb2bc33108e05f42ab3096fa52f2660c269d37d,2024-11-21T08:12:28.683000 CVE-2023-37923,0,0,7668498e9eacdeda89a99b6447aa39342c9b7ac764bc7c290e69466faa436f38,2024-11-21T08:12:28.813000 @@ -237136,7 +237136,7 @@ CVE-2023-48263,0,0,5cd17b43c6572cf707058ff25b5882dc78817d65af663319afb531bd3ae3e CVE-2023-48264,0,0,155ac9cd802d1046ea7aa31346b2075c14152026a738330e825a741016831192,2024-11-21T08:31:22.033000 CVE-2023-48265,0,0,2bea0a9635b42a840374fcc62e841df94025667525112ce8947a065348a4d6c7,2024-11-21T08:31:22.270000 CVE-2023-48266,0,0,a5ebc4fd128da8ba40df09e59f808a8ef4eadc63c455d176f9e5b19592a03776,2024-11-21T08:31:22.483000 -CVE-2023-48267,0,0,ef99ead67a835fcc2307044dd43aa85f7a624bb50936bd1e3770f4aabd4e4680,2025-02-12T22:15:30.303000 +CVE-2023-48267,0,1,45f0db128b1fa9a136d9a67a0ba2b745b78fc4b6bba76735d04df06f3decaf14,2025-02-13T16:15:43.243000 CVE-2023-48268,0,0,34faada8369af81879e19a7212273a737c58c40355ee2a27467ad63b345f4880,2024-11-21T08:31:22.667000 CVE-2023-4827,0,0,b3fa4da8e9b789c286c2be37f616f6b01debdcd12cf0ca51c587068604adefa3,2024-11-21T08:36:03.350000 CVE-2023-48270,0,0,e8261175d23a5e78bdd45066e6211ad0efc45adde88e39f5b46cede3696e82c3,2024-11-21T08:31:22.810000 @@ -243089,7 +243089,7 @@ CVE-2024-0599,0,0,efb4f7ed9814ff58d6b909a4393882a85d57032d3fb7878e531640caef6aee CVE-2024-0601,0,0,ff6209a8427e9fe1b30504d1686f42635ff37b22a4c8fe62f5c49dcf1a6c5b9a,2024-11-21T08:46:58.667000 CVE-2024-0602,0,0,0d4feccc97e84ba97757f40e264b1f918ca495cbc90c0163dec61adaa52f45da,2024-11-21T08:46:58.800000 CVE-2024-0603,0,0,ca6516c9283eeff81802a143edd6d3050f16edc7841ba386af966b85c5dbcbf7,2024-11-21T08:46:58.917000 -CVE-2024-0604,0,0,2b3256f7f669d7126f4bbc9a7ac54b0eb175784a7eeed2a05654c10dcc02fd26,2024-11-21T08:46:59.047000 +CVE-2024-0604,0,1,6cf166f57f172132c54bc76683b1b9f2bb87a750fda9f6bd7b2c70d7e855e0f1,2025-02-13T16:54:45.640000 CVE-2024-0605,0,0,06fd9228bf88b19ac6dfa1ba458848cbe23073984ee398c77e65cea2644976fb,2024-11-21T08:46:59.153000 CVE-2024-0606,0,0,53f79eebfbe885d8ad157dbee910f37431bf9f4a0163dc066767f58dce428384,2024-11-21T08:46:59.270000 CVE-2024-0607,0,0,7593ab4432ea7553985e7b16ebd4406e544edfa1354f24e856a4b897e755a05f,2024-11-21T08:46:59.383000 @@ -243882,7 +243882,7 @@ CVE-2024-10484,0,0,32383c32bab139165d502eb87b607c0e91c14ee68b6619e8eae708d878fe5 CVE-2024-10486,0,0,a09948eabf8cf605227a081403b7e15d5d2e278cefd9b515ecda82689c86d786,2024-11-19T21:57:32.967000 CVE-2024-10487,0,0,6432070ca0d8b9d5f61bfa9588afb65704f780affb8c7aeb91dd110781a88251,2025-01-02T18:08:38.297000 CVE-2024-10488,0,0,3cd21bc0e615da49b058a3b6560ea6312bfaf84e4d5a4d9003e02eff4809baca,2025-01-02T18:08:10.997000 -CVE-2024-1049,0,0,dc6be6699277342a4e13c2e6716c81ea8d9d56a905f83092bd3c4d8585793ae3,2024-11-21T08:49:40.920000 +CVE-2024-1049,0,1,5a561e51efbf5d59d0ef55d6332a6668012ccd613656250bb3ca5bcfe346d9f9,2025-02-13T16:48:07.857000 CVE-2024-10490,0,0,f21b8c7becddbaa0ea56b7b67da3747213296c7bde0ad883c427ff856815557e,2024-12-02T09:15:04.613000 CVE-2024-10491,0,0,ab353cc469b92a224e9979b5f7442da134507528607335ef35cd761268862911,2024-11-06T23:08:49.780000 CVE-2024-10492,0,0,7f8940123504b47e7360ed943050a0eaf7d86e6d3f4447616bea276ef0817dfb,2024-11-25T08:15:08.453000 @@ -245289,6 +245289,9 @@ CVE-2024-12006,0,0,36f18b21148a0ee67abb3880ad49f0f8c4ad811090df2db1dbbfc11fa749b CVE-2024-12007,0,0,8e607a1eddf324cb0db7978994624ff72f4892cd536259d2d33593eb53a4d98b,2024-12-11T03:16:24.473000 CVE-2024-12008,0,0,c6233d44f9ccc9833da766f9738aceabd906dd7310efd71abd35e6e9b4e35a50,2025-01-16T21:30:41.017000 CVE-2024-1201,0,0,98150b7d086d80b767e6802e39750bc86f0479b7a9cd93495263225678c4d4a5,2024-11-21T08:50:01.647000 +CVE-2024-12011,1,1,184f47e14be07ae553507a8fdb2b80104a108cc404e6158c4d4263863fbabab9,2025-02-13T16:15:43.750000 +CVE-2024-12012,1,1,eef43acafda7e61eefa2cdb5fbbb986ea290fde2587957bc20de781aa6fea1d5,2025-02-13T16:15:43.913000 +CVE-2024-12013,1,1,3a8cef75452e633b8f49bb2286b264b0483dc0d0c9c0712d458ee426c77ff958,2025-02-13T16:15:44.050000 CVE-2024-12014,0,0,d63bd7a401a8fb5ede49d9de357706a50a82cd2bae6c930cf8555bf9a9cab749,2024-12-20T16:15:23.030000 CVE-2024-12015,0,0,d5a693fd232b1e3fbc53d72a834e39c83a435aa6e5ae231752c351acc22ca6db,2024-12-02T14:15:05.383000 CVE-2024-12018,0,0,593c05ac2f3dac4339301164983c309f8de674e944577becd0f305b7e0d23ef0,2024-12-12T06:15:22.737000 @@ -245784,11 +245787,11 @@ CVE-2024-12578,0,0,9683da78c95f4de0afe4f169763bacae0c8e4e48d594e85dbc7c32bda1c6e CVE-2024-12579,0,0,6b066a632ed42755872bfe12897131044e41b00627589546ab36be31d813b6f2,2024-12-13T05:15:07.473000 CVE-2024-1258,0,0,36d421eec5fc7cce6382fad9fd3a9a8780da80fcb6e09fc8e5e480709b2e6caa,2024-11-21T08:50:10.573000 CVE-2024-12581,0,0,17d18fc726b97760d30d61750a12c405333a5f53d81d848944da12ea8bb424ae,2025-02-06T15:36:33.913000 -CVE-2024-12582,0,1,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3e66,2025-02-13T14:15:28.700000 +CVE-2024-12582,0,0,a0b0d559e35257fefd40696360a672947ea87b7d7c68f9748c838d1ee2cd3e66,2025-02-13T14:15:28.700000 CVE-2024-12583,0,0,18b36426c2246709d6e004bec0c8a5de7c91c679c9d1416c197a6176fa3a08fa,2025-01-04T09:15:06.090000 CVE-2024-12584,0,0,adcd511bb3f4eac61fabd0c77513e0f49514ba8fec705794080ba1b5bd973bc5,2025-01-08T07:15:26.833000 CVE-2024-12585,0,0,5da3be9bc678e425dc481c70b7523d18c5d89e9715457ba9168db2468bb42cc7,2025-01-08T16:15:34.130000 -CVE-2024-12586,0,0,3e86030ae6efd3b0eee2f26dcc2d1ae87f3ef3d571a2e191467c0c395f6a0843,2025-02-13T06:15:20.607000 +CVE-2024-12586,0,1,e523746525f112350eb7888b7e497f2d49aaebf013c7e745296edf45c4b4de56,2025-02-13T15:15:17.200000 CVE-2024-12587,0,0,7960172962a4bd5df694844fdf178521cdb4dbd17b76b544453367f416394602,2025-01-13T20:15:27.283000 CVE-2024-12588,0,0,9ef4dd85f085f6ba612688cc14a2c49d05248e20e75bd2d7bdd4aff39b5ac0f2,2024-12-21T09:15:06.233000 CVE-2024-1259,0,0,1c6bb100fc9cba505c4d696801bfd3102c508e530bb2e36c86a6685675278bd7,2024-11-21T08:50:10.730000 @@ -246223,9 +246226,9 @@ CVE-2024-13114,0,0,0294bf3cffe33550cb4e4f68d18089dfac8f013192677ef679fc2a8b508cb CVE-2024-13115,0,0,13b8199069b20efe9868960868ade8b98a30fac2dac411b23e0856355daac94f,2025-02-04T19:15:30.240000 CVE-2024-13116,0,0,98f3ad6698735710def1c6baf530db546e54e66a9af268d4888f3cbf2c43dee6,2025-02-03T15:15:16.290000 CVE-2024-13117,0,0,48c4c1a0deaa83ed5f11e564cf33aba28b1ea8edfb18de9dc2dbe1b856b27247,2025-02-03T15:15:16.440000 -CVE-2024-13119,0,0,60b1a375de28bc883ab45342fd0423621675e7467947d0e4576bf341efaee064,2025-02-13T06:15:20.763000 +CVE-2024-13119,0,1,7240d21657a449709e2ceeb11a676ba74ad2599a30a3e4419f0c805e572b7945,2025-02-13T15:15:17.360000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 -CVE-2024-13120,0,0,86a62d7e8dc07a5a432f59769e70576dece57f473109852bbfedb327386a505d,2025-02-13T06:15:20.917000 +CVE-2024-13120,0,1,10492a308c67c78c69c61944548fb579273daa12bd1ae68a787d1f1a16e58d86,2025-02-13T15:15:17.520000 CVE-2024-13121,0,0,400cb6a6458fcea63bb0abfca45b1de45b0b3f23ff4f2af5f948d3f4940e0b5c,2025-02-13T06:15:21.050000 CVE-2024-13125,0,0,a81585c57e23fbe08648b139f20ab4084b413b412946f0295543270276b031fd,2025-02-13T06:15:21.210000 CVE-2024-13129,0,0,c8465ea9fafd80ae001698785c09dec31df42294cc4a62b87a1aaef854b51892,2025-01-03T22:15:06.677000 @@ -246274,7 +246277,7 @@ CVE-2024-13179,0,0,9d2a982b824c67bbacd2e3f4856194d80faa53a9ffb503fdbd054d373079f CVE-2024-1318,0,0,8468ceebf6c6c9f41014d2f5941b790bd61167061813191d7b8edcc4ba43bbca,2024-12-31T16:56:50.763000 CVE-2024-13180,0,0,d8eed302f18bf4ce52a1f3c3aecacb18daed8ee47876692255a4c4adf22e5203,2025-01-16T21:01:52.650000 CVE-2024-13181,0,0,619fe755e63fe3e9187685691ca64b6896c0b1403e0d4ede0609b0d7248d7a86,2025-01-16T21:02:04.910000 -CVE-2024-13182,1,1,ef7cb61dda1d7aecd86c8e3d6e4d0d893d86c62c523bc2141825c453e531fb02,2025-02-13T13:15:08.290000 +CVE-2024-13182,0,0,ef7cb61dda1d7aecd86c8e3d6e4d0d893d86c62c523bc2141825c453e531fb02,2025-02-13T13:15:08.290000 CVE-2024-13183,0,0,2ce47bc0097832a6bd22ec2d12492d2b5c4ebe6c470cd8cfcebfa2e924cfdeb4,2025-01-16T21:28:47.330000 CVE-2024-13184,0,0,8b81821152591ad1436a78438bc699d56dfdd30ea4e4d2ad15a148f2202c8566,2025-01-18T09:15:06.937000 CVE-2024-13185,0,0,f40f11cf6008f79d177ff077a9dcbe69bd3026b99163ebcfc01129828e4cdf96,2025-01-08T15:15:17.163000 @@ -246742,7 +246745,7 @@ CVE-2024-1443,0,0,d64ab6359e51b21266d3040ac868c3e514796f54387001a584845450bafd7a CVE-2024-1444,0,0,56cc1378c4a049cbaf1603e47be22d792d424ac802b4bd15d8f7ed435163d8dc,2024-02-16T17:15:08.710000 CVE-2024-1445,0,0,0a624acf2f93fcc7458a537b50687e8779f2e95d40ded5926d8cbd4da5fc9dd4,2024-11-21T08:50:35.970000 CVE-2024-1446,0,0,5289495e85da9fc9040a80e29268b7f36f0c851dfb3fca66c534797f931b9ac9,2025-02-07T17:47:02.493000 -CVE-2024-1447,0,0,6746acde1301c5825538a1aa38cac61672f524700591a0648dd48779ea53ab7d,2024-11-21T08:50:36.220000 +CVE-2024-1447,0,1,2a09d72fdee6c85757279985d988197847bd82507b736f0e94f302f592a1c680,2025-02-13T16:49:07.203000 CVE-2024-1448,0,0,5526aa130c96da8910caa6efdc03c8520a1309b057f2df26b50043d1ed6a5fd2,2025-01-08T18:38:49.883000 CVE-2024-1449,0,0,95a37d5ef698eee492da651c7884d70c40bd960e6512acbe5a06fb32eb9cd083,2025-01-07T17:38:57.307000 CVE-2024-1450,0,0,2c4685806ad094ef0e67bd2000051393b62a0d6ee127f95dcc18abbea7135c6a,2024-11-21T08:50:36.610000 @@ -246970,7 +246973,7 @@ CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000 CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000 CVE-2024-1696,0,0,96c8303e535001c6c5d3b6e14d30079b9651c70dc730972b738df81a8696b09e,2024-11-21T08:51:06.550000 -CVE-2024-1697,0,0,c470a81452f09db0e40146053a7ca6ac44c10328d8eb381864ced3a9cc5f2c2e,2024-11-21T08:51:06.673000 +CVE-2024-1697,0,1,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000 CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000 CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000 CVE-2024-1701,0,0,52c8c940f190bcaa163ee22225dbff8fdb651be3e5bfa1b6f375a6ccbccb0dd9,2025-02-12T16:57:05.487000 @@ -249067,7 +249070,7 @@ CVE-2024-22016,0,0,e61d53ad48de566e671c4870524f86981cc84cd4ff147249779157ec803d6 CVE-2024-22017,0,0,f8ddd81dce3bf81896e81991f007af8de38ff2bc2bdfa1774945eaac4d130654,2024-11-21T08:55:24.130000 CVE-2024-22018,0,0,8700bac6e1b1883a1148f7705e0358edaff43b84a71887101c6658d35b8d8259,2024-11-21T08:55:24.273000 CVE-2024-22019,0,0,4689b92afb8680e1c9e526fd51d2bc7938d4a7227d089b65c65ab3600e394bb8,2024-11-21T08:55:24.413000 -CVE-2024-2202,0,0,a20d1fc07efab892e4dda1166a5bba940971183d8ac2a0eb1a2c8d27e49d292b,2024-11-21T09:09:14.840000 +CVE-2024-2202,0,1,b32d19529765bbc51553683d248204aefff37fb40b548ddd6c8de1e89f9356ac,2025-02-13T16:48:25.923000 CVE-2024-22020,0,0,61023b609d958195bad1ff8603e758361daa3b7f3a6d092bc76cd60f8aeee44f,2024-11-22T12:15:18.453000 CVE-2024-22021,0,0,7e831ede4adb65df1cdde33413ac454f75b2ea46b70489a1b8ccefb8862c84fb,2024-11-21T08:55:24.707000 CVE-2024-22022,0,0,8c82b6b9f452170739e1f385cfd3d982989cfa354500ef97629a87b4582ea867,2024-11-21T08:55:24.853000 @@ -249894,7 +249897,7 @@ CVE-2024-23256,0,0,4ea578b20137f41639da60d4790de798cbf85fd6e17c481c4d3ab161fae0f CVE-2024-23257,0,0,7f06391a83a3a5d30a7d83dfdd066795af480eb581dd23a51eff9c35cfe45e80,2024-12-20T17:08:48.080000 CVE-2024-23258,0,0,eba9c68188ca56a6ed74a451e7dab749f607b390492bf516b3fa96413ebc51e7,2024-12-06T15:15:59.713000 CVE-2024-23259,0,0,4afb2ece42ac8b13385095744010dc54f98bbd06c0222dbb45caf5a65dfc644f,2024-12-20T17:08:58.297000 -CVE-2024-2326,0,0,d09d4fc0a3fe2b3bbc5a1e657d32fe82b3fbf461a6d335455eaa162e70e203ea,2024-11-21T09:09:30.590000 +CVE-2024-2326,0,1,3181cfbeea673dbd7e90fe1d89c2bcd56c4e1db4e1b04c126f46f489dab6717a,2025-02-13T16:32:17.897000 CVE-2024-23260,0,0,86bee0d3b6e536addbecc74ccb792fb0e6df91f3c5ef6f2caee278d7f60aa344,2024-12-06T15:21:05.480000 CVE-2024-23261,0,0,e3d079aeae084ce00b784250816edd4a5b3e0b3c058d3918e25850cd4defbfe1,2024-11-21T08:57:20.073000 CVE-2024-23262,0,0,1535451d12572554b56049bc49912d9cdb50bf6dc852f77d89b358e10c4ee767,2024-12-09T14:38:23.027000 @@ -250239,7 +250242,7 @@ CVE-2024-23616,0,0,4e2f10b2c71660110249edd6761efdaedaa3ce18b2fc84181f2a27c9ed1d0 CVE-2024-23617,0,0,133437310952fd6ce6b70da44eb4d7bf24b8c445f722b54266889e28351adc57,2024-11-21T08:58:01 CVE-2024-23618,0,0,415ca6bc613228ab7523db7a0e5203d5605fca666a0bd383936c40f8b6d09bfd,2024-11-21T08:58:01.147000 CVE-2024-23619,0,0,8318b72feb98f96d91f86193af2f8df577c87c100016658a66f3e41aed2178ea,2024-11-21T08:58:01.290000 -CVE-2024-2362,0,0,d1a13d3281760b039df5a3541ba3636269e134565540ef8a2fb062743f25f6a5,2024-11-21T09:09:35.783000 +CVE-2024-2362,0,1,afdee98393320c7fbc2f52e2e835fff028efc9450a2682d55d61f8b444979cbe,2025-02-13T16:09:46.350000 CVE-2024-23620,0,0,2a5d82281d04e3ebeb645ced3d379dcd72776b1a7a0f8ae2b96f38adbc279024,2024-11-21T08:58:01.433000 CVE-2024-23621,0,0,0302c8e7f8d59ba73ffd977dba20a46d2be6b619b29dd4b29a4d3eaeb8cc427e,2024-11-21T08:58:01.583000 CVE-2024-23622,0,0,b64913a21b3e97f9a78a622c67d97bb3cdc6eb08da4b93dad809f83cc905b1c4,2024-11-21T08:58:01.737000 @@ -253670,7 +253673,7 @@ CVE-2024-28042,0,0,2fdf5e585680de3ff17efb3bc78e29135378fbfa431dd23f958a353437d44 CVE-2024-28044,0,0,4321e66e9abad9bc2815f064d2409efc5b717b87741f240009dbca664117840a,2024-09-04T17:12:54.973000 CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537d7d,2024-11-21T09:05:41.680000 CVE-2024-28046,0,0,08ac6a41262a30c05ef763f8296b9175ae9831f9fdea62d8c95f9945b9c74715,2024-09-06T18:40:14.330000 -CVE-2024-28047,0,0,82f00ca6926a78b73a90c039458578b5796d1628d998244fb56b1d23d5eabd71,2025-02-12T22:15:31.983000 +CVE-2024-28047,0,1,3800d9f5b935cae9ef9605bc15b96dd4381784de21fab94bd936f4ce94aca86f,2025-02-13T15:15:17.957000 CVE-2024-28048,0,0,166375921280a7285874abcdec0584c225aafe530cd2ca9bad02a6525a8cff07,2024-11-21T09:05:41.997000 CVE-2024-28049,0,0,4191140b72d68518c43bb961f8171d2b3da1a3878f82c679e5f952ecd7437a12,2024-11-15T14:00:09.720000 CVE-2024-2805,0,0,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 @@ -254580,7 +254583,7 @@ CVE-2024-2933,0,0,aa36ab561887564bee0d2b5b8199cbbcfe3b5235044831189f4ad1e0368010 CVE-2024-29338,0,0,1aaa1318dec73367eb36a5d0cd1abeda9170c9dd8d554a9376a051f01884cb6d,2024-11-21T09:07:57.383000 CVE-2024-2934,0,0,a79132ce1f770e0dbdf5b3d9a28a95080f08689160653590343cd59f6873f28b,2024-11-21T09:10:52.507000 CVE-2024-2935,0,0,87d4d1a948c9f460a27b0ef24185f29f2a8adf55150b5faacb6d45570cef9621,2024-11-21T09:10:52.647000 -CVE-2024-2936,0,0,50a4d02eabd9113b72ad060495b4d896c296692ad14b7ceb0f3fdf287fcc207d,2024-11-21T09:10:52.830000 +CVE-2024-2936,0,1,e1637e9751cd50192c775246bed8a5a935eb4d558daee53b8066da607cc107cb,2025-02-13T16:31:06.233000 CVE-2024-29366,0,0,a4c37234f5475bf3e0db182bc2ff356efc3d9687878407fd7f29d2e5e10e4975,2024-11-21T09:07:57.600000 CVE-2024-29368,0,0,a20f2f01e4025099be3f62f18aff11b356a455644c555ff93a8794b70467bc8f,2024-11-21T09:07:57.823000 CVE-2024-2937,0,0,10c97f18fa847858ff544d31a1bbce732f86937b7f371f3c3318a5bd104ab2c4,2024-09-10T15:03:49.607000 @@ -257639,7 +257642,7 @@ CVE-2024-33453,0,0,1fbe82c644fb8bbe113912cb00a4a5d1a1c94bafa8eab10745ce875253c5c CVE-2024-33454,0,0,828c3154586cb9467c595c29d55b5edffb58459441e838ece7c4b76998774cd3,2024-11-21T09:16:59.873000 CVE-2024-3346,0,0,59b56dd3f76b482f3f46a4f5168e1d1df055d74f08cce67e579a69f871f78046,2024-11-21T09:29:25.567000 CVE-2024-33465,0,0,028b0b409a1d692a647c2520d19ecf0970cde52f7911daddec0b497be9b02421,2024-11-21T09:17:00.083000 -CVE-2024-33469,0,0,cf79f0ff14229dd6ea85037083e4eb71d760f3031431b118be57e42499e47d3f,2025-02-12T22:15:33.940000 +CVE-2024-33469,0,1,6f6ff2b75c61ae05d3d69f5eb1b127ef03a506ff53818706f0c7cad14959a9ab,2025-02-13T15:15:18.157000 CVE-2024-3347,0,0,84580b9ac972f7e1b9b68290f45a4841524b704cb60fa893b96efa9e425529ef,2024-11-21T09:29:25.703000 CVE-2024-33470,0,0,08742a77635184295f1eb4cd590862e27d57823d4ad2e85bd8bf65959a85d00d,2024-11-21T09:17:00.293000 CVE-2024-33471,0,0,70fd7f1f07be12a7e1cc088009fc2e2ec3d705634ba21a89ed0b1fc39d5857b1,2024-11-21T09:17:00.520000 @@ -259915,7 +259918,7 @@ CVE-2024-36289,0,0,9a4e2e8c22c877a7229e5ef67cd4e3937f178f5664cb9107f76a5fa80df78 CVE-2024-3629,0,0,df403ccbf1837e11a032a9bb80d87536760e2eeafe99d76ff9b043ef1d743b24,2024-11-21T09:30:01.633000 CVE-2024-36290,0,0,8298f0d1642987ec9c63c5254514e0267d57f00f7a058acac2c0e8b01a55797a,2025-01-14T16:15:29.473000 CVE-2024-36291,0,0,5a9889606f41bbb4d2800cd39de94ee7c22074fc6f9f789abe8bec05040a833a,2025-02-12T22:15:34.890000 -CVE-2024-36293,0,0,052c97f873894d106eaa916c1d8d33a703fe12790ca8373b94101f1103603faf,2025-02-12T22:15:35.040000 +CVE-2024-36293,0,1,a3f93a031712ca210280980814adf571378777654de6d36369fba092cdc66713,2025-02-13T16:16:23.727000 CVE-2024-36294,0,0,eb134be872ea12d25047633ce9f4e6d06cf7b25c0b58ceeff6fc0a24899cd955,2025-02-04T18:32:48.410000 CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8adb2,2025-01-14T16:15:29.580000 CVE-2024-3630,0,0,77fcc9a4ab1f0f4362906fbc77c6b3cee6304fb38c0fff6803c856751be26cdb,2024-11-21T09:30:01.833000 @@ -260407,7 +260410,7 @@ CVE-2024-37017,0,0,9e9e7d245ae7636635d8fb9b7646e69ff4740b4aee32b577e749a761315fc CVE-2024-37018,0,0,dcf2b63abe61db319847b5d7e942c36af68b31f1cafe8b47e5200c9fd8419d58,2024-12-16T21:15:07.897000 CVE-2024-37019,0,0,019f9cadac30cdb47b60ef4c54cc291462b2bdbecfeff69d16099a4eb4863742,2024-11-21T09:23:03.357000 CVE-2024-3702,0,0,7b265a49b93baeb4226bb63cb9a4acc5f9eb7332525eeb6794bb581c436a4163,2025-02-11T02:15:34.710000 -CVE-2024-37020,0,0,a3da1514aa3f2d6ea69b8456661b012ad07221105d0f12fc2bb4c254636168b8,2025-02-12T22:15:35.190000 +CVE-2024-37020,0,1,b24d388e30a48afaff8b8aed33c44274d52184ec0ad0450f5afe249c89ea7332,2025-02-13T15:15:18.320000 CVE-2024-37021,0,0,1fef4ba12d503003c90d0df6f25b17bd91d92aaa79eec5ce352058e2de190264,2025-02-03T15:56:26.340000 CVE-2024-37022,0,0,58e15183af3d32942869fe6953f465d4e55099ab2b6c8139c4c8d08e686f90ce,2024-11-21T09:23:03.690000 CVE-2024-37023,0,0,f4f53709e1be08c5fe3fca36aa5104850c438460730a24ef5245adc14ca5b232,2024-08-20T17:12:03.330000 @@ -262261,7 +262264,7 @@ CVE-2024-39282,0,0,8d19a62ea2208ee549ce1ae639673f7c6307b394f865aae3ba768260c976d CVE-2024-39283,0,0,4522f3bbc438abcd81e221b08edda070f395b85d336b168a4b5ca1c5829a00dc,2024-09-12T19:15:46.390000 CVE-2024-39284,0,0,bf29e3976b7c47cc358bc0a4008cac0bd13f578b0f3fade923a176e2a8aab00c,2025-02-12T22:15:36.083000 CVE-2024-39285,0,0,f0043fe58d02ea22fa80a21b1fba2440c49cfc1f78daf98e76e53f25d8a76df4,2024-11-15T14:00:09.720000 -CVE-2024-39286,0,0,e87f9a1366b5486c21fda38f7a23259387a9ca453f0304fe29eeb97a8d350588,2025-02-12T22:15:36.223000 +CVE-2024-39286,0,1,b83e502113ee35e1e88247625b7d73b3650cfb9e05c07677ff5844be7bbaac18,2025-02-13T16:16:29.157000 CVE-2024-39287,0,0,7582a54b2388a70164c9564ee1f85653aced547dff036f41aa22b6e50b81804d,2024-08-29T14:23:31.807000 CVE-2024-39288,0,0,f17532d8db758c901d7f2d2b6827cf0283adb1c05ec9834da20a939a636a4990,2025-01-14T16:15:30.460000 CVE-2024-3929,0,0,2f3799dad2b99454ece752aad0330957941062a860c2df3b38dbd9ef124282e2,2024-11-21T09:30:43.337000 @@ -262328,7 +262331,7 @@ CVE-2024-39352,0,0,aa50c4c28f76901b5df9c043ad69006e02bf1ae5bd879b2160fb058e608db CVE-2024-39353,0,0,2c8be227a8d14887935bc4ae5bc19a7fe2b7ee08444dca7ad981049635b23810,2024-11-21T09:27:31.997000 CVE-2024-39354,0,0,af101bbb8efba9998575417346801b06fdd7cd798a6138b798891ff644c42a6c,2025-01-30T14:35:18.047000 CVE-2024-39355,0,0,67ce69f8d190cac8a35e3e8a44ffb847f26721d8f1861f540b2f9bbdf03b0374,2025-02-12T22:15:36.380000 -CVE-2024-39356,0,0,80c3b2398bec88da672edbf5c26f208c09a33566c506a84e231428163c68aee0,2025-02-12T22:15:36.527000 +CVE-2024-39356,0,1,5803746f35c634e3fbe6d9debac0f05899b0fba5f7fa27ec12c4acdf0efbadab,2025-02-13T15:15:18.507000 CVE-2024-39357,0,0,05fad288b05b59e33d648c9eb1d2ff76c0f6af7b551634c79403f1312cc01de6,2025-01-14T16:15:30.793000 CVE-2024-39358,0,0,9eeef3abb2f61d58ed8e2122c0c3bcbb04e69452c7ee95ad547df8b791b1e391,2025-01-14T16:15:30.907000 CVE-2024-39359,0,0,f4e024801aa8b60419c874a361b414fdc2ec7dcbf103c85ee43bf099477a1ea3,2025-01-14T16:15:31.010000 @@ -262338,7 +262341,7 @@ CVE-2024-39361,0,0,477116428326d7bdec5ce562e55d21a285643227ebfe2e1fbe27a873152d5 CVE-2024-39362,0,0,a4e72d457ad79497d234146ef4f9a3e9f07fed3f9039766cdc9d7026e27b2016,2024-07-02T20:15:06.353000 CVE-2024-39363,0,0,1532df8dbaa164222937f85b082fd3798ad305753bec49cec27dedc9a5faf8f6,2025-01-14T16:15:31.223000 CVE-2024-39364,0,0,5c70137712c5b899f4bd053db2949ead7489ac81f5ead35b90cbcb1bbca7521a,2024-09-30T12:45:57.823000 -CVE-2024-39365,0,0,b9626713747d18c7c603182e8d642cb455c2f1bcd6a684b8635179e2e27c6320,2025-02-12T22:15:36.670000 +CVE-2024-39365,0,1,3980e019c1c0da8d2314545a9bf5cbae2388f418bd3630aa938a136b9e38b4eb,2025-02-13T15:15:18.687000 CVE-2024-39367,0,0,2a0d1a1735ad2eb38f3dc83b04bfe1b4b45a382d6c816a4b8ec5c2288c0135b9,2025-01-14T16:15:31.330000 CVE-2024-39368,0,0,8d0beb90981772e56cdc456383e0ad76416c3ac8910086fb0eb28318814c835a,2024-11-15T14:00:09.720000 CVE-2024-3937,0,0,45bcfbffb0cc9dbb6ee7014f6348017c5f9d7762fdf9bb269b80a174f4d59cc1,2024-11-21T09:30:44.430000 @@ -262783,7 +262786,7 @@ CVE-2024-39808,0,0,f44d7f3e590dfdbfb77ca6963705a1e0f6bb459c634421293e8d3ebd1b9fa CVE-2024-39809,0,0,7c54e67dade0b44ea0efd84f17f0a49ecf802216ccdeab5d2cb569e5a1301da5,2024-08-19T16:19:52.530000 CVE-2024-39810,0,0,ae56d32909e36911a442ad2179b927c261a96c3ffcecf73d313c3dd6bca2e235,2024-08-23T16:16:36.907000 CVE-2024-39811,0,0,8060988dc9d75c60307c25925c80ec36adf3bc7d704c5c319322e3f2e53536e2,2024-11-15T14:00:09.720000 -CVE-2024-39813,0,0,2c7f964f503038f8fd86fe95ce732180b69000bc6cfa2fd3548733f08d699657,2025-02-12T22:15:37.567000 +CVE-2024-39813,0,1,f0ee6bcfaedcc6b2f6b3f2d217c1205e9b2b52c88f4fa36e42cfac6804a4fc55,2025-02-13T15:15:18.883000 CVE-2024-39815,0,0,3f08218977fde87b3bdca90e96b54b8d24d5f2b2ffe03ad2c9604b5683266229,2024-08-20T17:14:18.587000 CVE-2024-39816,0,0,bf31642010ea8072be479ec01a800fdc54bc0950923af17d98b842b9cf37feb3,2024-09-04T16:30:42.197000 CVE-2024-39817,0,0,e0dce784c323c74627b1c8ac6158ae7d1d8ab303285570726585ad73c67e00be,2024-09-11T19:36:18.050000 @@ -264108,7 +264111,7 @@ CVE-2024-41913,0,0,fce4e02642287f9e6160a6f8520e124ec69c6e3cdf971b0e3bd6764a9a59e CVE-2024-41914,0,0,b4cb30058ba7c15253a6b7af5171c10291a9eb5f90f7ea1c66073a44c58cafff,2024-11-21T09:33:16.507000 CVE-2024-41915,0,0,74f4b30a3490769bd45dc3bb1c6e58da7fcab263c0eccbe09541d45260e0a8a4,2024-11-21T09:33:16.650000 CVE-2024-41916,0,0,e26bbdb30f3e12989e8ba751536faaac62be571602a0259fbe27bdf53bba951f,2024-11-21T09:33:16.797000 -CVE-2024-41917,0,0,fb82d550b5782bb8f30fe151b3ef6dc7b3345cc0cd06aea8d57afaea295636a3,2025-02-12T22:15:38.160000 +CVE-2024-41917,0,1,92dc114bdd46a3246d574d6385f7b98ccc87db8177d7bc7ecce5cf649b2f0c72,2025-02-13T16:16:29.390000 CVE-2024-41918,0,0,0025c02645b62e9a013f9a632cdf884d305e491a1529fcde2896b5f25d46b1f6,2024-08-30T16:05:23.737000 CVE-2024-4192,0,0,6f45d7ab3fa2e128e5ba0090b09e0efb99d62d4fa36ffa8103dd1a0f77ba887b,2024-11-21T09:42:21.737000 CVE-2024-41922,0,0,7e03c992eccbc90ea51a8983e0cf91681fc1323d95ecf135ada02c68d1fe41ab,2024-12-18T15:15:11.163000 @@ -264577,7 +264580,7 @@ CVE-2024-42399,0,0,506142db09c821dd3d6ad2ff961d3e036eaba630fcdd840a57cad040888a4 CVE-2024-4240,0,0,0e5f31784b7162c087aca37e585256441c15b32a7e0d4b2098e6ff8a1565e011,2025-01-27T18:30:07.563000 CVE-2024-42400,0,0,b23dfd205967d309343e484e6eb5c901d62a0b3953c77493b57f0104c8430fad,2024-08-23T15:06:00 CVE-2024-42404,0,0,bb61ac33954fbd9cb789abfbcdde8b366f1c0c5dfe94d454dc594181179c8a15,2024-09-20T12:30:51.220000 -CVE-2024-42405,0,0,65bb04d7a1eac933a7204fdceaede6d7605ec22133e93cc003bb89e194db8891,2025-02-12T22:15:38.477000 +CVE-2024-42405,0,1,1f5283c7ad173a90c6af86099049721de5a75e9c135a44ca310e384e4e31c9d6,2025-02-13T15:15:19.117000 CVE-2024-42406,0,0,27ec0815435bbda0c2431d4630bea0ca6b595a1297245017087d145f127b6444,2024-10-01T11:15:48.450000 CVE-2024-42407,0,0,f0d739bc84cee721cfefadcf95caf855718a30db3f3991b30a719354873792c9,2024-12-12T02:15:23.017000 CVE-2024-42408,0,0,fea0cc9e4f3c35832fcef20074d7bda9403a00e74d9e32437a4416b7b17d8e5d,2024-08-29T14:22:45.603000 @@ -268015,8 +268018,8 @@ CVE-2024-47256,0,0,d3d8c30b0f310b3ff28cf03b3779bc7395e68e4efa72ca3bc434e2dd34584 CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000 CVE-2024-47258,0,0,189516206f0cef8a9e06ec5598c1fbb82e722c7ba999c79ea446ac0086a46e1a,2025-02-06T20:15:39.643000 CVE-2024-4726,0,0,3e61e14a791c8650d0008a4e96317f2512c59da3e1881419f89f3069e84d077b,2024-11-21T09:43:27.817000 -CVE-2024-47264,0,0,b4b7f22b3d6cbe89834e80e7d8cd687cd351b89a3d25fe74404b6e5880ad8980,2025-02-13T07:15:09.990000 -CVE-2024-47265,0,0,b37c907d240dc6453b255c7c1623df6d0de4d28b5d891caa27365c39534842ac,2025-02-13T07:15:10.207000 +CVE-2024-47264,0,1,74dc43ad03023a4ab226f24b451936e53ee67d8f09fb8c16e76c79c0ccd6c006,2025-02-13T15:15:19.400000 +CVE-2024-47265,0,1,0878d1b3612af62545b3bd4bb7a19f31f9753614371f1915874b0fefaa7dd399,2025-02-13T15:15:19.600000 CVE-2024-47266,0,0,a8ed9826685d0f6b2fef8dcda57a85927d3994f6db0eca6e3be975eca01e8139,2025-02-13T07:15:10.383000 CVE-2024-4727,0,0,b5703c16f288dbf264e85ffadf388498a97a674e06139b3dd73d60060608ca96,2024-11-21T09:43:27.953000 CVE-2024-4728,0,0,07486e4cc1c7316d942acf75d8218bb01b9e16e07ced0971b743aa5d379224fe,2024-11-21T09:43:28.090000 @@ -272530,7 +272533,7 @@ CVE-2024-53683,0,0,3f4e0dd07db6947759f0c0b8e35d7c951945ba108d141abf33595205ce071 CVE-2024-53685,0,0,8fdf498c126b8d262abe3adc1050b79980907d511f7f4d4f6d38d5ae163c4ff0,2025-02-02T11:15:11.740000 CVE-2024-53687,0,0,98abe3ff07e18a9322923a5e5ffaf288d2f33ec5bc5d45064ffe7ce40492b944,2025-01-11T13:15:26.120000 CVE-2024-53688,0,0,19e807e9f218b9a73099ef1ac03cb800eed5ec697cf2f5b2b26094211e5b9782,2024-12-18T07:15:08.233000 -CVE-2024-53689,0,0,0ede54e325c84cca386b96bd5ac55ed73ad47a9a3279d9020d922d0043651aad,2025-01-16T16:21:09.993000 +CVE-2024-53689,0,1,c81052a2201a68b7784830dc72b4df307cc1b4bee2584137846b27671588c87e,2025-02-13T16:16:29.787000 CVE-2024-5369,0,0,4d1ab13d131ccd1a2d526b08bdee93570a00db558607c8eb844b88c6f97e7424,2025-02-11T18:32:18.170000 CVE-2024-53690,0,0,145186003a2e20e895b910273e087e978c037a99e9a7d237f6c4661d59d1c9b5,2025-01-11T13:15:26.470000 CVE-2024-53691,0,0,09846e368cf7a07a1d919202728e77d0589572ed56c2c2f1bb03db07c3ec7fb0,2024-12-06T17:15:10.520000 @@ -274126,7 +274129,7 @@ CVE-2024-56568,0,0,92dffb26329ad1e2169287285f7625a8c7cb3cdf396d095f8dee9c538f281 CVE-2024-56569,0,0,5dfc9dd43bdb979e0da77f8e1d4ad74f2cf95d56e8e9a59ca7dbda3d2f2d9f60,2025-01-31T15:58:56.730000 CVE-2024-5657,0,0,322b989a97af9a632a310787c45ccef95cbff8f0006f11abe6348fcd1668034b,2024-11-21T09:48:06.280000 CVE-2024-56570,0,0,8726d0931b01e9691ff00476bef7093196414275400f646de081f849d9a7ad08,2024-12-27T15:15:15.963000 -CVE-2024-56571,0,0,e8e5014dafd43d2b7ada8f39ea4437487772a9fce794b5856744aff3679ca068,2024-12-27T15:15:16.077000 +CVE-2024-56571,0,1,fb52ffc7f26ad4f5d85da7de13461cf87f2e20b1d18516ebe3be56a6f1227740,2025-02-13T16:16:43.213000 CVE-2024-56572,0,0,bf67f357e62bf9ec6237411445f6e7b114f6c47bb35fc738fec4ebf3bf83bbd0,2025-01-14T15:46:25.400000 CVE-2024-56573,0,0,686575fd6876aa7241d3b81816e19faa272e31a78981fb5d81fd728a72ab97dd,2024-12-27T15:15:16.320000 CVE-2024-56574,0,0,d1659bb2467b974570337abca4ede43186d6aecfacc04f417144c3b6fc3cf29e,2025-01-06T17:20:38.493000 @@ -274335,7 +274338,7 @@ CVE-2024-56761,0,0,50cdec2eb0ac44f5b4bf3ee27d9bf4283f3aa1e5e4a6c8551c767a8281df1 CVE-2024-56762,0,0,60cbcc45f06c16ba0161fce9430eab44b47458e705e9b29759993ec95842a560,2025-01-07T09:15:16.973000 CVE-2024-56763,0,0,b39292b686e9471eec590980b78b2a363be23c62abe7afa434eea1401b525135,2025-01-09T16:16:23.780000 CVE-2024-56764,0,0,f430899c2c816887efc211dab16ece7317597b0f1b1c0be2d0f1e9d9577e3ea5,2025-02-11T16:15:47.927000 -CVE-2024-56765,0,1,f052ce7db4ab37b715e4de64fd073c2145ff41f900220475c37118f454133be1,2025-02-13T14:16:17.130000 +CVE-2024-56765,0,0,f052ce7db4ab37b715e4de64fd073c2145ff41f900220475c37118f454133be1,2025-02-13T14:16:17.130000 CVE-2024-56766,0,0,bce49344e22f2bb3806268a0257273103e66d2578fa423683880a7c80182d04d,2025-01-09T16:16:23.913000 CVE-2024-56767,0,0,ec44d992537d8dabb3d619cb50ee92ccb66f80ed282e5005cbd7f3c03d352a0f,2025-01-09T16:16:24.063000 CVE-2024-56768,0,0,d8373e0dbf214f4feec34d3f904be6536bfb761175850928b1ed7e4f24a9c3b7,2025-01-07T22:50:43.207000 @@ -274776,7 +274779,7 @@ CVE-2024-5779,0,0,2a86c05c31e595b12ded5db682c98a0bf6f259741199a426f00c627efee46f CVE-2024-57791,0,0,326f1a56f934ffc176ce7b6a2932ae3ce07749c9076db086eba2ded026e10e86,2025-01-11T13:15:29.253000 CVE-2024-57792,0,0,e53647b80dd687b9a2a0064a755fece6d3e4e026a6a0cb58d2d0e7aa75150018,2025-01-11T13:15:29.420000 CVE-2024-57793,0,0,e9b7a7fae892be6eee516cf000e8b375a33c60ab507666266d3a6f69d2535658,2025-01-11T13:15:29.593000 -CVE-2024-57795,0,1,a90e6dceb6d89c11c345a39f2051d8bc39b5648c7c13b1bd9f1bedb75e802a60,2025-02-13T14:16:17.430000 +CVE-2024-57795,0,0,a90e6dceb6d89c11c345a39f2051d8bc39b5648c7c13b1bd9f1bedb75e802a60,2025-02-13T14:16:17.430000 CVE-2024-57798,0,0,16d3561f254b9a67268e3fd1903675f3c6069d3999c68a99ddddb4bf962c6bef,2025-02-03T14:53:23.433000 CVE-2024-57799,0,0,629fd8bffc1c970081661553b3588a57b03911cce9c0036c62f31188e3006930,2025-01-16T15:19:18.117000 CVE-2024-5780,0,0,8f257920278f73ebde8da2f9da9c11fb9d019685aae47ae6d2026dc053194989,2024-06-12T08:15:51.300000 @@ -274803,7 +274806,7 @@ CVE-2024-57844,0,0,ba7a9af927cdccfb32d77efd3b08b23135ba420a4b94376a9ac04ef40ed20 CVE-2024-57849,0,0,6c1a4f1831f5a2a9c9af19f1c5a93dad2a70d3fd672b039b5a9c54549819e120,2025-01-11T15:15:07.290000 CVE-2024-5785,0,0,0e9b551c455c61638ce3e7d2f5874ca2c1cf14d589c0a4025501beedb178de88,2024-11-21T09:48:19.780000 CVE-2024-57850,0,0,47b5473b2f10d731d0387dd9768f510a3a9dbe99cecf1312c304ff971055ab13,2025-01-11T15:15:07.423000 -CVE-2024-57857,0,1,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000 +CVE-2024-57857,0,0,3f0cabf5d6ee223bacca9cfe8ea4c67c059ddcf7e3b9854317117b67ecec7803,2025-02-13T14:16:17.620000 CVE-2024-5786,0,0,8f234ab6daf42312db402cec6a9780e6a0a03ed9070824749daf6f62affc4884,2024-11-21T09:48:19.897000 CVE-2024-5787,0,0,1d58b2484cfc2497ce3be8bc315153e4937b24852bc87d95aee088e2aedc7438,2024-11-21T09:48:20.010000 CVE-2024-57872,0,0,c3ffa0e155e2ac44fac8a82673746753e090198753fbd02da0ed8386c1ecfa6e,2025-01-16T15:19:51.637000 @@ -274827,7 +274830,7 @@ CVE-2024-57889,0,0,62e396df070c9aec292eb26521734ece0a76444ded3816447a98dba23df3e CVE-2024-5789,0,0,9dcfcd4111ea0e9e739e91d8fd580d0fefd90ab28ec12c3acba80730fef979ee,2024-09-26T20:28:29.237000 CVE-2024-57890,0,0,876228291e28ce2dbcf91efd1283214e54d4069730fa474ebc3b3b0d9a53418a,2025-01-21T17:41:24.450000 CVE-2024-57891,0,0,cd33e3a4e8d37a5f36fd34bd5a361c07ff62e7972f171735ba5dd223fe03e6f1,2025-01-15T13:15:13.590000 -CVE-2024-57892,0,1,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000 +CVE-2024-57892,0,0,14736616310e4e8ee489220b3fa985deb190abfc580a60b1a99e9cb0181d3dfe,2025-02-13T14:16:17.800000 CVE-2024-57893,0,0,de1df3ef6db19acaf3c7c48dd5c62fb10118eacffbfad185b7dbbf80a82129c6,2025-01-15T13:15:13.820000 CVE-2024-57894,0,0,d7d6f6140de35b010b1b5beb6457a2e35be159e74f947f8b4b5cce28e627637c,2025-01-15T13:15:13.943000 CVE-2024-57895,0,0,9ad2e608235ea6296b191cd61921ed3a449403f186ff27dacefb37686d68c65d,2025-01-21T17:47:20.323000 @@ -274836,7 +274839,7 @@ CVE-2024-57897,0,0,3d8c470fae69b589d24f1b293420d7a6a2c10fa45e69bbcc2f2a6813cfb37 CVE-2024-57898,0,0,33919a8729fc5ee32309d9f13ff00813ffa8f03e2482ac875a9d69e5d0b52206,2025-01-15T13:15:14.427000 CVE-2024-57899,0,0,83468965f33ada40980399571d777b372c41a2b30b4775120a1f2be8fe69b89f,2025-01-15T13:15:14.540000 CVE-2024-5790,0,0,eec668ee9d3641cb0f3de89f3c2f9fc313b8158d0b4258bc8dbb969f253eecba,2024-11-21T09:48:20.323000 -CVE-2024-57900,0,1,47c59939a517ef6e55e93927c3b37d9d833e39af74439b35b5240b02f60aed6c,2025-02-13T14:16:18.027000 +CVE-2024-57900,0,0,47c59939a517ef6e55e93927c3b37d9d833e39af74439b35b5240b02f60aed6c,2025-02-13T14:16:18.027000 CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d6855e3,2025-01-15T13:15:14.747000 CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000 CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 @@ -274852,7 +274855,7 @@ CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d CVE-2024-57912,0,0,44f7160a1a37bbda2c5c7fa8c6d77c8a6a0382eb187adc2a3d7d300f4cdcdf70,2025-02-02T11:15:13.627000 CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000 CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000 -CVE-2024-57915,0,0,272b8d530208322ded0e9543f48d2d912687b5db908f62b556b0a7a1d4725bbf,2025-02-02T11:15:13.920000 +CVE-2024-57915,0,1,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000 CVE-2024-57916,0,0,0f652372cdc52048530c608b55b545395f7986fa64d076a529ff1e83fb34d711,2025-01-19T12:15:25.763000 CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000 CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000 @@ -275034,7 +275037,7 @@ CVE-2024-5929,0,0,409d9fd47b0d87b1aafe290967393c8588da22c7267509f22c94d19f27919f CVE-2024-5930,0,0,12b8ba4847349e11656f133c1a70cb5265e4a562e62b979bb8d4f8f7440b3e81,2024-08-23T16:48:15.103000 CVE-2024-5931,0,0,e58d18916c8b6d2ac57a0a1239b63286abccd7dd201226895e419b887539bb6a,2024-09-19T01:35:17.767000 CVE-2024-5932,0,0,a342191e38ff090eef7e140343bc67998ed5dbb84413ce9a7482e32dbb727905,2024-08-26T18:34:13.787000 -CVE-2024-5933,0,0,944b839118e931cea0ea7bad6e0dfcb6d0da88c42b3d054b425e1551db0f7d61,2024-11-21T09:48:36.263000 +CVE-2024-5933,0,1,c3e88468daf157c9f220a5010526f69ccf042075b7cd608d9cac216afd08806e,2025-02-13T15:43:43.267000 CVE-2024-5934,0,0,16721403d72b0462a70f000841eb683fbbdcd68e0952cf56add7902c00813b6e,2024-06-14T16:15:14.647000 CVE-2024-5935,0,0,33de45cd0a9dbec9c09be2dfcdd626110c8d1494b4e9b3daff11fb78fd2ccee2,2024-11-21T09:48:36.403000 CVE-2024-5936,0,0,d33e3654fbe2f8d1101b64d197a41ff3f425b0d6a2e0640a9a89b19935133a92,2024-11-21T09:48:36.527000 @@ -278746,6 +278749,7 @@ CVE-2025-0410,0,0,77fcc9d20cbc72a10bd98fd8a0d76eb1f68bad51f3fb695c8bb4e738dc7136 CVE-2025-0411,0,0,963fb93dc9f22be5b01fb4ee24ffe0ff364fead29af110d8c8255d7fa3a39b9c,2025-02-12T18:14:13.143000 CVE-2025-0412,0,0,c39a3dcab0c6d49c3211d3247bc68e95a0d8b1c80f2a5bafe11ee5bd72adb69a,2025-01-13T04:15:06.477000 CVE-2025-0413,0,0,93800ba82ed487e2324b7ceece686cde9ee28fb29053c0e6e34c1a22e09e9631,2025-02-05T00:15:28.173000 +CVE-2025-0426,1,1,fa867a700ce39a69d2ac802616ea55e0257c06ad8822962e9f5a9e56fdbd1e5a,2025-02-13T16:16:48.417000 CVE-2025-0428,0,0,53ca33b8751cace74b1767e06da6e1ef57d9382b6c96eab72106c311721ef6db,2025-01-24T20:56:49.767000 CVE-2025-0429,0,0,78859fcdeaa45b49773faf4a287c5acdb235628b0cbfb95e3aa51c974c22a44b,2025-01-24T20:51:18.657000 CVE-2025-0430,0,0,a8200addb62401843f5be6a163be32dcec6bbc5c81068c809f1c7b05c4147e88,2025-01-17T18:15:30.920000 @@ -279075,7 +279079,7 @@ CVE-2025-1083,0,0,4afa513b3fc8f95cd8d4d20b3ed0046d9430183e58afbd31ad82dd599bd8fd CVE-2025-1084,0,0,b0d508f1ab3a1d3dc65fb5a374e03ada5ac495226151bdcc4d5b2ac7850ddb9c,2025-02-07T00:15:28.180000 CVE-2025-1085,0,0,f584db130967758b77431e11a5f469d25699b86ea49d2e400bcb605050e5a113,2025-02-07T01:15:07.930000 CVE-2025-1086,0,0,939f922cf83473192b0b258783d5ca641c4443176d820dcd2d3b84e692405303,2025-02-07T02:15:30.523000 -CVE-2025-1094,1,1,e5e055d514f617b2b0dd68bfd421d255613f2d2ce30f5da292f691fa4aaf7a96,2025-02-13T13:15:09.130000 +CVE-2025-1094,0,0,e5e055d514f617b2b0dd68bfd421d255613f2d2ce30f5da292f691fa4aaf7a96,2025-02-13T13:15:09.130000 CVE-2025-1096,0,0,f369ee58dbaa6e142f3d975d8711cac15a0a303facd75e898c558f3e454cc535,2025-02-08T01:15:07.947000 CVE-2025-1099,0,0,bf17eec112b497da534e01d8cb5eb20bbffb3f16a9e8841ea572781479eb3e5f,2025-02-10T11:15:21.147000 CVE-2025-1100,0,0,caabd467f14edf71ead8d61afba156fa4f48c60c81aecb9cb29d5d2ddb691e7f,2025-02-12T14:15:31.647000 @@ -279162,7 +279166,7 @@ CVE-2025-1213,0,0,68b0c9e37f46f9aec77275fa9abd0f6d730345a74d8832c46c0ff993ad2817 CVE-2025-1214,0,0,d0dbf99c9d9079cfaedc03a146be5c033e583b05a5f5b5fb2e92a87431b49ac7,2025-02-12T20:15:39.200000 CVE-2025-1215,0,0,84e403de23fb78c292061d6d436701f1a64eb200dbdbacdce627acd10765a8a5,2025-02-12T20:15:39.773000 CVE-2025-1216,0,0,ea57dc514d69c23027ab2d968b2a1ca1d678c815cd32b6da97cf70f00e696c73,2025-02-12T20:15:39.907000 -CVE-2025-1224,0,0,389f17c7b34f59f858fa6a150d42995ba7f054550cc94d814c02b4f054197c97,2025-02-12T20:15:40.030000 +CVE-2025-1224,0,1,dbf9ca25612f3b15663509f5a8c0ad24581ded6705dd4635bcfc69168f7d2196,2025-02-13T15:15:20.500000 CVE-2025-1225,0,0,09d7de95f59443fefca73bfef618153faa9192255b899bb38153abdbf4ab6d78,2025-02-12T20:15:40.203000 CVE-2025-1226,0,0,6edf890439ca8443e37a6729af1ec322de0291abbd98bfd27e0f84c1db629762,2025-02-12T21:15:20.470000 CVE-2025-1227,0,0,d3e1f70aa5ee09789935127068557d0d5efb43c517c0ad3cde41799b5688d9c9,2025-02-12T22:15:41.383000 @@ -279173,9 +279177,9 @@ CVE-2025-1231,0,0,649e1b02ffb9b2bdea0c0d5302a32991e98ee2dd95c7154e6cc11a5ff00876 CVE-2025-1240,0,0,9246fa8e04ff02b401e811c0a0ea877726af12834c8315ffa6c43657c8f2f12a,2025-02-11T22:15:29.800000 CVE-2025-1243,0,0,ce5d6de4aa6c9e357b98e042ebbfccf5742c455f48067e48b6f93d2620d3c5f5,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,3a7066df433eb03dbb1a5156667b9922c9a48d520391bb584a7af3176d35b733,2025-02-12T15:15:18.430000 -CVE-2025-1247,1,1,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000 -CVE-2025-1270,1,1,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000 -CVE-2025-1271,1,1,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000 +CVE-2025-1247,0,0,c04092dcf345103badb80fdd95e22fac8a6844256bbf5405f306402957fc9ebb,2025-02-13T14:16:18.400000 +CVE-2025-1270,0,0,236281c7e2f02c32874e4e3709dfb4e8e9ebb69fe161a8786e8aa1222fe115b8,2025-02-13T13:15:09.273000 +CVE-2025-1271,0,0,5d817e390688ef07b23033305a3d61b54ec7909b543740a3f3f14f0970450461,2025-02-13T13:15:09.433000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,58d0a26aacf6cc700c9707f22937d4a9fd06e9e8ac5a17ed011c7efb874a7f40,2025-02-05T18:15:29.573000 @@ -279633,7 +279637,7 @@ CVE-2025-21629,0,0,5bd27bb9a82cb5a5f09a5986e4163e86befaea4298f9b54578a62350a2997 CVE-2025-21630,0,0,b687cde38a98e756a80e569a98743dbd03093e3308ce5058c13044fa43b51e41,2025-01-17T09:15:08 CVE-2025-21631,0,0,827a424e63f48b072bb6688d1a9f41839aec5c2b224610b12dcbe56fe5cf9787,2025-02-10T18:15:34.650000 CVE-2025-21632,0,0,319c971763f332a963bcaca50f66216a12a2c5a0d07d26ccb015f5aed2bdc246,2025-01-19T11:15:08.650000 -CVE-2025-21633,0,1,660796f9c53850c1727326b3761ca207d3e35c4459b8907d5ec4f3129a38f3e9,2025-02-13T14:16:18.597000 +CVE-2025-21633,0,0,660796f9c53850c1727326b3761ca207d3e35c4459b8907d5ec4f3129a38f3e9,2025-02-13T14:16:18.597000 CVE-2025-21634,0,0,c8b95aca08c2b45c9dba95d6155aefb765f07edea9819768e8b59b392e1eaba1,2025-02-03T14:42:29.407000 CVE-2025-21635,0,0,f68693db8da33a37c51f7f5f67c2bc3befefae2a56081d367cd2c2267ce553f1,2025-01-19T11:15:09 CVE-2025-21636,0,0,6097ea20b833d9169f54205d90a302acd27d436dea66efcd6b9cee92a1babbe7,2025-01-23T17:15:24.790000 @@ -279698,9 +279702,10 @@ CVE-2025-21694,0,0,f3208723e5ea28fa5fd7201508cf23ae505e836a8b84859f7104fefaeeac6 CVE-2025-21695,0,0,ca643353f3476144f00734e5585a92f981e373f7c1f68af83a5b89241db65ab0,2025-02-12T14:15:32.577000 CVE-2025-21696,0,0,b50db3425e3c5ae8f9bcd952321a8faca5176a354e7da76e7a95c5c44fb3f418,2025-02-12T14:15:32.677000 CVE-2025-21697,0,0,21dbc5e8ca09f0db10d8b851c55a1218ced4547bd60419817adfbeb41bc40c98,2025-02-12T14:15:32.787000 -CVE-2025-21698,0,0,d7e293d79ce2d1c259f49fc2afa96a937082b9e40b1bdd42a351c66f25f809e0,2025-02-12T14:15:32.900000 +CVE-2025-21698,0,1,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1314,2025-02-13T16:16:48.690000 CVE-2025-21699,0,0,0738ffc847a7a2829b592d8dc197a21782e195ddce9370e0b4f4c6413dc7be27,2025-02-12T14:15:33.020000 -CVE-2025-21700,0,1,16c660ef83be8e3692860c63459d5cb91dde6789514ef1272a7fe490e5043738,2025-02-13T14:16:18.803000 +CVE-2025-21700,0,0,16c660ef83be8e3692860c63459d5cb91dde6789514ef1272a7fe490e5043738,2025-02-13T14:16:18.803000 +CVE-2025-21701,1,1,70fa5c5a644cffdee1e47bda2e8a9cefcd9b38d30da33f817c3957d14b5ffc75,2025-02-13T15:15:20.867000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 @@ -279832,6 +279837,7 @@ CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 CVE-2025-22467,0,0,f07763becd8cf6c1da915862c7207621a97fbd9224763d1eb78f9ab507e8cf5e,2025-02-11T16:15:50.840000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 +CVE-2025-22480,1,1,492780f2091ea0845caa2301b60734bc68ad40d5de0c97f0980b686b91af6c34,2025-02-13T16:16:48.777000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 CVE-2025-22499,0,0,2c7469ba06cedcc8f30abf0610d7acbf7462216a8d6077933c22c805fba653a7,2025-01-13T14:15:10.960000 CVE-2025-22500,0,0,c8f154061d3da5b6a8edbf6756b48a42d68c23a6466a5b364e986467d39302c7,2025-01-07T17:15:33.657000 @@ -280709,7 +280715,7 @@ CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 -CVE-2025-24200,0,0,3bda3924ca0079e6302bdf923bad7dddd8b34a0aaa1ebdfd0ae1fbb7bbf21b6a,2025-02-13T02:00:01.817000 +CVE-2025-24200,0,1,588e3756d714d1d90f30dee3f03ff2b3409a47afa861c30d00639a07ad4fd729,2025-02-13T16:24:24.953000 CVE-2025-24312,0,0,d9dba6cbaa92cade0cbc2a2b5591f51977e538972a45e5f514c66bfc9410e16f,2025-02-05T18:15:34.060000 CVE-2025-24319,0,0,7a322f9d886642cbfd3a0aeade86ac46db1ba4d93cf8564f520afb93b15cdbbf,2025-02-05T18:15:34.557000 CVE-2025-24320,0,0,86be1bb21fc907492f8803646e8f561ec0d7fdcafc5be57216cfc1eb40244044,2025-02-05T18:15:34.960000 @@ -281043,6 +281049,8 @@ CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b CVE-2025-24900,0,0,bf4a005f4b9e99ea173925e04bf839096bb71e9873debb6d572ac36637b966d8,2025-02-11T16:15:51.763000 CVE-2025-24901,0,0,0212113e82fe59f8fb511336481d2941c764d52190e7af161975e0996e240b23,2025-02-03T22:15:28.590000 CVE-2025-24902,0,0,a8342e26e81f3dd713317227233ae179657dc1da0d571656930ab8f25e8325c3,2025-02-03T22:15:28.723000 +CVE-2025-24903,1,1,9946609862987fe21035b3925ad303e9f801517f4e155ef7c26588a515dee410,2025-02-13T16:16:48.913000 +CVE-2025-24904,1,1,85d68bcf0832ede08c31c9bcc64cb6a1a9030340bb998c97335035215898ea67,2025-02-13T16:16:49.053000 CVE-2025-24905,0,0,098ac0e64f8a993f96e5a098b79ac65b27cdc361710d0b4a7c8b866a781e8c00,2025-02-03T22:15:28.840000 CVE-2025-24906,0,0,d215eac31508a3741eaf524faddf55fddbb4d32831603ab611d8df6f14a84385,2025-02-03T22:15:28.963000 CVE-2025-24956,0,0,0ba7d9cd9cd655d10b2fdd86b1c2c5ed03aa701cb5cc5236c73a95258a61d7a3,2025-02-11T11:15:17.273000 @@ -281156,9 +281164,15 @@ CVE-2025-25246,0,0,0ae0916aaea4283fe6ce79729127d0aa8edfdf07242f3416b5c2d5ec885c2 CVE-2025-25247,0,0,2690485555121cc3195beb93ff27e2a62b28c4f65e937f10f15ef11f9c4f824a,2025-02-10T15:15:13.333000 CVE-2025-25283,0,0,418e2966a3d119d4f87e4a326f631343b9aaeb0f00ae68b4b613b17ef82e0256,2025-02-12T19:15:21.863000 CVE-2025-25286,0,0,d02a516e334a3f6a031f551547a6cf5db3f84dd4e0c98c8429bacf5acc75be44,2025-02-13T01:15:25.280000 +CVE-2025-25287,1,1,990f1bef848f5cb0ec832e1dc9fa9d35b18b0435a224d0f576726f1fa2e52a18,2025-02-13T16:16:49.187000 CVE-2025-25343,0,0,165ee3c898301f2db8f607c24a899fe7668a5762e7942c4695c7dfe0dda59857,2025-02-12T19:15:22.003000 CVE-2025-25349,0,0,1719e1721d7487688b7bcc870b24d655aa6de7ad5dd7048ecc08987a1985507b,2025-02-12T16:15:46.323000 CVE-2025-25351,0,0,cdcd8e58bc2d04652968c3d47eedc1a7504f4c099db31cb878d22be60d38fffe,2025-02-12T16:15:46.453000 +CVE-2025-25352,1,1,0a546ec8595618261c2d9d5baed99aac6a9434902e0e6a95e789a0df9f156719,2025-02-13T16:16:49.343000 +CVE-2025-25354,1,1,644c1f98db76bacefce7599642a5c3bce587228541e0b2d536f4988e565aa4b8,2025-02-13T16:16:49.433000 +CVE-2025-25355,1,1,7383ecd6a63ae93c3a2852d9a1bc8a4693048a41adab182a133fca7cf58c38f6,2025-02-13T16:16:49.530000 +CVE-2025-25356,1,1,324aaf2b373472c6b8c90b598e39e2d5df9087de40c444f18bb49c7851e462ae,2025-02-13T16:16:49.613000 +CVE-2025-25357,1,1,6f531e76829770dc77637d426fbb2113a6e29ec9bb7f3b2911778249f6c2d925,2025-02-13T16:16:49.700000 CVE-2025-25522,0,0,134d853c7acffe14f61ea9663eafcc5a3836051c19c8c173c6beae54efc4aa8e,2025-02-11T19:15:18.883000 CVE-2025-25523,0,0,be3d6367d2839ada2e950cba54f10f43e3987782bf2b0625985a3811b208de0b,2025-02-11T19:15:19 CVE-2025-25524,0,0,266e58e31a39a594c7ade747d38a7ddd90ae4d066937745ff84387f801bb03fe,2025-02-11T19:15:19.110000 @@ -281173,6 +281187,11 @@ CVE-2025-25742,0,0,7436abbf9896837a8de9002dbff5d07a1a7a57435c6244cea579f542c949c CVE-2025-25743,0,0,b33e96b73fe5d43e977fc05d5d723c6f65971127b3785cb42153a064e7d1dfa8,2025-02-12T17:15:24.270000 CVE-2025-25744,0,0,628a606d8113015dc92f83451c33b7ec9f2d546fbac6214e1a09b8ec06580c92,2025-02-12T17:15:24.390000 CVE-2025-25746,0,0,c4b5e6feeed888e613a77cde223f386a53a94e2f5f7e2eda511c12e6c183117d,2025-02-12T17:15:24.500000 +CVE-2025-25897,1,1,2ea1460474639a1fdf3df677fc835c28578c1be17f5c3694f6f8c8d08e5b7f8a,2025-02-13T16:16:49.790000 +CVE-2025-25898,1,1,b3914930aee254a710f3c68cefa5259839e273a33b904b296d78b9d90c089482,2025-02-13T16:16:49.867000 +CVE-2025-25899,1,1,ce4a2502b46f030fd094155e24e9591ccbfb191ba33d33b705da477c99aa42c6,2025-02-13T16:16:49.953000 +CVE-2025-25900,1,1,a0ccc8806ccf3a3c8c76a012f89ca9bd9b6e8f621ab07786472d57d1b5f5925d,2025-02-13T16:16:50.037000 +CVE-2025-25901,1,1,7c00c4f6a65482a8973906804aa663453cc2407407b6bc523ef9411ad464c9cf,2025-02-13T16:16:50.180000 CVE-2025-26339,0,0,bf29cf27bf0313878ff158c2baab3319b314e90402d364b4bae80b0ff3690b84,2025-02-12T14:15:33.510000 CVE-2025-26340,0,0,b066968dbbcdbf77631ff8578b94ee75e5d24efc878ed88726b86433606826d8,2025-02-12T14:15:33.650000 CVE-2025-26341,0,0,66ba8ee45cc95ad8cd01c50f18902be4ac8bf5285c3bc5f97b6c1e0be981e1ce,2025-02-12T14:15:33.857000 @@ -281223,27 +281242,28 @@ CVE-2025-26492,0,0,5b41311733a5614d57ba5ee7777fd90be55aaaf83f70eb2ee27bd92694b6e CVE-2025-26493,0,0,1099023a6dd0784f561a6e33a794f1b6b69f51c22042510a0826814d283df5c1,2025-02-11T14:15:31.473000 CVE-2025-26494,0,0,fbc26c80357160dc793881bb81bca8973032cb78045f64dc3903e7fb3d3f359e,2025-02-11T18:15:47.060000 CVE-2025-26495,0,0,0731ad2cc6d733334de4696008327b6e5ee6279ed8bc678e0a689b6be160a2fa,2025-02-11T18:15:47.237000 +CVE-2025-26511,1,1,3539874a9906ef1c6dcca91725c7051cb46878cc702ae6b254df1d60e3316495,2025-02-13T16:16:50.270000 CVE-2025-26520,0,0,b83a456ccd02c927137ed430a7b7666fceb0cc753b6c14f6ee5654a1a893266c,2025-02-12T07:15:08.617000 -CVE-2025-26538,1,1,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000 -CVE-2025-26539,1,1,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000 -CVE-2025-26543,1,1,62cfcbc6cba7195cf72b9bcad3caeeb3f7235faae114608907f61610e078b963,2025-02-13T14:16:19.707000 -CVE-2025-26545,1,1,86e6d73b316c567f92fafe24354abc1f6e5e58627f6331bfd9ac32870ef96d2e,2025-02-13T14:16:20.043000 -CVE-2025-26547,1,1,32512de25d98c31a3fb7d8dc154a7a890308ccf1c434f822a8fe2d1eff9a6a66,2025-02-13T14:16:20.347000 -CVE-2025-26549,1,1,c83d206011787aa939d7304c8834cb18339ef2b98da1d146dbbf9a541a444205,2025-02-13T14:16:20.663000 -CVE-2025-26550,1,1,883cb288bc4eea99ad912aba30c7fea818b98e6f73b285242c10d13a2acb06fd,2025-02-13T14:16:20.993000 -CVE-2025-26551,1,1,a029083bd25de057d4266e7a9ad85862168c3f408f38b9563e3ef7ec6ded376a,2025-02-13T14:16:21.450000 -CVE-2025-26552,1,1,8b7ec2369e4b0d92ec83bba01cf2fbfb75c6453ef7cb949f856810a061cc31f5,2025-02-13T14:16:21.787000 -CVE-2025-26558,1,1,efb5f704c336f3bcfd0d4d5ddc23ef57815fe3581c8f780dfc299ec13d06ee4f,2025-02-13T14:16:22.130000 -CVE-2025-26561,1,1,fa5fcfc1b5af387d2ba8d298e09268fe2f60a955e0f2a3d62ec520035eeddefb,2025-02-13T14:16:22.450000 -CVE-2025-26562,1,1,37af47f6874a6ee725f87bd58d1efb60fdaceff3bf562bc1f6f0cb5fdd5a4af0,2025-02-13T14:16:22.607000 -CVE-2025-26567,1,1,ad7353cdfa1615256245880358dfd51f302bf6cfa87401a28368c4850c9a5ab3,2025-02-13T14:16:22.763000 -CVE-2025-26568,1,1,396b9e537988f1e8ccb15cd4c2387cb39dc59312282cc0daae1e64b2f4b2c915,2025-02-13T14:16:22.910000 -CVE-2025-26569,1,1,b9d6e8fd04d3efb22666efdf216ef1ba6d52f11fde384e4b05ebc0501e2efb5b,2025-02-13T14:16:23.070000 -CVE-2025-26570,1,1,6d0c7fab6c543070ec379f24d33a7fed4cbf7dbb9af7209df28b890fa0e09c89,2025-02-13T14:16:23.223000 -CVE-2025-26571,1,1,a9e05e769efc9ed5cc1337a3f80b138ce504de11ef88d35e4441956c5f36d51d,2025-02-13T14:16:23.360000 -CVE-2025-26572,1,1,920a554f5bc2f7d587796ed0f8965fb97e1d50be8ae5583dafe7d4258ecfd010,2025-02-13T14:16:23.507000 -CVE-2025-26574,1,1,04b267df093c1e4aa7dbd35454f1702610f59fd7182a705455dea6367852d58b,2025-02-13T14:16:23.653000 -CVE-2025-26577,1,1,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbfae1,2025-02-13T14:16:23.797000 -CVE-2025-26578,1,1,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000 -CVE-2025-26580,1,1,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000 -CVE-2025-26582,1,1,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000 +CVE-2025-26538,0,0,9ea4ca612e90cce9189b8bae07fa04997f24224417b26ca364e9d1ce2abc0564,2025-02-13T14:16:19.100000 +CVE-2025-26539,0,0,9e24ab5af3835adb18f91dd2d1f793e969f13bc3aa31bd06f752764eeee8db3e,2025-02-13T14:16:19.383000 +CVE-2025-26543,0,1,79534b5118a4ed770b16da331e48f5776ba13135c8971d726cc8e1e891178cf0,2025-02-13T15:15:21.080000 +CVE-2025-26545,0,0,86e6d73b316c567f92fafe24354abc1f6e5e58627f6331bfd9ac32870ef96d2e,2025-02-13T14:16:20.043000 +CVE-2025-26547,0,0,32512de25d98c31a3fb7d8dc154a7a890308ccf1c434f822a8fe2d1eff9a6a66,2025-02-13T14:16:20.347000 +CVE-2025-26549,0,0,c83d206011787aa939d7304c8834cb18339ef2b98da1d146dbbf9a541a444205,2025-02-13T14:16:20.663000 +CVE-2025-26550,0,0,883cb288bc4eea99ad912aba30c7fea818b98e6f73b285242c10d13a2acb06fd,2025-02-13T14:16:20.993000 +CVE-2025-26551,0,0,a029083bd25de057d4266e7a9ad85862168c3f408f38b9563e3ef7ec6ded376a,2025-02-13T14:16:21.450000 +CVE-2025-26552,0,0,8b7ec2369e4b0d92ec83bba01cf2fbfb75c6453ef7cb949f856810a061cc31f5,2025-02-13T14:16:21.787000 +CVE-2025-26558,0,0,efb5f704c336f3bcfd0d4d5ddc23ef57815fe3581c8f780dfc299ec13d06ee4f,2025-02-13T14:16:22.130000 +CVE-2025-26561,0,0,fa5fcfc1b5af387d2ba8d298e09268fe2f60a955e0f2a3d62ec520035eeddefb,2025-02-13T14:16:22.450000 +CVE-2025-26562,0,0,37af47f6874a6ee725f87bd58d1efb60fdaceff3bf562bc1f6f0cb5fdd5a4af0,2025-02-13T14:16:22.607000 +CVE-2025-26567,0,0,ad7353cdfa1615256245880358dfd51f302bf6cfa87401a28368c4850c9a5ab3,2025-02-13T14:16:22.763000 +CVE-2025-26568,0,0,396b9e537988f1e8ccb15cd4c2387cb39dc59312282cc0daae1e64b2f4b2c915,2025-02-13T14:16:22.910000 +CVE-2025-26569,0,0,b9d6e8fd04d3efb22666efdf216ef1ba6d52f11fde384e4b05ebc0501e2efb5b,2025-02-13T14:16:23.070000 +CVE-2025-26570,0,0,6d0c7fab6c543070ec379f24d33a7fed4cbf7dbb9af7209df28b890fa0e09c89,2025-02-13T14:16:23.223000 +CVE-2025-26571,0,0,a9e05e769efc9ed5cc1337a3f80b138ce504de11ef88d35e4441956c5f36d51d,2025-02-13T14:16:23.360000 +CVE-2025-26572,0,0,920a554f5bc2f7d587796ed0f8965fb97e1d50be8ae5583dafe7d4258ecfd010,2025-02-13T14:16:23.507000 +CVE-2025-26574,0,0,04b267df093c1e4aa7dbd35454f1702610f59fd7182a705455dea6367852d58b,2025-02-13T14:16:23.653000 +CVE-2025-26577,0,0,cc2f8c1ac7aa0d1b35a1f7b5d360e0b2d07e13834785542e837aebe416cbfae1,2025-02-13T14:16:23.797000 +CVE-2025-26578,0,0,cd72ae9257326f25b0cb5e50eefc8b87bc4caefa625d6784329a0c22f9290202,2025-02-13T14:16:23.990000 +CVE-2025-26580,0,0,916e7b90eb27b1f7f000689c1c2c0d448ca25a3cef16eef15cec717bb455efdc,2025-02-13T14:16:24.250000 +CVE-2025-26582,0,0,6e8fe3f3ea1ebd2d8730cc1aef1506305d1a9b31eb701ca7bcc9103287dcd909,2025-02-13T14:16:24.407000