diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json index 51a0ac8cc8e..db3002dd135 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4655.json @@ -2,8 +2,8 @@ "id": "CVE-2016-4655", "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:00.133", - "lastModified": "2024-11-21T02:52:42.610", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:52:57.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json index 89c117f4929..0d385d4c832 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4656.json @@ -2,8 +2,8 @@ "id": "CVE-2016-4656", "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:01.087", - "lastModified": "2024-11-21T02:52:42.787", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:53:19.107", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json index 8d85b24eccf..0c34fbca1a1 100644 --- a/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json +++ b/CVE-2016/CVE-2016-46xx/CVE-2016-4657.json @@ -2,8 +2,8 @@ "id": "CVE-2016-4657", "sourceIdentifier": "product-security@apple.com", "published": "2016-08-25T21:59:02.150", - "lastModified": "2024-11-21T02:52:42.907", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:53:23.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json b/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json index fc5aefaf2a1..d286d125f44 100644 --- a/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json +++ b/CVE-2016/CVE-2016-87xx/CVE-2016-8735.json @@ -2,8 +2,8 @@ "id": "CVE-2016-8735", "sourceIdentifier": "security@apache.org", "published": "2017-04-06T21:59:00.243", - "lastModified": "2024-11-21T02:59:57.203", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:29:15.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json index d558b712c8e..5da82405705 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12615.json @@ -2,8 +2,8 @@ "id": "CVE-2017-12615", "sourceIdentifier": "security@apache.org", "published": "2017-09-19T13:29:00.190", - "lastModified": "2024-11-21T03:09:53.973", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:34:44.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json b/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json index c5aa465daad..716ec0a3b53 100644 --- a/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json +++ b/CVE-2017/CVE-2017-126xx/CVE-2017-12617.json @@ -2,8 +2,8 @@ "id": "CVE-2017-12617", "sourceIdentifier": "security@apache.org", "published": "2017-10-04T01:29:02.120", - "lastModified": "2024-11-21T03:09:54.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:34:58.623", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json index 5beddd15fc9..273a629ef24 100644 --- a/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json +++ b/CVE-2017/CVE-2017-56xx/CVE-2017-5638.json @@ -2,8 +2,8 @@ "id": "CVE-2017-5638", "sourceIdentifier": "security@apache.org", "published": "2017-03-11T02:59:00.150", - "lastModified": "2024-11-21T03:28:04.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:28:58.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json b/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json index b5808b7a06f..b9073179175 100644 --- a/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json +++ b/CVE-2017/CVE-2017-97xx/CVE-2017-9791.json @@ -2,8 +2,8 @@ "id": "CVE-2017-9791", "sourceIdentifier": "security@apache.org", "published": "2017-07-10T16:29:00.277", - "lastModified": "2024-11-21T03:36:51.647", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:29:25.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json index ee78ac97f80..31deb27c481 100644 --- a/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json +++ b/CVE-2017/CVE-2017-98xx/CVE-2017-9805.json @@ -2,8 +2,8 @@ "id": "CVE-2017-9805", "sourceIdentifier": "security@apache.org", "published": "2017-09-15T19:29:00.237", - "lastModified": "2024-11-21T03:36:53.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:34:40.910", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json index 1c2e0cd8181..e1fbf58cb56 100644 --- a/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json +++ b/CVE-2018/CVE-2018-117xx/CVE-2018-11776.json @@ -2,8 +2,8 @@ "id": "CVE-2018-11776", "sourceIdentifier": "security@apache.org", "published": "2018-08-22T13:29:00.753", - "lastModified": "2024-11-21T03:44:00.740", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:36:33.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json index f3da4901547..4656f5ae8df 100644 --- a/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json +++ b/CVE-2018/CVE-2018-43xx/CVE-2018-4344.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4344", "sourceIdentifier": "product-security@apple.com", "published": "2019-04-03T18:29:09.173", - "lastModified": "2024-11-21T04:07:14.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:53:29.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", diff --git a/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json b/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json index c1abcd5437c..6057b7d68e7 100644 --- a/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json +++ b/CVE-2018/CVE-2018-48xx/CVE-2018-4878.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4878", "sourceIdentifier": "psirt@adobe.com", "published": "2018-02-06T21:29:00.347", - "lastModified": "2024-11-21T04:07:37.703", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:36:18.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json index cb0081602d3..103b6283a19 100644 --- a/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json +++ b/CVE-2018/CVE-2018-49xx/CVE-2018-4939.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4939", "sourceIdentifier": "psirt@adobe.com", "published": "2018-05-19T17:29:01.480", - "lastModified": "2024-11-21T04:07:45.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:36:22.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json b/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json index d3f27817a69..e12635513ca 100644 --- a/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json +++ b/CVE-2018/CVE-2018-49xx/CVE-2018-4990.json @@ -2,8 +2,8 @@ "id": "CVE-2018-4990", "sourceIdentifier": "psirt@adobe.com", "published": "2018-07-09T19:29:03.327", - "lastModified": "2024-11-21T04:07:51.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:36:26.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 8.8, "baseSeverity": "HIGH", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json b/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json index fe63b602af0..eff2389be8f 100644 --- a/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json +++ b/CVE-2018/CVE-2018-50xx/CVE-2018-5002.json @@ -2,8 +2,8 @@ "id": "CVE-2018-5002", "sourceIdentifier": "psirt@adobe.com", "published": "2018-07-09T19:29:03.750", - "lastModified": "2024-11-21T04:07:53.737", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:36:30.167", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json b/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json index 7a7b06a9f22..112d9a238d2 100644 --- a/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json +++ b/CVE-2019/CVE-2019-01xx/CVE-2019-0193.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0193", "sourceIdentifier": "security@apache.org", "published": "2019-08-01T14:15:13.113", - "lastModified": "2024-11-21T04:16:27.287", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:37:04.953", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json index 2bc4b2bafe7..9f4de2a199a 100644 --- a/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json +++ b/CVE-2019/CVE-2019-02xx/CVE-2019-0211.json @@ -2,8 +2,8 @@ "id": "CVE-2019-0211", "sourceIdentifier": "security@apache.org", "published": "2019-04-08T22:29:00.387", - "lastModified": "2024-11-21T04:16:29.640", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:37:01.753", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27112.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27112.json index c784fe47d7c..9c43640957a 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27112.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27112.json @@ -2,16 +2,55 @@ "id": "CVE-2023-27112", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T22:15:09.710", - "lastModified": "2025-01-21T22:15:09.710", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:27.067", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the projectCode parameter at project.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que pearProjectApi v2.8.10 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro projectCode en project.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/a54552239/pearProjectApi/issues/32", diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27113.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27113.json index 054c7e39f67..af01a08969a 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27113.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27113.json @@ -2,16 +2,55 @@ "id": "CVE-2023-27113", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T22:15:09.823", - "lastModified": "2025-01-21T22:15:09.823", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:28.080", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "pearProjectApi v2.8.10 was discovered to contain a SQL injection vulnerability via the organizationCode parameter at project.php." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que pearProjectApi v2.8.10 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro organizationCode en project.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/a54552239/pearProjectApi/issues/31", diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30281.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30281.json index 9c99ab6cb44..7dda1103fcf 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30281.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30281.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30281", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T20:15:09.323", - "lastModified": "2024-11-21T07:59:58.680", + "lastModified": "2025-01-23T16:15:28.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30452.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30452.json index d48467d2d62..9b39da1c3e7 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30452.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30452.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30452", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T00:15:09.107", - "lastModified": "2024-11-21T08:00:12.833", + "lastModified": "2025-01-23T16:15:28.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31572.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31572.json index 8dfa755e1ab..fdf7bf9cfaf 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31572.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31572.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31572", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T14:15:09.540", - "lastModified": "2024-11-21T08:02:02.400", + "lastModified": "2025-01-23T15:15:08.303", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31848.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31848.json index 3c3ea627f95..887cbc77c0a 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31848.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31848.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31848", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-17T00:15:09.150", - "lastModified": "2024-11-21T08:02:19.550", + "lastModified": "2025-01-23T16:15:28.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31856.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31856.json index d8f644c18ad..b091dd8befc 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31856.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31856.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31856", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T15:15:09.350", - "lastModified": "2024-11-21T08:02:20.267", + "lastModified": "2025-01-23T16:15:29.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31857.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31857.json index f5fffb16fe8..47b11c52ea5 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31857.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31857.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31857", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T15:15:09.467", - "lastModified": "2024-11-21T08:02:20.413", + "lastModified": "2025-01-23T16:15:29.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-318xx/CVE-2023-31890.json b/CVE-2023/CVE-2023-318xx/CVE-2023-31890.json index 5a84bfefdfa..bce6162c21e 100644 --- a/CVE-2023/CVE-2023-318xx/CVE-2023-31890.json +++ b/CVE-2023/CVE-2023-318xx/CVE-2023-31890.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31890", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-16T16:15:10.343", - "lastModified": "2024-11-21T08:02:21.873", + "lastModified": "2025-01-23T15:15:09.050", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32409.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32409.json index 753070b42d5..24f9de0beeb 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32409.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32409.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32409", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.183", - "lastModified": "2024-11-21T08:03:17.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:53:34.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -121,7 +121,6 @@ "url": "https://support.apple.com/en-us/HT213757", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -129,7 +128,6 @@ "url": "https://support.apple.com/en-us/HT213758", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -137,7 +135,6 @@ "url": "https://support.apple.com/en-us/HT213761", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -145,7 +142,6 @@ "url": "https://support.apple.com/en-us/HT213762", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -153,7 +149,6 @@ "url": "https://support.apple.com/en-us/HT213764", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -161,7 +156,6 @@ "url": "https://support.apple.com/en-us/HT213842", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -169,7 +163,6 @@ "url": "https://support.apple.com/en-us/HT213757", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -177,7 +170,6 @@ "url": "https://support.apple.com/en-us/HT213758", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -185,7 +177,6 @@ "url": "https://support.apple.com/en-us/HT213761", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -193,7 +184,6 @@ "url": "https://support.apple.com/en-us/HT213762", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -201,7 +191,6 @@ "url": "https://support.apple.com/en-us/HT213764", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -209,7 +198,6 @@ "url": "https://support.apple.com/en-us/HT213842", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json index 3e9f03d1c73..f9cc4a7cbfe 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32434.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32434", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.720", - "lastModified": "2024-11-21T08:03:20.717", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:53:39.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -136,7 +136,6 @@ "url": "https://support.apple.com/en-us/HT213808", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -144,7 +143,6 @@ "url": "https://support.apple.com/en-us/HT213809", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -152,7 +150,6 @@ "url": "https://support.apple.com/en-us/HT213810", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -160,7 +157,6 @@ "url": "https://support.apple.com/en-us/HT213811", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -168,7 +164,6 @@ "url": "https://support.apple.com/en-us/HT213812", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -176,7 +171,6 @@ "url": "https://support.apple.com/en-us/HT213813", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -184,7 +178,6 @@ "url": "https://support.apple.com/en-us/HT213814", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -207,7 +200,6 @@ "url": "https://support.apple.com/en-us/HT213808", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -215,7 +207,6 @@ "url": "https://support.apple.com/en-us/HT213809", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -223,7 +214,6 @@ "url": "https://support.apple.com/en-us/HT213810", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -231,7 +221,6 @@ "url": "https://support.apple.com/en-us/HT213811", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -239,7 +228,6 @@ "url": "https://support.apple.com/en-us/HT213812", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -247,7 +235,6 @@ "url": "https://support.apple.com/en-us/HT213813", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -255,7 +242,6 @@ "url": "https://support.apple.com/en-us/HT213814", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json index 93c58ea3a4b..810a4558726 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32439.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32439", "sourceIdentifier": "product-security@apple.com", "published": "2023-06-23T18:15:13.813", - "lastModified": "2024-11-21T08:03:21.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:36:05.110", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -100,6 +100,22 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webkitgtk:webkitgtk\\+:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.42.3", + "matchCriteriaId": "8C7F88F0-0092-4338-A52F-1A2ED27460B5" + } + ] + } + ] } ], "references": [ @@ -167,7 +183,6 @@ "url": "https://support.apple.com/en-us/HT213811", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -175,7 +190,6 @@ "url": "https://support.apple.com/en-us/HT213813", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -183,7 +197,6 @@ "url": "https://support.apple.com/en-us/HT213814", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -191,7 +204,6 @@ "url": "https://support.apple.com/en-us/HT213816", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, diff --git a/CVE-2023/CVE-2023-324xx/CVE-2023-32484.json b/CVE-2023/CVE-2023-324xx/CVE-2023-32484.json index 380df37c0d3..b86a42cba43 100644 --- a/CVE-2023/CVE-2023-324xx/CVE-2023-32484.json +++ b/CVE-2023/CVE-2023-324xx/CVE-2023-32484.json @@ -2,8 +2,8 @@ "id": "CVE-2023-32484", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-15T13:15:45.553", - "lastModified": "2024-11-21T08:03:27.103", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:59:24.473", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,63 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:enterprise_sonic_distribution:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.5.0", + "versionEndExcluding": "3.5.5", + "matchCriteriaId": "A38C6071-4903-48FB-9AAB-6A9B14A9072B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:enterprise_sonic_distribution:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.0.0", + "versionEndExcluding": "4.0.6", + "matchCriteriaId": "B3C92AD0-DE87-4514-A980-9305C9BCF81C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:dell:enterprise_sonic_distribution:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "DA546A04-B62E-4E53-90F4-4391479677B5" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000216586/dsa-2023-284-security-update-for-dell-emc-enterprise-sonic-os-command-injection-vulnerability-when-using-remote-user-authentication", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000216586/dsa-2023-284-security-update-for-dell-emc-enterprise-sonic-os-command-injection-vulnerability-when-using-remote-user-authentication", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32977.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32977.json index 73f162d7a22..39226333131 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32977.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32977.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32977", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T16:15:10.507", - "lastModified": "2024-11-21T08:04:19.993", + "lastModified": "2025-01-23T16:15:29.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32978.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32978.json index c46ad56aee7..c2c94044d8c 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32978.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32978.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32978", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T16:15:10.610", - "lastModified": "2024-11-21T08:04:20.107", + "lastModified": "2025-01-23T16:15:29.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32979.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32979.json index a7816067a75..5b5702ed700 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32979.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32979.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32979", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T16:15:10.673", - "lastModified": "2024-11-21T08:04:20.217", + "lastModified": "2025-01-23T16:15:29.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32980.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32980.json index e6f16a547f4..3568f2c767b 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32980.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32980.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32980", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T16:15:10.753", - "lastModified": "2024-11-21T08:04:20.337", + "lastModified": "2025-01-23T16:15:29.967", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32987.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32987.json index 1664310e301..46671659f0b 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32987.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32987.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32987", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T16:15:11.200", - "lastModified": "2024-11-21T08:04:21.153", + "lastModified": "2025-01-23T16:15:30.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32994.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32994.json index e96ba3a5460..c948827d1a4 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32994.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32994.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32994", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:11.937", - "lastModified": "2024-11-21T08:04:21.947", + "lastModified": "2025-01-23T16:15:30.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-295" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32997.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32997.json index d521de03c3b..d9b20f29a62 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32997.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32997.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32997", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.067", - "lastModified": "2024-11-21T08:04:22.293", + "lastModified": "2025-01-23T16:15:30.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-384" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32998.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32998.json index d8285434bf6..27db6081cd9 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32998.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32998.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32998", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.110", - "lastModified": "2024-11-21T08:04:22.417", + "lastModified": "2025-01-23T16:15:30.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-329xx/CVE-2023-32999.json b/CVE-2023/CVE-2023-329xx/CVE-2023-32999.json index bad20356e67..d5be76a1dfc 100644 --- a/CVE-2023/CVE-2023-329xx/CVE-2023-32999.json +++ b/CVE-2023/CVE-2023-329xx/CVE-2023-32999.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32999", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.160", - "lastModified": "2024-11-21T08:04:22.537", + "lastModified": "2025-01-23T16:15:30.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33000.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33000.json index f2bb8a83489..b7eda223935 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33000.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33000.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33000", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.207", - "lastModified": "2024-11-21T08:04:22.643", + "lastModified": "2025-01-23T16:15:31.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33001.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33001.json index fdbf4ef68b4..590f789b8c6 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33001.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33001.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33001", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.250", - "lastModified": "2024-11-21T08:04:22.760", + "lastModified": "2025-01-23T16:15:31.230", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-532" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33002.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33002.json index f5106022cf2..b17182373c1 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33002.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33002.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33002", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.293", - "lastModified": "2024-11-21T08:04:22.870", + "lastModified": "2025-01-23T16:15:31.433", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33003.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33003.json index 6a21686d2ae..42ab83a4707 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33003.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33003.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33003", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.340", - "lastModified": "2024-11-21T08:04:22.970", + "lastModified": "2025-01-23T16:15:31.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33004.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33004.json index afbc8295b83..d42b6f3c684 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33004.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33004.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33004", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.377", - "lastModified": "2024-11-21T08:04:23.087", + "lastModified": "2025-01-23T16:15:31.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33005.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33005.json index 97bb402299a..100a8fb8177 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33005.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33005.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33005", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.420", - "lastModified": "2024-11-21T08:04:23.200", + "lastModified": "2025-01-23T16:15:31.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-613" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33006.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33006.json index ff65e46f563..94046a2ceae 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33006.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33006.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33006", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.467", - "lastModified": "2024-11-21T08:04:23.317", + "lastModified": "2025-01-23T16:15:32.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-330xx/CVE-2023-33007.json b/CVE-2023/CVE-2023-330xx/CVE-2023-33007.json index 66fa7cb2888..523bc1295df 100644 --- a/CVE-2023/CVE-2023-330xx/CVE-2023-33007.json +++ b/CVE-2023/CVE-2023-330xx/CVE-2023-33007.json @@ -2,7 +2,7 @@ "id": "CVE-2023-33007", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2023-05-16T17:15:12.507", - "lastModified": "2024-11-21T08:04:23.423", + "lastModified": "2025-01-23T16:15:32.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json index 0c94ab854c6..bb4e5608694 100644 --- a/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json +++ b/CVE-2023/CVE-2023-332xx/CVE-2023-33246.json @@ -2,8 +2,8 @@ "id": "CVE-2023-33246", "sourceIdentifier": "security@apache.org", "published": "2023-05-24T15:15:09.553", - "lastModified": "2024-11-21T08:05:15.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:15:36.257", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -61,15 +61,15 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*", - "versionEndExcluding": "4.9.7", - "matchCriteriaId": "4DBCE249-91D7-442A-BD1B-4C20F848EB35" + "versionEndExcluding": "4.9.6", + "matchCriteriaId": "77D6638C-EB7C-486D-8AA9-4BA699EA5273" }, { "vulnerable": true, "criteria": "cpe:2.3:a:apache:rocketmq:*:*:*:*:*:*:*:*", "versionStartIncluding": "5.0.0", - "versionEndExcluding": "5.1.2", - "matchCriteriaId": "68AFCD16-B82F-411E-B3E6-236CA76A1FEE" + "versionEndExcluding": "5.1.1", + "matchCriteriaId": "12739B28-F22E-4B7A-9573-AF2B23438397" } ] } @@ -129,7 +129,11 @@ }, { "url": "https://www.vicarius.io/vsociety/posts/rocketmq-rce-cve-2023-33246-33247", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37014.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37014.json index a55cb3d4078..d10c74fc965 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37014.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37014.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37014", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:10.987", - "lastModified": "2025-01-22T15:15:10.987", + "lastModified": "2025-01-23T15:15:09.280", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open5GS MME versions <= 2.6.4 contains an assertion that can be remotely triggered via a malformed ASN.1 packet over the S1AP interface. An attacker may send a `UE Context Release Request` message missing a required `MME_UE_S1AP_ID` field to repeatedly crash the MME, resulting in denial of service." + }, + { + "lang": "es", + "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n que se puede activar de forma remota a trav\u00e9s de un paquete ASN.1 mal formado a trav\u00e9s de la interfaz S1AP. Un atacante puede enviar un mensaje de \"Solicitud de liberaci\u00f3n de contexto de UE\" sin el campo \"MME_UE_S1AP_ID\" requerido para bloquear repetidamente el MME, lo que da como resultado la denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json index f0f12a39509..f11e711c18a 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37022.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37022", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:11.817", - "lastModified": "2025-01-22T15:15:11.817", + "lastModified": "2025-01-23T15:15:09.430", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Open5GS MME versions <= 2.6.4 contain a reachable assertion in the `UE Context Release Request` packet handler. A packet containing an invalid `MME_UE_S1AP_ID` field causes Open5gs to crash; an attacker may repeatedly send such packets to cause denial of service." + }, + { + "lang": "es", + "value": "Las versiones de Open5GS MME anteriores a la 2.6.4 contienen una aserci\u00f3n alcanzable en el controlador de paquetes `UE Context Release Request`. Un paquete que contiene un campo `MME_UE_S1AP_ID` ??no v\u00e1lido hace que Open5gs se bloquee; un atacante puede enviar repetidamente dichos paquetes para provocar una denegaci\u00f3n de servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json index d0569e77df0..5ff8ff8e1dc 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37027.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37027", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:09.880", - "lastModified": "2025-01-21T23:15:09.880", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:32.543", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `E-RAB Modification Indication` packet missing an expected `eNB_UE_S1AP_ID` field." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `E-RAB Modification Indication` que carece de un campo `eNB_UE_S1AP_ID` ??esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json index d1cf4753330..31a5c37964b 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37028.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37028", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.000", - "lastModified": "2025-01-21T23:15:10.000", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:32.740", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `E-RAB Modification Indication` packet missing an expected `eNB_UE_S1AP_ID` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `E-RAB Modification Indication` que carece de un campo `eNB_UE_S1AP_ID` ??esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37030.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37030.json index c014697f3f2..81ad728226e 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37030.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37030.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37030", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.247", - "lastModified": "2025-01-21T23:15:10.247", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:32.940", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `eNB_UE_S1AP_ID` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete de `Mensaje UE inicial` S1AP que carece de un campo `eNB_UE_S1AP_ID` ??esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37031.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37031.json index 62f3f0d70cc..bb0b37ce1b8 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37031.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37031.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37031", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.363", - "lastModified": "2025-01-21T23:15:10.363", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:33.127", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `eNB Configuration Transfer` packet missing its required `Target eNB ID` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete de `Transferencia de configuraci\u00f3n de eNB` de S1AP que carece del campo `ID de eNB de destino` requerido." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37032.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37032.json index 7e5c4de1148..b66b2fc572d 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37032.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37032.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37032", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.473", - "lastModified": "2025-01-21T23:15:10.473", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:33.330", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Stack-based buffer overflow in the Mobile Management Entity (MME) of Magma versions <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows remote attackers to crash the MME with an unauthenticated cellphone by sending a NAS packet containing an oversized `Emergency Number List` Information Element." + }, + { + "lang": "es", + "value": "Un desbordamiento de b\u00fafer basado en pila en la entidad de administraci\u00f3n m\u00f3vil (MME) de las versiones de Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes remotos bloquear la MME con un tel\u00e9fono celular no autenticado mediante el env\u00edo de un paquete NAS que contiene un elemento de informaci\u00f3n de \"Lista de n\u00fameros de emergencia\" de gran tama\u00f1o." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json index 6c24cb310d6..c7ac7a1a9f2 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37033.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37033", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.580", - "lastModified": "2025-01-21T23:15:10.580", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:09.563", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `EUTRAN_CGI` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete de `Mensaje inicial de UE` S1AP que carece de un campo `EUTRAN_CGI` esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37034.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37034.json index da581fa0730..8aac7e692b5 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37034.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37034.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37034", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.703", - "lastModified": "2025-01-21T23:15:10.703", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:09.733", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `TAI` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete de `Mensaje UE inicial` S1AP que carece de un campo `TAI` esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37036.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37036.json index f588b233953..08599c50a21 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37036.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37036.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37036", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:10.970", - "lastModified": "2025-01-21T23:15:10.970", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:09.900", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `ENB_UE_S1AP_ID` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `Uplink NAS Transport` al que le falta un campo `ENB_UE_S1AP_ID` ??esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json index ef406732e8d..a48f0dbae9a 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37037.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37037", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.080", - "lastModified": "2025-01-21T23:15:11.080", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:10.080", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `S1Setup Request` packet missing an expected `Supported TAs` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `S1Setup Request` que carece de un campo `Supported TAs` esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37038.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37038.json index 7ff36b55850..a38fcbd46b2 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37038.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37038.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37038", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.203", - "lastModified": "2025-01-21T23:15:11.203", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:10.270", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows network-adjacent attackers to crash the MME via an S1AP `Uplink NAS Transport` packet missing an expected `MME_UE_S1AP_ID` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete S1AP `Uplink NAS Transport` que carece de un campo `MME_UE_S1AP_ID` ??esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-370xx/CVE-2023-37039.json b/CVE-2023/CVE-2023-370xx/CVE-2023-37039.json index 31388e9173b..6e98b0b9986 100644 --- a/CVE-2023/CVE-2023-370xx/CVE-2023-37039.json +++ b/CVE-2023/CVE-2023-370xx/CVE-2023-37039.json @@ -2,16 +2,55 @@ "id": "CVE-2023-37039", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T00:15:15.683", - "lastModified": "2025-01-22T00:15:15.683", - "vulnStatus": "Received", + "lastModified": "2025-01-23T15:15:10.443", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A Null pointer dereference vulnerability in the Mobile Management Entity (MME) in Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allow network-adjacent attackers to crash the MME via an S1AP `Initial UE Message` packet missing an expected `RRC Establishment Clause` field." + }, + { + "lang": "es", + "value": "Una vulnerabilidad de desreferencia de puntero nulo en la entidad de administraci\u00f3n m\u00f3vil (MME) en Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a atacantes adyacentes a la red bloquear la MME a trav\u00e9s de un paquete de `Mensaje UE inicial` de S1AP que carece de un campo `Cl\u00e1usula de establecimiento de RRC` esperado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json b/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json index 99b303fa664..25b019c1866 100644 --- a/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json +++ b/CVE-2023/CVE-2023-374xx/CVE-2023-37450.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37450", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:15.497", - "lastModified": "2024-11-21T08:11:44.027", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:36:38.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -128,7 +128,6 @@ "url": "https://support.apple.com/en-us/HT213826", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -136,7 +135,6 @@ "url": "https://support.apple.com/en-us/HT213841", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -144,7 +142,6 @@ "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -152,7 +149,6 @@ "url": "https://support.apple.com/en-us/HT213846", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -160,7 +156,6 @@ "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -175,7 +170,6 @@ "url": "https://support.apple.com/en-us/HT213826", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -183,7 +177,6 @@ "url": "https://support.apple.com/en-us/HT213841", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -191,7 +184,6 @@ "url": "https://support.apple.com/en-us/HT213843", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -199,7 +191,6 @@ "url": "https://support.apple.com/en-us/HT213846", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -207,7 +198,6 @@ "url": "https://support.apple.com/en-us/HT213848", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json b/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json index 73bab356dd9..6c46d69529d 100644 --- a/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json +++ b/CVE-2023/CVE-2023-378xx/CVE-2023-37869.json @@ -2,8 +2,8 @@ "id": "CVE-2023-37869", "sourceIdentifier": "audit@patchstack.com", "published": "2024-06-19T14:15:12.617", - "lastModified": "2024-11-21T08:12:22.147", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:32:34.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.1", + "matchCriteriaId": "8C9EC948-AEA6-460C-B566-CEBDBBF80F73" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/premium-addons-pro/wordpress-premium-addons-pro-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/premium-addons-pro/wordpress-premium-addons-pro-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-386xx/CVE-2023-38606.json b/CVE-2023/CVE-2023-386xx/CVE-2023-38606.json index b423cc4f444..49e9f3cc640 100644 --- a/CVE-2023/CVE-2023-386xx/CVE-2023-38606.json +++ b/CVE-2023/CVE-2023-386xx/CVE-2023-38606.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38606", "sourceIdentifier": "product-security@apple.com", "published": "2023-07-27T00:15:16.173", - "lastModified": "2024-11-21T08:13:55.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:36:53.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -127,7 +127,6 @@ "url": "https://support.apple.com/en-us/HT213841", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -135,7 +134,6 @@ "url": "https://support.apple.com/en-us/HT213842", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -143,7 +141,6 @@ "url": "https://support.apple.com/en-us/HT213843", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -151,7 +148,6 @@ "url": "https://support.apple.com/en-us/HT213844", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -159,7 +155,6 @@ "url": "https://support.apple.com/en-us/HT213845", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -167,7 +162,6 @@ "url": "https://support.apple.com/en-us/HT213846", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -175,7 +169,6 @@ "url": "https://support.apple.com/en-us/HT213848", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -183,7 +176,6 @@ "url": "https://support.apple.com/en-us/HT213841", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -191,7 +183,6 @@ "url": "https://support.apple.com/en-us/HT213842", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -199,7 +190,6 @@ "url": "https://support.apple.com/en-us/HT213843", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -207,7 +197,6 @@ "url": "https://support.apple.com/en-us/HT213844", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -215,7 +204,6 @@ "url": "https://support.apple.com/en-us/HT213845", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -223,7 +211,6 @@ "url": "https://support.apple.com/en-us/HT213846", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -231,7 +218,6 @@ "url": "https://support.apple.com/en-us/HT213848", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] } diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39244.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39244.json index f20b2cfd38f..19ec2e4a6ce 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39244.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39244.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39244", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-15T13:15:45.770", - "lastModified": "2024-11-21T08:14:58.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:57:46.483", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:enterprise_storage_integrator_for_sap_landscape_management:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.0.0", + "matchCriteriaId": "2BF50F45-2A95-4BE7-8F7D-150893330F90" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000216654/dsa-2023-299-security-update-for-dell-esi-enterprise-storage-integrator-for-sap-lama-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000216654/dsa-2023-299-security-update-for-dell-esi-enterprise-storage-integrator-for-sap-lama-multiple-security-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-392xx/CVE-2023-39245.json b/CVE-2023/CVE-2023-392xx/CVE-2023-39245.json index c0dfd7d8388..7f126a64238 100644 --- a/CVE-2023/CVE-2023-392xx/CVE-2023-39245.json +++ b/CVE-2023/CVE-2023-392xx/CVE-2023-39245.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39245", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-15T13:15:46.000", - "lastModified": "2024-11-21T08:14:59.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:57:31.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-319" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:enterprise_storage_integrator_for_sap_landscape_management:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.0.0", + "matchCriteriaId": "2BF50F45-2A95-4BE7-8F7D-150893330F90" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000216654/dsa-2023-299-security-update-for-dell-esi-enterprise-storage-integrator-for-sap-lama-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000216654/dsa-2023-299-security-update-for-dell-esi-enterprise-storage-integrator-for-sap-lama-multiple-security-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json index 3f3a2d02591..0359a76fe02 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42917.json @@ -2,8 +2,8 @@ "id": "CVE-2023-42917", "sourceIdentifier": "product-security@apple.com", "published": "2023-11-30T23:15:07.280", - "lastModified": "2024-11-21T08:23:30.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:37:02.693", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -245,16 +245,14 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/", "source": "product-security@apple.com", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/", "source": "product-security@apple.com", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { @@ -268,7 +266,6 @@ "url": "https://support.apple.com/en-us/HT214031", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -276,7 +273,6 @@ "url": "https://support.apple.com/en-us/HT214032", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -284,7 +280,6 @@ "url": "https://support.apple.com/en-us/HT214033", "source": "product-security@apple.com", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -385,16 +380,14 @@ "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AD2KIHHCUBQC2YYH3FJWAHI5BG3QETOH/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/P5LQS6VEI7VIZNC7QGQ62EOV45R5RJIR/", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Release Notes" + "Mailing List" ] }, { @@ -408,7 +401,6 @@ "url": "https://support.apple.com/en-us/HT214031", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -416,7 +408,6 @@ "url": "https://support.apple.com/en-us/HT214032", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -424,7 +415,6 @@ "url": "https://support.apple.com/en-us/HT214033", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Release Notes", "Vendor Advisory" ] }, @@ -453,8 +443,7 @@ "url": "https://www.debian.org/security/2023/dsa-5575", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] } ] diff --git a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json index f5c3527a339..8ea9df32b32 100644 --- a/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json +++ b/CVE-2023/CVE-2023-466xx/CVE-2023-46604.json @@ -2,8 +2,8 @@ "id": "CVE-2023-46604", "sourceIdentifier": "security@apache.org", "published": "2023-10-27T15:15:14.017", - "lastModified": "2024-11-21T08:28:52.810", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:16:49.210", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -66,7 +66,7 @@ "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -211,8 +211,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html", "source": "security@apache.org", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { @@ -257,8 +256,7 @@ "url": "https://lists.debian.org/debian-lts-announce/2023/11/msg00013.html", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ - "Mailing List", - "Third Party Advisory" + "Mailing List" ] }, { diff --git a/CVE-2023/CVE-2023-49xx/CVE-2023-4993.json b/CVE-2023/CVE-2023-49xx/CVE-2023-4993.json index 82ce84b62ce..79a592ff637 100644 --- a/CVE-2023/CVE-2023-49xx/CVE-2023-4993.json +++ b/CVE-2023/CVE-2023-49xx/CVE-2023-4993.json @@ -2,8 +2,8 @@ "id": "CVE-2023-4993", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-02-15T16:15:45.643", - "lastModified": "2024-11-21T08:36:25.267", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:56:18.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-648" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:utarit:solipay_mobile:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "959D95E5-61A9-4A28-8785-63580837107E" + } + ] + } + ] } ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-51xx/CVE-2023-5155.json b/CVE-2023/CVE-2023-51xx/CVE-2023-5155.json index 0c0a774b8b2..2021a242a32 100644 --- a/CVE-2023/CVE-2023-51xx/CVE-2023-5155.json +++ b/CVE-2023/CVE-2023-51xx/CVE-2023-5155.json @@ -2,8 +2,8 @@ "id": "CVE-2023-5155", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-02-15T16:15:45.910", - "lastModified": "2024-11-21T08:41:10.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:56:09.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:utarit:solipay_mobile:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "959D95E5-61A9-4A28-8785-63580837107E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6249.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6249.json index 18ae98aa2a0..5c1ddc22336 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6249.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6249.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6249", "sourceIdentifier": "vulnerabilities@zephyrproject.org", "published": "2024-02-18T08:15:07.223", - "lastModified": "2024-11-21T08:43:27.700", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:49:26.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,74 @@ "value": "CWE-704" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-704" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3.5.0", + "matchCriteriaId": "77568556-7FD0-4579-9F07-9ECE4E6CCFFE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:3.5.0:-:*:*:*:*:*:*", + "matchCriteriaId": "41EBBDE9-8B0F-4538-8676-FFD53783853F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:3.5.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "98715CBC-462C-46A7-BE10-2E00E88F73EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:3.5.0:rc2:*:*:*:*:*:*", + "matchCriteriaId": "61DC26BC-0117-4DA1-9152-023E53D8292B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zephyrproject:zephyr:3.5.0:rc3:*:*:*:*:*:*", + "matchCriteriaId": "14F7101F-A590-41FE-A8AA-3B7F52291349" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-32f5-3p9h-2rqc", - "source": "vulnerabilities@zephyrproject.org" + "source": "vulnerabilities@zephyrproject.org", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] }, { "url": "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-32f5-3p9h-2rqc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-62xx/CVE-2023-6255.json b/CVE-2023/CVE-2023-62xx/CVE-2023-6255.json index dd03106c324..76908147a9f 100644 --- a/CVE-2023/CVE-2023-62xx/CVE-2023-6255.json +++ b/CVE-2023/CVE-2023-62xx/CVE-2023-6255.json @@ -2,8 +2,8 @@ "id": "CVE-2023-6255", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-02-15T16:15:46.117", - "lastModified": "2024-11-21T08:43:28.530", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:55:52.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:utarit:solipay_mobile:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.8", + "matchCriteriaId": "959D95E5-61A9-4A28-8785-63580837107E" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0104", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json index fa05acba51e..77aac2200ea 100644 --- a/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json +++ b/CVE-2023/CVE-2023-70xx/CVE-2023-7081.json @@ -2,13 +2,13 @@ "id": "CVE-2023-7081", "sourceIdentifier": "iletisim@usom.gov.tr", "published": "2024-02-15T16:15:46.373", - "lastModified": "2024-11-21T08:45:12.757", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:53:04.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSTAHS\u0130L Online Payment System allows SQL Injection.This issue affects Online Payment System: before 14.02.2024.\n\n" + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in POSTAHS?L Online Payment System allows SQL Injection.This issue affects Online Payment System: before 14.02.2024.\n\n" }, { "lang": "es", @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postahsil:online_payment_system:*:*:*:*:*:*:*:*", + "versionEndExcluding": "14.02.2024", + "matchCriteriaId": "F9522CA1-A828-4705-8761-7422B10F05C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.usom.gov.tr/bildirim/tr-24-0103", - "source": "iletisim@usom.gov.tr" + "source": "iletisim@usom.gov.tr", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.usom.gov.tr/bildirim/tr-24-0103", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json index b7716deef9a..8c9c5d2d52a 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0622.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0622", "sourceIdentifier": "security@opentext.com", "published": "2024-02-15T21:15:08.860", - "lastModified": "2024-11-21T08:47:01.293", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:52:07.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,56 @@ "value": "CWE-269" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:operations_agent:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.20", + "versionEndIncluding": "12.25", + "matchCriteriaId": "60CE247E-60E8-4397-A847-5B0701406D54" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microfocus:operations_agent:12.15:*:*:*:*:*:*:*", + "matchCriteriaId": "973DFAB3-05AE-49A0-917B-ADAD9C296322" + } + ] + } + ] } ], "references": [ { "url": "https://portal.microfocus.com/s/article/KM000026555?language=en_US", - "source": "security@opentext.com" + "source": "security@opentext.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://portal.microfocus.com/s/article/KM000026555?language=en_US", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json new file mode 100644 index 00000000000..0a3d7d92458 --- /dev/null +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10846.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-10846", + "sourceIdentifier": "security@docker.com", + "published": "2025-01-23T16:15:33.533", + "lastModified": "2025-01-23T16:15:33.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The compose-go library component in versions v2.10-v2.4.0 allows an authorized user who sends malicious YAML payloads to cause the compose-go to consume excessive amount of Memory and CPU cycles while parsing YAML, such as used by Docker Compose from versions v2.27.0 to v2.29.7 included" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@docker.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:N/A:H", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@docker.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/compose-spec/compose-go/security/advisories/GHSA-36gq-35j3-p9r9", + "source": "security@docker.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-108xx/CVE-2024-10868.json b/CVE-2024/CVE-2024-108xx/CVE-2024-10868.json index 293443d2b1a..35cd5174c2c 100644 --- a/CVE-2024/CVE-2024-108xx/CVE-2024-10868.json +++ b/CVE-2024/CVE-2024-108xx/CVE-2024-10868.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10868", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-23T04:15:07.930", - "lastModified": "2024-11-23T04:15:07.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:58:10.220", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themelooks:enter_addons:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.1.9", + "matchCriteriaId": "B321B07A-193F-49A2-A649-DE61A156858C" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/enteraddons/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff8e8889-ec02-4b8d-9509-2c6335fdd9a4?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-112xx/CVE-2024-11220.json b/CVE-2024/CVE-2024-112xx/CVE-2024-11220.json index 6efc09df401..871795c83d4 100644 --- a/CVE-2024/CVE-2024-112xx/CVE-2024-11220.json +++ b/CVE-2024/CVE-2024-112xx/CVE-2024-11220.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11220", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-12-06T18:15:22.407", - "lastModified": "2024-12-06T18:15:22.407", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:54:24.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -93,16 +113,50 @@ "value": "CWE-279" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openautomationsoftware:open_automation_software:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.0.0.76", + "matchCriteriaId": "6FDFE998-61DE-45FB-B117-550F3000BD9B" + } + ] + } + ] } ], "references": [ { "url": "https://openautomationsoftware.com/downloads/", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Product" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-338-03", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json b/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json index 9a4fb5c71e7..87b3ada2a09 100644 --- a/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json +++ b/CVE-2024/CVE-2024-15xx/CVE-2024-1580.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1580", "sourceIdentifier": "cve-coordination@google.com", "published": "2024-02-19T11:15:08.817", - "lastModified": "2024-11-21T08:50:52.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:48:27.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,128 +69,323 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:videolan:dav1d:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.4.0", + "matchCriteriaId": "B21FACDB-790F-4BDF-AE54-72C70D1880C0" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", + "versionEndExcluding": "17.4.1", + "matchCriteriaId": "5B0BD32E-FA45-4796-956D-D1F2C049171E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.7", + "matchCriteriaId": "35B07242-1592-4814-8866-FA7DA2021DDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4.1", + "matchCriteriaId": "027265B2-C0CD-46D8-BF40-5E591CFDE9D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "16.7.7", + "matchCriteriaId": "4450D591-7B62-4339-9F0F-08C51F701967" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.0", + "versionEndExcluding": "17.4.1", + "matchCriteriaId": "9AA95646-94B7-4C20-9B69-371409BA4E22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.6.6", + "matchCriteriaId": "55A1512B-3C9A-428C-97BD-B3B6813B150D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.4.1", + "matchCriteriaId": "580B86E1-BCC1-419C-86B7-2A33DA257401" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.1.1", + "matchCriteriaId": "C8418E27-11BA-4DE1-9596-6E88F5A9C052" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*", + "matchCriteriaId": "CA277A6C-83EC-4536-9125-97B84C4FAF59" + } + ] + } + ] } ], "references": [ { "url": "http://seclists.org/fulldisclosure/2024/Mar/36", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/37", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/38", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/39", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/40", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/41", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://code.videolan.org/videolan/dav1d/-/releases/1.4.0", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EPMUNDMEBGESOJ2ZNCWYEAYOOEKNWOO/", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/kb/HT214093", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214094", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214095", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214096", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214097", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214098", - "source": "cve-coordination@google.com" + "source": "cve-coordination@google.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/36", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/37", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/38", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/40", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "http://seclists.org/fulldisclosure/2024/Mar/41", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://code.videolan.org/videolan/dav1d/-/blob/master/NEWS", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://code.videolan.org/videolan/dav1d/-/releases/1.4.0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5EPMUNDMEBGESOJ2ZNCWYEAYOOEKNWOO/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://support.apple.com/kb/HT214093", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214094", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214096", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://support.apple.com/kb/HT214098", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1996.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1996.json index 23d26ecb362..85369bec37d 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1996.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1996.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1996", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:28.930", - "lastModified": "2024-11-21T08:51:45.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:34:43.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fa5f3b-000b-406e-b7ee-51af5720cf72?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/48fa5f3b-000b-406e-b7ee-51af5720cf72?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1997.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1997.json index a47eefeea47..4c9c7b05599 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1997.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1997.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1997", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:29.110", - "lastModified": "2024-11-21T08:51:45.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:35:44.507", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ffa6a6b-bbb4-4361-8585-ce2cdb7d1d7e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ffa6a6b-bbb4-4361-8585-ce2cdb7d1d7e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-20xx/CVE-2024-2000.json b/CVE-2024/CVE-2024-20xx/CVE-2024-2000.json index ff9a7860101..4bcf9d6b8b0 100644 --- a/CVE-2024/CVE-2024-20xx/CVE-2024-2000.json +++ b/CVE-2024/CVE-2024-20xx/CVE-2024-2000.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2000", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:30.717", - "lastModified": "2024-11-21T09:08:46.863", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:34:23.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eee517de-a47e-47c9-8322-92ce772191b0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/eee517de-a47e-47c9-8322-92ce772191b0?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21590.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21590.json index 9ce93249e1b..7d5c9392f3b 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21590.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21590.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21590", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T15:15:22.983", - "lastModified": "2024-11-21T08:54:40.313", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:29:31.793", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -93,24 +113,369 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndIncluding": "21.2", + "matchCriteriaId": "C1B1AF9A-FE27-477A-BE2D-9BE502A0AFCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "909FC378-EBFE-4BA9-8393-0C8301438020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "9DB01252-2F11-41DB-9023-C74FD723334E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "2FB9F20B-7683-4B0D-8D2B-5569414EBC29" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "10F9C2B1-BD81-4EDC-ADF5-4B0F39001C7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "61F649B0-0121-4760-9432-5F57214EFC2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:-:*:*:*:*:*:*", + "matchCriteriaId": "9D7F0D73-85EE-4A07-B51B-6BF52ECBA75E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "FE777A1F-9CD9-426E-AF1C-FBE01EB9A4A8" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA75728", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA75728", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-218xx/CVE-2024-21870.json b/CVE-2024/CVE-2024-218xx/CVE-2024-21870.json index b6807e1755b..1bac24a216c 100644 --- a/CVE-2024/CVE-2024-218xx/CVE-2024-21870.json +++ b/CVE-2024/CVE-2024-218xx/CVE-2024-21870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21870", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-03T14:15:13.917", - "lastModified": "2024-11-21T08:55:09.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:56:30.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openautomationsoftware:open_automation_software:19.0.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "98468F0E-605A-47FA-877E-5FA039E1FB4B" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1950", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1950", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22178.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22178.json index cff5f8d4eaf..16d6f9ea675 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22178.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22178.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22178", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-03T14:15:14.543", - "lastModified": "2024-11-21T08:55:43.953", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:57:16.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openautomationsoftware:open_automation_software:19.0.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "98468F0E-605A-47FA-877E-5FA039E1FB4B" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1951", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22425.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22425.json index 7409a7f4d6e..26c0d6ee5f6 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22425.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22425.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22425", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-16T12:15:07.757", - "lastModified": "2024-11-21T08:56:15.960", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:51:37.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,18 +71,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2:*:*:*:*:*:*", + "matchCriteriaId": "0D63758C-7150-4B89-BD05-08AAA2C3D018" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p1:*:*:*:*:*:*", + "matchCriteriaId": "AE782786-D263-4946-8CDF-8FDA831FC6C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p2:*:*:*:*:*:*", + "matchCriteriaId": "7494092A-686D-4AE7-B420-80586564FA27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p4:*:*:*:*:*:*", + "matchCriteriaId": "F113FDFF-78AC-4F85-82B6-A01F2DD12CAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p1:*:*:*:*:*:*", + "matchCriteriaId": "FE37056B-7198-4A83-8912-99DA65E6D889" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p2:*:*:*:*:*:*", + "matchCriteriaId": "B31D991B-B2BB-4D75-AA16-B47A87D556FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000228154/dsa-2024-369-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-224xx/CVE-2024-22426.json b/CVE-2024/CVE-2024-224xx/CVE-2024-22426.json index 99c9d2b4a2a..a9930dd9850 100644 --- a/CVE-2024/CVE-2024-224xx/CVE-2024-22426.json +++ b/CVE-2024/CVE-2024-224xx/CVE-2024-22426.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22426", "sourceIdentifier": "security_alert@emc.com", "published": "2024-02-16T12:15:08.537", - "lastModified": "2024-11-21T08:56:16.120", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:50:56.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,20 +69,86 @@ "value": "CWE-434" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2:*:*:*:*:*:*", + "matchCriteriaId": "0D63758C-7150-4B89-BD05-08AAA2C3D018" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p1:*:*:*:*:*:*", + "matchCriteriaId": "AE782786-D263-4946-8CDF-8FDA831FC6C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p2:*:*:*:*:*:*", + "matchCriteriaId": "7494092A-686D-4AE7-B420-80586564FA27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp2_p4:*:*:*:*:*:*", + "matchCriteriaId": "F113FDFF-78AC-4F85-82B6-A01F2DD12CAB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p1:*:*:*:*:*:*", + "matchCriteriaId": "FE37056B-7198-4A83-8912-99DA65E6D889" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:5.3:sp3_p2:*:*:*:*:*:*", + "matchCriteriaId": "B31D991B-B2BB-4D75-AA16-B47A87D556FB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:recoverpoint_for_virtual_machines:6.0:sp1:*:*:*:*:*:*", + "matchCriteriaId": "DD0ABCD5-9273-4799-A916-3518ED5EBB46" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000228154/dsa-2024-369-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000222133/dsa-2024-092-security-update-for-dell-recoverpoint-for-virtual-machines-multiple-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2237.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2237.json index f78643f60ea..4ce33e9f66e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2237.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2237", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:32.403", - "lastModified": "2024-11-21T09:09:19.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:35:26.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35151561-6a80-4c2c-b87a-2dfe02aa6158?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/35151561-6a80-4c2c-b87a-2dfe02aa6158?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2238.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2238.json index 890bf871a58..86ad06797ab 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2238.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2238", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:32.577", - "lastModified": "2024-11-21T09:09:19.677", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:34:00.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82e5fd9f-9a1f-4a4c-ac06-61bf65e3c8ab?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82e5fd9f-9a1f-4a4c-ac06-61bf65e3c8ab?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2239.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2239.json index 1ac5bc742a3..ae2e6e0a55f 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2239.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2239", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:32.750", - "lastModified": "2024-11-21T09:09:19.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:35:08.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:leap13:premium_addons:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "2.9.13", + "matchCriteriaId": "95AC4C11-39C1-4A4D-8843-C44A1EF51E94" + } + ] + } + ] + } + ], "references": [ { "url": "https://premiumaddons.com/change-log/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/254f3a1c-0d5d-499b-9da7-129f21ba70af?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://premiumaddons.com/change-log/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/254f3a1c-0d5d-499b-9da7-129f21ba70af?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24416.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24416.json index ad412fd0a91..d3ecc008e3d 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24416.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24416.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24416", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.543", - "lastModified": "2025-01-21T23:15:11.543", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:33.727", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_access_point_name_ie function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n decode_access_point_name_ie en /3gpp/3gpp_24.008_sm_ies.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24417.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24417.json index 4a731c866e8..8ad9beda10f 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24417.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24417.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24417", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.663", - "lastModified": "2025-01-21T23:15:11.663", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:33.943", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_protocol_configuration_options function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n decode_protocol_configuration_options en /3gpp/3gpp_24.008_sm_ies.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24418.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24418.json index 85a0a80e21b..b45f4815f6b 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24418.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24418.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24418", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.787", - "lastModified": "2025-01-21T23:15:11.787", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:34.177", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_pdn_address function at /nas/ies/PdnAddress.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que la versi\u00f3n Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n decode_pdn_address en /nas/ies/PdnAddress.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24419.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24419.json index 6949fb46c58..732378cac43 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24419.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24419.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24419", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:11.910", - "lastModified": "2025-01-21T23:15:11.910", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:34.427", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_traffic_flow_template_packet_filter function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n decode_traffic_flow_template_packet_filter en /3gpp/3gpp_24.008_sm_ies.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24420.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24420.json index 0a0cdd71f06..aab803a8620 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24420.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24420.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24420", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.030", - "lastModified": "2025-01-21T23:15:12.030", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:34.687", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reachable assertion in the decode_linked_ti_ie function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Una afirmaci\u00f3n alcanzable en la funci\u00f3n decode_linked_ti_ie de Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json index 36a73e2570e..7b83ab4890c 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24421.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24421", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.147", - "lastModified": "2025-01-21T23:15:12.147", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:34.883", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A type confusion in the nas_message_decode function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to execute arbitrary code or cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Una confusi\u00f3n de tipos en la funci\u00f3n nas_message_decode de Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a los atacantes ejecutar c\u00f3digo arbitrario o provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json index 5e6a3b230c6..e8bade14521 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24422.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24422", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.267", - "lastModified": "2025-01-21T23:15:12.267", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:35.053", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a stack overflow in the decode_protocol_configuration_options function at /3gpp/3gpp_24.008_sm_ies.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de pila en la funci\u00f3n decode_protocol_configuration_options en /3gpp/3gpp_24.008_sm_ies.c. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json index 0101ebb258f..c764d3a7b68 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24423.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24423", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.407", - "lastModified": "2025-01-21T23:15:12.407", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:35.253", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Linux Foundation Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) was discovered to contain a buffer overflow in the decode_esm_message_container function at /nas/ies/EsmMessageContainer.cpp. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que Linux Foundation Magma <= 1.8.0 (corregido en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) conten\u00eda un desbordamiento de b\u00fafer en la funci\u00f3n decode_esm_message_container en /nas/ies/EsmMessageContainer.cpp. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24424.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24424.json index acab0696b7c..6b285b4f5a0 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24424.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24424.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24424", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.527", - "lastModified": "2025-01-21T23:15:12.527", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:35.453", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reachable assertion in the decode_access_point_name_ie function of Magma <= 1.8.0 (fixed in v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) allows attackers to cause a Denial of Service (DoS) via a crafted NAS packet." + }, + { + "lang": "es", + "value": "Una afirmaci\u00f3n alcanzable en la funci\u00f3n decode_access_point_name_ie de Magma <= 1.8.0 (corregida en v1.9 commit 08472ba98b8321f802e95f5622fa90fec2dea486) permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete NAS manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://cellularsecurity.org/ransacked", diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24445.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24445.json index a2cd9553517..6d3d287191d 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24445.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24445.json @@ -2,16 +2,55 @@ "id": "CVE-2024-24445", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T22:15:11.847", - "lastModified": "2025-01-21T22:15:11.847", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:35.617", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "OpenAirInterface CN5G AMF (oai-cn5g-amf) <= 2.0.0 contains a null dereference in its handling of unsupported NGAP protocol messages which allows an attacker with network-adjacent access to the AMF to carry out denial of service. When a procedure code/presence field tuple is received that is unsupported, OAI indexes into a null function pointer and subsequently dereferences it." + }, + { + "lang": "es", + "value": "OpenAirInterface CN5G AMF (oai-cn5g-amf) <= 2.0.0 contiene una desreferencia nula en su gesti\u00f3n de mensajes de protocolo NGAP no compatibles, lo que permite que un atacante con acceso adyacente a la red a AMF lleve a cabo una denegaci\u00f3n de servicio. Cuando se recibe una tupla de c\u00f3digo de procedimiento/campo de presencia que no es compatible, OAI indexa en un puntero de funci\u00f3n nulo y posteriormente lo desreferencia." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://openairinterface.com", diff --git a/CVE-2024/CVE-2024-249xx/CVE-2024-24976.json b/CVE-2024/CVE-2024-249xx/CVE-2024-24976.json index 9803b8f6c8b..9fd934f462d 100644 --- a/CVE-2024/CVE-2024-249xx/CVE-2024-24976.json +++ b/CVE-2024/CVE-2024-249xx/CVE-2024-24976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24976", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-03T14:15:15.073", - "lastModified": "2024-11-21T09:00:04.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:55:39.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,51 @@ "value": "CWE-130" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openautomationsoftware:open_automation_software:19.0.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "98468F0E-605A-47FA-877E-5FA039E1FB4B" + } + ] + } + ] } ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1948", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1948", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json index 20c07773588..148222237d2 100644 --- a/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json +++ b/CVE-2024/CVE-2024-257xx/CVE-2024-25709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25709", "sourceIdentifier": "psirt@esri.com", "published": "2024-04-04T18:15:13.340", - "lastModified": "2024-10-10T12:57:21.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T16:17:02.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,67 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "FDE382B5-E228-4803-A3FC-B803C7838777" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:10.9.1:*:*:*:*:*:*:*", + "matchCriteriaId": "1DCD5CA4-4423-4AC2-A9B8-3FCACC4E43ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "2A62FCB5-12A6-487C-BCA9-0AD3F11354CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.1:*:*:*:*:*:*:*", + "matchCriteriaId": "A0DAF61C-E776-4E31-8E39-92636B459A3E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:esri:portal_for_arcgis:11.2:*:*:*:*:*:*:*", + "matchCriteriaId": "F2E37361-8569-4023-BC3E-F36E7607CC7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.esri.com/arcgis-blog/products/arcgis-enterprise/administration/portal-for-arcgis-security-2024-update-1/", - "source": "psirt@esri.com" + "source": "psirt@esri.com", + "tags": [ + "Not Applicable" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25978.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25978.json index 13be639c0c7..d6a0507bace 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25978.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25978", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-19T17:15:08.567", - "lastModified": "2024-11-21T09:01:41.543", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:47:38.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,40 +69,122 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.9", + "matchCriteriaId": "CEC7A69A-C831-4087-B210-0C4DA13BA20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "FCCA487E-E8A2-496D-8439-01D492B7E95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "442D221B-7597-4FF2-A43E-ADFA21036DBE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74641", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264074", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455634", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74641", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264074", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455634", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25979.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25979.json index 9bf81918a64..9cdfe7d562e 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25979.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25979.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25979", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-19T17:15:08.793", - "lastModified": "2024-11-21T09:01:41.680", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:47:30.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,40 +69,122 @@ "value": "CWE-233" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.9", + "matchCriteriaId": "CEC7A69A-C831-4087-B210-0C4DA13BA20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "FCCA487E-E8A2-496D-8439-01D492B7E95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "442D221B-7597-4FF2-A43E-ADFA21036DBE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264095", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455635", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-69774", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455635", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25980.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25980.json index f799ddc022e..48f5412a849 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25980.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25980.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25980", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-19T17:15:09.023", - "lastModified": "2024-11-21T09:01:41.810", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:47:04.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,40 +69,122 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.9", + "matchCriteriaId": "CEC7A69A-C831-4087-B210-0C4DA13BA20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "FCCA487E-E8A2-496D-8439-01D492B7E95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "442D221B-7597-4FF2-A43E-ADFA21036DBE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80501", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264096", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455636", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80501", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264096", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455636", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25981.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25981.json index b0339573325..49e276829f1 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25981.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25981.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25981", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-19T17:15:09.230", - "lastModified": "2024-11-21T09:01:41.930", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:45:12.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,40 +69,122 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.9", + "matchCriteriaId": "CEC7A69A-C831-4087-B210-0C4DA13BA20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "FCCA487E-E8A2-496D-8439-01D492B7E95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "442D221B-7597-4FF2-A43E-ADFA21036DBE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80504", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264097", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455637", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-80504", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455637", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25982.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25982.json index c286eaa4559..eb68806919f 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25982.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25982.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25982", "sourceIdentifier": "patrick@puiterwijk.org", "published": "2024-02-19T17:15:09.467", - "lastModified": "2024-11-21T09:01:42.053", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:42:27.347", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,40 +69,122 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.1.0", + "versionEndExcluding": "4.1.9", + "matchCriteriaId": "CEC7A69A-C831-4087-B210-0C4DA13BA20B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.2.0", + "versionEndExcluding": "4.2.6", + "matchCriteriaId": "FCCA487E-E8A2-496D-8439-01D492B7E95C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:moodle:moodle:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.3.0", + "versionEndExcluding": "4.3.3", + "matchCriteriaId": "442D221B-7597-4FF2-A43E-ADFA21036DBE" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + } + ] + } + ] } ], "references": [ { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-54749", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264098", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455638", - "source": "patrick@puiterwijk.org" + "source": "patrick@puiterwijk.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-54749", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2264098", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KXGBYJ43BUEBUAQZU3DT5I5A3YLF47CB/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://moodle.org/mod/forum/discuss.php?d=455638", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27201.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27201.json index 9c3230f30d6..e659bec244c 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27201.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27201.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27201", "sourceIdentifier": "talos-cna@cisco.com", "published": "2024-04-03T14:15:17.300", - "lastModified": "2024-11-21T09:04:05.253", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:56:55.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openautomationsoftware:open_automation_software:19.0.0.57:*:*:*:*:*:*:*", + "matchCriteriaId": "98468F0E-605A-47FA-877E-5FA039E1FB4B" + } + ] + } + ] + } + ], "references": [ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1949", - "source": "talos-cna@cisco.com" + "source": "talos-cna@cisco.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-1949", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-313xx/CVE-2024-31363.json b/CVE-2024/CVE-2024-313xx/CVE-2024-31363.json index e146efe57bd..b30f37147a3 100644 --- a/CVE-2024/CVE-2024-313xx/CVE-2024-31363.json +++ b/CVE-2024/CVE-2024-313xx/CVE-2024-31363.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31363", "sourceIdentifier": "audit@patchstack.com", "published": "2024-04-12T13:15:20.207", - "lastModified": "2024-11-21T09:13:22.453", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T15:45:13.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lifterlms:lifterlms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.5.1", + "matchCriteriaId": "406EABFC-0714-471C-A56E-41CE764FCE98" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/lifterlms/wordpress-lifterlms-plugin-7-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/lifterlms/wordpress-lifterlms-plugin-7-5-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json index 7661e81db6f..12cc91e418b 100644 --- a/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json +++ b/CVE-2024/CVE-2024-314xx/CVE-2024-31492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31492", "sourceIdentifier": "psirt@fortinet.com", "published": "2024-04-10T13:51:38.607", - "lastModified": "2024-11-21T09:13:38.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:58:57.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,58 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "7.0.6", + "versionEndExcluding": "7.0.11", + "matchCriteriaId": "9B1112E4-7DC3-41EA-9F78-57C80E109C36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:macos:*:*", + "versionStartIncluding": "7.2.0", + "versionEndExcluding": "7.2.4", + "matchCriteriaId": "A4E41723-27C8-484D-A3B6-384B08B4CE18" + } + ] + } + ] } ], "references": [ { "url": "https://fortiguard.com/psirt/FG-IR-23-345", - "source": "psirt@fortinet.com" + "source": "psirt@fortinet.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://fortiguard.com/psirt/FG-IR-23-345", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json index 199f6068f00..a020124798e 100644 --- a/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json +++ b/CVE-2024/CVE-2024-319xx/CVE-2024-31985.json @@ -2,8 +2,8 @@ "id": "CVE-2024-31985", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-10T21:15:06.723", - "lastModified": "2024-11-21T09:14:17.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:51:52.277", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -49,56 +69,137 @@ "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.1", + "versionEndExcluding": "14.10.19", + "matchCriteriaId": "416D6CB0-EB32-45AC-B541-C081EC033EAF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.5.4", + "matchCriteriaId": "C15AC764-BCCE-4AF3-98F5-28EC637500A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xwiki:xwiki:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.6", + "versionEndExcluding": "15.9", + "matchCriteriaId": "3E8A87CB-01A7-4C55-99FF-93FAAC70532B" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/f16ca4ef1513f84ce2e685d4a05d689bd3a2ab4c", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j2r6-r929-v6gf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-20851", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/8a92cb4bef7e5f244ae81eed3e64fe9be95827cf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/efd3570f3e5e944ec0ad0899bf799bf9563aef87", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/f16ca4ef1513f84ce2e685d4a05d689bd3a2ab4c", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/commit/f30d9c641750a3f034b5910c6a3a7724ae8f2269", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/xwiki/xwiki-platform/security/advisories/GHSA-j2r6-r929-v6gf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.xwiki.org/browse/XWIKI-20851", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json index 775cc70875b..4490fb50263 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3210.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3210", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T06:15:07.763", - "lastModified": "2024-11-21T09:29:09.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-23T16:03:20.460", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:properfraction:profilepress:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "4.15.6", + "matchCriteriaId": "B2C7D4F7-AF37-4401-8428-2C6CAE6977F2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3067520/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FieldsShortcodeCallback.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4986bc3-ee34-43a6-bad2-9f6665adb35c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3067520/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FieldsShortcodeCallback.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f4986bc3-ee34-43a6-bad2-9f6665adb35c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json b/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json index e006cc9746e..360bdabaff0 100644 --- a/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json +++ b/CVE-2024/CVE-2024-429xx/CVE-2024-42936.json @@ -2,16 +2,55 @@ "id": "CVE-2024-42936", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T20:15:30.963", - "lastModified": "2025-01-21T20:15:30.963", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:35.773", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The mqlink.elf is service component in Ruijie RG-EW300N with firmware ReyeeOS 1.300.1422 is vulnerable to Remote Code Execution via a modified MQTT broker message." + }, + { + "lang": "es", + "value": "El componente de servicio mqlink.elf en Ruijie RG-EW300N con firmware ReyeeOS 1.300.1422 es vulnerable a la ejecuci\u00f3n remota de c\u00f3digo a trav\u00e9s de un mensaje de agente MQTT modificado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://gist.github.com/smrx86/2008111b12ab47882b3928d0cbc9e415", diff --git a/CVE-2024/CVE-2024-433xx/CVE-2024-43301.json b/CVE-2024/CVE-2024-433xx/CVE-2024-43301.json index d3553d27bfb..57b10df8d9a 100644 --- a/CVE-2024/CVE-2024-433xx/CVE-2024-43301.json +++ b/CVE-2024/CVE-2024-433xx/CVE-2024-43301.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43301", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-26T21:15:27.707", - "lastModified": "2024-09-12T21:24:20.563", + "lastModified": "2025-01-23T15:22:55.803", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:fontsplugin:fonts_plugin:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:fontsplugin:fonts:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.7.8", - "matchCriteriaId": "44795B37-7415-4C7E-8D12-5DD5EA45C2FB" + "matchCriteriaId": "D85D6464-6631-459D-8897-960F5BCAFAB2" } ] } diff --git a/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json b/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json index a2c5cdc2f69..0a260c1a4f5 100644 --- a/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json +++ b/CVE-2024/CVE-2024-485xx/CVE-2024-48509.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48509", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-21T20:15:14.943", - "lastModified": "2024-10-29T13:38:16.893", + "lastModified": "2025-01-23T16:50:03.787", "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ @@ -90,8 +90,8 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:learning_with_texts_project:learning_with_texts:2.0.3:*:*:*:*:*:*:*", - "matchCriteriaId": "9C7F073F-0E17-491D-A38D-28DEB4269C42" + "criteria": "cpe:2.3:a:lang-learn-guy:learning_with_texts:2.0.3:*:*:*:*:*:*:*", + "matchCriteriaId": "1C21149A-45A1-49B6-AB7D-6E30407C3D22" } ] } diff --git a/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json b/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json new file mode 100644 index 00000000000..4033fb046d7 --- /dev/null +++ b/CVE-2024/CVE-2024-523xx/CVE-2024-52325.json @@ -0,0 +1,112 @@ +{ + "id": "CVE-2024-52325", + "sourceIdentifier": "9119a7d8-5eab-497f-8521-727c672e3725", + "published": "2025-01-23T16:15:35.943", + "lastModified": "2025-01-23T16:15:35.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ECOVACS robot lawnmowers and vacuums are vulnerable to command injection via SetNetPin() over an unauthenticated BLE connection." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.6, + "baseSeverity": "CRITICAL", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "9119a7d8-5eab-497f-8521-727c672e3725", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://dontvacuum.me/talks/DEFCON32/DEFCON32_reveng_hacking_ecovacs_robots.pdf", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, + { + "url": "https://www.ecovacs.com/global/userhelp/dsa20241119", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, + { + "url": "https://www.ecovacs.com/global/userhelp/dsa20241130001", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + }, + { + "url": "https://youtu.be/_wUsM0Mlenc?t=2041", + "source": "9119a7d8-5eab-497f-8521-727c672e3725" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52518.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52518.json index 25f28ab1dcc..ec882e67641 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52518.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52518.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52518", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-15T17:15:21.543", - "lastModified": "2024-11-18T17:11:56.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:15:58.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,140 @@ }, "exploitabilityScore": 0.7, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-287" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.12", + "matchCriteriaId": "198DA774-A34C-4662-BABA-8E73246BAEC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.12", + "matchCriteriaId": "0D64CB01-AF54-472F-A70B-0910DB01B7EF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "29.0.0", + "versionEndExcluding": "29.0.9", + "matchCriteriaId": "71EE8159-DEB8-452B-A7E5-4D8CED48545B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "29.0.0", + "versionEndExcluding": "29.0.9", + "matchCriteriaId": "5B11C227-AAC6-4053-BDC0-2E732B95A854" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "30.0.0", + "versionEndExcluding": "30.0.2", + "matchCriteriaId": "A0880BD6-1031-428B-85D3-83BCC13FF10F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "30.0.0", + "versionEndExcluding": "30.0.2", + "matchCriteriaId": "5BBD7BC5-F07B-4CB8-8FC7-74BDE3BBEDC5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-vrhf-532w-99rg", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/nextcloud/server/pull/48373", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/nextcloud/server/pull/48788", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://github.com/nextcloud/server/pull/48992", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://hackerone.com/reports/2602973", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-525xx/CVE-2024-52519.json b/CVE-2024/CVE-2024-525xx/CVE-2024-52519.json index 579147cafa2..ee42c9d2fc2 100644 --- a/CVE-2024/CVE-2024-525xx/CVE-2024-52519.json +++ b/CVE-2024/CVE-2024-525xx/CVE-2024-52519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52519", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-15T17:15:21.843", - "lastModified": "2024-11-18T17:11:56.587", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-23T15:05:17.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -51,18 +71,74 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "27.0.0", + "versionEndExcluding": "27.1.11.8", + "matchCriteriaId": "EB2DDF43-98CB-42E5-B560-39FB139F5439" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.10", + "matchCriteriaId": "9E892FCE-444A-41AA-BFE5-55A59BBEA754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "28.0.0", + "versionEndExcluding": "28.0.10", + "matchCriteriaId": "B7DEEB8A-6DE6-4F01-A814-1544038E977E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:-:*:*:*", + "versionStartIncluding": "29.0.0", + "versionEndExcluding": "29.0.7", + "matchCriteriaId": "9829D54B-29AB-4D22-97F7-97AB033406D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nextcloud:nextcloud_server:*:*:*:*:enterprise:*:*:*", + "versionStartIncluding": "29.0.0", + "versionEndExcluding": "29.0.7", + "matchCriteriaId": "AA5E1111-AE0F-4238-A644-9283F09EDC15" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fvpc-8hq6-jgq2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/nextcloud/server/commit/09b8aea8f6783514bffe00df6abbf9fa542faac5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/nextcloud/server/pull/47635", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json index 142df07a76a..e0ae8cf720f 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55957.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55957", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T18:15:20.237", - "lastModified": "2025-01-22T18:15:20.237", + "lastModified": "2025-01-23T15:15:11.663", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Thermo Fisher Scientific Xcalibur before 4.7 SP1 and Thermo Foundation Instrument Control Software (ICSW) before 3.1 SP10, the driver packages have a local privilege escalation vulnerability due to improper access control permissions on Windows systems." + }, + { + "lang": "es", + "value": "En Thermo Fisher Scientific Xcalibur anterior a 4.7 SP1 y Thermo Foundation Instrument Control Software (ICSW) anterior a 3.1 SP10, los paquetes de controladores tienen una vulnerabilidad de escalada de privilegios locales debido a permisos de control de acceso inadecuados en sistemas Windows." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://assets.thermofisher.com/TFS-Assets/CORP/Product-Guides/Thermo_Scientific_Xcalibur_and_Foundation.pdf", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json index 5c35ec149c3..1999893af1e 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55959.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55959", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.323", - "lastModified": "2025-01-21T21:15:11.323", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:36.147", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Northern.tech Mender Client 4.x before 4.0.5 has Insecure Permissions." + }, + { + "lang": "es", + "value": "Northern.tech Mender Client 4.x anterior a 4.0.5 tiene permisos inseguros." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://Northern.tech", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json new file mode 100644 index 00000000000..8e6738c148d --- /dev/null +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55971.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-55971", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-23T16:15:36.307", + "lastModified": "2025-01-23T16:15:36.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in the default configuration of the Logitime WebClock application <= 5.43.0 allows an unauthenticated user to run arbitrary code on the backend database server." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://en.logitime.com/time-attendance/", + "source": "cve@mitre.org" + }, + { + "url": "https://nl.logitime.com/", + "source": "cve@mitre.org" + }, + { + "url": "https://nl.logitime.com/download/webclock-v5-43-0-13-12-2024/", + "source": "cve@mitre.org" + }, + { + "url": "https://tulling.dev/disclosures/cve-2024-55971/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json index 477880e7dd4..6903096b4b1 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57360.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57360", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T21:15:11.440", - "lastModified": "2025-01-21T21:15:11.440", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:36.437", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "https://www.gnu.org/software/binutils/ nm >=2.43 is affected by: Incorrect Access Control. The type of exploitation is: local. The component is: `nm --without-symbol-version` function." + }, + { + "lang": "es", + "value": "https://www.gnu.org/software/binutils/ nm >=2.43 se ve afectado por: Control de acceso incorrecto. El tipo de explotaci\u00f3n es: local. El componente es: funci\u00f3n `nm --without-symbol-version`." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32467", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json index f2dd9840151..a6576f97bb8 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57719.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57719", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:26.740", - "lastModified": "2025-01-23T01:15:26.740", + "lastModified": "2025-01-23T15:15:11.920", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component blend_transformed_tiled_argb.isra.0." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente blend_transformed_tiled_argb.isra.0." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json index 38384f834e6..e1fc559ab40 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57720.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57720", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:26.847", - "lastModified": "2025-01-23T01:15:26.847", + "lastModified": "2025-01-23T15:15:12.177", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_blend." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente plutovg_blend." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json index b93e6ea1d56..c931cfaa9ef 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57721.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57721", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:26.990", - "lastModified": "2025-01-23T01:15:26.990", + "lastModified": "2025-01-23T15:15:12.387", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component plutovg_path_add_path." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente plutovg_path_add_path." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json index 7088895dc3d..e5ca04ea40f 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57722.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57722", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:27.137", - "lastModified": "2025-01-23T01:15:27.137", + "lastModified": "2025-01-23T15:15:12.610", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a allocation-size-too-big bug via the component plutovg_surface_create." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda un error de tama\u00f1o de asignaci\u00f3n demasiado grande a trav\u00e9s del componente plutovg_surface_create." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json index 488a075d2fc..7cd9cd4e1e3 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57723.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57723", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:27.270", - "lastModified": "2025-01-23T01:15:27.270", + "lastModified": "2025-01-23T15:15:12.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component composition_source_over." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente composition_source_over." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json index 4a5c9708be7..c92995407a1 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57724.json @@ -2,16 +2,43 @@ "id": "CVE-2024-57724", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T01:15:27.387", - "lastModified": "2025-01-23T01:15:27.387", + "lastModified": "2025-01-23T15:15:13.020", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "lunasvg v3.0.0 was discovered to contain a segmentation violation via the component gray_record_cell." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 que lunasvg v3.0.0 conten\u00eda una violaci\u00f3n de segmentaci\u00f3n a trav\u00e9s del componente gray_record_cell." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, "references": [ { "url": "https://github.com/keepinggg/poc/blob/main/poc_of_lunasvg_3.1.0", diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json new file mode 100644 index 00000000000..6ccca8841a7 --- /dev/null +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0637.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0637", + "sourceIdentifier": "cve-coordination@incibe.es", + "published": "2025-01-23T16:15:36.617", + "lastModified": "2025-01-23T16:15:36.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "It has been found that the Beta10 software does not provide for proper authorisation control in multiple areas of the application. This deficiency could allow a malicious actor, without authentication, to access private areas and/or areas intended for other roles. The vulnerability has been identified at least in the file or path \u2018/app/tools.html\u2019." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve-coordination@incibe.es", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve-coordination@incibe.es", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-beta10", + "source": "cve-coordination@incibe.es" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json index 721f3dbfc4c..3beb7d20e6d 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21509.json @@ -2,20 +2,24 @@ "id": "CVE-2025-21509", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:16.107", - "lastModified": "2025-01-21T21:15:16.107", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:36.777", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows low privileged attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of JD Edwards EnterpriseOne Tools. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Web Runtime SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante con pocos privilegios y acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado la capacidad no autorizada de provocar un bloqueo o un bloqueo repetitivo frecuente (DOS completo) de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 6,5 (impactos en la disponibilidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json b/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json index c4736a6f126..22a4fea5f72 100644 --- a/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json +++ b/CVE-2025/CVE-2025-215xx/CVE-2025-21510.json @@ -2,20 +2,24 @@ "id": "CVE-2025-21510", "sourceIdentifier": "secalert_us@oracle.com", "published": "2025-01-21T21:15:16.243", - "lastModified": "2025-01-21T21:15:16.243", - "vulnStatus": "Received", + "lastModified": "2025-01-23T16:15:36.937", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Vulnerability in the JD Edwards EnterpriseOne Tools product of Oracle JD Edwards (component: Web Runtime SEC). Supported versions that are affected are Prior to 9.2.9.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise JD Edwards EnterpriseOne Tools. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all JD Edwards EnterpriseOne Tools accessible data. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." + }, + { + "lang": "es", + "value": "Vulnerabilidad en el producto JD Edwards EnterpriseOne Tools de Oracle JD Edwards (componente: Web Runtime SEC). Las versiones compatibles afectadas son anteriores a la 9.2.9.0. Esta vulnerabilidad, que se puede explotar f\u00e1cilmente, permite que un atacante no autenticado con acceso a la red a trav\u00e9s de HTTP ponga en peligro JD Edwards EnterpriseOne Tools. Los ataques exitosos de esta vulnerabilidad pueden dar como resultado un acceso no autorizado a datos cr\u00edticos o un acceso completo a todos los datos accesibles de JD Edwards EnterpriseOne Tools. Puntuaci\u00f3n base de CVSS 3.1: 7,5 (impactos de confidencialidad). Vector CVSS: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)." } ], "metrics": { "cvssMetricV31": [ { "source": "secalert_us@oracle.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -35,6 +39,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], "references": [ { "url": "https://www.oracle.com/security-alerts/cpujan2025.html", diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json new file mode 100644 index 00000000000..37d9769b709 --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22264.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22264", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:37.257", + "lastModified": "2025-01-23T16:15:37.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tarak Patel WP Query Creator allows Reflected XSS. This issue affects WP Query Creator: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-query-creator/vulnerability/wordpress-wp-query-creator-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json b/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json new file mode 100644 index 00000000000..102510952fc --- /dev/null +++ b/CVE-2025/CVE-2025-227xx/CVE-2025-22768.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22768", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:37.403", + "lastModified": "2025-01-23T16:15:37.403", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Qwerty23 Rocket Media Library Mime Type allows Stored XSS. This issue affects Rocket Media Library Mime Type: from n/a through 2.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rocket-media-library-mime-type/vulnerability/wordpress-rocket-media-library-mime-type-plugin-2-1-0-csrf-to-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json index b89c8cf23ec..9500cbaeff2 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23006", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-23T12:15:28.523", - "lastModified": "2025-01-23T12:15:28.523", + "lastModified": "2025-01-23T15:15:13.240", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,11 +15,34 @@ "value": "Se ha identificado una vulnerabilidad de deserializaci\u00f3n de datos no confiables antes de la autenticaci\u00f3n en SMA1000 Appliance Management Console (AMC) y Central Management Console (CMC), que en condiciones espec\u00edficas podr\u00eda permitir que un atacante remoto no autenticado ejecute comandos arbitrarios del sistema operativo." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "PSIRT@sonicwall.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json new file mode 100644 index 00000000000..881f37314e8 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23540.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23540", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:37.577", + "lastModified": "2025-01-23T16:15:37.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Mohsin khan WP Front-end login and register allows Reflected XSS. This issue affects WP Front-end login and register: from n/a through 2.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-front-end-login-and-register/vulnerability/wordpress-wp-front-end-login-and-register-plugin-2-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json new file mode 100644 index 00000000000..22ea4b06c75 --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23541.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23541", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:37.737", + "lastModified": "2025-01-23T16:15:37.737", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in edmon Download, Downloads allows Reflected XSS. This issue affects Download, Downloads : from n/a through 1.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ydn-download/vulnerability/wordpress-download-downloads-plugin-1-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json new file mode 100644 index 00000000000..fd23062c74c --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23544.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23544", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:37.897", + "lastModified": "2025-01-23T16:15:37.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in heart5 StatPressCN allows Reflected XSS. This issue affects StatPressCN: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/statpresscn/vulnerability/wordpress-statpresscn-plugin-1-9-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json b/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json new file mode 100644 index 00000000000..f5d27c8108d --- /dev/null +++ b/CVE-2025/CVE-2025-235xx/CVE-2025-23545.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23545", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.070", + "lastModified": "2025-01-23T16:15:38.070", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Navnish Bhardwaj WP Social Broadcast allows Reflected XSS. This issue affects WP Social Broadcast: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-social-broadcast/vulnerability/wordpress-wp-social-broadcast-plugin-1-0-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json new file mode 100644 index 00000000000..bfc79377a05 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23624.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23624", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.223", + "lastModified": "2025-01-23T16:15:38.223", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alessandro Benoit WpDevTool allows Reflected XSS. This issue affects WpDevTool: from n/a through 0.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpdevtool/vulnerability/wordpress-wpdevtool-plugin-0-1-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json new file mode 100644 index 00000000000..cbec168e92d --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23626.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23626", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.390", + "lastModified": "2025-01-23T16:15:38.390", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Hidetoshi Fukushima Kumihimo allows Reflected XSS. This issue affects Kumihimo: from n/a through 1.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kumihimo/vulnerability/wordpress-kumihimo-plugin-1-0-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json new file mode 100644 index 00000000000..a36585d04fa --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23628.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23628", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.547", + "lastModified": "2025-01-23T16:15:38.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in New Media One GeoDigs allows Reflected XSS. This issue affects GeoDigs: from n/a through 3.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/geodigs/vulnerability/wordpress-geodigs-plugin-3-4-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json new file mode 100644 index 00000000000..a4465e3d299 --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23629.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23629", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.690", + "lastModified": "2025-01-23T16:15:38.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Subhasis Laha Gallerio allows Reflected XSS. This issue affects Gallerio: from n/a through 1.0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/gallerio/vulnerability/wordpress-gallerio-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json new file mode 100644 index 00000000000..8389d6c9a9e --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23634", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.840", + "lastModified": "2025-01-23T16:15:38.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Youtube Video Grid allows Reflected XSS. This issue affects Youtube Video Grid: from n/a through 1.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/youmax-channel-embeds-for-youtube-businesses/vulnerability/wordpress-youtube-video-grid-plugin-1-9-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json b/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json new file mode 100644 index 00000000000..ab3cd88853a --- /dev/null +++ b/CVE-2025/CVE-2025-236xx/CVE-2025-23636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:38.983", + "lastModified": "2025-01-23T16:15:38.983", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dimitar Atanasov My Favorite Car allows Reflected XSS. This issue affects My Favorite Car: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/my-favorite-cars/vulnerability/wordpress-my-favorite-car-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json new file mode 100644 index 00000000000..74281301d33 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23722.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23722", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.117", + "lastModified": "2025-01-23T16:15:39.117", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Mind3doM RyeBread Widgets allows Reflected XSS. This issue affects Mind3doM RyeBread Widgets: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mind3dom-ryebread-widgets/vulnerability/wordpress-mind3dom-ryebread-widgets-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json new file mode 100644 index 00000000000..d236fab273c --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23723.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23723", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.260", + "lastModified": "2025-01-23T16:15:39.260", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plestar Inc Plestar Directory Listing allows Reflected XSS. This issue affects Plestar Directory Listing: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/plestar-directory-listing/vulnerability/wordpress-plestar-directory-listing-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json new file mode 100644 index 00000000000..eb154a076f2 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23724.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23724", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.387", + "lastModified": "2025-01-23T16:15:39.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Oleksandr Ustymenko University Quizzes Online allows Reflected XSS. This issue affects University Quizzes Online: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/university-quizzes-online/vulnerability/wordpress-university-quizzes-online-plugin-1-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json new file mode 100644 index 00000000000..6c17910ade7 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23725.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23725", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.530", + "lastModified": "2025-01-23T16:15:39.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in TaskMeister Accessibility Task Manager allows Reflected XSS. This issue affects Accessibility Task Manager: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/accessibility-task-manager/vulnerability/wordpress-accessibility-task-manager-plugin-1-2-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json new file mode 100644 index 00000000000..a3d24980868 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23727.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23727", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.660", + "lastModified": "2025-01-23T16:15:39.660", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound AZ Content Finder allows Reflected XSS. This issue affects AZ Content Finder: from n/a through 0.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/az-content-finder/vulnerability/wordpress-az-content-finder-plugin-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json new file mode 100644 index 00000000000..a596f988940 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23729.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23729", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.790", + "lastModified": "2025-01-23T16:15:39.790", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in fures XTRA Settings allows Reflected XSS. This issue affects XTRA Settings: from n/a through 2.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xtra-settings/vulnerability/wordpress-xtra-settings-plugin-2-1-8-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json new file mode 100644 index 00000000000..10ad096ca63 --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23730.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23730", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:39.933", + "lastModified": "2025-01-23T16:15:39.933", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound FLX Dashboard Groups allows Reflected XSS. This issue affects FLX Dashboard Groups: from n/a through 0.0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/flx-dashboard-groups/vulnerability/wordpress-flx-dashboard-groups-plugin-0-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json b/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json new file mode 100644 index 00000000000..91091608fbe --- /dev/null +++ b/CVE-2025/CVE-2025-237xx/CVE-2025-23733.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23733", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.073", + "lastModified": "2025-01-23T16:15:40.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in sayocode SC Simple Zazzle allows Reflected XSS. This issue affects SC Simple Zazzle: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sc-simple-zazzle/vulnerability/wordpress-sc-simple-zazzle-plugin-1-1-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json new file mode 100644 index 00000000000..20e9eac160d --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23834.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23834", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.203", + "lastModified": "2025-01-23T16:15:40.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Links/Problem Reporter allows Reflected XSS. This issue affects Links/Problem Reporter: from n/a through 2.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/report-broken-links/vulnerability/wordpress-links-problem-reporter-plugin-2-6-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json new file mode 100644 index 00000000000..1728690d881 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23835.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23835", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.353", + "lastModified": "2025-01-23T16:15:40.353", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NotFound Legal + allows Reflected XSS. This issue affects Legal +: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/legal-plus/vulnerability/wordpress-legal-plugin-1-0-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json new file mode 100644 index 00000000000..8388d8f3243 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23836.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23836", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.497", + "lastModified": "2025-01-23T16:15:40.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in SuryaBhan Custom Coming Soon allows Reflected XSS. This issue affects Custom Coming Soon: from n/a through 2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/custom-coming-soon/vulnerability/wordpress-custom-coming-soon-plugin-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json b/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json new file mode 100644 index 00000000000..401e9364d86 --- /dev/null +++ b/CVE-2025/CVE-2025-238xx/CVE-2025-23894.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23894", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.637", + "lastModified": "2025-01-23T16:15:40.637", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Tatsuya Fukata, Alexander Ovsov wp-flickr-press allows Reflected XSS. This issue affects wp-flickr-press: from n/a through 2.6.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-flickr-press/vulnerability/wordpress-wp-flickr-press-plugin-2-6-4-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json b/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json new file mode 100644 index 00000000000..cbbe74553b0 --- /dev/null +++ b/CVE-2025/CVE-2025-239xx/CVE-2025-23960.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23960", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-23T16:15:40.777", + "lastModified": "2025-01-23T16:15:40.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in basteln3rk Save & Import Image from URL allows Reflected XSS. This issue affects Save & Import Image from URL: from n/a through 0.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/save-import-image-from-url/vulnerability/wordpress-save-import-image-from-url-plugin-0-7-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json index 8582bebe51c..6e95cbe1d11 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24398.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24398", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:13.760", - "lastModified": "2025-01-22T17:15:13.760", + "lastModified": "2025-01-23T16:15:40.920", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Bitbucket Server Integration Plugin 2.1.0 through 4.1.3 (both inclusive) allows attackers to craft URLs that would bypass the CSRF protection of any target URL in Jenkins." + }, + { + "lang": "es", + "value": "El complemento Jenkins Bitbucket Server Integration 2.1.0 a 4.1.3 (ambos incluidos) permite a los atacantes **ENMASCARAR15** URL que eludir\u00edan la protecci\u00f3n CSRF de cualquier URL de destino en Jenkins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3434", diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json index 8fd70f67491..a8378e0f693 100644 --- a/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24399.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24399", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:13.853", - "lastModified": "2025-01-22T17:15:13.853", + "lastModified": "2025-01-23T15:15:13.440", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins OpenId Connect Authentication Plugin 4.452.v2849b_d3945fa_ and earlier, except 4.438.440.v3f5f201de5dc, treats usernames as case-insensitive, allowing attackers on Jenkins instances configured with a case-sensitive OpenID Connect provider to log in as any user by providing a username that differs only in letter case, potentially gaining administrator access to Jenkins." + }, + { + "lang": "es", + "value": "El complemento de autenticaci\u00f3n de Jenkins OpenId Connect 4.452.v2849b_d3945fa_ y anteriores, excepto 4.438.440.v3f5f201de5dc, trata los nombres de usuario como si no distinguieran entre may\u00fasculas y min\u00fasculas, lo que permite a los atacantes en instancias de Jenkins configuradas con un proveedor de OpenID Connect que distinga entre may\u00fasculas y min\u00fasculas iniciar sesi\u00f3n como cualquier usuario al proporcionar un nombre de usuario que difiere solo en may\u00fasculas y min\u00fasculas, lo que potencialmente les permite obtener acceso de administrador a Jenkins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3461", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json index 3776dff3cfc..f8d9c3cd9cc 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24400.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24400", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:13.943", - "lastModified": "2025-01-22T17:15:13.943", + "lastModified": "2025-01-23T15:15:13.570", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Eiffel Broadcaster Plugin 2.8.0 through 2.10.2 (both inclusive) uses the credential ID as the cache key during signing operations, allowing attackers able to create a credential with the same ID as a legitimate one in a different credentials store to sign an event published to RabbitMQ with the legitimate credentials." + }, + { + "lang": "es", + "value": "El complemento Jenkins Eiffel Broadcaster 2.8.0 a 2.10.2 (ambos incluidos) utiliza el ID de credencial como clave de cach\u00e9 durante las operaciones de firma, lo que permite a los atacantes crear una credencial con el mismo ID que una leg\u00edtima en un almac\u00e9n de credenciales diferente para firmar un evento publicado en RabbitMQ con las credenciales leg\u00edtimas." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3485", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json index 9f84687a2a7..0906934f9f8 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24401.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24401", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:14.027", - "lastModified": "2025-01-22T17:15:14.027", + "lastModified": "2025-01-23T16:15:41.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Jenkins Folder-based Authorization Strategy Plugin 217.vd5b_18537403e and earlier does not verify that permissions configured to be granted are enabled, potentially allowing users formerly granted (typically optional permissions, like Overall/Manage) to access functionality they're no longer entitled to." + }, + { + "lang": "es", + "value": "El complemento Jenkins Folder-based Authorization Strategy 217.vd5b_18537403e y versiones anteriores no verifica que los permisos configurados para otorgarse est\u00e9n habilitados, lo que potencialmente permite que los usuarios a los que se les otorgaron anteriormente (normalmente permisos opcionales, como General/Administrar) accedan a funciones a las que ya no tienen derecho." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:L", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3062", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json index e24ac3ddf0b..658dba30648 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24402.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24402", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:14.123", - "lastModified": "2025-01-22T17:15:14.123", + "lastModified": "2025-01-23T16:15:41.190", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross-site request forgery (CSRF) vulnerability in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers to connect to a Service Fabric URL using attacker-specified credentials IDs obtained through another method." + }, + { + "lang": "es", + "value": "Una vulnerabilidad Cross-Site Request Forgery (CSRF) en el complemento Jenkins Azure Service Fabric 1.6 y versiones anteriores permite a los atacantes conectarse a una URL de Service Fabric utilizando identificadores de credenciales especificados por el atacante obtenidos a trav\u00e9s de otro m\u00e9todo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3094", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json index 68c0b1d7465..6dfac20e078 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24403.json @@ -2,16 +2,55 @@ "id": "CVE-2025-24403", "sourceIdentifier": "jenkinsci-cert@googlegroups.com", "published": "2025-01-22T17:15:14.220", - "lastModified": "2025-01-22T17:15:14.220", + "lastModified": "2025-01-23T16:15:41.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A missing permission check in Jenkins Azure Service Fabric Plugin 1.6 and earlier allows attackers with Overall/Read permission to enumerate credentials IDs of Azure credentials stored in Jenkins." + }, + { + "lang": "es", + "value": "Una verificaci\u00f3n de permiso faltante en el complemento Jenkins Azure Service Fabric 1.6 y versiones anteriores permite a los atacantes con permiso general/de lectura enumerar los identificadores de credenciales de Azure almacenadas en Jenkins." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.jenkins.io/security/advisory/2025-01-22/#SECURITY-3094", diff --git a/README.md b/README.md index 5f887535639..8f4773aa868 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-23T15:01:03.959493+00:00 +2025-01-23T17:00:47.778731+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-23T14:52:33.387000+00:00 +2025-01-23T16:59:24.473000+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278658 +278687 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `29` -- [CVE-2024-10539](CVE-2024/CVE-2024-105xx/CVE-2024-10539.json) (`2025-01-23T14:15:25.097`) -- [CVE-2024-57947](CVE-2024/CVE-2024-579xx/CVE-2024-57947.json) (`2025-01-23T14:15:25.293`) +- [CVE-2025-22264](CVE-2025/CVE-2025-222xx/CVE-2025-22264.json) (`2025-01-23T16:15:37.257`) +- [CVE-2025-22768](CVE-2025/CVE-2025-227xx/CVE-2025-22768.json) (`2025-01-23T16:15:37.403`) +- [CVE-2025-23540](CVE-2025/CVE-2025-235xx/CVE-2025-23540.json) (`2025-01-23T16:15:37.577`) +- [CVE-2025-23541](CVE-2025/CVE-2025-235xx/CVE-2025-23541.json) (`2025-01-23T16:15:37.737`) +- [CVE-2025-23544](CVE-2025/CVE-2025-235xx/CVE-2025-23544.json) (`2025-01-23T16:15:37.897`) +- [CVE-2025-23545](CVE-2025/CVE-2025-235xx/CVE-2025-23545.json) (`2025-01-23T16:15:38.070`) +- [CVE-2025-23624](CVE-2025/CVE-2025-236xx/CVE-2025-23624.json) (`2025-01-23T16:15:38.223`) +- [CVE-2025-23626](CVE-2025/CVE-2025-236xx/CVE-2025-23626.json) (`2025-01-23T16:15:38.390`) +- [CVE-2025-23628](CVE-2025/CVE-2025-236xx/CVE-2025-23628.json) (`2025-01-23T16:15:38.547`) +- [CVE-2025-23629](CVE-2025/CVE-2025-236xx/CVE-2025-23629.json) (`2025-01-23T16:15:38.690`) +- [CVE-2025-23634](CVE-2025/CVE-2025-236xx/CVE-2025-23634.json) (`2025-01-23T16:15:38.840`) +- [CVE-2025-23636](CVE-2025/CVE-2025-236xx/CVE-2025-23636.json) (`2025-01-23T16:15:38.983`) +- [CVE-2025-23722](CVE-2025/CVE-2025-237xx/CVE-2025-23722.json) (`2025-01-23T16:15:39.117`) +- [CVE-2025-23723](CVE-2025/CVE-2025-237xx/CVE-2025-23723.json) (`2025-01-23T16:15:39.260`) +- [CVE-2025-23724](CVE-2025/CVE-2025-237xx/CVE-2025-23724.json) (`2025-01-23T16:15:39.387`) +- [CVE-2025-23725](CVE-2025/CVE-2025-237xx/CVE-2025-23725.json) (`2025-01-23T16:15:39.530`) +- [CVE-2025-23727](CVE-2025/CVE-2025-237xx/CVE-2025-23727.json) (`2025-01-23T16:15:39.660`) +- [CVE-2025-23729](CVE-2025/CVE-2025-237xx/CVE-2025-23729.json) (`2025-01-23T16:15:39.790`) +- [CVE-2025-23730](CVE-2025/CVE-2025-237xx/CVE-2025-23730.json) (`2025-01-23T16:15:39.933`) +- [CVE-2025-23733](CVE-2025/CVE-2025-237xx/CVE-2025-23733.json) (`2025-01-23T16:15:40.073`) +- [CVE-2025-23834](CVE-2025/CVE-2025-238xx/CVE-2025-23834.json) (`2025-01-23T16:15:40.203`) +- [CVE-2025-23835](CVE-2025/CVE-2025-238xx/CVE-2025-23835.json) (`2025-01-23T16:15:40.353`) +- [CVE-2025-23836](CVE-2025/CVE-2025-238xx/CVE-2025-23836.json) (`2025-01-23T16:15:40.497`) +- [CVE-2025-23894](CVE-2025/CVE-2025-238xx/CVE-2025-23894.json) (`2025-01-23T16:15:40.637`) +- [CVE-2025-23960](CVE-2025/CVE-2025-239xx/CVE-2025-23960.json) (`2025-01-23T16:15:40.777`) ### CVEs modified in the last Commit -Recently modified CVEs: `5` +Recently modified CVEs: `133` -- [CVE-2024-47759](CVE-2024/CVE-2024-477xx/CVE-2024-47759.json) (`2025-01-23T14:25:02.953`) -- [CVE-2024-49060](CVE-2024/CVE-2024-490xx/CVE-2024-49060.json) (`2025-01-23T14:15:08.617`) -- [CVE-2024-52521](CVE-2024/CVE-2024-525xx/CVE-2024-52521.json) (`2025-01-23T14:52:33.387`) -- [CVE-2024-52525](CVE-2024/CVE-2024-525xx/CVE-2024-52525.json) (`2025-01-23T14:33:48.657`) -- [CVE-2025-23006](CVE-2025/CVE-2025-230xx/CVE-2025-23006.json) (`2025-01-23T12:15:28.523`) +- [CVE-2024-31985](CVE-2024/CVE-2024-319xx/CVE-2024-31985.json) (`2025-01-23T15:51:52.277`) +- [CVE-2024-3210](CVE-2024/CVE-2024-32xx/CVE-2024-3210.json) (`2025-01-23T16:03:20.460`) +- [CVE-2024-42936](CVE-2024/CVE-2024-429xx/CVE-2024-42936.json) (`2025-01-23T16:15:35.773`) +- [CVE-2024-43301](CVE-2024/CVE-2024-433xx/CVE-2024-43301.json) (`2025-01-23T15:22:55.803`) +- [CVE-2024-48509](CVE-2024/CVE-2024-485xx/CVE-2024-48509.json) (`2025-01-23T16:50:03.787`) +- [CVE-2024-52518](CVE-2024/CVE-2024-525xx/CVE-2024-52518.json) (`2025-01-23T15:15:58.413`) +- [CVE-2024-52519](CVE-2024/CVE-2024-525xx/CVE-2024-52519.json) (`2025-01-23T15:05:17.843`) +- [CVE-2024-55957](CVE-2024/CVE-2024-559xx/CVE-2024-55957.json) (`2025-01-23T15:15:11.663`) +- [CVE-2024-55959](CVE-2024/CVE-2024-559xx/CVE-2024-55959.json) (`2025-01-23T16:15:36.147`) +- [CVE-2024-57360](CVE-2024/CVE-2024-573xx/CVE-2024-57360.json) (`2025-01-23T16:15:36.437`) +- [CVE-2024-57719](CVE-2024/CVE-2024-577xx/CVE-2024-57719.json) (`2025-01-23T15:15:11.920`) +- [CVE-2024-57720](CVE-2024/CVE-2024-577xx/CVE-2024-57720.json) (`2025-01-23T15:15:12.177`) +- [CVE-2024-57721](CVE-2024/CVE-2024-577xx/CVE-2024-57721.json) (`2025-01-23T15:15:12.387`) +- [CVE-2024-57722](CVE-2024/CVE-2024-577xx/CVE-2024-57722.json) (`2025-01-23T15:15:12.610`) +- [CVE-2024-57723](CVE-2024/CVE-2024-577xx/CVE-2024-57723.json) (`2025-01-23T15:15:12.820`) +- [CVE-2024-57724](CVE-2024/CVE-2024-577xx/CVE-2024-57724.json) (`2025-01-23T15:15:13.020`) +- [CVE-2025-21509](CVE-2025/CVE-2025-215xx/CVE-2025-21509.json) (`2025-01-23T16:15:36.777`) +- [CVE-2025-21510](CVE-2025/CVE-2025-215xx/CVE-2025-21510.json) (`2025-01-23T16:15:36.937`) +- [CVE-2025-23006](CVE-2025/CVE-2025-230xx/CVE-2025-23006.json) (`2025-01-23T15:15:13.240`) +- [CVE-2025-24398](CVE-2025/CVE-2025-243xx/CVE-2025-24398.json) (`2025-01-23T16:15:40.920`) +- [CVE-2025-24399](CVE-2025/CVE-2025-243xx/CVE-2025-24399.json) (`2025-01-23T15:15:13.440`) +- [CVE-2025-24400](CVE-2025/CVE-2025-244xx/CVE-2025-24400.json) (`2025-01-23T15:15:13.570`) +- [CVE-2025-24401](CVE-2025/CVE-2025-244xx/CVE-2025-24401.json) (`2025-01-23T16:15:41.050`) +- [CVE-2025-24402](CVE-2025/CVE-2025-244xx/CVE-2025-24402.json) (`2025-01-23T16:15:41.190`) +- [CVE-2025-24403](CVE-2025/CVE-2025-244xx/CVE-2025-24403.json) (`2025-01-23T16:15:41.333`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 55b81232f7f..5776c6e08ab 100644 --- a/_state.csv +++ b/_state.csv @@ -87888,9 +87888,9 @@ CVE-2016-4651,0,0,dca5547f743c2102d5c273c0cfc92f0004d345db9d49185b4aebc67c38f148 CVE-2016-4652,0,0,743b4e077d1600bf8aaea43c6730d83c83cdf30b8c52a624555f460f8e998902,2024-11-21T02:52:42.207000 CVE-2016-4653,0,0,d894561ed26d3c592147a1313b1920ac20102bdee2962e3accda329b1da3b733,2024-11-21T02:52:42.343000 CVE-2016-4654,0,0,74af2c171ca29b607036a19152933e201bbd895eb1ffcae27d358251dc54de64,2024-11-21T02:52:42.490000 -CVE-2016-4655,0,0,6e6aa3e349d6404f461bd6bccdb74ed9541983c977f11c30ffcb5854a6361dd4,2024-11-21T02:52:42.610000 -CVE-2016-4656,0,0,126d2b1c10bfab23f4c14b7121ba869da7833dd266e08171da23511016bd356f,2024-11-21T02:52:42.787000 -CVE-2016-4657,0,0,1e4d61765b827ae45dceabe3a935599eafb92bfca2b3e53931c4fb16bc1a6589,2024-11-21T02:52:42.907000 +CVE-2016-4655,0,1,e73ec2c0ae32b9df2c924bdbcbe0587e2a8cb576ec4270461ad0a2a46c787931,2025-01-23T16:52:57.547000 +CVE-2016-4656,0,1,df1978dcd32a41d7e412ee68c4102c048d685ec19f22b8a82f68156aa4ce414d,2025-01-23T16:53:19.107000 +CVE-2016-4657,0,1,89e3af08f95b178de8b458eded14d97c498afa3ec4f12cd6aac3ff104bbf5be9,2025-01-23T16:53:23.263000 CVE-2016-4658,0,0,075d3f82167218a13fe5a4cbb749a67c510179ede31fc77656bd872b094e7c8c,2024-11-21T02:52:43.043000 CVE-2016-4659,0,0,24e16ca19628f69d9a5abdf267f119d264b31393a70db6d894d0d0cf653fe29f,2023-11-07T02:32:42.950000 CVE-2016-4660,0,0,537ac03788d6e6fda7aeabd3bac1e8e212429a779adefa296b409ec2fbc15d68,2024-11-21T02:52:43.220000 @@ -91629,7 +91629,7 @@ CVE-2016-8731,0,0,4b5a4b7270b1d783a5182f53c74c9402e3fee3b65002227693aa108d7368ea CVE-2016-8732,0,0,b8f44a391aeaa0c559fc9e1fc16b5bb91c9dcfcfc5784757bd230430783be38a,2024-11-21T02:59:56.797000 CVE-2016-8733,0,0,2397012de3e99c7803ae7e8415e5a5b21fdd6f131a449c3bd48b294aaf6ce6c7,2024-11-21T02:59:56.923000 CVE-2016-8734,0,0,ed71876a8c1141fe2ad4f00528e5a90d9a1ca49f900f7f26049d837fc30b90ff,2024-11-21T02:59:57.043000 -CVE-2016-8735,0,0,5d12812fc2a273546c9661a83c4ae17284b58a0f8f3df28734b3efb2db14805c,2024-11-21T02:59:57.203000 +CVE-2016-8735,0,1,748143873d5847e5013ca2c87a53d18d645b06d564a8d80bdf2435858530e4c2,2025-01-23T15:29:15.380000 CVE-2016-8736,0,0,8508cb191ea8aac7ef32cafe60f49f42b9fe66a81b63a0000a07c40edbe4c449,2024-11-21T02:59:57.493000 CVE-2016-8737,0,0,838a4926c9ee6d5b0ab6534bb50616c0210ca354b7d128775929b291c5488ef2,2024-11-21T02:59:57.613000 CVE-2016-8738,0,0,34e4ba0edc5d9094557f9a9c1975b2df3518f83d63a94ab128fc973786393e7f,2024-11-21T02:59:57.737000 @@ -96385,9 +96385,9 @@ CVE-2017-12611,0,0,fa9088c3e73b7f18448725388554759a19c6431a8f3cb38f800be66ff5893 CVE-2017-12612,0,0,90eadeea019a6c525e609469c1a17096bb8406fdc277880e280a490a73d85bcb,2024-11-21T03:09:53.567000 CVE-2017-12613,0,0,123f5c3aabd1b1e5dd1f6c958738a91b706cdef18a786ed1ccafd8ca98c730a9,2024-11-21T03:09:53.687000 CVE-2017-12614,0,0,7d44afc3628a197eb4286e6df8f5215280f489d35961ac6e02d3e2259b7dcc28,2024-11-21T03:09:53.860000 -CVE-2017-12615,0,0,eb406a952b5f3e48c97350e8d400e23c2a3a8c8b217743f0a53879f544ef19b2,2024-11-21T03:09:53.973000 +CVE-2017-12615,0,1,aec4c8270af89f424d1b00cad7cfcd8278510a1af3eae411e7ea66e1eb47dd0d,2025-01-23T15:34:44.007000 CVE-2017-12616,0,0,44364ba13878fc3af02f2dae155b7c22e55470b84618749d06de79673cfab0e0,2024-11-21T03:09:54.137000 -CVE-2017-12617,0,0,c2bb32e04a8948856f556f9369a13dd2716b509ec3f8980b1772b718760aa6e0,2024-11-21T03:09:54.273000 +CVE-2017-12617,0,1,c3dcc9bc8ea5619f7b157c6433c366a14d42aa1b8badd332a49b94633d20fc33,2025-01-23T15:34:58.623000 CVE-2017-12618,0,0,9ae0cbe580a0f4abeac13276fdd0ef745d642c56b6cb3dcbf88e674b511b41c5,2024-11-21T03:09:54.510000 CVE-2017-12619,0,0,273d42b034c0e0a623c3ef600de4fcfd117433ae835e910c00fc823cdc30d20d,2024-11-21T03:09:54.647000 CVE-2017-1262,0,0,6246430dc38db343b951b613b755bb4c855bf167ba7b871ae460110d74da7fdd,2024-11-21T03:21:36 @@ -105906,7 +105906,7 @@ CVE-2017-5634,0,0,c691b0eed537dde2ae2c10d7a3837aa7cedf94218b8faafaf27d2b6acd11c0 CVE-2017-5635,0,0,f92152048ee03f2f3300dd2e6b84fc49ec8f95791a9c24a39881c39d17fc53cb,2024-11-21T03:28:03.940000 CVE-2017-5636,0,0,265cde36b51c52dc7a14cdca404ae07ed0ee4fb7c6ef851fe25acfd3bd2a0d1f,2024-11-21T03:28:04.063000 CVE-2017-5637,0,0,947a830d13563d9955c01f83f199f6d51a49007b865fcb26ab01b2bfd93cd8ed,2024-11-21T03:28:04.187000 -CVE-2017-5638,0,0,9417c4787e56708a075518577036b6daaf36327dafc735574c41661f8233f98e,2024-11-21T03:28:04.340000 +CVE-2017-5638,0,1,7078df69cc249ab53851d71e0eb9e4e08fd95d9b6c5febd2d3afa817774ce1f4,2025-01-23T15:28:58.827000 CVE-2017-5639,0,0,462a0f7c78ab8086edebd9f13969ca06172b26aeaf48715bd8ef53f97b1e42ea,2023-11-07T02:49:28.107000 CVE-2017-5640,0,0,72c959d49b2faee7e74f55903f2dee5136bde1ae0a0b667e8535f44d447f2a26,2024-11-21T03:28:04.580000 CVE-2017-5641,0,0,65e48daa937d45cb94c8220feebcd49740caa7c505a50c61ea31754636386eeb,2024-11-21T03:28:04.720000 @@ -109590,7 +109590,7 @@ CVE-2017-9787,0,0,4ff0474fa94745ba21b69e810977ce0a4dcb255a757d57917e166690e42f61 CVE-2017-9788,0,0,e6d4e3a8811ab88c0a25a72988130c7240559f653ad54ed27977a26e6e4453d1,2024-11-21T03:36:50.693000 CVE-2017-9789,0,0,55c18e88a75476874c281156ec708fa949d7d6dfa3d6df9a97e45d5a20908273,2024-11-21T03:36:51.323000 CVE-2017-9790,0,0,5986e3314508c3da64592bf9e47874d28c7904b788cecba61f8ab904ed7afbee,2024-11-21T03:36:51.527000 -CVE-2017-9791,0,0,fd12a89bc8c33e4f2ce0068610e42a3a6713ecd330f37533152c97b12f1f8b31,2024-11-21T03:36:51.647000 +CVE-2017-9791,0,1,ae720aa1b80fa01eec8e01dd97b122af4cd90dcbd5814ca0954b7c689e91b89a,2025-01-23T15:29:25.123000 CVE-2017-9792,0,0,85856ebca0eb83d7d412ec8adc07b478e9b7a430596b956d7c0c5d8296f3ed66,2024-11-21T03:36:51.783000 CVE-2017-9793,0,0,697c62bc29a0d80cd0c7f4c7a7961f560238b57ba6cc02631edf68c66036476d,2024-11-21T03:36:51.917000 CVE-2017-9794,0,0,6e6db4498d19757c3c7e154e2f152eaed1840beb54f4df2bb7109ebf680ac86a,2024-11-21T03:36:52.070000 @@ -109604,7 +109604,7 @@ CVE-2017-9801,0,0,dc7712f21d6648d38a7da724a52b54a68314aa36b346360fbeaaa7b15a72a5 CVE-2017-9802,0,0,5a4ab8c40f57662955b5fa0b37a0f1fcd64d3bd6e8aec9194eabdcce1abe440b,2024-11-21T03:36:53.203000 CVE-2017-9803,0,0,c4d53129e8c075cb9f562aa04ddbbbee900482544aa32757aaea8e4cdcd6dc13,2024-11-21T03:36:53.317000 CVE-2017-9804,0,0,af1649f75773cd4ea2d950fc98ad79fede4cc3f9b0c159ad839eb42a8b7ba620,2024-11-21T03:36:53.423000 -CVE-2017-9805,0,0,b29accb976db07e722e54cba2db3c29c59d8694a9d3cde1c1673fb86628271a7,2024-11-21T03:36:53.557000 +CVE-2017-9805,0,1,df3abf33328c72d7c6003926cfa0984d33e0d1b1425d0a2eae91934f0a01c998,2025-01-23T15:34:40.910000 CVE-2017-9806,0,0,5f4606f350b1c0159ca2c28ac4d679896d973c48661ed62c7fc87a705e4212cc,2024-11-21T03:36:53.700000 CVE-2017-9807,0,0,d589aad1d51bba53dd460e5f280723adca587151b78e5017337c0ad09ab990ae,2024-11-21T03:36:53.820000 CVE-2017-9808,0,0,cf3b02988d19553966ec76ad68604222aeb2d90cf85579c1f38041928061a22a,2024-11-21T03:36:53.970000 @@ -112800,7 +112800,7 @@ CVE-2018-11772,0,0,bbc7c30a7a0dbf68b0b90bb283675f793f5ca1f4e3a039b1822fa44a73518 CVE-2018-11773,0,0,394662b584968d1becc4f8d81385073f49d8f78c9f6140041454650380f7f35d,2024-11-21T03:44:00.300000 CVE-2018-11774,0,0,822bef8ddf19c36cbf00f977ee53f186948cc782c6d8fdf7c393b7b77d966ac1,2024-11-21T03:44:00.417000 CVE-2018-11775,0,0,8203037f4ee091b6bd01c6f5d5c9e79d0ac462269416f12e9f8ecbdcb6c69575,2024-11-21T03:44:00.530000 -CVE-2018-11776,0,0,077403adedbed66cc33c2e214fb47938a9fa21d798a04e2b8f583571cc191b81,2024-11-21T03:44:00.740000 +CVE-2018-11776,0,1,c4c605675204a7078b37d3fb139fbc099aadc93d29c5f04ce8e073a9e3f21cf0,2025-01-23T15:36:33.293000 CVE-2018-11777,0,0,f8e35d29ef5b091c978fe0e14c00f55d1a1aec0370ac51e551802ff5a2b483b7,2024-11-21T03:44:00.963000 CVE-2018-11778,0,0,3f0570ce1618833ee0231293cdd9c55497b73039cbe76b9028bd9ae5699c0396,2024-11-21T03:44:01.080000 CVE-2018-11779,0,0,6c5f33b2869d33be777d9a8177c1f167b3bbb39ce75e3f5609085f7b4b11593e,2024-11-21T03:44:01.203000 @@ -122900,7 +122900,7 @@ CVE-2018-4340,0,0,b43a7e0ee120ba44162f384df239fbe47b66e855e37863afa72de3a193e074 CVE-2018-4341,0,0,dea7e02377f1c376cd8c7dd3f2fc7eec24381821f6351ee5ef277a5dff751657,2024-11-21T04:07:13.693000 CVE-2018-4342,0,0,b3f59b2ac0e3061a3d11a75df46b1eb40d080946d103d59cb30c9ce21652eb54,2024-11-21T04:07:13.817000 CVE-2018-4343,0,0,9bd920e62f902f0e28bf3098ea4a2540290dbc2e43262cff2b5daf96ec73e24b,2024-11-21T04:07:13.930000 -CVE-2018-4344,0,0,5ef4bcd112280abda98acf6db160b4452198f8c32ab306be7353f1b7b9633dd8,2024-11-21T04:07:14.067000 +CVE-2018-4344,0,1,7367e0c2e3b88c6cfe7967094d80f6e3fde1fdae1e3de1202cc4dfb697bc3a6f,2025-01-23T16:53:29.750000 CVE-2018-4345,0,0,d451457e99571660e2050d70a45a870ea804274a1fb75662fd8abb18d7011d71,2024-11-21T04:07:14.190000 CVE-2018-4346,0,0,c4f593031dd265962878bb12b22a5c97f896433c5c8288900694de10de896240,2024-11-21T04:07:14.320000 CVE-2018-4347,0,0,355d9b8cce85661c40a474957973641c83e188a4cf32f3c1f7abbba32c8c1096,2024-11-21T04:07:14.437000 @@ -123417,7 +123417,7 @@ CVE-2018-4874,0,0,001e4deb5c6535f1d86a9853487f66e644017abf53f30c14044fe24a71e9ac CVE-2018-4875,0,0,828ca7194958837af531f6d926f2e6efad3e06506c06a1ec60d79f97e482f6db,2024-11-21T04:07:37.340000 CVE-2018-4876,0,0,d60f8ca5a522370294131546a37d8cfa7029fe032394b40e7a70c89d2890bdae,2024-11-21T04:07:37.460000 CVE-2018-4877,0,0,837f92480206511c1669bbf6ba58b0f130e7f2857587d84aa9f5f9bb536c7e84,2024-11-21T04:07:37.580000 -CVE-2018-4878,0,0,851973e5a807958c7c75e4c7b4a8c6243096d481414c639249ea81d159a827a9,2024-11-21T04:07:37.703000 +CVE-2018-4878,0,1,decd2777bc75236fa2e5e909774590df1c592355d6735c801011ebaca8773ec2,2025-01-23T15:36:18.867000 CVE-2018-4879,0,0,0d7f8a85e4038ef27ba31e2472daf37e74ddf6899fecdc5a583ac5bc34a6f3d0,2024-11-21T04:07:37.860000 CVE-2018-4880,0,0,045e9f032a298443f93e3790a70e4abcd68625e59e5c9df6c44c44f9f5c06d42,2024-11-21T04:07:37.987000 CVE-2018-4881,0,0,9b0e562147a6706c36c5906c56df0a08b4ec6027e1f194d83f10d8a9ec581508,2024-11-21T04:07:38.110000 @@ -123478,7 +123478,7 @@ CVE-2018-4935,0,0,399998ac67f634b872f680c3ab88b518d1b7522c988571ccde1825342ee456 CVE-2018-4936,0,0,271ca644a13b593428b1d96d5ee35c1fb7bedfe88af2b402336b313e1b9390fd,2024-11-21T04:07:44.760000 CVE-2018-4937,0,0,96a07bf209f86ba011673cf73c0d98ce9c8331c74e615eae43383c5e8a71fc41,2024-11-21T04:07:44.890000 CVE-2018-4938,0,0,838a8c7bbb985b850f0cf887792b9ee59b8cbd5a1f48a2637cc5d2b46199428b,2024-11-21T04:07:45.027000 -CVE-2018-4939,0,0,790a7176169ffb35549805a2fe4c4b8c9e3845c9d89526d126524d8b22653beb,2024-11-21T04:07:45.160000 +CVE-2018-4939,0,1,387fd6870caede22d37461c89f5a5c58e882403a5a64d9f2e5ad5502acfd9444,2025-01-23T15:36:22.337000 CVE-2018-4940,0,0,58e9c596099b32df415dedd77c2fabcf01942da5d842274955e956635e9fc36f,2024-11-21T04:07:45.277000 CVE-2018-4941,0,0,c9746042e985ba715e6224aa8d5e3ca3bc94efb2036fe1778d418e1de275b807,2024-11-21T04:07:45.403000 CVE-2018-4942,0,0,badf52afcf03141ee18de1887aaa45c591c4e8a4cec6581f3991cfff3b3fd89a,2024-11-21T04:07:45.530000 @@ -123529,7 +123529,7 @@ CVE-2018-4986,0,0,c8a2e646894f5fc31c799eb54dce879ece19338c44ac430c0292d7cc31a634 CVE-2018-4987,0,0,9fb4a6f58170586279b1367122696a8bc3103480a0d3e2a19dd33d4c3102e2b7,2024-11-21T04:07:51.240000 CVE-2018-4988,0,0,565db0c120545a0980b443acabc25c3fe0bbe77ff968225cf72c5f4ac1b5bbd6,2024-11-21T04:07:51.430000 CVE-2018-4989,0,0,d969203ec1744215a113eb914fb8bb6e8c8bb47130a1a1b304a3f7f3081f0bb8,2024-11-21T04:07:51.603000 -CVE-2018-4990,0,0,11c25b978e2146d3c15a118313abc7155dfdfa637bbc889bfb72f08944b08893,2024-11-21T04:07:51.767000 +CVE-2018-4990,0,1,3994a27714049f481b35e0ab46fb513144acd18b930ce14557f28fbe66a140bf,2025-01-23T15:36:26.277000 CVE-2018-4991,0,0,4f48903c6bd132691cdea90b110a694cc849ea70fbafc65953442dc590dd6b0c,2024-11-21T04:07:51.930000 CVE-2018-4992,0,0,774f4ecc150b900b309d235e9dc4e472199fd5938e216d979b3205a223df9919,2024-11-21T04:07:52.570000 CVE-2018-4993,0,0,6595d41e2f9eb986cef7c6bd58b76af712e0ebf9e4ee2213cc2e4671db1d94ae,2024-11-21T04:07:52.690000 @@ -123541,7 +123541,7 @@ CVE-2018-4998,0,0,7bc1b91b4ed3c2ed5bb6e8b5e97d6fabfae099cb567a2c4e418bda5babdd3e CVE-2018-4999,0,0,2804f0f3c26b64f522ac214766f1e12aff6b13f52d410b5a5278af4aa1384d4c,2024-11-21T04:07:53.377000 CVE-2018-5000,0,0,ca36b8788981e66a469b6a12a11b7147b02def6a470cf4634f205bca07351332,2024-11-21T04:07:53.507000 CVE-2018-5001,0,0,937f04430d8bdb291415510bf42966bd1f1f8a6f7a7e08147565cabc6147c403,2024-11-21T04:07:53.620000 -CVE-2018-5002,0,0,aca88577d66793e8b61eec6e48b9245128dee03e06a483d7133f732c89ca9ce5,2024-11-21T04:07:53.737000 +CVE-2018-5002,0,1,7ae835675b15dc8d6ed2126fcd31ced37cd5a37ccf54b907f8eef68afe394313,2025-01-23T15:36:30.167000 CVE-2018-5003,0,0,68d2f21cd2423841c08bc7db21746f56f3f11803c62cdf55b5a25f219ce9047a,2024-11-21T04:07:53.853000 CVE-2018-5004,0,0,64ff4844ff1f2ff63e89e50d615ef90053208aae825a36ed0bff1b6f013b75d8,2024-11-21T04:07:53.967000 CVE-2018-5005,0,0,580545e4297826f5fb3054eb463692d3543e12ee70adabe9306aad26a47249e1,2024-11-21T04:07:54.077000 @@ -127435,7 +127435,7 @@ CVE-2019-0189,0,0,13810b74d7aeabe53d566c2633c7bf564418c1befd15535dfeb7a9fc5f5776 CVE-2019-0190,0,0,48e03ee4db4c27e3281667c0c50471bc6f19f2a8e1b27a336d954413c89f6e72,2024-11-21T04:16:26.850000 CVE-2019-0191,0,0,98b776b648d53a9ac95aebeef506a8b27338670cc353d41afdf3937e5aeb9cba,2024-11-21T04:16:27.020000 CVE-2019-0192,0,0,b5914093724940c0ceecc2351fd909dd13bc290674cfc87066219273ef81d3c8,2024-11-21T04:16:27.140000 -CVE-2019-0193,0,0,299c5bc7064264652dfe5eb603b7b102a8c26c42c802114e152f7f60de503318,2024-11-21T04:16:27.287000 +CVE-2019-0193,0,1,ab2a57673dfb2384b4bf98cba0a196c228acf28771d592feba8cbb46e95de8c6,2025-01-23T15:37:04.953000 CVE-2019-0194,0,0,0d47f295cbfd81bb00286e86a8d3de59bba5ecd3c22cefc98cfa22b001d90517,2024-11-21T04:16:27.477000 CVE-2019-0195,0,0,231e2d7227940a30df5c1097759860c54faf13a33907407a11c2ceac4e7f7056,2024-11-21T04:16:27.610000 CVE-2019-0196,0,0,eef8121ef5d4a660cfcca062c0709f2b63b75bea66a0e8117bf7af7e313806ca,2024-11-21T04:16:27.757000 @@ -127453,7 +127453,7 @@ CVE-2019-0207,0,0,1d274320dc3cfcdd3e6843ad8499871aa7aab2b96146ed945bffa6de677aee CVE-2019-0208,0,0,47fa72fb1491e2eddd007ac660c2013a428a55186223ef7595fd512160713322,2023-11-07T03:01:49.670000 CVE-2019-0209,0,0,8a63648f5ca6170017076fde6d74e61036a2724c0ceca47b3baed4431df839de,2023-11-07T03:01:49.940000 CVE-2019-0210,0,0,465a5af179711f2606e97e9f1456c95d28adb8e3023e78b326e4835282594988,2024-11-21T04:16:29.503000 -CVE-2019-0211,0,0,6a156a63cce2c51a958fc9d0e0b9fab9ed9bb1b4d5676b7281bcc6395e79b1df,2024-11-21T04:16:29.640000 +CVE-2019-0211,0,1,13b538619f15ff4d9ed6716958e16f697b58525987e0d47986497dd9e9108e38,2025-01-23T15:37:01.753000 CVE-2019-0212,0,0,570d4d5b1a58fb419f2a8fed0d2f1d94057425b51e2fa4b12437cb677e606217,2024-11-21T04:16:29.913000 CVE-2019-0213,0,0,e97ed4030c72ecb0980c1c110d4ddc8ef279b7f36fa864d93896f600ace0b728,2024-11-21T04:16:30.047000 CVE-2019-0214,0,0,65bb13f93d9d445dbbe948ee48fd9a13c87b8b5973a7faa5c46a51e78bbd4da9,2024-11-21T04:16:30.190000 @@ -220931,8 +220931,8 @@ CVE-2023-27105,0,0,3ebe603ff3f16c03541cc4700c5f21fad7319131e1992dcb41e497b05c62a CVE-2023-27107,0,0,bbdf5f0c25908e9f8f5e56566975e243651a79564d0df91e2e3abc51838f3ba5,2024-11-21T07:52:20.110000 CVE-2023-27108,0,0,b8940befe1ddf391315dce5f5d430d8c1aee8ccc93016ad368dae5fae74b311c,2024-11-21T07:52:20.257000 CVE-2023-2711,0,0,c43472a8c20d741979b439e3bc102f5f9559519492c61f60f11a183488cbe254,2024-11-21T07:59:08.223000 -CVE-2023-27112,0,0,12ea544f49bc685be742a5d94394ea82eceec6a4f815d8881865e474ac1b21fb,2025-01-21T22:15:09.710000 -CVE-2023-27113,0,0,c145b0e9b7445d8b792e03051c596e893ff33928978aed5fb3a53fe55303524e,2025-01-21T22:15:09.823000 +CVE-2023-27112,0,1,7f4768f5cf1619a4704a59ff89cc38db579379adb5f6324f2c3c025b3117d387,2025-01-23T16:15:27.067000 +CVE-2023-27113,0,1,f247dae44669103ec1b76340206537a23999ac0ecd9016dffc4cf194e58ac7f4,2025-01-23T16:15:28.080000 CVE-2023-27114,0,0,381c5ad5ef1ee610a647bf2f36e03720b1f8a3c4b9a12147ffc96315d17db022,2024-11-21T07:52:21.330000 CVE-2023-27115,0,0,de045cfd32668df9cf787d018b20df26acab4b75e4980102a982bfa6d6edec27,2024-11-21T07:52:21.503000 CVE-2023-27116,0,0,7d525dcb4562516f5c4677c4ad00b6ccdf54bca9cd52069a24c21acf3c3cdd6d,2024-11-21T07:52:21.647000 @@ -223500,7 +223500,7 @@ CVE-2023-30269,0,0,cebd756c90bb877f8e88202ba42bf1215405ee7bc7742a9b0a6d65e8dad5b CVE-2023-3027,0,0,560d82e06a1833a4ff7380ca52c8278ca6cedaacbf61570bb31dfac50b4bff69,2025-01-08T17:15:13.653000 CVE-2023-3028,0,0,d7e6c492aa4e09f4068a4883ce78bc00c5d3a6d6e7c135ad24766c470347aba7,2024-11-21T08:16:16.607000 CVE-2023-30280,0,0,ef85ad7ae12e425f73b02ce09fe58299e837810a7b3f878ae87c5dda25f820ea,2024-11-21T07:59:58.527000 -CVE-2023-30281,0,0,9285be0bb0754f7f9c0558350277e8d74652220daaa54df7dc678182821e2104,2024-11-21T07:59:58.680000 +CVE-2023-30281,0,1,3a26267230fdd8ac345cdcd240ca199fc117c55974af888904f14926d4b09e94,2025-01-23T16:15:28.260000 CVE-2023-30282,0,0,7ee7ec3795edcbd1cc9bef3cbaacc24354e4b4445e0142c19824de9f6c1ed286,2024-11-21T07:59:58.843000 CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000 CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000 @@ -223602,7 +223602,7 @@ CVE-2023-30449,0,0,328e0008aa87724bc1119988042af83d0e7f220a1d71681b98be6a3dc2539 CVE-2023-3045,0,0,5bfcc31d64a917d38b23dada1e5786670dff662cf23fb0e7dec809cfc9d30737,2024-11-21T08:16:18.950000 CVE-2023-30450,0,0,e8abf2288be578f9aba31e86a7a71291da0ebac6855ef6c8dd30603a62411b3e,2024-11-21T08:00:12.513000 CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000 -CVE-2023-30452,0,0,386f8def717ff92c7d7987ee5c1d88d25efcb8ddfa4ce6e63b184c0e698add33,2024-11-21T08:00:12.833000 +CVE-2023-30452,0,1,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000 CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000 CVE-2023-30454,0,0,c6fadb94020df9aaf92dc893b8ce24b95889eb58aec92ff2ca0bcf4372297d2d,2024-11-21T08:00:13.123000 CVE-2023-30455,0,0,67590854388925a6ee11408360c4660ec765b5d5fb3440442ef818dd0e0bb85d,2024-11-21T08:00:13.273000 @@ -224515,7 +224515,7 @@ CVE-2023-31566,0,0,e871c886400ebd66446d3859338ecac61182d7101420a3f79ab1135a583d7 CVE-2023-31567,0,0,bd5d8de992a43d73ec75608eadc07f5a87c2d764e49c12e6d987a6adc631a187,2024-11-21T08:02:01.977000 CVE-2023-31568,0,0,2a94cef32a460c46c54e6bf7baed4302e010b387a30baae3c629c416e075acb9,2024-11-21T08:02:02.110000 CVE-2023-31569,0,0,d077547b542d195c8f55da836f1c847ca9af82c0c370d8805e63fdff1b63da10,2025-01-08T16:15:29.143000 -CVE-2023-31572,0,0,7e60986fdcdb9e6fc758fdeea9993f4cff97ce5351c559d3723d9b04a720d6aa,2024-11-21T08:02:02.400000 +CVE-2023-31572,0,1,e7098774719d66b5a0a02084ed526feb7ef1e2e4076475b7abc938f374c3c6f2,2025-01-23T15:15:08.303000 CVE-2023-31576,0,0,c09026c0298a63fb495458cd534a7d65d48e7b6f81c7449cf2ddf8b5d8e09121,2024-11-21T08:02:02.553000 CVE-2023-31579,0,0,75a007048fc1a54a6840179bdd981d83684b0b6ccac864aebbd94e6105ec6ffb,2024-11-21T08:02:02.700000 CVE-2023-3158,0,0,ace18045a3724281d3efe6ecd24fb6b095fc5b5cdccc79b7cba7e8e3d2c31010,2024-11-21T08:16:35.223000 @@ -224657,13 +224657,13 @@ CVE-2023-31843,0,0,54f7849724cbe11f6da5e667fc7780219d0ba47cbdb5d8c6918953c560b9b CVE-2023-31844,0,0,e313c4eac2abb96cd6478dd52b1ff49af079b7d6e2512e59f45183f714a754c5,2024-11-21T08:02:19.137000 CVE-2023-31845,0,0,010ff27f4b802c204ea560e2a6d6dd8efc9afa0421f31c35db1cacf2e475b140,2024-11-21T08:02:19.277000 CVE-2023-31847,0,0,61652494dcf39a47d9c41c5bcf334843a00bb44003843e702e7fa0ecace274fc,2025-01-22T17:15:11.553000 -CVE-2023-31848,0,0,5256ae3c08d44e561db926e9fafe7d2eb6c7df72056b8e75d61fc4cf6694e73b,2024-11-21T08:02:19.550000 +CVE-2023-31848,0,1,c4ef79b999227c52827a4852798c4314df87f5c70236c4f09feb11cd92478392,2025-01-23T16:15:28.850000 CVE-2023-31851,0,0,28e0ff2c774b14b35c919062a5005171b7eb64e8e88e7d86e80fbeb0e947f032,2024-11-21T08:02:19.697000 CVE-2023-31852,0,0,60b88d15d49f418b5ee4e9b6f24abed1c597679dc7c775beba5502c414a2e904,2024-11-21T08:02:19.847000 CVE-2023-31853,0,0,188bdfb68ee611defe273af45e16ca69f0f0463011eb9e612b3b6ed1e73e028d,2024-11-21T08:02:19.990000 CVE-2023-31854,0,0,1afe22a18848e9c434b0c259f6d2c90301fa42928d2094ebf0bc1b4b52fc6b27,2024-11-21T08:02:20.133000 -CVE-2023-31856,0,0,ce256db1525fce6a46e28d9cc8111df499b2085637139fa8706530beb5896492,2024-11-21T08:02:20.267000 -CVE-2023-31857,0,0,7bd3853f2c55682965431fa0d6799811d368a0e716fd1913e523e8cb2e1eb410,2024-11-21T08:02:20.413000 +CVE-2023-31856,0,1,f4de4ba59c8554e57797f25e0888b1eb604674ed22835a10a43d6b46ab9e9216,2025-01-23T16:15:29.030000 +CVE-2023-31857,0,1,ca2a7a9bc84482dea3d73e44a0e752440acc0bb6ffa23c26a88cf6a2432d6a23,2025-01-23T16:15:29.230000 CVE-2023-3186,0,0,14a8a3e02f8d6ed26188c9f463e876e766ad72b9a21434e816a4de3953e3d487,2024-11-21T08:16:39.013000 CVE-2023-31860,0,0,c8cd823357aabe2248349ead353aa43605af9164cf40845a237ab4fd189848d1,2025-01-17T17:15:08.863000 CVE-2023-31861,0,0,00ed8b460a421cbea6dd8b076a614dfb6e50c87d17fb1a33433f66e14cf7477d,2025-01-16T15:15:10.720000 @@ -224677,7 +224677,7 @@ CVE-2023-31874,0,0,aaeeb0431a9a1893d552c2a1d86d7024a1cb24bbc16d2ac3b3a4d2f0898bb CVE-2023-3188,0,0,ed975c2ca95a43dd0a1601e3d12e0e041e6ed66a4ffa6869eb0b4e0368f2ec18,2024-11-21T08:16:39.287000 CVE-2023-31889,0,0,860fdb07b6fd9e0e32e9f25216030b26d75b6c5bd476c13116dbe08a42f78f6b,2024-11-21T08:02:21.673000 CVE-2023-3189,0,0,90b7be594abf8f0ecc9df91220db42abe0006221673e859b30a599fddc34f471,2024-11-21T08:16:39.420000 -CVE-2023-31890,0,0,dbfc8dc304aefcfd73cedba88cdbdab1d70ac9812e6e1b86de38d65aabb218f5,2024-11-21T08:02:21.873000 +CVE-2023-31890,0,1,0fbb25b32d9994e27c8010778db11222ad40666b24a6dbc796221e0731d11c72,2025-01-23T15:15:09.050000 CVE-2023-31893,0,0,21ba3fe4129e701a3557352f945cc0417a22c044d81b30613e43c14f9ebc4b4f,2024-11-21T08:02:22.007000 CVE-2023-3190,0,0,7db86e04544f8eba511b6d963d5edd9521b55a2eef0f5beead6ede415eae6a3c,2024-11-21T08:16:39.573000 CVE-2023-31902,0,0,4970407b0151e647b1b82c1825347a6db8937a2ca6f3d25b0a873338c17dd0bd,2025-01-22T17:15:11.717000 @@ -225163,7 +225163,7 @@ CVE-2023-32404,0,0,6cdf35cb6263b9c680ea8dc81713cf36cb75552f6f43705b97451cde0198e CVE-2023-32405,0,0,066e16e1725da134cfd2fec336f3962448666fb7bf1e730a4e208618dfc6ec68,2024-12-05T16:15:22.507000 CVE-2023-32407,0,0,cd68ebad80c351089d7aae49edf3c6f8e50c7e542200dd990eec1498172ec03e,2024-12-05T16:15:22.650000 CVE-2023-32408,0,0,69d717faea8bf9d30ac6145162652e36aa7bfb9d779e070e23bfd72c23a36722,2024-11-21T08:03:17.700000 -CVE-2023-32409,0,0,2b52653b04fa0adf74e7f6d550f7e58ec4636c2c970964150cc73889972d19cc,2024-11-21T08:03:17.840000 +CVE-2023-32409,0,1,3fda8ebcc0a006130dcab0dbc9b2d671bf93543c8de804627e56876880a72b9e,2025-01-23T16:53:34.323000 CVE-2023-3241,0,0,2978ebbc8e64e2c72b8397cb052b684afb6db6f4aad7ae3eb19aa57ab3ddc489,2024-11-21T08:16:46.750000 CVE-2023-32410,0,0,26a643155d66f7a2bdea0f46fc76d3196f304f0989db762493991114bd7f4f45,2024-11-21T08:03:17.977000 CVE-2023-32411,0,0,956858eabd9918e8e6b3c1db4179d820ad50c65824207fd3e536d8c22450acfc,2024-11-21T08:03:18.097000 @@ -225189,12 +225189,12 @@ CVE-2023-32429,0,0,e46e02f258d51635ab5ef8bab6d35855f35e56d76662f17aff3e32f728cfd CVE-2023-3243,0,0,f39d9207aa51a4f50a921684a93aa08e98ddf85594ad1964d7ef7666e323d0b4,2024-11-21T08:16:47.080000 CVE-2023-32432,0,0,71739248fbd9019ee6d1ece6530111937bb9544f2912c4f6af9b8290fb231108,2024-12-12T14:26:18.893000 CVE-2023-32433,0,0,3162dd87a2e4be71b01dab05d4d5586614c514c9e744874d06bf9242d1982a79,2024-11-21T08:03:20.587000 -CVE-2023-32434,0,0,e19845805e2c170e35da29433d90257184d040282660e03dff9d0164e8aa4f87,2024-11-21T08:03:20.717000 +CVE-2023-32434,0,1,fdc991e81611dc4b7a1f43fcd6dc9f1c198d6764b6b3832bbf7f1abf7af72d73,2025-01-23T16:53:39.523000 CVE-2023-32435,0,0,daf2b1c2b3ed078f49d50583ccdcb859cdc35675e5eea44b5471538e85b4b8ce,2024-12-20T17:49:17.260000 CVE-2023-32436,0,0,b1838bad592f8061b6d9a4a9063867063ed3bb06a03b6ff3b7dfcbddf25b174f,2024-11-21T08:03:20.970000 CVE-2023-32437,0,0,34cb0d82da59eadf72e035d71ce27268fe5640e446349555ae0be1c644a830f4,2024-11-21T08:03:21.103000 CVE-2023-32438,0,0,a00014ad87ef16329a1ad28e21cf98311827d59fe3cfcc6d54ef64a64fea0ed4,2024-12-12T14:26:18.893000 -CVE-2023-32439,0,0,2ce1da5abff5d1853b37c29dc7ead4fe975de63113cb782df730a53c27083887,2024-11-21T08:03:21.347000 +CVE-2023-32439,0,1,d33752892c92b9818540114cde8191bd225336da8d2380c953799691cd7c128e,2025-01-23T16:36:05.110000 CVE-2023-3244,0,0,01470d499b32ea5cba53fbc6c2839f629c628a66441361005d09811a2b604954,2024-11-21T08:16:47.233000 CVE-2023-32441,0,0,aaaa4d579ed908d0b9e7528ac9c558ea7a2bc165ae2989c8a5559d52e290963e,2024-11-21T08:03:21.477000 CVE-2023-32442,0,0,98f289f358fe3d399579852388e283e7e5fc6845dcb9c9c6f3e95590d3822789,2024-11-21T08:03:21.610000 @@ -225239,7 +225239,7 @@ CVE-2023-32480,0,0,9b44002978128ed55d1c6fcdc3cfad7803ade1d43e794d7a8e7f738329a36 CVE-2023-32481,0,0,c6f40f752476dbc955bbdac962688dca1b92781de6da3b24e0be729507178677,2024-11-21T08:03:26.733000 CVE-2023-32482,0,0,3dc2e5896171cedfe31100b2aca213b202cb1e5e36518fea589666f07675c2d5,2024-11-21T08:03:26.853000 CVE-2023-32483,0,0,c8b85017aed0540db6b28463a1cea803482a7e605fc3613a951b77aaa3f198eb,2024-11-21T08:03:26.980000 -CVE-2023-32484,0,0,571b888d607bf36cadbc1c79cb9b0e1bb17b3c33407eab516127dd90cb86338f,2024-11-21T08:03:27.103000 +CVE-2023-32484,0,1,6bcd5bf9352b0051c57dd3db59bbedbf055c88efd9e0ca7249bbad7efb6fa704,2025-01-23T16:59:24.473000 CVE-2023-32485,0,0,ae8573a7afc2ec7d9e43dc589dacba59f0e99e395c3d0ebc7b3e6986c78d1b50,2024-11-21T08:03:27.227000 CVE-2023-32486,0,0,e2529a888325e6da41af359b828a735b1f3311c6340e99ee718986fa5e3754bc,2024-11-21T08:03:27.357000 CVE-2023-32487,0,0,f534f4c873d81eef1a3b82780bf4c1775bde3546a3d55fff98703cafda37789a,2024-11-21T08:03:27.483000 @@ -225677,17 +225677,17 @@ CVE-2023-32973,0,0,7c1e7b793d3820419a9f66b15b950877d329a23764e301eef16780587f8ad CVE-2023-32974,0,0,576bfbaeb176b9da6682e383ef300c95fbb84a15bc2b5a5170f00e6062757e7c,2024-11-21T08:04:19.567000 CVE-2023-32975,0,0,34a47c1a6afe205509292cb661bd5007f3183532599205c73add7763625def3a,2024-11-21T08:04:19.710000 CVE-2023-32976,0,0,0eccbbe9a63fe0d8e5dae7c42882171aad5455e45340956021ff754cf556adee,2024-11-21T08:04:19.850000 -CVE-2023-32977,0,0,93ffde483fa203baa092c9d3f62df0155cbec2d47186130ab1d2ab32265fab4f,2024-11-21T08:04:19.993000 -CVE-2023-32978,0,0,5a328ef5f666fb1276a811d139eb32d51b8cae6181fa58c812dc79f6850b2d43,2024-11-21T08:04:20.107000 -CVE-2023-32979,0,0,64c0620c7e6cf7dfeb9f47f35e0d56ae1d3f1557ed53eb2548e7b555b1a92367,2024-11-21T08:04:20.217000 -CVE-2023-32980,0,0,4c31db01b5e843be730bb64984db7de514eb07d3f33579ea847da6d092eb19ae,2024-11-21T08:04:20.337000 +CVE-2023-32977,0,1,c3716352ec4f4f27934462b6538eb4d942c70fa185a75ec27a70a90c800f1b88,2025-01-23T16:15:29.433000 +CVE-2023-32978,0,1,e2596a7d40f451b09d4a4ea7e76228af2e6284363d3354421d4b521421e4e037,2025-01-23T16:15:29.620000 +CVE-2023-32979,0,1,bafdbe4a03234b01c02421a14c6be9242c69129a18260f1949effaac47cf044a,2025-01-23T16:15:29.793000 +CVE-2023-32980,0,1,44b4402b6c7ee8225bc525cea141da0781e24b561d784faf0cafe59927587ba1,2025-01-23T16:15:29.967000 CVE-2023-32981,0,0,4ae29467107d5cabba7a10a05f31aec36aa42465203a0310038286b173c2d9ea,2024-11-21T08:04:20.450000 CVE-2023-32982,0,0,d3fedd02220874efa73e1b92855259f9f84084eb625f48ec7d575b4532446438,2024-11-21T08:04:20.570000 CVE-2023-32983,0,0,64b0abebecaf8af84d80cf0bc46502d7f35cb368840043f5674a95c48a864588,2024-11-21T08:04:20.680000 CVE-2023-32984,0,0,a3b3d06b9afd2383d3fe27c639768cb25c7af9a915171f8458be732227331329,2024-11-21T08:04:20.787000 CVE-2023-32985,0,0,60fe9981712bbc1bed64e2576a93177f0a483f976951786b4d80af1052687eae,2024-11-21T08:04:20.900000 CVE-2023-32986,0,0,03df88d35552c0bbe490fd82702289d02e015a3a3b955ac5696714f8064578ac,2024-11-21T08:04:21.040000 -CVE-2023-32987,0,0,c87e72f41069ddc13d4fe9de7cd9f3367258dd41b473fa9112ffe30c747c421d,2024-11-21T08:04:21.153000 +CVE-2023-32987,0,1,1ddb9937b5057b3e4fce13172aa1784c1ab534e59449cfd43531466ad2416c56,2025-01-23T16:15:30.150000 CVE-2023-32988,0,0,9f8c606b05958ea35c11898e2a066eea55c45a619cb921d96ab65f008a75b540,2024-11-21T08:04:21.263000 CVE-2023-32989,0,0,7a8ec21f048619b25217479be8d737d0d419d59fdb2b90be00b95e5e61e108ea,2024-11-21T08:04:21.380000 CVE-2023-3299,0,0,8b9ca0adae3bd83d6a131b0e354e5770841d7614840f98289795acd821485467,2024-11-21T08:16:57.423000 @@ -225695,21 +225695,21 @@ CVE-2023-32990,0,0,ae9b87ae81a64985499ea36f9b1bcf31c7d0af744ab395ba834a30e5568df CVE-2023-32991,0,0,1228cb4ab7864b6efc40d143795d1572cd397b6c1c78ad342345798476edf051,2024-11-21T08:04:21.600000 CVE-2023-32992,0,0,aec70a1164892ac3f39d13448ecb52ad5385984c37bf5050b34da63cddd69369,2024-11-21T08:04:21.703000 CVE-2023-32993,0,0,b1b4eddc294e2b91de6633121df504ead7e5d1a64cf654528a8f77c691f96d7a,2024-11-21T08:04:21.823000 -CVE-2023-32994,0,0,11b2f17acbd0ef59006a49db91d8323868052887fa9e1b1bb0211a4a769fe258,2024-11-21T08:04:21.947000 +CVE-2023-32994,0,1,c8ae8b87aa76cefa127e0d32c4eab82193c19686b29070ce3fb0e0176441ba06,2025-01-23T16:15:30.327000 CVE-2023-32995,0,0,cb1539d3aa29066ba0a477720f67de83bec34be38340f110bac83a8f8fb6e336,2024-11-21T08:04:22.067000 CVE-2023-32996,0,0,f57f58799fec30144ba9c5ee0483666b5766709b17dfe7e17df1779036ff9876,2024-11-21T08:04:22.187000 -CVE-2023-32997,0,0,e809b3a47376bb53e8920e852e42920f8bee1d12d4d17bf4ffce511acaec3b74,2024-11-21T08:04:22.293000 -CVE-2023-32998,0,0,8d643156e2884ac2f96e7e1bf166d78b31341095408a064d987b7e506ec52257,2024-11-21T08:04:22.417000 -CVE-2023-32999,0,0,dcdf105921ac8861f9ea130af6eea3b527781e1bed4569676e1f54c60bab7ac5,2024-11-21T08:04:22.537000 +CVE-2023-32997,0,1,127529572afeb5cd39e82e0d9c01f3a480623b3869d8db0c0d172e611842cc43,2025-01-23T16:15:30.483000 +CVE-2023-32998,0,1,c28b030cfda4c373aa0a936fdc92105b05c1f1661c6db0c86b80d9d9ab239ef5,2025-01-23T16:15:30.643000 +CVE-2023-32999,0,1,6c38158dd319c1e8ab8e9c3fde8cbefb2d4b86a844e296f758e07a7c3a22698d,2025-01-23T16:15:30.830000 CVE-2023-3300,0,0,a123413d5d82beaa4c176c14c6e6a13239aa565794e2f8180f9d789558872bf0,2024-11-21T08:16:57.577000 -CVE-2023-33000,0,0,40f5aa43e9b8e9bd461dc1e53c387d9ccb6610179b759189d1c20e8d731f6b18,2024-11-21T08:04:22.643000 -CVE-2023-33001,0,0,c34e15242ed6bcfc065f09d4175dc1a0f4c43774bf6b5ccab8bfb0bf477e0b8f,2024-11-21T08:04:22.760000 -CVE-2023-33002,0,0,7575199dabe3cc2e6b2a7dfb976f31cebe88804c6834b7821979afa46df8e8c6,2024-11-21T08:04:22.870000 -CVE-2023-33003,0,0,967a6bf798ebbc34ecd044f54e31c3c8961c4a03631b6c903e2ec54a74f0acc2,2024-11-21T08:04:22.970000 -CVE-2023-33004,0,0,cf163d6c8c5ddaea85bfe7395b3ff78e5cfcfdd9fdc146f75daa3fc41849aceb,2024-11-21T08:04:23.087000 -CVE-2023-33005,0,0,3ac06493adcc73eaf97f34d6d563c95cc3cf523fb298da6f598e2050a43aea44,2024-11-21T08:04:23.200000 -CVE-2023-33006,0,0,4aed718f7e53c0d8ebc9e1b1ca5cf63a8c97490604e962da6d30e19d2fd44047,2024-11-21T08:04:23.317000 -CVE-2023-33007,0,0,34eeed207fb90e7998cddd2bcc99c8d2a7f2e63d02324aafa46dfb556c0daf6e,2024-11-21T08:04:23.423000 +CVE-2023-33000,0,1,fa43e4caab0cc17013451e96918fad71bdf09c4ce7c9ffd5946d9789483ab019,2025-01-23T16:15:31.030000 +CVE-2023-33001,0,1,d8c8af0556a63f3022eb541d6c4485971770bbc9cc060f979021faa800cb9560,2025-01-23T16:15:31.230000 +CVE-2023-33002,0,1,7267e6ce44157ac90a8a453060ff21ce4e4310a3d6750d541761d47d3f0d1e7b,2025-01-23T16:15:31.433000 +CVE-2023-33003,0,1,0ae359c31c3af5e92ee371884219d71ce00ef5e25879f52f2efbda038c462ebc,2025-01-23T16:15:31.613000 +CVE-2023-33004,0,1,a73867c270c8704b5a2809463c0869f28092faa4787d95f2bdbfbfc4a581d505,2025-01-23T16:15:31.770000 +CVE-2023-33005,0,1,11233cc2aed617d34892cd10b6cd285e42b1642984ce6ebb8ceff57ede82697e,2025-01-23T16:15:31.933000 +CVE-2023-33006,0,1,c61f6a83fed5c84dac3c5856e32d1c1a30fa553051d617857ae2ae547ce1f2d6,2025-01-23T16:15:32.103000 +CVE-2023-33007,0,1,9ca1ed3257db236ca4f5f1e2792c485b257fe17dccc1d01196ea86f616f8cbf3,2025-01-23T16:15:32.277000 CVE-2023-33008,0,0,5192f4ead374e87889057d3b47378b1e56cc84bf09249148fbed08294fc98773,2024-11-21T08:04:23.530000 CVE-2023-33009,0,0,c4483f4f0db02f5d9215ee1e11bb102a6cc5eeaac063153e6d4707fc89944aca,2024-11-21T08:04:23.717000 CVE-2023-3301,0,0,082ada9f68e33f6990dc7650a566577b9bbab90718aa744587a91daf839f6744,2024-11-21T08:16:57.723000 @@ -225956,7 +225956,7 @@ CVE-2023-33242,0,0,a76e54903e1bfa0300160648b077333b58cc1f028155f31638eea87ce5b93 CVE-2023-33243,0,0,590f0b7337db73b310eeeedc8fb6b42289fc37ed06cbdf228f0f61ca9d1533ca,2024-12-12T22:15:07.200000 CVE-2023-33244,0,0,c12fd93177aa67aa81e735fe94f3bd4f28deab2ebff4e4f1593c8d4133ce551b,2024-11-21T08:05:14.777000 CVE-2023-33245,0,0,16c9db6606ed2dfdc13b1f06447f38071397777076e1320f59f76264acfe464f,2025-01-10T22:15:24.807000 -CVE-2023-33246,0,0,d5532be562df3fd306b7e8e00e03116664e064b7c4b6c033c080a3fe3a322965,2024-11-21T08:05:15.150000 +CVE-2023-33246,0,1,09d99c0f1e16aa5466529721e5e2169a873bc99e8ea7f19141e529d815a7baa7,2025-01-23T16:15:36.257000 CVE-2023-33247,0,0,28e3bb5766ab12affc427d3366ffd23fb9c14a844b84b4947c8ef44e558c8843,2025-01-16T16:15:29.437000 CVE-2023-33248,0,0,e14495edb77049f2c89ed0c54ad4447d666394f95d323f14cd348a126ba1d6bb,2025-01-16T16:15:29.630000 CVE-2023-3325,0,0,7efdbd196c90142bd5bd8f5c064614d6c4e96a5dcdb6f4c022ddfa4dae0b97ac,2024-11-21T08:17:01.167000 @@ -228639,7 +228639,7 @@ CVE-2023-37010,0,0,db91e1583a7f4cae891cc62de0b0abd853c64237b0f7f7ed598bfa2ae11ff CVE-2023-37011,0,0,10e4db718a9fd96024e307839707ef8a5501fb4943d8cfe86e523e9692779a34,2025-01-22T15:15:10.683000 CVE-2023-37012,0,0,c9df3caf42232b255846ddb0fc112463b3fa15dade422f6bb3673ba7652ee282,2025-01-22T15:15:10.783000 CVE-2023-37013,0,0,6fbe217b9c9df40775ec262fd152758e20a0de7a6293ed020f995fba3b79f075,2025-01-22T15:15:10.883000 -CVE-2023-37014,0,0,2b54ff439f8b41bf4b2fbbd2be62923d7ba9e49157f05c892b09bab86d315f30,2025-01-22T15:15:10.987000 +CVE-2023-37014,0,1,9ba68854eeaa55275918210ab87201f24858744a2381ff8d22c919791e7bacbe,2025-01-23T15:15:09.280000 CVE-2023-37015,0,0,66eb73469b3ba78b3bab79aeac6ed24ca4d3de4a641b6c180ec19e903039dadd,2025-01-22T15:15:11.100000 CVE-2023-37016,0,0,8868c5ec313c58fd9423256b4570250ee9f085e38d76a3597757ad99b53b6e56,2025-01-22T15:15:11.207000 CVE-2023-37017,0,0,09eaf3964fab7bf3f6f67e22c338e5bc8cc4a602f57d2893183367b5e452ca70,2025-01-22T15:15:11.310000 @@ -228647,25 +228647,25 @@ CVE-2023-37018,0,0,16b59946c2b55bcdd78347ea3af7a79bb463313e51f4116dfefc754730e01 CVE-2023-37019,0,0,edf7b6a2ad715042569c565919367bd3db4e10905fae667123c59f9a1a2cc26f,2025-01-22T15:15:11.510000 CVE-2023-37020,0,0,0f1e5e8c95316ef7094cc0c60501980062de896244304caffad32e9e769abbb4,2025-01-22T15:15:11.613000 CVE-2023-37021,0,0,1a830f672e29163e83b8a89e2600a4e2a6422ba8cde7f2035d8b0ba2ff721a0f,2025-01-22T15:15:11.710000 -CVE-2023-37022,0,0,0b0fd64ce93d8a6c0376111f45a55e6bfe7530be537d4a4470b1846a858a55e8,2025-01-22T15:15:11.817000 +CVE-2023-37022,0,1,aedcce2e3948d9e6b223e349b30f7261b3b7eaa1e064e6b74fdd21c05bf44159,2025-01-23T15:15:09.430000 CVE-2023-37023,0,0,bd9dc31664e38e12575d80c55c419ca71263921e4ea4349c3dd7d6e3d5ec000b,2025-01-22T15:15:11.913000 CVE-2023-37024,0,0,fdde923f545a782296ba940851623c412455317ea848c36c10ce5ccf126d428b,2025-01-21T23:15:09.500000 CVE-2023-37025,0,0,f90abd65c13cfed8867b2c6ee8abcfc09f44a8341f55662a404159db37abc10b,2025-01-21T23:15:09.623000 CVE-2023-37026,0,0,bfbad1a1a324a8114ef90dd361be4401e77b13e26a65b2ffdcdcfa09407fb402,2025-01-21T23:15:09.747000 -CVE-2023-37027,0,0,d3f67ec7f953731df4363655c69e73eed0a829714747d1954505e201abbed021,2025-01-21T23:15:09.880000 -CVE-2023-37028,0,0,313a27f854ccef6848590a3aadc2d006da07fb55d4fc3b7ea6506faf4b1519f2,2025-01-21T23:15:10 +CVE-2023-37027,0,1,91beb5dd340a2ca54c55e25ee0aabe436b43c2179e0c9e4ab7d35730b3f91707,2025-01-23T16:15:32.543000 +CVE-2023-37028,0,1,b17f27dec429070f83800c68afdc54fd88a66eb2c6dd49083c00e6201303a0bc,2025-01-23T16:15:32.740000 CVE-2023-37029,0,0,eaf306630eda3a169db668dda23af1a58638dd19e77f9203531ee1577f506ec6,2025-01-21T23:15:10.117000 CVE-2023-3703,0,0,e793c1538a953443cfd9717dd4892eed9653e7e0e15a19f28233b00c03531ba9,2024-11-21T08:17:52.740000 -CVE-2023-37030,0,0,8ea9015e25e395ef69f2d41585ab615dd79acb738c3ccdfa6aba661d2abad624,2025-01-21T23:15:10.247000 -CVE-2023-37031,0,0,106f5ee9c873f3689420a5aeaa2d7e1796b238ac49a78634e0a65e0d2b3cb3aa,2025-01-21T23:15:10.363000 -CVE-2023-37032,0,0,80ace4103da18e9cace3feaf65daad824cef6637ee11a013b6bed7be6fc3e084,2025-01-21T23:15:10.473000 -CVE-2023-37033,0,0,32028a3e1e8d86131f8f8821f5a01fc99919ce9591be3439b64ccd2ca1c5d5a9,2025-01-21T23:15:10.580000 -CVE-2023-37034,0,0,34ea2153524fa8bb2d0c220606ad810f0556a9a247d6faa25fb623865f8968a4,2025-01-21T23:15:10.703000 +CVE-2023-37030,0,1,2769613fc3db294b5909b55d6a376f481a0d6e0f7442ce4546c6af67d7872eea,2025-01-23T16:15:32.940000 +CVE-2023-37031,0,1,f0d7880be47a0bdc007926f700ea044205aa9928cd41294ef7001b483319f7ee,2025-01-23T16:15:33.127000 +CVE-2023-37032,0,1,8b8922dcd71ecb8b425e1dfc4bf8bbb7a1dbe316cd27ad3ad50498f3f8bf37dd,2025-01-23T16:15:33.330000 +CVE-2023-37033,0,1,4db8ad3f8e6728c3d15836be10f6360497aa1df772993e1c5d4dfd11f3aab46b,2025-01-23T15:15:09.563000 +CVE-2023-37034,0,1,38d182e9f94879cb8c5f7da72a38ac329e0d75c2005fa615a24482ec99de6c38,2025-01-23T15:15:09.733000 CVE-2023-37035,0,0,4b68b44e876ecbdfd20bbceeb836e386c8998e840e614841a322bd28cdb9d09d,2025-01-22T15:15:12.017000 -CVE-2023-37036,0,0,10aca712be1ca99db21ed3c7abe2896d9d73585b83ec10f389501c7e54297d2d,2025-01-21T23:15:10.970000 -CVE-2023-37037,0,0,55d0be8f067165e37af1a64464df4bcf595561c724711afa1728c2effadc1360,2025-01-21T23:15:11.080000 -CVE-2023-37038,0,0,5b2e955f501ea29279d0f6fd257167b7b466219d721bde59e67dd5d4b17fbaaf,2025-01-21T23:15:11.203000 -CVE-2023-37039,0,0,34b5ac70a4a25d70b9a455fa0b2c725862c274dc55e887d7dab9ec085d809fb3,2025-01-22T00:15:15.683000 +CVE-2023-37036,0,1,7b044d6b00bb8c83972eb84000e52bee4a603f4babcdded881506f5f011d4c2d,2025-01-23T15:15:09.900000 +CVE-2023-37037,0,1,9b78ba5003cb4600383ef5e7cfc493eaefd64562755e3bf28cbf306a4cb8255e,2025-01-23T15:15:10.080000 +CVE-2023-37038,0,1,9d0a6382f383319197691e25a01c33a6820c5d57040a89dab40b512e7eb14fd8,2025-01-23T15:15:10.270000 +CVE-2023-37039,0,1,bf7173be26c9eefb93ad0d8cd495290d0105438946c02d85f951912b90a93493,2025-01-23T15:15:10.443000 CVE-2023-3704,0,0,f6e670c2d83474f0123d0af7a87775cbeb898fda49a9a2d86b14ac103d673216,2024-11-21T08:17:52.930000 CVE-2023-37049,0,0,a50fac4cd820db018d62b9574142c1c91225888e27f635ecbb9c39f9da56db63,2024-11-21T08:11:00.767000 CVE-2023-3705,0,0,23dfb658d5461b0c5cf9acca3f38c99662f0d860aba88f7cd6064100050ddcda,2024-11-21T08:17:53.087000 @@ -228987,7 +228987,7 @@ CVE-2023-37446,0,0,be821897afaefff3511ddbe99c1766d2aa99608bc19be9be22c2a6416daa5 CVE-2023-37447,0,0,15bd69699d2b2992e93ae4e14ad90f556204e72caa0bee115e5bfe633e0f527b,2024-11-21T08:11:43.753000 CVE-2023-37448,0,0,68bcc01a6fac47e3f732bd1cef7dc5013483e1f033183d8d9f34d5dcbd19793a,2024-11-21T08:11:43.893000 CVE-2023-3745,0,0,9144ad8cbe174bc79191569e1be593f42fa833e4e8289a4912c02fef5b3192ba,2024-11-21T08:17:58.043000 -CVE-2023-37450,0,0,b54a88393860ba3276b11cedc98cd0929f538029231317c9ce17c9ffd9072a94,2024-11-21T08:11:44.027000 +CVE-2023-37450,0,1,e9defe8fab0bf6ee2a9418b818274f8476bd8d5d1f94e3eabafb123e117d187c,2025-01-23T16:36:38.280000 CVE-2023-37453,0,0,688beea879fba5f45b055ba0ddbbc6400f31db0bf5103255d2b19ec2de0ca61e,2024-11-21T08:11:44.167000 CVE-2023-37454,0,0,2f6e432da2269381eae5b8211281992618e37122fa5a7abc27d22a1db1174552,2024-11-21T08:11:44.337000 CVE-2023-37455,0,0,c6a24bb6c4f50c17800628cdf4a4ece5759bfe34b2075c554fcb668f4e286189,2024-11-21T08:11:44.510000 @@ -229278,7 +229278,7 @@ CVE-2023-37865,0,0,64134b465ab697e571c6cb7636b98cd2154a702a469ddf698698878fad5cf CVE-2023-37866,0,0,ebe734610881757a9ad27cd7534fcf82331277c0c5e906685b5e4273ba36d030,2024-11-21T08:12:21.737000 CVE-2023-37867,0,0,4c0662b3c4bc6744b98da4ecb0c7ffeb9f5a1257d1e2fd34ae534d8238c39b51,2024-11-21T08:12:21.863000 CVE-2023-37868,0,0,d847d135eb88e65157861d10cb91dec755a795dbd8cc47eb4efb24584042a7e4,2024-11-21T08:12:22.013000 -CVE-2023-37869,0,0,eb2d32b8eaed2f7e3949b0920c38fbfa44a647041b2dbf2ef6e5c1b8006a50c5,2024-11-21T08:12:22.147000 +CVE-2023-37869,0,1,ed86d1b28305ff8a8ca31c6f03f8ea6adde8ecb127b77d76ad0d4bc15a878a85,2025-01-23T16:32:34.380000 CVE-2023-3787,0,0,0ad536be2b20ecd03e36b8b321a1b5d3a9fb9dc9b9f0c7fe800d11818f0b7495,2024-11-21T08:18:03.743000 CVE-2023-37870,0,0,b64cbe6408aee78d293cb5a50f6df94451dbd2e4c5f803f731d87d51a8a09eb6,2024-11-21T08:12:22.273000 CVE-2023-37871,0,0,c72813f909ff23edfb528d435b81a6e68e80a8ab11b30ecf3a615a96fe7fbcdc,2024-11-21T08:12:22.410000 @@ -230008,7 +230008,7 @@ CVE-2023-38602,0,0,682ad24eba51407b94feac26792ac332e843b4c22a8ce8e27d6cf9aea82da CVE-2023-38603,0,0,3b1aeb4279e9a72566723129b4591a8f4eb4626ffa5df730d18436c112bf28fe,2024-11-21T08:13:55.240000 CVE-2023-38604,0,0,edd6ccf1f6e5c9d1039ee28e906bff0ecfd51c4f2cf711bacef59881f1c1bc7a,2024-11-21T08:13:55.367000 CVE-2023-38605,0,0,b0abc5c82d50cfe3f60678db440f32ed275f350d9f541ab6dc0f93798cb931ed,2024-11-21T08:13:55.520000 -CVE-2023-38606,0,0,ac6b38a02e019c823352e399530f7d244fa17f41ebd4e20ea62bbf0b51914558,2024-11-21T08:13:55.653000 +CVE-2023-38606,0,1,be2ce8b8e37e0c214c5363009492de6ad601684e5f0181d8984506ce255e7876,2025-01-23T16:36:53.287000 CVE-2023-38607,0,0,ed91d934a8c96da5801c1130f6f03d6ae7447713b74a628f2d24774628ad63d0,2024-11-21T08:13:55.797000 CVE-2023-38608,0,0,b71d5a2655ed04c8dddf465e235f7b0639be5f023e883b9a5ba1758064cc8e3b,2024-11-21T08:13:55.913000 CVE-2023-38609,0,0,6dc79f9d60fa5646ad0e783262026af7df43cd2e155e3927d10dda9c9455089f,2024-11-21T08:13:56.030000 @@ -230472,8 +230472,8 @@ CVE-2023-39237,0,0,c38dd38297acae978a4fbc21a6d8cdd08e18fccca67e53047f49f05d254da CVE-2023-39238,0,0,b802c0a80f3682c7005e88c507ed597f462157b1314fc86d80655239553eff8c,2024-11-21T08:14:58.463000 CVE-2023-39239,0,0,d87459b1704dc09147b20edf95ff97d87b6724458b9b178bddcb4e371309735e,2024-11-21T08:14:58.627000 CVE-2023-39240,0,0,7bc2729c54501df38fcbf34f3e1f38ae6970ac611ba687603504e4715a0eaa0a,2024-11-21T08:14:58.760000 -CVE-2023-39244,0,0,39c5cc58768d0ca4b40c6b34fe1bc9ad5c547d4c885650f2f96f3107e63fd7fe,2024-11-21T08:14:58.897000 -CVE-2023-39245,0,0,4b376ef831da179d8fd71a945b874f8322e78d7dcb7acf8e049080f43ac282d7,2024-11-21T08:14:59.030000 +CVE-2023-39244,0,1,cf78da9f9b68b94f20085537203d8c8f32dfbb9b532c8b2fd1a233413ab55b50,2025-01-23T16:57:46.483000 +CVE-2023-39245,0,1,fe93ac4e9711bdfcccec8607c80aaef7402eecf4c5a5da80b820b0b0d1a3ffb8,2025-01-23T16:57:31.067000 CVE-2023-39246,0,0,999095e2a7899047fbef5d62e429ea2118f46513216302df69b50fbb79ac03d3,2024-11-21T08:14:59.150000 CVE-2023-39248,0,0,2261d3aceba107a05e3157817d4791f5e811793dd1be5725e107169848b46460,2024-11-21T08:14:59.283000 CVE-2023-39249,0,0,5cb4f9a308b872d5294891b14f865c7d66da914c3730621a97d3cb9323632445,2024-11-21T08:14:59.413000 @@ -233389,7 +233389,7 @@ CVE-2023-42913,0,0,5818c393b5d92a4eb66f2c6d03629fd68ca311b60c9be586a1369817c61c6 CVE-2023-42914,0,0,fbb02939bd4a080ccbbaa419cfd9c0443a345ff12dacb4e05171bdc8d52fbae4,2024-11-21T08:23:30.140000 CVE-2023-42915,0,0,a491c801967ea665e6a1e7894d12e52fc0e3bc74c17c4ea7b2e5a98e97053fd8,2024-02-14T03:15:13.210000 CVE-2023-42916,0,0,c4f2d6fad88b2ab94029c8171644207bc7bb425f096dc8185d78b52adf2970af,2024-11-29T15:03:51.967000 -CVE-2023-42917,0,0,839eadd45880760ae51e8540583b7112aaaa67a9dfd11ac955bea10e62b8cceb,2024-11-21T08:23:30.587000 +CVE-2023-42917,0,1,18178b24ce5a1ec8949f2c585a5be9d98aa4c54d0bbf65aa2ddaf7165e44f389,2025-01-23T16:37:02.693000 CVE-2023-42918,0,0,e66ebe9c2bed61829c0393c11e08cd7bec391609452471902134a42b7654cfd3,2024-12-09T21:28:58.763000 CVE-2023-42919,0,0,0c3c70bb5f2863412b2b2dd67082465102a85fe428dafa015ca9d7e89c5e148b,2024-11-21T08:23:30.927000 CVE-2023-4292,0,0,d9de54c2172d4a0bd9014f748290f40f3a2200aa50a679e4a1ee0d613f997768,2024-11-21T08:34:47.827000 @@ -235857,7 +235857,7 @@ CVE-2023-46596,0,0,7ec13b4f7be1ede1ad1e419c50cf0344c21facf353275d7d3713fa50415e6 CVE-2023-46601,0,0,739bb1365ee90282b5f1d046dd503ea5eaf0a4d64f7dd95529af7b2550849adf,2024-11-21T08:28:52.213000 CVE-2023-46602,0,0,f59406848825161cde147d1e590fffa5776803a932b927e1ea2bcc795ebef0ce,2024-11-21T08:28:52.387000 CVE-2023-46603,0,0,c8e4a28d8170f5924386c421f801ce28ae08b9f2a2675bd0a6d3ffc0105d045d,2024-11-21T08:28:52.600000 -CVE-2023-46604,0,0,94d70ad91b630a20bc50ca5fabf877ea6e71773ec87e106d5153b1b4609a1b14,2024-11-21T08:28:52.810000 +CVE-2023-46604,0,1,92ebea9392f7eb34b0ab647abf4ec880cb77349ad273b6d30d6438efd99b07a5,2025-01-23T16:16:49.210000 CVE-2023-46605,0,0,4a6ee379179e5ddde476c4cd2e5cf87ae26e9247bc93c31f97d0121557933169,2025-01-02T12:15:11.993000 CVE-2023-46606,0,0,265ae37bfc17238e9489142f1ad99f8e75a4c66c897be6a5b938e78e3e1232a6,2025-01-02T12:15:12.133000 CVE-2023-46607,0,0,990a9fdbb3f36ed589080fc6bd0f390c0325ee9e42ee2784d6aa92e4c57b0011,2025-01-02T12:15:12.283000 @@ -238367,7 +238367,7 @@ CVE-2023-49923,0,0,301e30144b070008a0820dcb37f76bbe9c2a9c5329b99e0aa05b63c7ba551 CVE-2023-49926,0,0,80d36f300825a86641a4f98f95b0630a84bc990833a0aa412a21dcbe2b60d606,2024-11-21T08:34:00.940000 CVE-2023-49927,0,0,82081beee4061cffd34ef78d24cb99766202a0680d9634397ead28fc1aa5791e,2024-11-21T08:34:01.090000 CVE-2023-49928,0,0,82ea9a4a554f64be0f803001236700d4005765edb3e3d68735cc84f142a81ad7,2024-11-21T08:34:01.323000 -CVE-2023-4993,0,0,309d6202c463def86099352ff84b08d0d9a2c729d7aa0095585fb3e9281f82be,2024-11-21T08:36:25.267000 +CVE-2023-4993,0,1,40ebec6aed86d9d515d288696fe965b0131e18d5e88e1a14ed385b3b26856559,2025-01-23T16:56:18.263000 CVE-2023-49930,0,0,f8954034376f6216b38a96176e859c032e442b76c18680fe544fc7df94874fd5,2024-11-21T08:34:01.560000 CVE-2023-49931,0,0,5fd905284e515d1bb698d21351509ba27d9bd785e8f44faeef421143c061603d,2024-11-21T08:34:01.703000 CVE-2023-49932,0,0,c369ed9f4cc22499baed875ad8c28e093319b2af5a0da69518ea1c5dbe54cfcd,2024-11-21T08:34:01.910000 @@ -239384,7 +239384,7 @@ CVE-2023-51546,0,0,c3363cc5c11b420e8e241cdca21ae8851cb845364c3795458f7503a16e58c CVE-2023-51547,0,0,82fa3b0a5768040d5c52e5a3122070ffd4f69c5843cffe0977007494508637e2,2024-11-21T08:38:21.337000 CVE-2023-51548,0,0,76d6dc67763811e45cfaf0f1e5637cf33fd7f4b44779bba1a38a5b9f0e8a810d,2024-11-21T08:38:21.467000 CVE-2023-51549,0,0,c2eb4825987c426b1eb75ef665a6b87d873d9ce1aa54ba29de2c6e0862689a03,2024-11-21T08:38:21.593000 -CVE-2023-5155,0,0,8d615c034efd4cbb8f460e6c735e8cc61953059363dde4fa7a1ab676d2c3e173,2024-11-21T08:41:10.720000 +CVE-2023-5155,0,1,979eb4c2df967c1d2b7368e14d0525cb6f7cbbd255e88c264a3f0544783ea157,2025-01-23T16:56:09.100000 CVE-2023-51550,0,0,364442d85167b3eb9184fc0ab397893cf05c8859c172df21838f99a239e849c6,2024-11-21T08:38:21.737000 CVE-2023-51551,0,0,11d106fafd94caa57d7d4801f0d3b732094619b6d79eff796855b01db67379cd,2024-11-21T08:38:21.877000 CVE-2023-51552,0,0,b09f313c5d704dd2acb98ca55afdc3257c79632529cee0c2c852a01b5c8dc57f,2024-11-21T08:38:22.010000 @@ -241484,13 +241484,13 @@ CVE-2023-6245,0,0,86ad3c799cca921eea11c9559eae0401f064a4ebe34dfdc5bef5d093c5e44e CVE-2023-6246,0,0,95971c2d561c34e86e5f6f8d8778f25efdd22a29156440c4c1080fae60ebb497,2024-11-21T08:43:27.197000 CVE-2023-6247,0,0,2e8f45b275b1e8e03e30fbc6dd95842afc6b75dfe8d1ccbf5a63f250b926d164,2024-11-21T08:43:27.387000 CVE-2023-6248,0,0,630a6f3e786af8ac41ff0c9fa76f2935f608ca2bdf50109f3f677f771ca26a47,2024-11-21T08:43:27.570000 -CVE-2023-6249,0,0,81573abca60d2d9edf53f60c00c1d6527572254b677444b0836fced7d3e370ff,2024-11-21T08:43:27.700000 +CVE-2023-6249,0,1,760cd62841ad562f8e194047026b5955762e0aaaf1e3a851c3bc241f4d232501,2025-01-23T16:49:26.293000 CVE-2023-6250,0,0,4962dc5ddffddf64ca8b141605fe76ccedfdb4ea433525eccf0c7f5b6eb0804a,2024-11-21T08:43:27.830000 CVE-2023-6251,0,0,82c22d8f76e9f6812ec368cfc9cf4eafc603017e0ee8b72a9cffd80075778ac6,2024-11-21T08:43:27.950000 CVE-2023-6252,0,0,8948600e2f4a1347fc29cb1041fbde4813c3c176fa157afa68f36f546c7ecd1e,2024-11-21T08:43:28.110000 CVE-2023-6253,0,0,ce49faed8d1d07d464c51b43672def1a4fa71f8aec500ad1a1b144097250630b,2024-11-21T08:43:28.247000 CVE-2023-6254,0,0,3754c05112e94afab171d0fbae09e8abb4107d9f6b25d69a06fd88522a42f89d,2024-11-21T08:43:28.390000 -CVE-2023-6255,0,0,4cf913996f5f3ca0bc846b0d8d682f54f4bb94ee937b583b56d1732bc36cdfd5,2024-11-21T08:43:28.530000 +CVE-2023-6255,0,1,16caec1d31bf689e1dcb41be434a3ec144d7820c88c0246074a9546f99413989,2025-01-23T16:55:52.197000 CVE-2023-6257,0,0,6217aec7abacf010ade90fc250028d441f15ee82748809d831e771b2506c6a00,2024-11-21T08:43:28.650000 CVE-2023-6258,0,0,d90e949b1270045c0f92fab8f8f15ca6d8dee6ba9427714bd7b6d440c16ee748,2024-11-21T08:43:28.763000 CVE-2023-6259,0,0,ca0542a22991ad8ecae6dce382df1b34849e13c4d5a9d4f3600eee0667852cd9,2024-11-21T08:43:28.897000 @@ -242223,7 +242223,7 @@ CVE-2023-7077,0,0,20a538ff690ee7669a6b7becf4d527d8c10e60b9150e28ffac2a747a00df33 CVE-2023-7078,0,0,f7d7fe7655b5566666f340379eb2eacc725fc271aad9069efc986b62c2b4df19,2024-11-21T08:45:12.253000 CVE-2023-7079,0,0,46c393c570993abb391f057750b5f3d862f3a7268c200e5fdd089347f6f96ee5,2024-11-21T08:45:12.460000 CVE-2023-7080,0,0,0dedea4579e0ebdb20487dc410d73c81f344d084a8525a398527f331a9f27e4d,2024-11-21T08:45:12.610000 -CVE-2023-7081,0,0,b600ff9a2c56dbcb89c1f0c49e954b9f01d5b7f7b605f95322c5b3bc4296575a,2024-11-21T08:45:12.757000 +CVE-2023-7081,0,1,d9a9a3089980eaa9dffcd70fa3d94bdc5f0566169992f289bb367cbba18ba5e3,2025-01-23T16:53:04.707000 CVE-2023-7082,0,0,01da1b16e99cb894b19b28e654f0eb0d1f946ad3cc9cf73b506a5d550a9446db,2024-11-21T08:45:12.920000 CVE-2023-7083,0,0,c5aa53dbff112a3d086d0b26f297d981e1f6ee6c887d1ac2941e9a37a179680a,2024-11-21T08:45:13.047000 CVE-2023-7084,0,0,d9889df429199caea86387e661e3ff9a19490ddaa4c78a76e3ed6d89055dc2e5,2024-11-21T08:45:13.180000 @@ -242965,7 +242965,7 @@ CVE-2024-0618,0,0,c8d16847fce9f2cb03aec797634d2ee65c6d6118d484ea1e5f62d29664b2ea CVE-2024-0619,0,0,4ede4c2ce234de077beb2d58c2dd52c1638a5586c5e1ad672034f0e43cb50038,2024-11-21T08:47:00.873000 CVE-2024-0620,0,0,355a1e00d61f9961beb511b92f493f468e3689d021c591b9b0d4e0b327edcc47,2024-11-21T08:47:01.020000 CVE-2024-0621,0,0,83f0b75f1444310875240348160756eda3d14c967d83395652fdca0e3f1d1cf9,2024-11-21T08:47:01.137000 -CVE-2024-0622,0,0,ccf3faa5d8494ce4ec47d7918e975e1760c2f1cb742011599a85e38857b48780,2024-11-21T08:47:01.293000 +CVE-2024-0622,0,1,bef0e087ddfd4a0233efb4c38eaf0e60aea1ba239bed5e5e8e26c084ac2ea3e3,2025-01-23T16:52:07.417000 CVE-2024-0623,0,0,dd5f29435e15338dc985fb5551595a6e34d69131f116d209222d2e5d483144bc,2024-11-21T08:47:01.423000 CVE-2024-0624,0,0,09352035dee59fe02f2fbab48ef8ce9be3c361adfb9ff0690caac0c5912794a6,2024-11-21T08:47:01.550000 CVE-2024-0625,0,0,0f09f7c276d34454abd591658f545becb0e46f1af09747d32b03759c48232183,2024-11-21T08:47:01.680000 @@ -243773,7 +243773,7 @@ CVE-2024-10535,0,0,496e3e4073abe2adad8b54d5ee745431f58893a256de2e44bb2f056357efc CVE-2024-10536,0,0,a823233131559d6dd2b341d836be9135c9879264a324c21b5db4b4eee461a226,2025-01-07T06:15:13.920000 CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50407,2024-11-23T04:15:07.663000 CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000 -CVE-2024-10539,1,1,9a4f67ef017614f89188e01bf3ed02ae77558734c83485471ada19d4c77299b6,2025-01-23T14:15:25.097000 +CVE-2024-10539,0,0,9a4f67ef017614f89188e01bf3ed02ae77558734c83485471ada19d4c77299b6,2025-01-23T14:15:25.097000 CVE-2024-1054,0,0,94b651608db3d30d3daebf6e295a99b6cb748f5b340c93c3e226c28c09fa8fa8,2024-11-21T08:49:41.570000 CVE-2024-10540,0,0,45dc62d2a6882ed78eb940dad2c8292ca30098100a55bb2bb2d5e31ef03fa351,2024-11-04T13:18:27.017000 CVE-2024-10541,0,0,17e645860588c5290ea1de09ebbe30e3ee704356357c444bb1176f1b7d6de69a,2025-01-07T21:15:11.490000 @@ -244036,6 +244036,7 @@ CVE-2024-10841,0,0,8edc5f4a34195255877236191bce2bc34566b30a238e2312976868449be76 CVE-2024-10842,0,0,6a1bf2d708af31633adcaf31229d3f756d0a973aee6bc08d09ef2355ecb0b242,2024-11-06T22:43:19.327000 CVE-2024-10844,0,0,f5f4e0d5b5f81450d4b277cd5f34ac79ece27a20b2ef20dabc17527d2440f7d7,2024-11-06T22:38:13.800000 CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d49362ab,2024-11-06T22:38:03.347000 +CVE-2024-10846,1,1,50f0d1e1c10c36e5ba86ad33d7053f6a353b8e049a40315f22cdde598cf088e3,2025-01-23T16:15:33.533000 CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000 CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000 CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000 @@ -244053,7 +244054,7 @@ CVE-2024-10861,0,0,a0a9ed450f8163c1435b46341b966a17dde352d3f4e975547d6d20959f881 CVE-2024-10862,0,0,8d0469751c4a45e9a11849af14ded70548f7b3b67c046bcdbd1a895c0f05bb5b,2025-01-17T14:53:51.413000 CVE-2024-10863,0,0,b5b227485fbe2ef5029ee042bb93b4e86d4e47bdafc29c909ac7a75d6e0d47a4,2024-11-22T16:15:21.257000 CVE-2024-10866,0,0,13e110d5a19cfea89d073cb1ad5330e517869c323a871281199fd8e329b3e697,2025-01-07T08:15:23.060000 -CVE-2024-10868,0,0,ed5c74cd38793a3786fe1a207774b7d893f356dc5b7738c219f7d841c4557dd6,2024-11-23T04:15:07.930000 +CVE-2024-10868,0,1,596abebd416284f3193ea1ca5b889802ac9c927bb78e6530bbcb8067de4bbeb3,2025-01-23T16:58:10.220000 CVE-2024-10869,0,0,24e83078acb589a8bf17812dbc3140ca72ecc1dc51859fe588758bfcf79e45ac,2024-11-23T04:15:08.073000 CVE-2024-1087,0,0,9751a2fe52b8f14e0fc1c9d86ee656c42465ba61ef03201895b6c1868f5679fd,2024-01-31T13:15:11.030000 CVE-2024-10871,0,0,084eac40a4a6cacbe5734b1f69d4f9106b9a98be24a8fb3abdceb60b2ea6a280,2024-11-12T13:56:24.513000 @@ -244347,7 +244348,7 @@ CVE-2024-11217,0,0,cb24a1bdb987ee2ebd888113abdd2cecfb9cb2fe9a3dca74044179030beb6 CVE-2024-11218,0,0,661bb1bb499a94a43782169452a6410d4d7bdeb3a8a79402f9cf8376eefb47c8,2025-01-22T05:15:08.903000 CVE-2024-11219,0,0,e0425cf1f1ca40cc6d95ef04e03e17b5776d09d72a88fcf5abbcb2ac00f59570,2024-11-27T06:15:18.110000 CVE-2024-1122,0,0,4a647161edb6d6dbac08921722ee9f0f3f3f764af2a44d6cd56ac17a7d3d92e5,2024-11-21T08:49:50.943000 -CVE-2024-11220,0,0,5638e4c56cecb636c7b9e9af730cca60f5085a7f9cf6e6a192a2c97c73abab40,2024-12-06T18:15:22.407000 +CVE-2024-11220,0,1,2bacf5e02725323b27ba9cab9bc5f331ae5ef28bd238022ab9e1ae19b09e4fbc,2025-01-23T16:54:24.970000 CVE-2024-11223,0,0,d75d95a61775726397d8c97460b74fd5ed2ab0335df998c9281fea9bc6ff2b7b,2024-12-30T18:15:08.090000 CVE-2024-11224,0,0,2cdc35f700571377d770dfe6d7a5c097f3055ab07c10acabf750a1174f4e07dd,2024-11-19T21:57:32.967000 CVE-2024-11225,0,0,49e01dccad3ee4a4adc9a23405324c84c815ee3ae2fa63f77a3607812451f386,2024-11-22T06:15:19.283000 @@ -246347,7 +246348,7 @@ CVE-2024-1576,0,0,c1d68cb2b92dbaf973690c9a7b22d2558c647dd4d634038677ac030405ddd2 CVE-2024-1577,0,0,f1190dd090659696c3c065cc9b0ef534f3bd69cbaa6694420c1e88d656e27cbf,2024-11-21T08:50:52.380000 CVE-2024-1578,0,0,e6377a74619b7ca5b0d3b25fd1eeaaa0aa571f95ff00be163cf6abd495390b9f,2024-09-20T13:53:31.657000 CVE-2024-1579,0,0,9240f1b1902f0768b99712f7029a7e0cff6f424284f1f413cc0f572b009c1069,2024-11-21T08:50:52.770000 -CVE-2024-1580,0,0,0b4f9fdf5dc6625678202f7ea93e9a601c2ba5722d3e63b136a5be7c80f1335e,2024-11-21T08:50:52.910000 +CVE-2024-1580,0,1,0f33758b43b5a03774570c36adf04f8da3d37799aed95467272891934890d3ae,2025-01-23T16:48:27.027000 CVE-2024-1582,0,0,1d3f6cf664b0e4ffb3418f481e81750b3eedfc59406613775b89e82b548b0565,2024-11-21T08:50:53.060000 CVE-2024-1584,0,0,cfafdb4f5ffc1319288c510c9224a8cb8c2cc5f346f7b847228043c1ff209e06,2024-11-21T08:50:53.187000 CVE-2024-1585,0,0,4c7c5f46a2e35c5754e0e91b697b9be95f6ee29e1a3493ffc40f4f9e09d27d32,2024-11-21T08:50:53.310000 @@ -246736,11 +246737,11 @@ CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f2 CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000 CVE-2024-1994,0,0,2799a8fba4da98163d1c8a4201d87bd63ba559669844539136acb52787911a32,2024-11-21T08:51:45.320000 CVE-2024-1995,0,0,38215861a84849dad958209fc4dea9b1a9198ba851a0b7084a63fc82f826cda6,2024-11-21T08:51:45.460000 -CVE-2024-1996,0,0,f19b0602e1c7fbb02b2cdaf6881a06c0576c8ff54ed73d6f981bfeee8fecbfd8,2024-11-21T08:51:45.583000 -CVE-2024-1997,0,0,da90e7138da686423120f2f79df9aef03844abe779b19f1a9602422ed39c6caf,2024-11-21T08:51:45.720000 +CVE-2024-1996,0,1,4330d857271daed3c2e57ea796ec447c0ae6136de9a7caf35a881743715c08cd,2025-01-23T16:34:43.927000 +CVE-2024-1997,0,1,47a30b2bac28244b96b03fc6d5bcbf05fa3a3608708a8a5dd90c6d0f91f4d40e,2025-01-23T16:35:44.507000 CVE-2024-1998,0,0,4588679fabfec7cfc1601533f6b3d06871ae6e9d9962008d18bd8e3dcde35006,2024-03-14T18:15:07.003000 CVE-2024-1999,0,0,f93b3f77639aebdda6eb646386c599e26c39a3eb14c41d954259a5b5be4e75cb,2024-11-21T08:51:45.863000 -CVE-2024-2000,0,0,536bb0fce955017112913fdeb6ea4c2d4553ae7b2b2756b6fcf30fbb0fb6eb79,2024-11-21T09:08:46.863000 +CVE-2024-2000,0,1,131a5b834ad6429b4444b9587f55da12d55e7ba3458f3d2854b921a3dd00f3ce,2025-01-23T16:34:23.897000 CVE-2024-20001,0,0,d81da864138aef2e916a535e1176ba42648319249c46618e65ca5de06493ba5c,2024-11-21T08:51:45.983000 CVE-2024-20002,0,0,55a994447631f5951a6e1275f63c34e7fa418e413ae7221c0028baa239663e52,2024-11-21T08:51:46.143000 CVE-2024-20003,0,0,79362f7e34cccc0afd3abe9f4ba7baa825f3eb45bc504c607750ca92392388fb,2024-11-21T08:51:46.293000 @@ -248165,7 +248166,7 @@ CVE-2024-21586,0,0,b2514751994972c3d261ad7ec6bd416f3d5a6e727cf184039fc01a5f179ae CVE-2024-21587,0,0,12ceab6a8617bba884c3945746bd38a150022a8ae92c14a7557faa5ca62c0a6a,2024-11-21T08:54:40.027000 CVE-2024-21589,0,0,560c0b598f44df34a42456a042b42a8f6628db58cb45afae50413837290c425f,2024-11-21T08:54:40.180000 CVE-2024-2159,0,0,8e46002478f5bef6fada5f3d931932d4001932442e5a9dd314099fb8485f027c,2024-11-21T09:09:09.353000 -CVE-2024-21590,0,0,24c58e08692a631c6509e6eb84ab10993a2ceca6e51d803c1fd339f13de08350,2024-11-21T08:54:40.313000 +CVE-2024-21590,0,1,69062ae36688bbe2eb13db3fb426194b906bb86e9e8d720bd7168adc27c37cf1,2025-01-23T15:29:31.793000 CVE-2024-21591,0,0,ccc9721aa5c6f5e2d0b4595f4c89a71e3ccc07419e633f9629132dda867697f9,2024-11-21T08:54:40.447000 CVE-2024-21593,0,0,519e081bf3db8f7fe20f3069d4f6d28c5d67ef4c84e058b23cd01888a7772c94,2024-11-21T08:54:40.607000 CVE-2024-21594,0,0,96f7ffccc5e1b95b526e0770e66b0a10aca6419927605427f2f6947a28f56f72,2024-11-21T08:54:40.743000 @@ -248434,7 +248435,7 @@ CVE-2024-21865,0,0,583fd7dd0aa12097e737a2985a06d8c2e10647eb7bd05007cef306e8670a0 CVE-2024-21866,0,0,877a22cac4a3ed4e6886e06de6323d143f73ef29c73f7754337e7d90afe1e6da,2024-11-21T08:55:08.893000 CVE-2024-21869,0,0,e37c8a4889f9eaef99aadb2f6512dc2821c59f5e354397dfc83a1050590fa73d,2024-11-21T08:55:09.050000 CVE-2024-2187,0,0,1103ee7372c5ea9ac3f366f5b222f200117c18c2fbd61f44534e2c7446ae9f16,2025-01-09T17:06:43.647000 -CVE-2024-21870,0,0,badf69f6043aace3f7b6a967da51f0af6e837826e42326a804de4aa7dc210c5b,2024-11-21T08:55:09.200000 +CVE-2024-21870,0,1,7b9cedc215333c3dd6e9b18311aca456933a81ea12d1eccc76775227a9ccd253,2025-01-23T16:56:30.133000 CVE-2024-21871,0,0,f8a7e9cf5225fbb0e781f6412f0aa5db749ca95cdb4723dd70ba04d75dc30359,2024-09-16T18:03:16.707000 CVE-2024-21872,0,0,4b0c6cee8b302b028ef21a0a92094f117e39cced90a58681537b45b6634a2770,2024-11-21T08:55:09.673000 CVE-2024-21875,0,0,46cd0b6a9400a177f86c656583d91676d62a1113838b736b7422239e191b830d,2024-11-21T08:55:09.860000 @@ -248678,7 +248679,7 @@ CVE-2024-22169,0,0,de568c5187e4439e032733baf97cd011aa44d0d4c7cfa131546dfba15b01a CVE-2024-2217,0,0,5dc223c9d9a2136491ccaacd0585d1ef948a98ff41661c78f7f5174ccdac6370,2024-11-21T09:09:16.820000 CVE-2024-22170,0,0,8e1ce414c6fe1076420bc567a162406861f0abdd3d9c27cefa227739efb97e1a,2024-09-30T12:45:57.823000 CVE-2024-22177,0,0,763cc0fe9d4952aa804847af201c74da8244bc525a37db0e20ac1d192cc9880a,2025-01-02T19:12:43.827000 -CVE-2024-22178,0,0,e765ceb58033517f1480b1fa39a7e3f034f044ee250041307adff844758847ad,2024-11-21T08:55:43.953000 +CVE-2024-22178,0,1,927af9a01f624b083cafed023c6818824e5a1ef8df6c48ecb2d2bb95bf7671aa,2025-01-23T16:57:16.747000 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 CVE-2024-22180,0,0,ba5889c40f761c602409812708cfd0c01c2eb40e2d7677b7f8968864ba82c69b,2024-11-21T08:55:44.260000 @@ -248863,7 +248864,7 @@ CVE-2024-22365,0,0,f6559aadb4f641ffb3dbe70bcd8cbadf0fb096bff38d1a8ddc63de3ba072a CVE-2024-22366,0,0,c9d4eac273888b8ed913f9e915823a299a656b6afa80a9997d2f8e6593e55a53,2024-11-21T08:56:07.920000 CVE-2024-22368,0,0,42f1e51c584ac67c724cd77ff67e48a5ec43d1dc3a71a029cf38e486d8136cd2,2024-11-21T08:56:08.047000 CVE-2024-22369,0,0,58e8ca1bec283235a25cd95d49da2325b0c64624136b4dcc1cb8c11767541a1a,2024-11-21T08:56:08.217000 -CVE-2024-2237,0,0,80c358d46e7017fdc398a7a0b9fbfa5a366d0684439140a58c308e0e749efeee,2024-11-21T09:09:19.547000 +CVE-2024-2237,0,1,10342a3bcedc4ff39999af4eb389909f61f2ebcb0c10fb4672d2ed188d1b8434,2025-01-23T16:35:26.147000 CVE-2024-22370,0,0,154c2c04f020f54de37bfc5e89569563afcd67d6a9da771051468d73c892d8f9,2024-11-21T08:56:08.407000 CVE-2024-22371,0,0,d0e92b003134c0fed730aae003a7b80fa3bc3f32abee1c84a03ebdae53062d2f,2024-11-21T08:56:08.540000 CVE-2024-22372,0,0,9b500ad543f8da332376c8a3c2cc4d708605f436b743b1fffa6775a0b87070f1,2024-11-21T08:56:08.670000 @@ -248873,7 +248874,7 @@ CVE-2024-22376,0,0,0b1d42b19b9ab056fcf9859a710f755e5c4d57ddfb85f698630e9d1f09dc1 CVE-2024-22377,0,0,2bff56888b73307167108c33c72a8c0fb3a6df49d0f611e0fbd542aa18073a97,2024-11-21T08:56:09.157000 CVE-2024-22378,0,0,ad12dccf80ea67c99d6dab57851f8b4ece24088a1b6d6de4acfe648e887ffdac,2024-08-14T17:49:14.177000 CVE-2024-22379,0,0,3d7dbb444a66aef27ebc7c2d53ef8a8c7cbed341f2d516396d40c20e87ea4ac3,2024-11-21T08:56:09.467000 -CVE-2024-2238,0,0,c07698bcfebc916aa38b584829f4048b8820e1730057003ee6449d5849a8af15,2024-11-21T09:09:19.677000 +CVE-2024-2238,0,1,01f88d2ba769d26a929ee59e06ebef9224ab201e0aa64603f42fae3141b43eb2,2025-01-23T16:34:00.867000 CVE-2024-22380,0,0,5037a13d35a4db38c0ac5a98edb894c7f12b971a4c8ffcb2b7e1f0cfd1229996,2024-11-21T08:56:09.603000 CVE-2024-22382,0,0,33e56b9a14e5953744774c56c2afbe73291445f87f7c93152f6213f3a5cbbc20,2024-11-21T08:56:09.747000 CVE-2024-22383,0,0,8514514a74b7723238bc430917d3b0b6df07ceba43c72d1f9b0105b8648fd273,2024-11-21T08:56:09.863000 @@ -248883,7 +248884,7 @@ CVE-2024-22386,0,0,c08800b1d36204b2f48b8362f042b9850512686257a83b7840381225a6c8c CVE-2024-22387,0,0,08eddf04066c28a3302d6a244f03a899231279035ef5b84c429fc20f7bfcb644,2024-11-21T08:56:10.407000 CVE-2024-22388,0,0,0a4423c4afcb37c99a3b6b0ef906ca236e2cdaf6a78861a54c0aef03362bec7f,2024-11-21T08:56:10.547000 CVE-2024-22389,0,0,4966e52dd7ce8c04e8f43c87f120b3278a326375218e288dd7dbd7da4cacbb94,2024-11-21T08:56:10.717000 -CVE-2024-2239,0,0,5bfa8d187b9fcc827e02ec0adc07b90e06539ac01574b8022ac49f59c7cbf007,2024-11-21T09:09:19.817000 +CVE-2024-2239,0,1,5a7de56b46399cefd4d1704e58435f9b06b1b4b25f3a0e1cbba9562eafa91ca6,2025-01-23T16:35:08.010000 CVE-2024-22390,0,0,ce5d3d381f54505e0b8006b455f1f7b21f5167c3563cd40ef3a04a5c9787da18,2024-11-21T08:56:10.857000 CVE-2024-22391,0,0,613921831a91bcce15248f83a80e873279b6660a96fbc962ca6ad54492d854fd,2024-11-21T08:56:11.013000 CVE-2024-22393,0,0,02863de2685d04ea02e0a45f1f9aac851c77eca911763481fedc267806c70c86,2024-11-21T08:56:11.150000 @@ -248920,8 +248921,8 @@ CVE-2024-22421,0,0,68ad10dfed72f3aca3738f68707fe94c502fe15e2d9ab9159832423762e11 CVE-2024-22422,0,0,370a9051f3f2c4021b8468e74ec0889a82957024baf94c98a6d7fbfbc647291b,2024-11-21T08:56:15.487000 CVE-2024-22423,0,0,f2bc332fbb34f01354ddb3a030dc8494d1132800add16c03aaff0faf27894e1e,2024-11-21T08:56:15.637000 CVE-2024-22424,0,0,4b7731f367a9920bfa6d63196c7586a414c888a9627b4f71343b10d0c004745b,2024-11-21T08:56:15.780000 -CVE-2024-22425,0,0,9f079f6f2c61b961f7a249c1a9c126947b51d82c8e2565ec5cd774282fcdfcb9,2024-11-21T08:56:15.960000 -CVE-2024-22426,0,0,c8219824bd443bad9b8c93ebbfa5fb488d4e55c8c8c3d69f9db6f30f07c62198,2024-11-21T08:56:16.120000 +CVE-2024-22425,0,1,a0b995a155ecd51d340a6103a0e4a3382cbd366ea3ab720f068b304cc436009b,2025-01-23T16:51:37.177000 +CVE-2024-22426,0,1,be3b3fc731ba3847ca8704dd6340da9558e51859e5b7009ac88fbb11c3f7944c,2025-01-23T16:50:56.417000 CVE-2024-22428,0,0,97ba898ef03ad044243eee9a2a9f3bf000186b10e7cf1418a4f66ab0f1d4a391,2024-11-21T08:56:16.260000 CVE-2024-22429,0,0,6ad2f8dc5d40032c5a1e997acf2f56cb7ed858b91fddf1268e6e136032103c12,2024-11-21T08:56:16.417000 CVE-2024-2243,0,0,4a950216376586fd89744a66774761bf5d4c11f51d4189b3526d8eb951a7fd99,2024-11-21T09:09:20.247000 @@ -250225,16 +250226,16 @@ CVE-2024-24403,0,0,9dfd8d2383a51e07b61f370007222fc6207ac481d048277e8f500a7d8b0ad CVE-2024-24407,0,0,9854b2123d3cb61fbea945bc5c28ab7e9c5e67ad8f91d9c6262853438f2d5551,2024-11-21T08:59:15.243000 CVE-2024-24409,0,0,2b5b94cb6623257f634c08bd886ff97512dff9af22f16e80107479043a99a530,2024-11-13T20:35:44.963000 CVE-2024-2441,0,0,f3d49cbdbc9b254da53d38040e54aa2ae2b37be0aa445ff971a41eaad48ea6ab,2024-11-21T09:09:45.583000 -CVE-2024-24416,0,0,a4b9d452bed56e9c31f4fcdc1c4b08ae683d31abef5da47d6e5c48b3b959a0d3,2025-01-21T23:15:11.543000 -CVE-2024-24417,0,0,b8d39862294a498be5c54f0e68d656a00e1c0fa5dc0394c5d998914bc29e4711,2025-01-21T23:15:11.663000 -CVE-2024-24418,0,0,7052cc4b86441c40f4514311daa1ace5da4117cf0620ae7f6d6c4c8d1e7a6373,2025-01-21T23:15:11.787000 -CVE-2024-24419,0,0,56b7ce4a3bef5fda8dfeb2e34b9d584d4b70a60c0857eec8d71835e85458c4bb,2025-01-21T23:15:11.910000 +CVE-2024-24416,0,1,f538a20094531fcfbe31f623604b2814fcfa624f150915f1598af991fc70c161,2025-01-23T16:15:33.727000 +CVE-2024-24417,0,1,1f32e5d501ba41c9b9d173bac403f0c4182127985fb34d237a8797ffaa0675de,2025-01-23T16:15:33.943000 +CVE-2024-24418,0,1,03880a52b82975db2a34d1c1a0802a9333cec8c11843e8c4c0523a11013173bf,2025-01-23T16:15:34.177000 +CVE-2024-24419,0,1,131573cb89a38306820e6739c68fa20052738c86453de738a680778e9b8a2521,2025-01-23T16:15:34.427000 CVE-2024-2442,0,0,253b87e62399d3a6af245d178e21fd710ca2545ac6e1dfd17779d2dcf3253a0c,2024-11-21T09:09:45.697000 -CVE-2024-24420,0,0,2e903b38db00284f9b97f673c7abdc15bea865c429b0508e86e1768deb9249af,2025-01-21T23:15:12.030000 -CVE-2024-24421,0,0,bc6daec60c3cc47862ba9c6afe22ccbb4c0da195ed281619e7f237d041a0b202,2025-01-21T23:15:12.147000 -CVE-2024-24422,0,0,d8ab71f0bf07d1e1c0a74dff8edefe595fdf609ab0e2a92797a942d913eee897,2025-01-21T23:15:12.267000 -CVE-2024-24423,0,0,228c1137266eb16ad68cfc044b4d678963ba338b25a8968b03fe14a703414b5d,2025-01-21T23:15:12.407000 -CVE-2024-24424,0,0,4daa5038daefa466f84ab1d9cb407be6f804a0b64c8fb665cfa18ffc9c364604,2025-01-21T23:15:12.527000 +CVE-2024-24420,0,1,5a5bc176c375a6ae3c1f1f1aaa7fa8c118b011f44384ef34091460eeed674d90,2025-01-23T16:15:34.687000 +CVE-2024-24421,0,1,fa164804ff284d241187d08b344fa9d54b6fd94cc28a5540cb8e981223f48d19,2025-01-23T16:15:34.883000 +CVE-2024-24422,0,1,1247c4510d55f3623ac23416024d95438e2a92cf5a1d9eb7b0493895127e21c8,2025-01-23T16:15:35.053000 +CVE-2024-24423,0,1,ddea1df30dfa7ce209949db87ba3322324bc4b2ab5b0764768258bd83bb953a9,2025-01-23T16:15:35.253000 +CVE-2024-24424,0,1,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 CVE-2024-24427,0,0,2019b77465bfd95e39f1460e0b6b34de1fd7f7de7c71851c707c200c7bcefb73,2025-01-21T23:15:12.640000 @@ -250248,7 +250249,7 @@ CVE-2024-2444,0,0,d9ff5dc2f1cec3e82221567fd131c75cf5704e6ca903fd99eda244483e9cdd CVE-2024-24442,0,0,dab1d192224455c9dbc2bb672a2b1d0803f5127b7d95d237ff5a5b7907e7708e,2025-01-21T22:15:11.610000 CVE-2024-24443,0,0,9e2edcea8b8b5767acc38926824c13bf6abb747a0f51a97e2a5a56f1a3d118a3,2025-01-21T23:15:12.897000 CVE-2024-24444,0,0,ac03478eee756bd3acfd373638c49cadedc682520b5d9852b736440ee5f0ff5e,2025-01-21T22:15:11.737000 -CVE-2024-24445,0,0,8fbf231a623f42e6f8db9571513c14946607ba733724df54270acc78c4e6c91a,2025-01-21T22:15:11.847000 +CVE-2024-24445,0,1,8951525a630ef7002c4c50c2bc834a25267be75618ad4d3813836a8ae7898249,2025-01-23T16:15:35.617000 CVE-2024-24446,0,0,4939781971312082259f029ca7c62ff4e0dd8fa78cf29355bcf38d66a90a2aab,2024-11-19T17:35:10.263000 CVE-2024-24447,0,0,16b4c82adca912903405ea4de695a47b9422228cb2a3f727c34125b114515ba2,2024-11-18T17:11:56.587000 CVE-2024-24449,0,0,cb429ffc1f73fa46512b04b6b6b7262785b1e5e3d056a09b6c1ac751016dc45d,2024-11-26T19:15:23.090000 @@ -250634,7 +250635,7 @@ CVE-2024-24972,0,0,e18f9379a0dfb442df63b89873a662475ca57c06be8d72f3283fa5108a6ba CVE-2024-24973,0,0,a4aeec4bb514a0aea566dd993a3799ef12bc8985c1156c75b231bc8ad8f37ba3,2024-08-31T03:39:37.043000 CVE-2024-24974,0,0,120a72d1892734f8f80848d93fee3cc1ac0dd1eb6bf320d4911e845780d163e2,2024-11-21T09:00:04.127000 CVE-2024-24975,0,0,6bfa53656d20b52fee0896eb801c4c0702c211f280342ece0214fe40a70fabd1,2025-01-21T18:41:23.220000 -CVE-2024-24976,0,0,61b572c96ba780f8c37b67352f816181b4581a37ca5fd5a69a16f93decba5a86,2024-11-21T09:00:04.457000 +CVE-2024-24976,0,1,404946b47a232b9583e4d9375d945fd272b48f5e280d2f93031fd2f7e16d8c78,2025-01-23T16:55:39.517000 CVE-2024-24977,0,0,2cc67a2afbadfefa2eae3087514056f4e29f0e06405ab427028ecbac21be9013,2024-09-12T18:45:58.803000 CVE-2024-24978,0,0,d6b62ab3fdc2ce4245d32186e03af1b316f2c7d5f1c9cee569ee4c6a1e52a576,2024-11-21T09:00:04.717000 CVE-2024-24980,0,0,8894d798252f4993621a543eaa2937e5ca1210b96e7e14449d88b16043c75b89,2024-08-14T17:49:14.177000 @@ -251142,7 +251143,7 @@ CVE-2024-25705,0,0,4c85f2126ead3ce3c0774776e6bb6841f004ed364727d984d7e62e5cc1e3c CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,25e086ffa0a81a3b857b32e708535a968457dcd6409ec723a476e9b2d66d5b65,2024-11-21T09:01:14.923000 -CVE-2024-25709,0,0,1c5bc6838c0059affc01d3ce989bb9e8ae06fe6dfe5be1540360742d558d4709,2024-10-10T12:57:21.987000 +CVE-2024-25709,0,1,1caf189688863a19d13310c016372e976d3e3a6ca37059cd900da4213fb3c1fd,2025-01-23T16:17:02.767000 CVE-2024-2571,0,0,b29b266277adb21ced6590b6766850aaf4a1b8696efe1124ac983a0d3d7a3e6f,2024-11-21T09:10:02.260000 CVE-2024-25710,0,0,14c488f94704110bccb0ebc194fb3de52b81c1368723fbc1d3df69c3748109e4,2024-11-21T09:01:15.113000 CVE-2024-25711,0,0,6b07db62ade2bc0114f28a2e5cc5709d9d183c15244fc22f9067859e0e6f014d,2024-11-21T09:01:15.250000 @@ -251327,12 +251328,12 @@ CVE-2024-25974,0,0,09138e23b97540d30a977571629f4962d810fc7ee64de0b4541e73a977cb5 CVE-2024-25975,0,0,fee7c444e9d1a5b2b3d4ced48c805e0b9b8c69d5a441852e2fd099be02223377,2024-11-21T09:01:41.097000 CVE-2024-25976,0,0,cb1f6b0b42d899e774f78b832ccf3948900f89462061f58ae1e38592f4baf306,2024-11-21T09:01:41.313000 CVE-2024-25977,0,0,1534be4005d7b8a58988c1b580e9872ba9a0e0fe3d8d1f50f02b7b5163c6b8a7,2024-11-21T20:15:39.787000 -CVE-2024-25978,0,0,8e5f3552b6a4f1a168b441a1a76e8c97fa054d8f81f469ff83f161b7523942f3,2024-11-21T09:01:41.543000 -CVE-2024-25979,0,0,1cf882bd19b9de68d26574aaa976cea641712942fbbbaf6a07fbf3db4201fa69,2024-11-21T09:01:41.680000 +CVE-2024-25978,0,1,0c7219f5c06a5352b9948531090f5433593aa78d3764979286a8ba8b4adf22d6,2025-01-23T16:47:38.127000 +CVE-2024-25979,0,1,62367627f1dfda8a075cc6275572564bed957eec6e91cccbd6ac6c25ddf17ea9,2025-01-23T16:47:30.230000 CVE-2024-2598,0,0,207759a3df73c42a30aa7e325f39fe6fc02ff4f66e56b5f9c10a405e9cb51365,2024-11-21T09:10:05.653000 -CVE-2024-25980,0,0,cb7be6d80e58162b1b2ca1d0383a1a5776c1f0fe804643a664bbc9361ce1c3fc,2024-11-21T09:01:41.810000 -CVE-2024-25981,0,0,047d0ec78d38de237931e3064b1fa0d2949bfa3acd79009654185fa2cddaabc0,2024-11-21T09:01:41.930000 -CVE-2024-25982,0,0,451d6e97045245b3f531821bdbfc92cd880d0af9188639b57a62d1ab9df50466,2024-11-21T09:01:42.053000 +CVE-2024-25980,0,1,8d1d94aa6e4e09300b461c5883765741a9ebffcfb9d494e122d841993fa258eb,2025-01-23T16:47:04.460000 +CVE-2024-25981,0,1,65ee87d00e6e6e517bd12e0407dbac14cc8080c00c62681121df7ff56f8abbcc,2025-01-23T16:45:12.977000 +CVE-2024-25982,0,1,69763e20670c916f43a77a01523036870138b73061e581389deedde19c043fe2,2025-01-23T16:42:27.347000 CVE-2024-25983,0,0,32bbe2ad3ec3b2dc8a8f3be1e0107bd562278a36904d1d23c75398b01c384b13,2024-11-21T09:01:42.180000 CVE-2024-25984,0,0,b74c497bc5a7821dc47cdc048c7cbec167a339a3704e1a6587bcbff2fb96843e,2024-11-21T09:01:42.310000 CVE-2024-25985,0,0,72842c85972821067d768893a6b2899bdbc464e02b3ecef289bd0cc162a9f74f,2024-11-21T09:01:42.500000 @@ -252432,7 +252433,7 @@ CVE-2024-27198,0,0,de438747af70d3a35b18668b9b31d3da0ee0ca592d998e76d2e324c336123 CVE-2024-27199,0,0,82ee3c054db940a599ef04a223b1edddbc0af922d3b2c864cd97a9e1669b1412,2024-12-16T14:56:40.747000 CVE-2024-2720,0,0,3a04c50bd9eaa3e1d31cec067b1b9f5cb9613017dd41b88c00de0d45c254f79f,2024-11-21T09:10:22.247000 CVE-2024-27200,0,0,9f287b534ca4f586904b2cc6faaa6d91f8ef3d30ae3977397d8c7dae4f46ee77,2024-11-15T14:00:09.720000 -CVE-2024-27201,0,0,2fe70f06347b0947149c8bf944b1f6385bc398091867c7d22cad80745062498c,2024-11-21T09:04:05.253000 +CVE-2024-27201,0,1,b502b17e60d187b9ffa566e24a694f1108657d6e6ae36984197a7ae61f0a171b,2025-01-23T16:56:55.550000 CVE-2024-27202,0,0,4f467e274cae23b75ce17bed8e5e15aeabadd17867528996811e440848b3463c,2024-11-21T09:04:05.373000 CVE-2024-27204,0,0,dc378098f75f5e12ccd9d993a343bde0c21d67f9257930b3d86bdb3b656344ab,2024-11-21T09:04:05.500000 CVE-2024-27205,0,0,34dea4a1905f758c0f600c88ca391ad652c0884f1991f6d3e125aea8fa662718,2024-11-21T09:04:05.683000 @@ -255526,7 +255527,7 @@ CVE-2024-3136,0,0,9e02aa4992302fe344595ff868f246169a934bd46e1b7ca8d370f5725a8008 CVE-2024-31360,0,0,8cb5e974db070725c801d7c826083d98c0c6e0dc164cd395ec990085232931bc,2024-11-21T09:13:22.097000 CVE-2024-31361,0,0,cd57a3ba85fbda740068fecaf7c25781b9ceeb2fe9afb57e7e9c1192b5574512,2024-11-21T09:13:22.220000 CVE-2024-31362,0,0,e1e383b1b6021174784187d582f1cdfeb1828d1a7981c4a748eecb139f1930a5,2024-11-21T09:13:22.327000 -CVE-2024-31363,0,0,0c9618d540f8095e4890b9e252daf7d134a91323c68092f7e779b6d871a38799,2024-11-21T09:13:22.453000 +CVE-2024-31363,0,1,f436020e4d0fba7a6f669df91b73d97fd93890372970e65d625ad6d0892cdf3e,2025-01-23T15:45:13.913000 CVE-2024-31364,0,0,7d58932cccf3d8e2f88823d7af9a3354ba3ef962ec70bf3af45d55c1b111753e,2024-11-21T09:13:22.580000 CVE-2024-31365,0,0,ee6f27c5550808e318852dece0d35c10b84d236b1ebe4fade29430ec6fb865b9,2024-11-21T09:13:22.697000 CVE-2024-31366,0,0,23e14b62333a61942a9d77e90198f986c95496595749db6183945de1cfb767a7,2024-11-21T09:13:22.820000 @@ -255659,7 +255660,7 @@ CVE-2024-31489,0,0,3c09d689ae4b29e24aa7a9b618ee52fdfa1da44cc707200d5479123d98874 CVE-2024-3149,0,0,8a78140490bcf701e13d0c05549610bd9a1157605ed7c6cf66c461a13a6097ff,2024-11-21T09:29:00.367000 CVE-2024-31490,0,0,fd601ecb6ce1c2bf33547fbbfd274f52c7252a32d9509a829d05990a5e592b31,2024-09-20T19:48:42.507000 CVE-2024-31491,0,0,eb8e9073235bb77415aa2949bd8dca7f0e2f76c335a1621addfa760485c0fdcc,2025-01-02T18:35:20.503000 -CVE-2024-31492,0,0,5ad9b4a65fd45e78f9277fa9db0f26964f6a5f0b495fbce6fa0081aaa7c894ac,2024-11-21T09:13:38.490000 +CVE-2024-31492,0,1,3ec801b7b6a12fac031a173e971204f4dd4c2ff32445305c0065132fcc9d6f74,2025-01-23T15:58:57.733000 CVE-2024-31493,0,0,4343b1606a7ed29c051f086c263ca11ca7be82a43b54eb58e52ae4779fb95b13,2025-01-21T21:49:55.390000 CVE-2024-31495,0,0,157a56de21c06532d9c8d19bbc8fe71f35ccfa7d686350a57acfb733a26fa532,2025-01-02T18:27:26.153000 CVE-2024-31496,0,0,d9f8198d3e77d67a379be3518aaf1a5bd88c77874ae275f4edf4720f1c31aa58,2025-01-21T22:11:48.160000 @@ -255942,7 +255943,7 @@ CVE-2024-31981,0,0,525aa42b48760e4dc3f50f41e9ca36e84b2fefe26eb317e7ef7914e1c0a04 CVE-2024-31982,0,0,f51759bd3b8616d9ff8a4212e892dac93f43d5e47d94991795a95bc90740ad04,2025-01-21T16:25:17.337000 CVE-2024-31983,0,0,667a913b29f0007e27b095f4bb9909f2ad3100f3fc9c9556a9660e3c5a845574,2025-01-21T16:22:36.987000 CVE-2024-31984,0,0,5dd9049085f0798dc2b889e21e5826896004d0254d5740a53609f76281116271,2025-01-21T16:20:37.297000 -CVE-2024-31985,0,0,8b597daf49963cd356a85fd42e5c6ab425eeedc4823ea342fc391379c03b5951,2024-11-21T09:14:17.007000 +CVE-2024-31985,0,1,d10e67d0f0637405278c4a36f430bc06b5541dec35e947db1fe12328513a8cad,2025-01-23T15:51:52.277000 CVE-2024-31986,0,0,bd539430f0490d9f383e9234022ffdbbd422d2006a6b79afc58b526fc1a0e70e,2025-01-21T15:43:52.013000 CVE-2024-31987,0,0,97b7c862777abd5a0ad590084fa0bdebc52efc75d29dd2e1c9afab6e9ae74dae,2025-01-21T15:35:42.450000 CVE-2024-31988,0,0,e1f6fe0e57c15ec80e26442fc27a73e4d01b1cd5c9eee218db1d87a564cae068,2025-01-09T18:54:53.390000 @@ -256041,7 +256042,7 @@ CVE-2024-32096,0,0,202412fd8d71aeecf024a457ba5ff2ed2cf7753a519300155d39edcddc33c CVE-2024-32097,0,0,be747e2a44a23e5dfaa4aefb5a2b4190ae72fab2a6169b4e2f65b0b45d51a015,2024-11-21T09:14:27.923000 CVE-2024-32098,0,0,98b6516b1f1b16673c9461af4f9164321374f2d45375fca58649c1e98fbf5ea8,2024-11-21T09:14:28.050000 CVE-2024-32099,0,0,b0241e1ab5cd1392ca946f4cc06b84dbbe8ef1cc56a1ec81530a1cb6408c9c08,2024-11-21T09:14:28.173000 -CVE-2024-3210,0,0,92ec3f009281697a350fe869c0a315ea98fa9c482bc6979d0bc89fa89acb9008,2024-11-21T09:29:09.410000 +CVE-2024-3210,0,1,88bc14a85965bff273db09eb141a13a0ca7356eca1f9d1283cae58512fef423f,2025-01-23T16:03:20.460000 CVE-2024-32100,0,0,096bdb9c57d6a2b26a20199b6e3bd50839ec7fc62c4dc1d65800224f38319114,2024-11-21T09:14:28.303000 CVE-2024-32101,0,0,cf8cfe1df3a68e96dcee3485540e706ffad536aade1c2f8877bc00f4bf580b51,2024-11-21T09:14:28.423000 CVE-2024-32102,0,0,9c0b201f8426affa83d74d0b2a16e411c574059da5baab78ba077411c1bbe302,2024-11-21T09:14:28.557000 @@ -264180,7 +264181,7 @@ CVE-2024-4292,0,0,aadd195e174cdf2c4fac6389aaff8dc86b25c7743bd2be9bf1a6d13c5672b9 CVE-2024-4293,0,0,4032ead7a4ae7257ee26b1e228dc7802f59eae15cb257f73c5786a8955216c65,2024-11-21T09:42:33.580000 CVE-2024-42930,0,0,fc971e94549728ba453549a80dd65aa5424c61cea7d4fdc47479a2cdf067adf9,2024-10-30T21:35:04.850000 CVE-2024-42934,0,0,1230de0d8b2dfa26c1ccbdc909ca39b36c856f70ea241827e7d7fc70ef4ace93,2024-10-31T20:35:05.250000 -CVE-2024-42936,0,0,86811035a752a288d9cccb940fa72a89e95d5b931c97144248ecd9720e090240,2025-01-21T20:15:30.963000 +CVE-2024-42936,0,1,dfbad2180c48bc39fee17f0da3000c116fff2a1f136db0c631284d2d9d1fef32,2025-01-23T16:15:35.773000 CVE-2024-42939,0,0,4547b4b1e0943985622e8f34eff1a8bb854051e0a4587d88630db6433049cbb9,2024-08-31T02:58:34.660000 CVE-2024-4294,0,0,505d8b404d53b4a48bcb50a0067c1b5655b169226bbf5afe60a2ee504db96a7f,2024-11-21T09:42:33.717000 CVE-2024-42940,0,0,b0d827c11b94f934185bd71744960303141938187c6d4d4091c6fd4d8544de72,2024-09-03T19:35:15.163000 @@ -264464,7 +264465,7 @@ CVE-2024-43298,0,0,75ca76e29fa81e9c80cb0440785667f4d0373828bc5b5475de528bf77f298 CVE-2024-43299,0,0,f3ffbfa753f28be116699b6ca0568db8e5250c244e2a5330e0abd09b6f50328a,2024-09-12T21:23:30.647000 CVE-2024-4330,0,0,0086e524dd1602b423bc850172fab6c477b326a2ce023b115db7b9918031079c,2024-11-21T09:42:38.397000 CVE-2024-43300,0,0,75c9a8b2d238d9cab08f410484f7da41745998025cff71fbfeea803347300474,2024-10-22T15:35:24.050000 -CVE-2024-43301,0,0,3d4f57b87abaec91fdbcc0e2d1eae6ec013f5667bcad97e7000995e536b37e68,2024-09-12T21:24:20.563000 +CVE-2024-43301,0,1,aa76f6fbde52ce3291341ffba7f2d98ed66fd54c916fcbbb420fa731de750dc1,2025-01-23T15:22:55.803000 CVE-2024-43302,0,0,44315c5d32383f0113d45ca429d79ac6dd7e95eb518218abf2b5482a33567a34,2024-11-13T01:18:45.093000 CVE-2024-43303,0,0,1c32bbff9bd1187e68e8cd2cca6257b7188e97bbd8b8d913c2954bb21506b151,2024-08-19T12:59:59.177000 CVE-2024-43304,0,0,a6e4736cb7ecc4711235c300561f3afe260626b72c3d0f4dbf014df002666bc1,2024-08-19T12:59:59.177000 @@ -267709,7 +267710,7 @@ CVE-2024-47755,0,0,8cf25d07e196e075734f98083f38dbef19fd8e91fd1c66d640e943585b9e2 CVE-2024-47756,0,0,1de05fda503d02fa87bd65fed649de9909414f3433775c910b61f18ec7e108ff,2024-11-08T16:15:28.193000 CVE-2024-47757,0,0,4e322af9265d57e4063793da36297e2e8e33c72df9516cf2e3471642eb8d6f80,2024-11-08T16:15:28.343000 CVE-2024-47758,0,0,3cab94b7efb5bada03465a968293b81a1164ba82bcb64e09591c408d49a1c5bd,2024-12-11T17:15:16.520000 -CVE-2024-47759,0,1,49c8a4cad894257a128c6784b8845f9bef305051388308b136f8c46f5319c99b,2025-01-23T14:25:02.953000 +CVE-2024-47759,0,0,49c8a4cad894257a128c6784b8845f9bef305051388308b136f8c46f5319c99b,2025-01-23T14:25:02.953000 CVE-2024-4776,0,0,2a2b40e79143dfc9f450d4468b54f62c55f3f15452736cde9c1621738d0e995d,2024-11-21T09:43:35.370000 CVE-2024-47760,0,0,36f5165d0af1f8e2f08ce9a99309743730b104ab568ff976f563ee139b465ca5,2024-12-11T17:15:16.620000 CVE-2024-47761,0,0,1646b9b063119186ae5be7a0f7bbf0054d893cef673e2f90443a5fbf467706fd,2024-12-11T17:15:16.753000 @@ -268110,7 +268111,7 @@ CVE-2024-48465,0,0,86905cef5ebcd2b050652d2c9d8dc0390e1a20f41c011a54752e2071221c8 CVE-2024-4847,0,0,c22f0a9897ae48897485c24e89d63816b43b2f4df2bd2f027cb4528747492fd8,2024-11-21T09:43:43.737000 CVE-2024-4848,0,0,e9a992014a82f7f25ea8b020a59a54821debcc21ba29ea30b909eb2d249ee224,2024-07-29T11:15:09.920000 CVE-2024-4849,0,0,7c7338e4b2ef8e6d928b2b56fb6f44a10225de9db2a372e1cf3d597fbe7ff8df,2024-11-21T09:43:43.877000 -CVE-2024-48509,0,0,93a9c48c9cf82da699ff95d30953f99800999991b78056a3ec4235c759a110b9,2024-10-29T13:38:16.893000 +CVE-2024-48509,0,1,ea56bd9865f582f6a06ac0d6b03f0c00bb92c2558d6e4c5f701396ac5b346c33,2025-01-23T16:50:03.787000 CVE-2024-4851,0,0,778c867c8873e919fd1508282d13b682099f8dccd85b91b6f2c07b18a85f9996,2024-11-21T09:43:43.997000 CVE-2024-48510,0,0,657bf60a1dca06dbc7d1985bc8869a3fb322c0603aca32f8bccfc2cb4278c49b,2024-11-21T17:15:19.780000 CVE-2024-48514,0,0,7967601421b3f49e474281860b80dc24d12c1d46f138377d1b0496a28ce0b17a,2024-12-19T16:15:08.340000 @@ -268438,7 +268439,7 @@ CVE-2024-49056,0,0,2bd2b2266d7b792cf7f1f9d1b8f0dc5da233dfb03d127cfa27eda6bdd0ad0 CVE-2024-49057,0,0,8adfe1f702587a70c7f28eae242d6d2ab31c9c830cf3607e351e6859f405b09b,2025-01-08T12:39:35.633000 CVE-2024-49059,0,0,e3a1c5f117ea373ce84de44e6911c196c1cf3001e2ce847a120a52a5210947bf,2025-01-08T12:40:00.190000 CVE-2024-4906,0,0,867b56b92bfe21b322ca43ff902131a5c10ad7122b44578e5002b985071da5a0,2024-11-21T09:43:50.303000 -CVE-2024-49060,0,1,610f816a9e6f5fc57b4926e20d606be7080b401de302fa473bffdcadf01f7efc,2025-01-23T14:15:08.617000 +CVE-2024-49060,0,0,610f816a9e6f5fc57b4926e20d606be7080b401de302fa473bffdcadf01f7efc,2025-01-23T14:15:08.617000 CVE-2024-49062,0,0,9d9ec47cd3eeea7827ea04f98b2b8aaf372cee31c80fefc1164038f4a8bc9169,2025-01-08T12:40:16.087000 CVE-2024-49063,0,0,5bae376951aeb5fe9cdb1d1299de5b518574decb4573e1aafdd2100842bf44ab,2025-01-08T12:40:50.423000 CVE-2024-49064,0,0,5f8859e2a458eae48bb53d0abe7352c27271b43719eff3149a2374fd4d7624f2,2025-01-08T12:41:02.453000 @@ -270769,6 +270770,7 @@ CVE-2024-52320,0,0,fbfaa1883239695b0007c9764a43ac2cebac69eb763863afcec1548f7df5c CVE-2024-52321,0,0,58349402fe5df3092273b7344f7d995ad64537d59a580bb31bc25ef4220d89e0,2024-12-23T01:15:07.700000 CVE-2024-52323,0,0,57617b6f1b94228bad139ee211c36bd4ec7e4706388ebf89e10500861eceb01c,2024-11-27T15:15:26.377000 CVE-2024-52324,0,0,1b82757393c4b121efeb2aca56c501ac2b568f66f0e838324b89dea8626b5590,2024-12-10T19:42:56.737000 +CVE-2024-52325,1,1,b71dab04bbe9cc4f34c787683633492187f6326ad90378cbd136ef84b83e6bd4,2025-01-23T16:15:35.943000 CVE-2024-5233,0,0,f7aceb9f589abd3e3127e7bdc682ef20b7c3a1e0d748898af38a399a8a8c2229,2024-11-21T09:47:14.357000 CVE-2024-52332,0,0,58837c5feb4aa8da96238f281eca729502def4e6f29469edf4244234ba0fc606,2025-01-11T13:15:25.070000 CVE-2024-52333,0,0,e1bc57a7d739bdd387fb07cc28b3547c00461f3445b0a694a0bfc9660ebe8df6,2025-01-13T16:15:17.990000 @@ -270965,15 +270967,15 @@ CVE-2024-52514,0,0,c2540b64852cdf95b6dfe1e1f191a4a17f2fe9783000c44466c80a373c6d3 CVE-2024-52515,0,0,59af22202c419d29418dbac82de6c1377e77a64cc37ede2e1db2902210187af2,2024-11-18T17:11:56.587000 CVE-2024-52516,0,0,24c3b674757ac42da28c66b58462a0937e3048ef1477707fe8fe8b4f408e5d4e,2025-01-06T20:51:23.237000 CVE-2024-52517,0,0,7e1129b9b009a9508b73ad1c43846b4d3bc45ace53fa00cf32e0603dd0aedd00,2025-01-06T20:58:07.123000 -CVE-2024-52518,0,0,64dcb5398c51790a3ef3555cfec3a29f5e50bbe6d97cf26bbdec33825823fc60,2024-11-18T17:11:56.587000 -CVE-2024-52519,0,0,40b096d8cacc7d32d50b8a21927a5a91aebf23f212233840640e61b61c4805a9,2024-11-18T17:11:56.587000 +CVE-2024-52518,0,1,4195d44f3e31a5056a904e4a6c716abfc7b04a6895a6a41b0c0e5ced202f27b4,2025-01-23T15:15:58.413000 +CVE-2024-52519,0,1,db58b2963b75280321aa54e878fde45a89e2a4c3cfd9814cc6f80b2abb1e2e6c,2025-01-23T15:05:17.843000 CVE-2024-5252,0,0,c51da4ae893db65fc31dc0045b0a4235dbe5cd31ed1b7b9aac7ead365ad9ab89,2024-11-21T09:47:16.830000 CVE-2024-52520,0,0,4fd27ba6e31e5f0ae2eed09ece702bc827add36e754b90ddca279a51a4ba769b,2024-11-18T17:11:56.587000 -CVE-2024-52521,0,1,bbb02118ffd7214e3578473e42872106ba547eddb6f3662662dd6593c06a0e8b,2025-01-23T14:52:33.387000 +CVE-2024-52521,0,0,bbb02118ffd7214e3578473e42872106ba547eddb6f3662662dd6593c06a0e8b,2025-01-23T14:52:33.387000 CVE-2024-52522,0,0,05a61f4f73cd28768f5327a71dde226bd1109d9d29d199e7e56fd3b08f89455c,2024-11-21T15:15:33.637000 CVE-2024-52523,0,0,9b15c2e31b64fa0f7dc4eed45196c48168b27c2e3ccb4323a160e6e7c5f9bd88,2024-11-18T17:11:56.587000 CVE-2024-52524,0,0,cb28810098344daef8f891038f3b592e18e9e249adbc4a8ed168ee64a1de2d59,2024-11-21T15:15:33.993000 -CVE-2024-52525,0,1,dec7c458b24e91443dc2a0fd3eb2a081961735d3706e86e078f28054a1bfb7ac,2025-01-23T14:33:48.657000 +CVE-2024-52525,0,0,dec7c458b24e91443dc2a0fd3eb2a081961735d3706e86e078f28054a1bfb7ac,2025-01-23T14:33:48.657000 CVE-2024-52526,0,0,dd9e0e6d723e703ab717bc5fe27a999615f5b127b701a0a2fdd8454e87406fd0,2024-11-20T14:39:19.647000 CVE-2024-52528,0,0,dfdbcdf52afbad7307da9f9083129e9e7cf1e1709c4f11f8968d2d228adc42ca,2024-11-18T17:11:56.587000 CVE-2024-52529,0,0,f2152dc699404c65c6350f1136db6560eb4c1af2e85d3b560a72e983b9325dad,2024-11-25T19:15:11.373000 @@ -272694,13 +272696,14 @@ CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519fea CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 -CVE-2024-55957,0,0,93ec958ce84a5b94e18aae8b6c1c1c30fbcd01fd14ce2c9365d9638ed6be10f7,2025-01-22T18:15:20.237000 +CVE-2024-55957,0,1,ada0c45326625ede7128814a2ddf1c6230493a1309cb930f3b7b704c3c7a06c6,2025-01-23T15:15:11.663000 CVE-2024-55958,0,0,805e9804f2e0f436a8b6462c6f5ea66eb72f3312c0b5dba8bff8785036cb57cd,2025-01-22T22:15:09.453000 -CVE-2024-55959,0,0,51a8504bb3c41973bd0622b20d6f9671032f558a4b6cd001edddcde78702ed37,2025-01-21T21:15:11.323000 +CVE-2024-55959,0,1,1be9d85eb46493c77ed7db4321425d1d95d759742cf6d5fdd1afad68017b844f,2025-01-23T16:15:36.147000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 CVE-2024-55970,0,0,16abb0c0e0265704de9252f7802bb4c1dcee3b6024c122812d4fa638388a012b,2024-12-16T17:15:12.517000 +CVE-2024-55971,1,1,64c8f1a825e5121b19be7d1cbf13b17b132dd2d3140daea5904dba05b9ffab49,2025-01-23T16:15:36.307000 CVE-2024-55972,0,0,073f1f7a76af32f336baa61e0f294014ab40da0fb83d4a54259f78e7d1bd8738,2024-12-16T15:15:23.613000 CVE-2024-55973,0,0,fff94d3b5918852053047fe137036975c3faaa8f02b96e59835ccb1b0e28c022,2024-12-16T15:15:23.767000 CVE-2024-55974,0,0,2fe0e66dd935fe894618bf0d375698cc30434c243d25601468e9e5918dcbb737,2024-12-16T15:15:24.397000 @@ -273469,7 +273472,7 @@ CVE-2024-5733,0,0,08c79914b3b228d8239c5511d15a5ec639094518968ef7bdf362b13a620582 CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac34828502652b,2024-11-21T09:48:15.300000 CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000 CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000 -CVE-2024-57360,0,0,40fe5fe095a9f434d207ddc06f4d837e785a58e94a1c57fe1faa35b373413711,2025-01-21T21:15:11.440000 +CVE-2024-57360,0,1,b55b093ca2518eac39079440800bfb25c14c6bd692dd0f78a706c0ccb71a2e4b,2025-01-23T16:15:36.437000 CVE-2024-57369,0,0,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 CVE-2024-57370,0,0,7765e75c31c1bc6246006d57f06cb37946989154ae631d46e5284bdc42f2fbbc,2025-01-17T20:15:29.303000 @@ -273593,13 +273596,13 @@ CVE-2024-5770,0,0,918380eecb24f860d41c083e6e9a778682d01ec1efa0eb8b0287a3dccfe91d CVE-2024-57703,0,0,648a1f97a651c02bc9cbd814c3aaa6ce923f775ec3dcd0727ff2f9993e5e0801,2025-01-16T23:15:08.003000 CVE-2024-57704,0,0,5d3ea96b243ef47ad9a653892bd654803ec2d81d9a41451dd6e5053bc648eb08,2025-01-16T23:15:08.113000 CVE-2024-5771,0,0,8829a844c7846b06bb23778fad93312a505e31e0f93087e15ef0b64a0b36f535,2024-11-21T09:48:18.863000 -CVE-2024-57719,0,0,40eeeb4187dd73d2e17f0b62129b8213a398e15b1812919be7d9e297ef23fc35,2025-01-23T01:15:26.740000 +CVE-2024-57719,0,1,f646d15c446f0191d5e746ae08f1e2aecbf143763065aac778e59831d2825e1e,2025-01-23T15:15:11.920000 CVE-2024-5772,0,0,04004702ec5106d11d8a70be9a1c34eceae4a60526afd5c3eb12e840c71e6683,2024-11-21T09:48:19.003000 -CVE-2024-57720,0,0,17e830ba80fea7ad4816c5bc301b4dbeee72a213a931d20632be2a991ee22f5e,2025-01-23T01:15:26.847000 -CVE-2024-57721,0,0,3ac6bcd94885973e38a9d93efdd5bbffe71782af7fd163d8ba8303c34444f112,2025-01-23T01:15:26.990000 -CVE-2024-57722,0,0,ff99e2ada59b84ddf86c0ec8be18ee23c761364e99c0530741db7fde1655b1e6,2025-01-23T01:15:27.137000 -CVE-2024-57723,0,0,5711ef5bead24e0994f875340e23a0448f27b5751fe953e0a6dd1e695e3e070a,2025-01-23T01:15:27.270000 -CVE-2024-57724,0,0,9a92f9263f2cafd6c63af53a263d35f5aa75f59a0f7a2911772118776c972a25,2025-01-23T01:15:27.387000 +CVE-2024-57720,0,1,e2b216278f01775409dd397c638299cd4660a0c73a414177915dcdad046d0a8c,2025-01-23T15:15:12.177000 +CVE-2024-57721,0,1,ba4b4d610c1a36a7d4003c5799ca90b5d91608f70962553f9544b9bf151246de,2025-01-23T15:15:12.387000 +CVE-2024-57722,0,1,ccf3b1b21b01688e5f641ce5edfaa71c53ac055b4b0788d32836116aa6326200,2025-01-23T15:15:12.610000 +CVE-2024-57723,0,1,05572b2538f4e5df69303e59249e19dc6b772ee20e5c61e15f2681e27f67472d,2025-01-23T15:15:12.820000 +CVE-2024-57724,0,1,8899fc1abe88b7ce7c6cd57c63e073d8c64d4e14822bdc618ddc7478b6ecd8f9,2025-01-23T15:15:13.020000 CVE-2024-57726,0,0,65fd2cddc719c88ffa0e00b4be18aec8ffa9fb5d459bdfe85cd0cb0d5409aec0,2025-01-22T16:25:12.533000 CVE-2024-57727,0,0,92f5d24a0d77d41fbb6ea3a796a25597f2aecf3a4600a0571ed4ae9364be0356,2025-01-16T21:22:25.317000 CVE-2024-57728,0,0,fb354679bf974c668fb55e36081142c182c86cd0df2050f9f41db6946683897d,2025-01-16T21:24:08.077000 @@ -273743,7 +273746,7 @@ CVE-2024-57943,0,0,dc7e0684b8377f15667d88e1273c5a5004a8c0a280d7d1767bad721d5d8df CVE-2024-57944,0,0,69f37fc5a40b866c95e7b5f04fa783680bd7856897f3b164ec222c4155dd5693,2025-01-22T23:02:41.850000 CVE-2024-57945,0,0,8e35c260271a7d05a4130bce464cd053ddcd7430dc8ad698dc9980a797cf9881,2025-01-21T13:15:09.033000 CVE-2024-57946,0,0,c7f36f65d43623d48215412aac78ff97bd2f343757e90cf928c2a23f40930377,2025-01-21T13:15:09.137000 -CVE-2024-57947,1,1,a5bc692266299472dc91cada34422b6dd2b65fd92beba8b3a286d0b670606528,2025-01-23T14:15:25.293000 +CVE-2024-57947,0,0,a5bc692266299472dc91cada34422b6dd2b65fd92beba8b3a286d0b670606528,2025-01-23T14:15:25.293000 CVE-2024-5795,0,0,8c27870eb8f46b4876cdd6a9335698b3a6adeccd1af066b5f5391281ef70b349,2024-11-21T09:48:20.780000 CVE-2024-5796,0,0,10c3848976491ca5eeb295d89b1679f80388276c56109509ef1777f493022afe,2024-11-21T09:48:20.910000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 @@ -277578,6 +277581,7 @@ CVE-2025-0619,0,0,d46ffdfae1888b85241d4dc2752362911c1afe391e732b7c722898ead62a74 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,97945102dd6c22c6dc52ba933146d415b8d38ebf36377c41b72b344e1c0821f3,2025-01-22T19:15:10.397000 CVE-2025-0635,0,0,2046aa43a5a3ad67b4f86fa1a13efb4964c1879d2d3815bf714cc71830b99120,2025-01-23T11:15:10.890000 +CVE-2025-0637,1,1,7558412677df096c788c66c019e4972a9d596c55f846c7ce4b4d39874f828668,2025-01-23T16:15:36.617000 CVE-2025-0638,0,0,ac9cca0d245198ff4674963eab0600993bc0b56692f14b75cf07327388ff27d0,2025-01-22T16:15:29.977000 CVE-2025-0648,0,0,f9d79465ad3803b75ff57d725f789e40aa0e726161afba05440d8db3881a4794,2025-01-23T11:15:11.030000 CVE-2025-0651,0,0,8c67aa0f80c9f1e30412c542495f9f971e1fa118a8f80db65a60da0b955bdf05,2025-01-22T18:15:20.363000 @@ -277800,8 +277804,8 @@ CVE-2025-21505,0,0,d38d80007487ff694532508e892a45688687c6b699ba24e27e4e84ef185a1 CVE-2025-21506,0,0,b15a082cfb9b642182fa216ca2dc935119f2b7ff1700f5c5b40e9db4cd530281,2025-01-22T19:15:10.643000 CVE-2025-21507,0,0,ca19e8210d4a68c7de935f15d1599be82b6c396f5844990bbaeeb8627ce7dbed,2025-01-21T21:15:15.847000 CVE-2025-21508,0,0,77d16baf9f8d14a680d396801ee4bbaa43bfb9b28cfbcf88a906be04f5238cd1,2025-01-22T19:15:10.767000 -CVE-2025-21509,0,0,5afa381b2fb0bacc8a2e710b60ed986035c1875945552d3210b5bc7b89db06c7,2025-01-21T21:15:16.107000 -CVE-2025-21510,0,0,9f42d95d4aa3d73a2603d2a5299cc95f424ec3fc029330e5f57fb333bba2c228,2025-01-21T21:15:16.243000 +CVE-2025-21509,0,1,21a812b786cc6eba1f43d96ae439efec57e46377f98df4f2aa400b62d6b5770d,2025-01-23T16:15:36.777000 +CVE-2025-21510,0,1,a9d4ed31cacc6780a953598023a9516bc432ebf53a4d880ebf8bed4d05eb13a9,2025-01-23T16:15:36.937000 CVE-2025-21511,0,0,91f37778883ae7ebc0ea76b2237dcfad91c93c396c56403199fb73bd3dfbf1f8,2025-01-21T21:15:16.363000 CVE-2025-21512,0,0,ec67f84edf19959e70c544006da43e3112fa9610123e64cdb66e7e51bfe9828a,2025-01-21T21:15:16.497000 CVE-2025-21513,0,0,f20a60f186c2d6145b78c8bcde31c84732efe551b42d86276aafd9c051879e29,2025-01-21T21:15:16.623000 @@ -277949,6 +277953,7 @@ CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7c CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 CVE-2025-22261,0,0,33a310cbc7efb685d95693f6e008875a8290fc5f9c6bce0cde03f1c0742bf7b7,2025-01-07T11:15:13.290000 CVE-2025-22262,0,0,d8ccc2867d2eece6059c27bd9ae3cb203a5caec3d70efe08069887af39a96863,2025-01-21T14:15:09.757000 +CVE-2025-22264,1,1,269d6d99d5d38020729c6f3bee1f95a3ddcf70ae68cef13e6fa32b4081a530d7,2025-01-23T16:15:37.257000 CVE-2025-22267,0,0,d47c362d1903a3323a8cc11ac9dbcc52108524ecef96f08e310fc8a539fecd56,2025-01-21T18:15:15.100000 CVE-2025-22275,0,0,dc0905974c721b278910237158fbbf2db7a66a5bd4b529c9d9744ba0c53260f3,2025-01-03T07:15:25.297000 CVE-2025-22276,0,0,9aca83262c3920612e93723d56c2a06a28b9cd00bbd745a2a28e66846e451df2,2025-01-21T18:15:15.303000 @@ -278183,6 +278188,7 @@ CVE-2025-22763,0,0,3e85a52e82c035116a3ac3d410f3ab9700da1a1bd216374d985e1defc38ad CVE-2025-22764,0,0,bb4ba9e4fde2400f152116cd1aad7bbbdbb7d640219a8e01ca47cc112eba4fd3,2025-01-15T16:15:39.373000 CVE-2025-22765,0,0,05da1bdc9e7167edf5387de0586b61a1995a9741b623487d7015cbf79f0a61e1,2025-01-15T16:15:39.543000 CVE-2025-22766,0,0,343e87bbd358f52869bf43f77788e51e9a96e6bce59424af557599ac7a821c7c,2025-01-15T16:15:39.700000 +CVE-2025-22768,1,1,6ac53ba544255bca278ed1b113cc15aecb93d83acedbb483da3bc50fb90a3537,2025-01-23T16:15:37.403000 CVE-2025-22769,0,0,4e6d679e63f8fe706c18670ecdd89233f779b3c6dadefbabc9659ff336c0b4a9,2025-01-15T16:15:39.860000 CVE-2025-22772,0,0,3a00e89ad909c68ba2b86c31324220231310a44e7a9d8f09a57bfe4d0193ce08,2025-01-22T15:15:14.990000 CVE-2025-22773,0,0,fcf097b5a8bf8f017de7fe5f8a18a77369aacf0486c55459d6bb76d657f29d3d,2025-01-15T16:15:40.027000 @@ -278249,7 +278255,7 @@ CVE-2025-22983,0,0,a4325d671f457e3a88359f4b166998f53b22f358b22808393b6eeb33cff62 CVE-2025-22984,0,0,c374cc7c54df2dedb6ecac62cfd3186e913633b44b128647ebb7edc501f96a0c,2025-01-14T16:15:35.710000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 -CVE-2025-23006,0,1,b139a95cc17d3c3e48b94596d0e0fafd62680ac7f12513f1a01aebac888902e2,2025-01-23T12:15:28.523000 +CVE-2025-23006,0,1,4909edec91386279e9960ab174937c9cea74f45a3faffb1f01e726a291599013,2025-01-23T15:15:13.240000 CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000 CVE-2025-23016,0,0,d6f57b5b395a069df7f809c3df8ada91e41979cd2f4b4f4edc46accb02e126b8,2025-01-10T12:15:25.480000 CVE-2025-23018,0,0,ad3bfa51bcf887bbb40aaa96a9f2385adb490b1540d4c17f9f0c08d58715f76c,2025-01-14T20:15:32.440000 @@ -278376,6 +278382,10 @@ CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 CVE-2025-23535,0,0,8c6c7853932dc86cad261901d628618e5a1cd59da8c0402b855e776a2dfe5b87,2025-01-22T15:15:17.290000 CVE-2025-23537,0,0,79e57ef42623bfacf08bcf48f182a917b206d07a7014897deba86aa5721ba1be,2025-01-16T20:15:39.070000 +CVE-2025-23540,1,1,cef6a133e0f519c346c79cf9e33c2d71b10256743d5e2f4f0af4cb7697679d1c,2025-01-23T16:15:37.577000 +CVE-2025-23541,1,1,c7e0188afdb6cca28b668f7051b2a69c753640319ff74d903037040d0d79347a,2025-01-23T16:15:37.737000 +CVE-2025-23544,1,1,a764e4fead4c6d296fbb4da3b7f8401895a7c52295237cb1a035f724f515f669,2025-01-23T16:15:37.897000 +CVE-2025-23545,1,1,76d07325ff33d10eafd194e0092c04e3cacf53ae93cfa80a4c4ba8eb628d45f1,2025-01-23T16:15:38.070000 CVE-2025-23547,0,0,6f6ff07f3f424280073fce42bfdec78cd39e7aff8dc91e913640e544d32ed50a,2025-01-16T20:15:39.220000 CVE-2025-23548,0,0,c721dc1137d98fc07da1935fe1c35885f96adfba5f6a1ac31f8a89ee20a0c5cc,2025-01-22T15:15:17.423000 CVE-2025-23551,0,0,3a2e7c6f8f024397a3482b683af17f9f32814f81bbc6ca9c38c2f9e9c6fffb26,2025-01-21T18:15:16.927000 @@ -278410,10 +278420,16 @@ CVE-2025-23617,0,0,87ef3623aa25e2331adb93f67250ff54cd8c0a9d97a9df407392635eb1424 CVE-2025-23618,0,0,2b70f46c9d14af7d7f45645689d4bdb93fcf0d60e0c8dbeddd3d561041eb97d6,2025-01-16T20:15:41.193000 CVE-2025-23620,0,0,09647c5f995fa9db6ccd9597829259959bc90db907c440ccec24baf4752a0b99,2025-01-16T20:15:41.340000 CVE-2025-23623,0,0,3a19bc13049e6280f5b56d5b01402a56d91485d47ecc589213c73480465da52e,2025-01-16T20:15:41.480000 +CVE-2025-23624,1,1,04a0e2d4658a70bae539d06160d0bbfac021d785d3f991eb2891122803ef0954,2025-01-23T16:15:38.223000 CVE-2025-23625,0,0,217e6ef7081bd7c0b9ba662afee4b1c58fb2a9d65b968b7120bc7c3250e2e5fd,2025-01-22T15:15:19.747000 +CVE-2025-23626,1,1,552ff36abda85a3a05a08e2ec71afadfe474336d7c6e11952e6cb92d480545f2,2025-01-23T16:15:38.390000 CVE-2025-23627,0,0,a0e2c69c295a72f80218793a17c28928376cacd73ebedddc83b23cca208996f3,2025-01-16T20:15:41.617000 +CVE-2025-23628,1,1,e5185cd4b4fd73287ded2ad84fed082e8b618b2e894a5fc5f48fcb405d8bccd5,2025-01-23T16:15:38.547000 +CVE-2025-23629,1,1,70db2a49138b7c82bc30ad5d42d8884c6c0b19a0e7b22ac25b1729813fdde50d,2025-01-23T16:15:38.690000 CVE-2025-23630,0,0,b208c37b8385004cf5b9ab8d1ec82d31a1f5c74f6a94ffaf184ddae9429cddca,2025-01-22T15:15:19.877000 CVE-2025-23631,0,0,02f6d9465957d5054c431116ffffa3869b38bff6e84764dd8de2115daaa0a23a,2025-01-22T15:15:20.013000 +CVE-2025-23634,1,1,390adeebfff44ba4f5641b1783327c4b690697c42f732ffbf294ab7957288c76,2025-01-23T16:15:38.840000 +CVE-2025-23636,1,1,c9d16644b64e863e52791e93ca544c60202669ef2b5540fe69899ec81d2d7af3,2025-01-23T16:15:38.983000 CVE-2025-23639,0,0,b5e6c8257038b7490893c42ae7e3121aaccdfc060b9557b2c3eb27b9ad45934a,2025-01-16T20:15:41.763000 CVE-2025-23640,0,0,118e59034a736b15100f4213d9ad0026082135513d4f080af852d559dd80b4a0,2025-01-16T20:15:41.900000 CVE-2025-23641,0,0,7d997794a239066a0b1939bc772f48c377254fbba43ec4f01793fcc89efd7a16,2025-01-16T20:15:42.037000 @@ -278465,7 +278481,15 @@ CVE-2025-23713,0,0,e91ea4a4691cd6ea54cef5c014a380cbfb6e447d22416c2178d1e94d8d5e4 CVE-2025-23715,0,0,0640be33a6d521fa9ce6237978250a0e811e0054ca0a5799459a317b8874e4f3,2025-01-16T20:15:46.083000 CVE-2025-23717,0,0,79ec33c46c47146faede274dbb2e9b9df8747f6c2068f93e33c80d094e53ab2c,2025-01-16T20:15:46.247000 CVE-2025-23720,0,0,4f4258f5d82ee9a1c0adeb945db0c0e48cfc2254164386bb711744a2792e3be7,2025-01-16T20:15:46.397000 +CVE-2025-23722,1,1,0bcf58571cf873fc32169d20f13492478ddad9dbf8aaa979500b5b187b33c3be,2025-01-23T16:15:39.117000 +CVE-2025-23723,1,1,5f1ed318679bc99feea02fe6ddf6eaccade9bab6d893906a7ee5b6607115daa2,2025-01-23T16:15:39.260000 +CVE-2025-23724,1,1,58c5ebb527482973d07236a4ca9c79f34bc3e1269b530b5a36db7bb6411ba342,2025-01-23T16:15:39.387000 +CVE-2025-23725,1,1,71e3ffb043f554f65e4a7c23cf8ae19d3747dc9e5b8aeaaa4e7167a6f24624d3,2025-01-23T16:15:39.530000 +CVE-2025-23727,1,1,45eb30236fef8fb03a932f5da091eda55c76701a71c1117e393ac46a51058046,2025-01-23T16:15:39.660000 +CVE-2025-23729,1,1,ebf4ec956b33e866685666fcd6ca263cec7e1cdc00d9556d6f6950174b569d94,2025-01-23T16:15:39.790000 +CVE-2025-23730,1,1,8b973f814ba7f4f98ea0989788a9aab43aba0996496fe63c05892753cfe4a4f6,2025-01-23T16:15:39.933000 CVE-2025-23732,0,0,f9c2c6f51463d41e0549eb7ece41c4bdf20f17f0aaca7cc5f9b2be741123ae8a,2025-01-22T15:15:22.640000 +CVE-2025-23733,1,1,81145a53a5d8d9ec9d46ceb599117071c92bb0ebe06808e5ffa0db26d38e0803,2025-01-23T16:15:40.073000 CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827cf0,2025-01-16T20:15:46.550000 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 CVE-2025-23746,0,0,7dbcfbc8753c7d90992ff04e5fd6d512faf8dd958e556fda8c0f424e0b99fb1e,2025-01-22T15:15:22.783000 @@ -278528,6 +278552,9 @@ CVE-2025-23830,0,0,b29c1dbb724e30118134483053c6856e5726b7a86f2f6d719fdcfca154e0a CVE-2025-23831,0,0,5197c9bfacc7e149482a79695ac12aead57f227753093688448b8bbc9868aa27,2025-01-16T21:15:24.360000 CVE-2025-23832,0,0,2679ff496b3a637ccd709dc676c5ecac70472f75fa8b558e60904410452695ff,2025-01-16T21:15:24.510000 CVE-2025-23833,0,0,4c637caa193ae54ea0fefd3799a58624823ed2bc221582b8c4c01c5796d4268d,2025-01-16T21:15:24.653000 +CVE-2025-23834,1,1,1dbd748210f1b6e4635c8b08763efddafce0123e23c5ca71c936fb8159d0def2,2025-01-23T16:15:40.203000 +CVE-2025-23835,1,1,7606968f85d01f1864ef71b7633253161c612c581c429178930cbdba5dc0a24f,2025-01-23T16:15:40.353000 +CVE-2025-23836,1,1,24a495984b66d46312cacf8bd7c83dca80ef9354b162ccd466b02fb58fc23980,2025-01-23T16:15:40.497000 CVE-2025-23841,0,0,c097c459c2277c131514a3ea078b91eba98a25a334eaa639de34719734a5222a,2025-01-16T21:15:24.793000 CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d36f,2025-01-16T21:15:24.940000 CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 @@ -278564,6 +278591,7 @@ CVE-2025-23890,0,0,06096d84655a8da17a5b965f3272a549498ff12dc69e0803b4b53bf2d3e51 CVE-2025-23891,0,0,067509fca70a94da8bfba15188aa14a59b65e478f2187e1845f8151c6444963f,2025-01-16T21:15:30.417000 CVE-2025-23892,0,0,2815c48f9855c15c2bcac6a572f7de134068a4319b8bd6e8a763867a75cbfad5,2025-01-16T21:15:30.580000 CVE-2025-23893,0,0,a4a9f6251fc57ea25ea019d27ce11802eb6e7a61659770654bba0552cdead6b7,2025-01-16T21:15:30.797000 +CVE-2025-23894,1,1,4792914def3e38d1f4d1c9be4b4b323c528b212c91d29c466d00f6210a22499c,2025-01-23T16:15:40.637000 CVE-2025-23895,0,0,0f6552a4efe4730b5fca6c1776d00ca6c96003dac49556dc3bb1c6b196286682,2025-01-16T21:15:30.967000 CVE-2025-23896,0,0,69eaaa34a46e8604218c9d61f1ccb999822d545454f0b80f6a3f239fa3cba4e3,2025-01-16T21:15:31.137000 CVE-2025-23897,0,0,b2f6344d86a531aa7a0520ca26d3ad0846e4161c55365af159a9362ee03debee,2025-01-16T21:15:31.310000 @@ -278618,6 +278646,7 @@ CVE-2025-23954,0,0,c0b532e328dfa85d7de261ede6d898c1c93d187c5ff87f67c3d88a90ff144 CVE-2025-23955,0,0,b35ff47ed4400b2edb51393bc234d7c4ad9797e847fec68985488245984a054d,2025-01-16T21:15:37.277000 CVE-2025-23957,0,0,40b759ae20a341b30b3caf9db81dbe00398828638d81ba3346ad7f7cf25fc424,2025-01-16T21:15:37.420000 CVE-2025-23959,0,0,2b2438fe3b4602dbb82e2518e6b22fd87132fb61763724b02645b4f69574a537,2025-01-22T15:15:26.810000 +CVE-2025-23960,1,1,7e2ccea401d4e23a57a3b992ccc579da3606ae0f3c4d83461c2158f3c524421b,2025-01-23T16:15:40.777000 CVE-2025-23961,0,0,36c0da688ed3e8548f86716b57ea278db435c869e71f4caf3f9de5e6869464d4,2025-01-16T21:15:37.573000 CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96317,2025-01-16T21:15:37.730000 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 @@ -278643,12 +278672,12 @@ CVE-2025-24027,0,0,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe CVE-2025-24030,0,0,e2fd122b8248f003d111dc0b5ddf9576f531248dec679d6a485c837f76e061a9,2025-01-23T04:15:07.100000 CVE-2025-24337,0,0,07d30bbea6dfa209bcd4c6bc43756d477d6586721f50f7d7909041753d5deb68,2025-01-20T14:15:27.130000 CVE-2025-24397,0,0,d430d6aa8f08fd4c26e342c2b09b90b4f880b934adb5c18e9134d1e933ec60ad,2025-01-22T17:15:13.670000 -CVE-2025-24398,0,0,48c31aa301bd0a48a78b3e6eba3bfa7b566cf7d156802a7875229bb9babc97ca,2025-01-22T17:15:13.760000 -CVE-2025-24399,0,0,5bb8a64b49d724b79c48ceeb609cc850dc8c108ea274d980a8a900a1bde032be,2025-01-22T17:15:13.853000 -CVE-2025-24400,0,0,f8ab734939ea6b97fabcc534fd1a831052706c8e2ee809846bc3f127307e057b,2025-01-22T17:15:13.943000 -CVE-2025-24401,0,0,40468684796e31fbf9aed5ce3e931a1fec92250b05bb09b39b932b5c0b3895ac,2025-01-22T17:15:14.027000 -CVE-2025-24402,0,0,61a441b8accaabd61cac3ab1e0196fdf648793b5cc4795c5f3be3d8707fcec1f,2025-01-22T17:15:14.123000 -CVE-2025-24403,0,0,bc2346c7581eaac0002782f8107a5554db86b793625d4fa4e5ceb82e296bb787,2025-01-22T17:15:14.220000 +CVE-2025-24398,0,1,17fdec77669ad9ad2442f8bfcba68e0f31676d9e19986be37cb27c2c0527b869,2025-01-23T16:15:40.920000 +CVE-2025-24399,0,1,5022626df407f9335397c8d8aa775d254829312030eabbf3f85ce199b116608f,2025-01-23T15:15:13.440000 +CVE-2025-24400,0,1,d4e33d3f64ab5857e07ca7edc1c70e091d835e180e9973f0447b96fc45e314ae,2025-01-23T15:15:13.570000 +CVE-2025-24401,0,1,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000 +CVE-2025-24402,0,1,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000 +CVE-2025-24403,0,1,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000 CVE-2025-24456,0,0,5fe51cb996c5e88ea28ff025771c6fdd6bead7226d83716177b689e9ee536362,2025-01-21T18:15:18.320000 CVE-2025-24457,0,0,0d337221a417a095ea0eb470ff71de9036b70c5502b7158bdb2ff26e48b1123e,2025-01-21T18:15:18.520000 CVE-2025-24458,0,0,d40186eb9e20b87dbfe22ca8e82230b8c5ca63ed2b27afa922d0acbf4a5a6df1,2025-01-21T18:15:18.697000