From 16c148068563a6dcb05dd9725674e43b988d9e5d Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 20 Feb 2025 17:04:25 +0000 Subject: [PATCH] Auto-Update: 2025-02-20T17:00:56.445324+00:00 --- CVE-2020/CVE-2020-100xx/CVE-2020-10095.json | 43 ++++- CVE-2020/CVE-2020-134xx/CVE-2020-13481.json | 43 ++++- CVE-2020/CVE-2020-355xx/CVE-2020-35546.json | 43 ++++- CVE-2022/CVE-2022-445xx/CVE-2022-44583.json | 12 +- CVE-2023/CVE-2023-210xx/CVE-2023-21061.json | 12 +- CVE-2023/CVE-2023-210xx/CVE-2023-21067.json | 12 +- CVE-2023/CVE-2023-210xx/CVE-2023-21068.json | 12 +- CVE-2023/CVE-2023-223xx/CVE-2023-22311.json | 99 +++++++++- CVE-2023/CVE-2023-275xx/CVE-2023-27517.json | 193 +++++++++++++++++++- CVE-2023/CVE-2023-462xx/CVE-2023-46271.json | 43 ++++- CVE-2023/CVE-2023-512xx/CVE-2023-51293.json | 43 ++++- CVE-2023/CVE-2023-512xx/CVE-2023-51296.json | 43 ++++- CVE-2023/CVE-2023-512xx/CVE-2023-51298.json | 43 ++++- CVE-2023/CVE-2023-512xx/CVE-2023-51299.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51300.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51301.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51302.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51303.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51305.json | 43 ++++- CVE-2023/CVE-2023-513xx/CVE-2023-51306.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51308.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51309.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51310.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51311.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51312.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51313.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51314.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51315.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51316.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51317.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51318.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51319.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51320.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51321.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51323.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51324.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51325.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51326.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51327.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51330.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51331.json | 25 +++ CVE-2023/CVE-2023-513xx/CVE-2023-51332.json | 25 +++ CVE-2024/CVE-2024-109xx/CVE-2024-10960.json | 54 +++++- CVE-2024/CVE-2024-109xx/CVE-2024-10977.json | 111 ++++++++++- CVE-2024/CVE-2024-109xx/CVE-2024-10978.json | 136 +++++++++++++- CVE-2024/CVE-2024-122xx/CVE-2024-12213.json | 32 +++- CVE-2024/CVE-2024-122xx/CVE-2024-12296.json | 32 +++- CVE-2024/CVE-2024-123xx/CVE-2024-12386.json | 60 +++++- CVE-2024/CVE-2024-125xx/CVE-2024-12550.json | 49 ++++- CVE-2024/CVE-2024-134xx/CVE-2024-13475.json | 52 +++++- CVE-2024/CVE-2024-134xx/CVE-2024-13477.json | 59 +++++- CVE-2024/CVE-2024-134xx/CVE-2024-13480.json | 52 +++++- CVE-2024/CVE-2024-134xx/CVE-2024-13490.json | 52 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13531.json | 52 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13532.json | 57 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13543.json | 60 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13544.json | 60 +++++- CVE-2024/CVE-2024-135xx/CVE-2024-13570.json | 66 ++++++- CVE-2024/CVE-2024-136xx/CVE-2024-13612.json | 69 ++++++- CVE-2024/CVE-2024-138xx/CVE-2024-13813.json | 47 ++++- CVE-2024/CVE-2024-138xx/CVE-2024-13842.json | 113 +++++++++++- CVE-2024/CVE-2024-138xx/CVE-2024-13843.json | 128 ++++++++++++- CVE-2024/CVE-2024-216xx/CVE-2024-21687.json | 119 +++++++++++- CVE-2024/CVE-2024-216xx/CVE-2024-21689.json | 76 +++++++- CVE-2024/CVE-2024-24xx/CVE-2024-2472.json | 66 ++++++- CVE-2024/CVE-2024-373xx/CVE-2024-37361.json | 8 +- CVE-2024/CVE-2024-470xx/CVE-2024-47073.json | 50 ++++- CVE-2024/CVE-2024-479xx/CVE-2024-47908.json | 47 ++++- CVE-2024/CVE-2024-522xx/CVE-2024-52295.json | 55 +++++- CVE-2024/CVE-2024-559xx/CVE-2024-55952.json | 67 ++++++- CVE-2024/CVE-2024-559xx/CVE-2024-55953.json | 55 +++++- CVE-2024/CVE-2024-565xx/CVE-2024-56511.json | 62 ++++++- CVE-2024/CVE-2024-574xx/CVE-2024-57401.json | 25 +++ CVE-2024/CVE-2024-89xx/CVE-2024-8911.json | 32 +++- CVE-2024/CVE-2024-89xx/CVE-2024-8943.json | 42 ++++- CVE-2025/CVE-2025-01xx/CVE-2025-0161.json | 56 ++++++ CVE-2025/CVE-2025-11xx/CVE-2025-1176.json | 81 +++++++- CVE-2025/CVE-2025-11xx/CVE-2025-1177.json | 77 +++++++- CVE-2025/CVE-2025-11xx/CVE-2025-1189.json | 82 ++++++++- CVE-2025/CVE-2025-200xx/CVE-2025-20059.json | 110 +++++++++++ CVE-2025/CVE-2025-224xx/CVE-2025-22467.json | 107 ++++++++++- CVE-2025/CVE-2025-240xx/CVE-2025-24011.json | 77 +++++++- CVE-2025/CVE-2025-240xx/CVE-2025-24012.json | 60 +++++- CVE-2025/CVE-2025-248xx/CVE-2025-24896.json | 53 +++++- CVE-2025/CVE-2025-259xx/CVE-2025-25901.json | 42 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25942.json | 43 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25943.json | 43 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25944.json | 43 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25945.json | 43 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25946.json | 43 ++++- CVE-2025/CVE-2025-259xx/CVE-2025-25947.json | 43 ++++- README.md | 61 ++++++- _state.csv | 158 +++++++++------- 93 files changed, 4439 insertions(+), 302 deletions(-) create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51306.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51308.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51309.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51310.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51311.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51312.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51313.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51314.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51315.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51316.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51317.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51318.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51319.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51320.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51321.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51323.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51324.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51325.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51326.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51327.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51330.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51331.json create mode 100644 CVE-2023/CVE-2023-513xx/CVE-2023-51332.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57401.json create mode 100644 CVE-2025/CVE-2025-01xx/CVE-2025-0161.json create mode 100644 CVE-2025/CVE-2025-200xx/CVE-2025-20059.json diff --git a/CVE-2020/CVE-2020-100xx/CVE-2020-10095.json b/CVE-2020/CVE-2020-100xx/CVE-2020-10095.json index 20e43a3a756..d992955e339 100644 --- a/CVE-2020/CVE-2020-100xx/CVE-2020-10095.json +++ b/CVE-2020/CVE-2020-100xx/CVE-2020-10095.json @@ -2,16 +2,55 @@ "id": "CVE-2020-10095", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T18:15:21.953", - "lastModified": "2025-02-19T18:15:21.953", + "lastModified": "2025-02-20T16:15:32.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Various Lexmark devices have CSRF that allows an attacker to modify the configuration of the device." + }, + { + "lang": "es", + "value": "Varios dispositivos Lexmark tienen CSRF que permite a un atacante modificar la configuraci\u00f3n del dispositivo." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://support.lexmark.com/alerts/", diff --git a/CVE-2020/CVE-2020-134xx/CVE-2020-13481.json b/CVE-2020/CVE-2020-134xx/CVE-2020-13481.json index df867470cbb..a592cfe7e79 100644 --- a/CVE-2020/CVE-2020-134xx/CVE-2020-13481.json +++ b/CVE-2020/CVE-2020-134xx/CVE-2020-13481.json @@ -2,16 +2,55 @@ "id": "CVE-2020-13481", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:10.630", - "lastModified": "2025-02-19T19:15:10.630", + "lastModified": "2025-02-20T16:15:32.720", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certain Lexmark products through 2020-05-25 allow XSS which allows an attacker to obtain session credentials and other sensitive information." + }, + { + "lang": "es", + "value": "Ciertos productos Lexmark hasta 2020-05-25 permiten XSS que permite a un atacante obtener credenciales de sesi\u00f3n y otra informaci\u00f3n confidencial." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://support.lexmark.com/alerts/", diff --git a/CVE-2020/CVE-2020-355xx/CVE-2020-35546.json b/CVE-2020/CVE-2020-355xx/CVE-2020-35546.json index c989c07f1d3..5fe55bbbcf0 100644 --- a/CVE-2020/CVE-2020-355xx/CVE-2020-35546.json +++ b/CVE-2020/CVE-2020-355xx/CVE-2020-35546.json @@ -2,16 +2,55 @@ "id": "CVE-2020-35546", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:10.753", - "lastModified": "2025-02-19T19:15:10.753", + "lastModified": "2025-02-20T16:15:32.870", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Lexmark MX6500 LW75.JD.P296 and previous devices have Incorrect Access Control via the access control settings." + }, + { + "lang": "es", + "value": "Lexmark MX6500 LW75.JD.P296 y los dispositivos anteriores tienen un control de acceso incorrecto a trav\u00e9s de la configuraci\u00f3n de control de acceso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://support.lexmark.com", diff --git a/CVE-2022/CVE-2022-445xx/CVE-2022-44583.json b/CVE-2022/CVE-2022-445xx/CVE-2022-44583.json index 64645eaff08..b13be8dd39c 100644 --- a/CVE-2022/CVE-2022-445xx/CVE-2022-44583.json +++ b/CVE-2022/CVE-2022-445xx/CVE-2022-44583.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44583", "sourceIdentifier": "audit@patchstack.com", "published": "2022-11-18T23:15:28.680", - "lastModified": "2024-11-21T07:28:10.040", + "lastModified": "2025-02-20T15:15:10.123", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -69,6 +69,16 @@ "value": "CWE-552" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21061.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21061.json index c1677dd5985..4716e870736 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21061.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21061.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21061", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.700", - "lastModified": "2024-11-21T07:42:05.357", + "lastModified": "2025-02-20T16:15:33.217", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21067.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21067.json index fdea26147e1..d0cdfd80b41 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21067.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21067.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21067", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.873", - "lastModified": "2024-11-21T07:42:06.067", + "lastModified": "2025-02-20T16:15:33.510", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21068.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21068.json index e0d57357c1a..1aae06743e7 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21068.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21068.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21068", "sourceIdentifier": "security@android.com", "published": "2023-03-24T20:15:14.907", - "lastModified": "2024-11-21T07:42:06.187", + "lastModified": "2025-02-20T16:15:33.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -45,6 +45,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json index f092e63e87a..d3666c5bf7c 100644 --- a/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json +++ b/CVE-2023/CVE-2023-223xx/CVE-2023-22311.json @@ -2,8 +2,8 @@ "id": "CVE-2023-22311", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:38.517", - "lastModified": "2024-11-21T07:44:30.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:02:08.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,87 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "01.00.00.3547", + "matchCriteriaId": "2B89B9F7-B599-4A97-9938-64D37065370C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90" + } + ] + } + ] } ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json index 3cc187595da..bbaf5b690c8 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27517.json @@ -2,8 +2,8 @@ "id": "CVE-2023-27517", "sourceIdentifier": "secure@intel.com", "published": "2024-02-14T14:15:47.313", - "lastModified": "2024-11-21T07:53:04.653", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:10:10.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,181 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "01.00.00.3072", + "versionEndExcluding": "01.00.00.3547", + "matchCriteriaId": "EC0ABBD3-228C-4F02-8BC9-2545FC57E49A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd128gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EA3959A-A077-420F-9CF0-FCF926F78A1B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd128gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C49C3C48-9452-417D-91A3-6282A5DF564E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd256gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DF7A9E1-9610-42F8-BE3C-50B6C70EC2CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd256gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E29B5FFA-FD00-490D-9E33-2ADC23369773" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd512gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77357E64-833C-46E7-B84F-29F7ED3D0F31" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nma1xxd512gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1E373F80-B81E-4B7F-9407-DD918E39DA90" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "02.00.00.3423", + "versionEndExcluding": "02.00.00.3915", + "matchCriteriaId": "3CA941AF-27A6-47B7-B2BC-1D9A88444664" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd128gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBED201B-A64E-441E-A952-B3C8C56F87C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd128gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29CD8FF9-DA6B-4293-8F4B-8B4A02C4C1E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd256gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "905C0399-6E5D-4D42-AA3D-D0ECC9117D9A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd256gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E7380A6-CB51-4205-AAD7-AB75AB2638B5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd512gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A86746AA-047D-4F7F-BD7F-0D18BF47F5EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmb1xxd512gpsuf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A3BC795-DAA0-48C5-BEBC-4A96B4FD3D0F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:intel:optane_persistent_memory_firmware:*:*:*:*:*:*:*:*", + "versionStartIncluding": "03.00.00.0302", + "versionEndExcluding": "03.00.00.0483", + "matchCriteriaId": "C5AB913F-BA30-4911-BC6F-083DFF14F9E6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmc2xxd128gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8D76D5AB-0CF5-40E5-8DA5-31E27F58F236" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmc2xxd256gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "541DF110-3539-4F20-BAE9-039A969B1763" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:intel:nmc2xxd512gpsu4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F1535ED-13DC-4C08-BA2D-E8BE50C4A6CD" + } + ] + } + ] } ], "references": [ { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", - "source": "secure@intel.com" + "source": "secure@intel.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00948.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-462xx/CVE-2023-46271.json b/CVE-2023/CVE-2023-462xx/CVE-2023-46271.json index 11687f1d3b3..9c41847bf89 100644 --- a/CVE-2023/CVE-2023-462xx/CVE-2023-46271.json +++ b/CVE-2023/CVE-2023-462xx/CVE-2023-46271.json @@ -2,16 +2,55 @@ "id": "CVE-2023-46271", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:13.797", - "lastModified": "2025-02-19T19:15:13.797", + "lastModified": "2025-02-20T16:15:34.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Extreme Networks IQ Engine before 10.6r1a, and through 10.6r4 before 10.6r5, has a buffer overflow. This issue arises from the ah_webui service, which listens on TCP port 3009 by default." + }, + { + "lang": "es", + "value": "Extreme Networks IQ Engine antes de 10.6R1A, y hasta 10.6R4 antes de 10.6R5, tiene un desbordamiento de b\u00fafer. Este problema surge del servicio Ah_Webui, que escucha en el puerto TCP 3009 de forma predeterminada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://extreme-networks.my.site.com/ExtrArticleDetail?an=000115354&q=CVE-2023-46271", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51293.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51293.json index e3869bc71f1..38b9d0245c9 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51293.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51293.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51293", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:14.027", - "lastModified": "2025-02-19T19:15:14.027", + "lastModified": "2025-02-20T16:15:34.460", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Event Booking Calendar v4.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en las funciones 'Forgot Password', 'Email Settings' de PHPJabbers Event Booking Calendar v4.0 permite a los atacantes enviar una cantidad excesiva de correo electr\u00f3nico a un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://packetstormsecurity.com/files/176495/PHPJabbers-Event-Booking-Calendar-4.0-Missing-Rate-Limiting.html", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51296.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51296.json index d7ff365ce33..75c65b062c8 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51296.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51296.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51296", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T19:15:14.150", - "lastModified": "2025-02-19T19:15:14.150", + "lastModified": "2025-02-20T15:15:10.293", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters which allows attackers to execute arbitrary code" + }, + { + "lang": "es", + "value": "PHPJabbers Event Booking Calendar v4.0 es vulnerable a Cross-Site Scripting (XSS) en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" que permite a los atacantes ejecutar c\u00f3digo arbitrario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176485", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json index 7cab6508870..bbe824b4799 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51298.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51298", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T20:15:34.937", - "lastModified": "2025-02-19T20:15:34.937", + "lastModified": "2025-02-20T15:15:10.473", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Event Booking Calendar v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + }, + { + "lang": "es", + "value": "PHPJabbers Event Booking Calendar v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n CSV que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en Opciones del sistema que se utiliza para construir el archivo CSV." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 4.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://packetstormsecurity.com/files/176487/PHPJabbers-Event-Booking-Calendar-4.0-CSV-Injection.html", diff --git a/CVE-2023/CVE-2023-512xx/CVE-2023-51299.json b/CVE-2023/CVE-2023-512xx/CVE-2023-51299.json index fb9945c3afb..71d779a1d6e 100644 --- a/CVE-2023/CVE-2023-512xx/CVE-2023-51299.json +++ b/CVE-2023/CVE-2023-512xx/CVE-2023-51299.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51299", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T20:15:35.040", - "lastModified": "2025-02-19T20:15:35.040", + "lastModified": "2025-02-20T15:15:10.633", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Hotel Booking System v4.0 es vulnerable a la inyecci\u00f3n de HTML en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176488", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51300.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51300.json index ed81dbf9501..2586a7613e7 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51300.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51300.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51300", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T21:15:14.727", - "lastModified": "2025-02-19T21:15:14.727", + "lastModified": "2025-02-20T15:15:10.820", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to Cross-Site Scripting (XSS) vulnerabilities in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Hotel Booking System v4.0 es afectado por una vulnerabilidades de Cross-Site Scripting (XSS) en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176488", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51301.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51301.json index 0d92210197b..d180236a869 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51301.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51301.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51301", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T21:15:14.867", - "lastModified": "2025-02-19T21:15:14.867", + "lastModified": "2025-02-20T15:15:10.993", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A lack of rate limiting in the \"Login Section, Forgot Email\" feature of PHPJabbers Hotel Booking System v4.0 allows attackers to send an excessive amount of reset requests for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + }, + { + "lang": "es", + "value": "La falta de limitaci\u00f3n de velocidad en la funci\u00f3n \"Login Section, Forgot Email\" de HPJabbers Hotel Booking System v4.0 permite a los atacantes enviar una cantidad excesiva de solicitudes de restablecimiento para un usuario leg\u00edtimo, lo que lleva a una posible denegaci\u00f3n de servicio (DoS) a trav\u00e9s de una gran cantidad de mensajes de correo electr\u00f3nico generados." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176486", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json index 56f641f5294..0b96ad9ed90 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51302.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51302", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T21:15:14.980", - "lastModified": "2025-02-19T21:15:14.980", + "lastModified": "2025-02-20T15:15:11.173", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Hotel Booking System v4.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + }, + { + "lang": "es", + "value": "PHPJabbers Hotel Booking System v4.0 es afectado por una la vulnerabilidad de inyecci\u00f3n de CSV, lo que permite a un atacante ejecutar c\u00f3digo remoto. La vulnerabilidad existe debido a una validaci\u00f3n de entrada insuficiente en la secci\u00f3n Idiomas. Etiqueta cualquier campo de par\u00e1metros en System Options que se utiliza para construir el archivo CSV." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1236" + } + ] } ], - "metrics": {}, "references": [ { "url": "http://packetstormsecurity.com/files/176489/PHPJabbers-Hotel-Booking-System-4.0-CSV-Injection.html", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51303.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51303.json index 6717ef697da..d0db1a51753 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51303.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51303.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51303", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T21:15:15.097", - "lastModified": "2025-02-19T21:15:15.097", + "lastModified": "2025-02-20T15:15:11.333", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple HTML Injection in the \"lid, name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Event Ticketing System v1.0 es vulnerable a m\u00faltiples inyecci\u00f3n HTML en los par\u00e1metros \"lid, name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176516", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51305.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51305.json index 72079512733..b26af24c0f0 100644 --- a/CVE-2023/CVE-2023-513xx/CVE-2023-51305.json +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51305.json @@ -2,16 +2,55 @@ "id": "CVE-2023-51305", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:09.567", - "lastModified": "2025-02-19T23:15:09.567", + "lastModified": "2025-02-20T15:15:11.507", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\" parameters." + }, + { + "lang": "es", + "value": "PHPJabbers Car Park Booking System v3.0 es vulnerable a m\u00faltiples Cross-Site Scripting (XSS) Almacenado en los par\u00e1metros \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key\"." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://packetstorm.news/files/id/176491", diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json new file mode 100644 index 00000000000..8430d1b8de6 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51306.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51306", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:11.673", + "lastModified": "2025-02-20T15:15:11.673", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Event Ticketing System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"name, title\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176516", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/event-ticketing-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51308.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51308.json new file mode 100644 index 00000000000..f83635038d9 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51308.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51308", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:11.793", + "lastModified": "2025-02-20T15:15:11.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176491", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json new file mode 100644 index 00000000000..f370245d9ee --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51309.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51309", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:11.920", + "lastModified": "2025-02-20T15:15:11.920", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176492", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json new file mode 100644 index 00000000000..8a0c4518864 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51310.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51310", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.050", + "lastModified": "2025-02-20T15:15:12.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Car Park Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176492", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json new file mode 100644 index 00000000000..037912b2068 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51311.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51311", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.170", + "lastModified": "2025-02-20T15:15:12.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Car Park Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176494", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/car-park-booking/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json new file mode 100644 index 00000000000..dbd29af6308 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51312.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51312", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.293", + "lastModified": "2025-02-20T15:15:12.293", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Reservations menu, Schedule section date parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176493", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json new file mode 100644 index 00000000000..a3c640f38a2 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51313.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51313", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.437", + "lastModified": "2025-02-20T15:15:12.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://packetstormsecurity.com/files/176498/PHPJabbers-Restaurant-Booking-System-3.0-CSV-Injection.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51314.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51314.json new file mode 100644 index 00000000000..4c4d8a3cfd3 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51314.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51314", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.563", + "lastModified": "2025-02-20T15:15:12.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password', 'Email Settings' feature of PHPJabbers Restaurant Booking System v3.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176496", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json new file mode 100644 index 00000000000..447ad41890f --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51315.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51315", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.680", + "lastModified": "2025-02-20T15:15:12.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"seat_name, plugin_sms_api_key, plugin_sms_country_code, title, name\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176493", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json new file mode 100644 index 00000000000..5266bacd2cc --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51316.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51316", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:12.810", + "lastModified": "2025-02-20T15:15:12.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Bus Reservation System v1.1 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176497", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json new file mode 100644 index 00000000000..f2980f8ec1d --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51317.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51317", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:34.600", + "lastModified": "2025-02-20T16:15:34.600", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Restaurant Booking System v3.0 is vulnerable to Multiple HTML Injection in the \"name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key, title\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176493", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/restaurant-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json new file mode 100644 index 00000000000..78a5b4cad9f --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51318.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51318", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:34.703", + "lastModified": "2025-02-20T16:15:34.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176499", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json new file mode 100644 index 00000000000..4d7419cd682 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51319.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51319", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:34.803", + "lastModified": "2025-02-20T16:15:34.803", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Bus Reservation System v1.1 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176500", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/bus-reservation-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json new file mode 100644 index 00000000000..b12e7e0a3c4 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51320.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51320", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:34.903", + "lastModified": "2025-02-20T16:15:34.903", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Night Club Booking Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176501", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/night-club-booking-software/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51321.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51321.json new file mode 100644 index 00000000000..a0cca734814 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51321.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51321", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.007", + "lastModified": "2025-02-20T16:15:35.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Night Club Booking Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176502", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/night-club-booking-software/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51323.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51323.json new file mode 100644 index 00000000000..5064bb86dbe --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51323.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51323", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.110", + "lastModified": "2025-02-20T16:15:35.110", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Shared Asset Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176503", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51324.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51324.json new file mode 100644 index 00000000000..a7967c72f35 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51324.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51324", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.210", + "lastModified": "2025-02-20T16:15:35.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176504", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json new file mode 100644 index 00000000000..98a2e82579b --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51325.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51325", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.330", + "lastModified": "2025-02-20T16:15:35.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Shared Asset Booking System v1.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the \"title, name\" parameters." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176505", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/shared-asset-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51326.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51326.json new file mode 100644 index 00000000000..96c7f3a6d55 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51326.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51326", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.437", + "lastModified": "2025-02-20T16:15:35.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176506", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51327.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51327.json new file mode 100644 index 00000000000..5fa1881ecb9 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51327.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51327", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.543", + "lastModified": "2025-02-20T16:15:35.543", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Cleaning Business Software v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176506", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json new file mode 100644 index 00000000000..46a1d1700dd --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51330.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51330", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.647", + "lastModified": "2025-02-20T16:15:35.647", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Cinema Booking System v1.0 is vulnerable to Reflected Cross-Site Scripting (XSS) in Now Showing menu \"date\" parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176508", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cinema-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51331.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51331.json new file mode 100644 index 00000000000..fc7b65e2f0a --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51331.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51331", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.750", + "lastModified": "2025-02-20T16:15:35.750", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PHPJabbers Cleaning Business Software v1.0 is vulnerable to CSV Injection vulnerability which allows an attacker to execute remote code. The vulnerability exists due to insufficient input validation on Languages section Labels any parameters field in System Options that is used to construct CSV file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176509", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/cleaning-business-software/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json new file mode 100644 index 00000000000..1be5bf9a625 --- /dev/null +++ b/CVE-2023/CVE-2023-513xx/CVE-2023-51332.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2023-51332", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T16:15:35.850", + "lastModified": "2025-02-20T16:15:35.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A lack of rate limiting in the 'Forgot Password' feature of PHPJabbers Meeting Room Booking System v1.0 allows attackers to send an excessive amount of email for a legitimate user, leading to a possible Denial of Service (DoS) via a large amount of generated e-mail messages." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://packetstorm.news/files/id/176510", + "source": "cve@mitre.org" + }, + { + "url": "https://www.phpjabbers.com/meeting-room-booking-system/#sectionDemo", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json index 38997b8b353..a075c6f09dc 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10960.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10960", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.027", - "lastModified": "2025-02-12T12:15:28.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:26:54.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brizy:brizy:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "318CE83C-F93C-4B84-AACF-541CDB997487" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3222672/brizy/tags/2.6.5/editor/zip/archiver.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/2f0c85f4-07ae-4a2b-bd82-93467e7d9325?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json index 6122273b88b..b40b5956989 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10977.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10977", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.023", - "lastModified": "2024-11-15T13:58:08.913", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:38:01.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 } ] }, @@ -49,12 +69,97 @@ "value": "CWE-348" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.21", + "matchCriteriaId": "433D59A0-8811-4DDB-A9F7-D85C62F905CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.17", + "matchCriteriaId": "380F8048-FBE5-4606-93A3-915CFD229317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.14", + "matchCriteriaId": "FACF31C7-3B20-4BAE-A596-9C59D67406D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9", + "matchCriteriaId": "DF12F1A2-3179-4DAC-B728-038B94954DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.5", + "matchCriteriaId": "353CBD91-FC28-4DA3-B79A-F4F4DC80FA93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:-:*:*:*:*:*:*", + "matchCriteriaId": "554F297F-6688-4242-9618-40A3A017D246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "2012E2E6-9A7A-4EA8-AE7C-5CB3486CE9DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "354785D4-62F8-49C6-BFE6-D7AFEF7BE28F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "EB5B99AA-AEDF-4730-824E-3A09D47B19DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "9C88EECA-C66E-4FCF-BA4A-7581516B2471" + } + ] + } + ] } ], "references": [ { "url": "https://www.postgresql.org/support/security/CVE-2024-10977/", - "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json index 53a081fdfc9..b68dee775f0 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10978.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10978", "sourceIdentifier": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", "published": "2024-11-14T13:15:04.217", - "lastModified": "2024-11-21T22:15:07.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:41:14.847", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 2.5 } ] }, @@ -49,20 +69,126 @@ "value": "CWE-266" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.0", + "versionEndExcluding": "12.21", + "matchCriteriaId": "433D59A0-8811-4DDB-A9F7-D85C62F905CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "13.0", + "versionEndExcluding": "13.17", + "matchCriteriaId": "380F8048-FBE5-4606-93A3-915CFD229317" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0", + "versionEndExcluding": "14.14", + "matchCriteriaId": "FACF31C7-3B20-4BAE-A596-9C59D67406D8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9", + "matchCriteriaId": "DF12F1A2-3179-4DAC-B728-038B94954DC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.5", + "matchCriteriaId": "353CBD91-FC28-4DA3-B79A-F4F4DC80FA93" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:-:*:*:*:*:*:*", + "matchCriteriaId": "554F297F-6688-4242-9618-40A3A017D246" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta1:*:*:*:*:*:*", + "matchCriteriaId": "2012E2E6-9A7A-4EA8-AE7C-5CB3486CE9DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta2:*:*:*:*:*:*", + "matchCriteriaId": "354785D4-62F8-49C6-BFE6-D7AFEF7BE28F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:beta3:*:*:*:*:*:*", + "matchCriteriaId": "EB5B99AA-AEDF-4730-824E-3A09D47B19DE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:postgresql:postgresql:17.0:rc1:*:*:*:*:*:*", + "matchCriteriaId": "9C88EECA-C66E-4FCF-BA4A-7581516B2471" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", + "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED" + } + ] + } + ] } ], "references": [ { "url": "https://www.postgresql.org/support/security/CVE-2024-10978/", - "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007" + "source": "f86ef6dc-4d3a-42ad-8f28-e6d5547a5007", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://lists.debian.org/debian-lts-announce/2024/11/msg00018.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] }, { "url": "https://www.postgresql.org/message-id/173171334532.1547978.1518068370217143844%40wrigleys.postgresql.org", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json index 1612efa2191..20e5e2497d0 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12213", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:08.737", - "lastModified": "2025-02-12T10:15:08.737", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:08:26.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apusthemes:superio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.2.76", + "matchCriteriaId": "A4A0A3BE-CD17-439E-8D5E-BB09F2FB6393" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cdfce88-b6c2-4820-9d6f-446f61b9b596?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json index ac3a04ca70c..c23b4eb33ee 100644 --- a/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12296", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:10.230", - "lastModified": "2025-02-12T10:15:10.230", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:09:14.287", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:apusthemes:superio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "CE1F8192-5CDF-4141-84BE-843F20F4FB41" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/superio-job-board-wordpress-theme/32180231", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dda2c437-8f41-480a-8816-2c07ab0eafa7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json index baa06f6f6fd..df624b4f8b2 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12386", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.470", - "lastModified": "2025-02-12T12:15:28.470", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:29:39.023", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,18 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kevonadonis:wp_abstracts:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.4", + "matchCriteriaId": "3374C421-D69B-452C-B5B2-A2E6923D5108" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3238664/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-abstracts-manuscripts-manager/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/efd27466-f68e-4d8a-a1ec-90dbb6ff126b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json b/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json index 0e7de01f9e1..4a005d29225 100644 --- a/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json +++ b/CVE-2024/CVE-2024-125xx/CVE-2024-12550.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12550", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2025-02-11T20:15:33.800", - "lastModified": "2025-02-11T20:15:33.800", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:05:43.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,10 +73,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:tungstenautomation:power_pdf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.1.1.2", + "matchCriteriaId": "D76CD6D0-3E8B-41E9-8517-0EA4A97B546A" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1678/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json index 13ccd9cdad7..d2d38548312 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13475.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13475", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.777", - "lastModified": "2025-02-12T10:15:11.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:10:58.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:small_package_quotes:*:*:*:*:ups:wordpress:*:*", + "versionEndExcluding": "4.5.17", + "matchCriteriaId": "44F7F55A-509C-4A87-82F2-687963772590" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3237693/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c62680b5-e9e0-497f-b957-9b223a623917?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json index 351e91f82e5..f303ca27e86 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13477", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.660", - "lastModified": "2025-02-12T12:15:28.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:30:34.457", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:unishippers:wordpress:*:*", + "versionEndExcluding": "2.5.9", + "matchCriteriaId": "906F6C5E-C28C-4D74-8075-B1A68ADB7587" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/ltl-freight-quotes-unishippers-edition/trunk/shipping-rules/shipping-rules-save.php#L84", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3237773/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7df452c9-4e73-40d7-88a3-d38ae1309d8f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json index dd1b5f86d3c..21e41eb9804 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13480.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13480", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:28.840", - "lastModified": "2025-02-12T12:15:28.840", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:31:52.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.4.2", + "matchCriteriaId": "5BD5C40E-CE22-4B19-B3E9-F339AF329837" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3238359%40ltl-freight-quotes-fedex-freight-edition&new=3238359%40ltl-freight-quotes-fedex-freight-edition&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a9b6f7a3-83eb-4352-9db6-ab4b03241702?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json index b955ecb168a..9cec0b39b2d 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13490.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13490", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:11.973", - "lastModified": "2025-02-12T10:15:11.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:14:27.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:ltl_freight_quotes:*:*:*:*:xpo:wordpress:*:*", + "versionEndExcluding": "4.3.8", + "matchCriteriaId": "764495F1-C5FC-4509-B77A-10FC58EA274A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3235163", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8bcfbc26-9b5d-4df8-9f16-293734bd2805?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json index cf183b7dba8..f2c669ab13f 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13531.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13531", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T10:15:12.317", - "lastModified": "2025-02-12T10:15:12.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:23:02.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:shipengine_shipping_quotes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.8", + "matchCriteriaId": "4B0A0928-3B54-4E11-8610-4FD5A0F95917" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/shipengine-shipping-quotes/trunk/admin/tab/shipping-rules/shipping-rules-save.php#L77", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cbb7bdcf-9f93-4c86-a4b3-ad5aaf7521b0?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json index 80e4f6eb871..5b67f2c6b2f 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13532.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13532", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-12T12:15:29.023", - "lastModified": "2025-02-12T12:15:29.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:46:25.600", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:enituretechnology:small_package_quotes:*:*:*:*:purolator:wordpress:*:*", + "versionEndExcluding": "3.6.5", + "matchCriteriaId": "54F4E712-F24B-4EB8-9434-4E4D4D14AC7D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/small-package-quotes-purolator-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L237", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/small-package-quotes-purolator-edition/trunk/warehouse-dropship/wild/includes/wild-delivery-save.php#L346", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/813fe9d2-913c-4e04-bcb7-443eef95c62e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json index 50bb7755c61..e7acddb32d2 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13543", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.373", - "lastModified": "2025-02-11T15:15:16.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:09:08.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amini7:zarinpal_paid_download:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "CD1F1B65-28B6-4ECB-B626-D35750D718B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/04a545c4-75d3-4672-8530-00bb879991ca/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json index 49d3c6711ce..3ad9ac2e545 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13544.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13544", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.650", - "lastModified": "2025-02-11T16:15:38.953", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:11:08.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,10 +59,44 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:amini7:zarinpal_paid_download:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.3", + "matchCriteriaId": "CD1F1B65-28B6-4ECB-B626-D35750D718B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/91884263-62a7-436e-b19f-682b1aeb37d6/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json index 739d20620bc..e80ca42e3dc 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13570.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13570", "sourceIdentifier": "contact@wpscan.com", "published": "2025-02-11T06:15:19.757", - "lastModified": "2025-02-11T16:15:39.090", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:12:22.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -39,14 +59,52 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:unalignedcode:stray_random_quotes:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.9.9", + "matchCriteriaId": "A79DB7A8-270F-45E5-89C6-0A88CEDBB4E5" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/26019036-f7e4-4ef5-85d4-7d5fda18823e/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/26019036-f7e4-4ef5-85d4-7d5fda18823e/", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json index 6e50f48ec5b..ce99eb4342f 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13612.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13612", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-01T13:15:21.320", - "lastModified": "2025-02-01T13:15:21.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:51:45.987", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,26 +71,59 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wordplus:better_messages:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.0", + "matchCriteriaId": "8A9095B1-8B7F-4903-AC23-8F0EEDBD312B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L125", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L127", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bp-better-messages/trunk/inc/shortcodes.php#L84", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3228965/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/169a857f-1ae0-40f6-8a34-10c573af59c5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json index 556b5d8fe6c..5949e5ce667 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13813", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.220", - "lastModified": "2025-02-11T16:15:39.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:56:04.087", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:secure_access_client:*:*:*:*:*:*:*:*", + "versionEndExcluding": "22.8", + "matchCriteriaId": "8EAE3670-4566-437C-80BF-2F116C93F06F" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json index 2241177aedd..421e6d7b041 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13842.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13842", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.513", - "lastModified": "2025-02-11T16:15:39.513", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:55:29.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,97 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.7", + "matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.7", + "matchCriteriaId": "DA65DC97-7E46-4C59-B8D4-E4EB4EDCD735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json b/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json index 2ef44424f40..22cc66cc0fa 100644 --- a/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json +++ b/CVE-2024/CVE-2024-138xx/CVE-2024-13843.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13843", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:39.667", - "lastModified": "2025-02-11T16:15:39.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:55:03.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.5, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,112 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.7", + "matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", + "matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*", + "matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*", + "matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.7", + "matchCriteriaId": "DA65DC97-7E46-4C59-B8D4-E4EB4EDCD735" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "FD9BE8C2-43EB-4870-A4B7-267CB17A19F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "C8915BB2-C1C0-4189-A847-DDB2EF161D62" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "8D24A8DB-D697-4C60-935D-B08EE36861CB" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json index 78eba99f260..96db9f2dd2b 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21687.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21687", "sourceIdentifier": "security@atlassian.com", "published": "2024-07-16T21:15:10.257", - "lastModified": "2024-11-21T08:54:51.880", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:20:02.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,22 +61,107 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.0.0", + "versionEndIncluding": "9.0.4", + "matchCriteriaId": "69A262E8-0C7E-4587-80DB-AEB806FDBB36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndIncluding": "9.1.3", + "matchCriteriaId": "B2E98284-0236-4BBE-9156-42BF39807DC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.2.0", + "versionEndExcluding": "9.2.16", + "matchCriteriaId": "858999DA-5F02-4F34-9776-C17BC35394AC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndIncluding": "9.3.6", + "matchCriteriaId": "0323B84C-7B7B-4FD2-A69B-8B0476543E32" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.4.0", + "versionEndIncluding": "9.4.3", + "matchCriteriaId": "F7848670-8093-4AD5-940F-33CCA7B085D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.5.0", + "versionEndIncluding": "9.5.4", + "matchCriteriaId": "F092DC7A-32B5-4B7C-819B-A7C05D25174C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.6.0", + "versionEndExcluding": "9.6.4", + "matchCriteriaId": "44EB1487-771C-479E-B986-7F1B582B1FB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/BAM-25822", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1417150917", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/BAM-25822", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json index 5ae38e86a85..e6214e67cca 100644 --- a/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json +++ b/CVE-2024/CVE-2024-216xx/CVE-2024-21689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21689", "sourceIdentifier": "security@atlassian.com", "published": "2024-08-20T10:15:04.103", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:23:21.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "security@atlassian.com", @@ -39,14 +61,60 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.1.0", + "versionEndExcluding": "9.2.17", + "matchCriteriaId": "B5EC3F5F-AFF0-4FAD-AFC9-4BE967319F82" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:atlassian:bamboo:*:*:*:*:*:*:*:*", + "versionStartIncluding": "9.3.0", + "versionEndExcluding": "9.6.5", + "matchCriteriaId": "52F810C2-8E16-4B1A-B426-54CE82067349" + } + ] + } + ] + } + ], "references": [ { "url": "https://confluence.atlassian.com/pages/viewpage.action?pageId=1431535667", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] }, { "url": "https://jira.atlassian.com/browse/BAM-25858", - "source": "security@atlassian.com" + "source": "security@atlassian.com", + "tags": [ + "Issue Tracking", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json index bffb2195f4b..d9223b4c8c9 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2472.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2472", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-14T10:15:09.403", - "lastModified": "2024-11-21T09:09:49.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:28:10.360", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,80 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.9.91", + "matchCriteriaId": "75F8EEAD-23DD-4963-AD95-5FAE483DD933" + } + ] + } + ] + } + ], "references": [ { "url": "https://aramhairchitects.nl/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Not Applicable" + ] }, { "url": "https://wpdocs.latepoint.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://aramhairchitects.nl/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Not Applicable" + ] }, { "url": "https://wpdocs.latepoint.com/changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product", + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6215fa9f-06bc-4dc8-b1f5-a3bb75749f1d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-373xx/CVE-2024-37361.json b/CVE-2024/CVE-2024-373xx/CVE-2024-37361.json index b73da1cd1d7..f71a8bf8a57 100644 --- a/CVE-2024/CVE-2024-373xx/CVE-2024-37361.json +++ b/CVE-2024/CVE-2024-373xx/CVE-2024-37361.json @@ -2,13 +2,17 @@ "id": "CVE-2024-37361", "sourceIdentifier": "security.vulnerabilities@hitachivantara.com", "published": "2025-02-20T00:15:19.507", - "lastModified": "2025-02-20T00:15:19.507", + "lastModified": "2025-02-20T15:15:13.190", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)\n\n\n\n\u00a0\n\n\n\nHitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parser to approved classes and methods.\n\n\n\n\u00a0\n\n\n\nWhen developers place no restrictions on \"gadget chains,\" or series of instances and method invocations that can self-execute during the deserialization process (i.e., before the object is returned to the caller), it is sometimes possible for attackers to leverage them to perform unauthorized actions." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n deserializa datos no confiables sin verificar suficientemente que los datos resultantes sean v\u00e1lidos. (CWE-502) Las versiones de Hitachi Vantara Pentaho Business Analytics Server anteriores a 10.2.0.0 y 9.3.0.9, incluida la 8.3.x, deserializan datos JSON no confiables sin restringir el analizador a clases y m\u00e9todos aprobados. Cuando los desarrolladores no imponen restricciones a las \"gadget chains\", o series de instancias e invocaciones de m\u00e9todos que pueden autoejecutarse durante el proceso de deserializaci\u00f3n (es decir, antes de que el objeto se devuelva al autor de la llamada), a veces es posible que los atacantes las aprovechen para realizar acciones no autorizadas." } ], "metrics": { @@ -49,7 +53,7 @@ ], "references": [ { - "url": "https://support.pentaho.com/hc/en-us/articles/34298351866893--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37360", + "url": "https://support.pentaho.com/hc/en-us/articles/34299135441805--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Deserialization-of-Untrusted-Data-Versions-before-10-2-0-0-and-9-3-0-9-including-8-3-x-Impacted-CVE-2024-37361", "source": "security.vulnerabilities@hitachivantara.com" } ] diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json index 2b0a1e8ef49..c33d639f759 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47073.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47073", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-07T18:15:17.417", - "lastModified": "2024-11-21T17:15:16.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:20:40.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,10 +95,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.2", + "matchCriteriaId": "20187B9D-2856-4B83-A276-B880611ACA6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-5jr4-wrm2-xj36", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json b/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json index 795b7b143c3..20240b1a314 100644 --- a/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json +++ b/CVE-2024/CVE-2024-479xx/CVE-2024-47908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47908", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:40.247", - "lastModified": "2025-02-11T16:15:40.247", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:57:06.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:cloud_services_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.0.5", + "matchCriteriaId": "7E3F8B56-228C-4AE0-9521-16EA5FC3463E" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Cloud-Services-Application-CSA-CVE-2024-47908-CVE-2024-11771", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json b/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json index 29a20cfef81..64b9d0a73f5 100644 --- a/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json +++ b/CVE-2024/CVE-2024-522xx/CVE-2024-52295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-52295", "sourceIdentifier": "security-advisories@github.com", "published": "2024-11-13T16:15:19.550", - "lastModified": "2024-11-21T15:15:32.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:21:26.323", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.2", + "matchCriteriaId": "20187B9D-2856-4B83-A276-B880611ACA6E" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dataease/dataease/commit/e755248d59543bcd668ace495f293ff735fa82e9", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-45v9-gfcv-xcq6", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json index cc8c2d12c54..0eb5a4d7d4d 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55952.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55952", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-18T19:15:11.933", - "lastModified": "2024-12-18T19:15:11.933", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:22:50.240", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,28 +59,85 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.27", + "matchCriteriaId": "C3CA3161-CA4A-4C07-9074-2D321FE954EA" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-w8qm-xw38-93qw", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json index 3fff82a387d..073fecda76e 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55953.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55953", "sourceIdentifier": "security-advisories@github.com", "published": "2024-12-18T19:15:12.067", - "lastModified": "2024-12-18T19:15:12.067", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:25:07.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } ] }, "weaknesses": [ @@ -73,14 +95,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.18.27", + "matchCriteriaId": "C3CA3161-CA4A-4C07-9074-2D321FE954EA" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/dataease/dataease/commit/0db4872a52eccf6e83dd9359aa05db52dd580ec1", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-mrf3-9q84-rcmf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json index 97598d7bb03..c494782d4cf 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56511.json @@ -2,8 +2,8 @@ "id": "CVE-2024-56511", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-10T16:15:29.510", - "lastModified": "2025-01-10T16:15:29.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:26:58.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,24 +59,78 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-289" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dataease:dataease:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "7335184A-8414-470A-98CB-6500DC6EE35E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/dataease/dataease/security/advisories/GHSA-9f69-p73j-m73x", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57401.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57401.json new file mode 100644 index 00000000000..a468fe78f51 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57401.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57401", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-20T15:15:13.347", + "lastModified": "2025-02-20T15:15:13.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Uniclare Student portal v.2 and before allows a remote attacker to execute arbitrary code via the Forgot Password function." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/aksingh82/CVE-2024-57401", + "source": "cve@mitre.org" + }, + { + "url": "https://studentportal.universitysolutions.in/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json index f4ce064e0d4..2121dd10e5a 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8911.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8911", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.077", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:30:18.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0.12", + "matchCriteriaId": "243AB190-F020-4345-9D31-3480C00B1A2D" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpdocs.latepoint.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c9a23a3-5eb5-4f5b-bf32-c9d163426f29?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json index 71e559ba024..bcb8bc54432 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8943.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8943", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-08T09:15:19.343", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:30:59.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-288" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:latepoint:latepoint:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.0.13", + "matchCriteriaId": "5B0BF9AF-25F7-4448-90C3-66CB9870A1D0" + } + ] + } + ] } ], "references": [ { "url": "https://wpdocs.latepoint.com/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/bac8c35b-2afa-4347-b86e-2f16db19a4d3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json new file mode 100644 index 00000000000..ac1a0659fff --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0161.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0161", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-20T16:15:36.333", + "lastModified": "2025-02-20T16:15:36.333", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7183788", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json index acb110d58b7..b4afe25b013 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1176", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T06:15:22.433", - "lastModified": "2025-02-11T06:15:22.433", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:40:56.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,6 +63,26 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -124,34 +144,77 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*", + "matchCriteriaId": "41E442CC-ADC3-46D7-BC3C-AF5210AA9C04" + } + ] + } + ] + } + ], "references": [ { "url": "https://sourceware.org/bugzilla/attachment.cgi?id=15913", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://sourceware.org/bugzilla/show_bug.cgi?id=32636", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Issue Tracking", + "Patch" + ] }, { "url": "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Patch" + ] }, { "url": "https://vuldb.com/?ctiid.295079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?id.295079", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.495329", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.gnu.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json index 940ff5ab27e..91f91d5f8ff 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1177.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1177", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-11T06:15:22.623", - "lastModified": "2025-02-11T06:15:22.623", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:58:50.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,24 +142,65 @@ "value": "CWE-502" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xunruicms:xunruicms:4.6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "17063A98-8DAA-4F84-AD21-FE9C70F158A3" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/stevenchen0x01/CVE2/blob/main/cve2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.295080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?submit.495366", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json b/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json index 92f24bdf9ba..1b85560d0a3 100644 --- a/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json +++ b/CVE-2025/CVE-2025-11xx/CVE-2025-1189.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1189", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-12T10:15:14.540", - "lastModified": "2025-02-12T10:15:14.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-20T16:24:17.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -111,7 +131,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -122,28 +142,72 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "108AEB9D-CD44-4A0D-8CB6-82EA6162A0B4" + } + ] + } + ] } ], "references": [ { "url": "https://1000projects.org/", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/takakie/CVE/blob/main/cve_2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.295095", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.295095", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.496452", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json new file mode 100644 index 00000000000..df7254fd58e --- /dev/null +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20059.json @@ -0,0 +1,110 @@ +{ + "id": "CVE-2025-20059", + "sourceIdentifier": "responsible-disclosure@pingidentity.com", + "published": "2025-02-20T15:15:13.957", + "lastModified": "2025-02-20T15:15:13.957", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "responsible-disclosure@pingidentity.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:N/SC:L/SI:H/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.2, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "responsible-disclosure@pingidentity.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-23" + } + ] + } + ], + "references": [ + { + "url": "https://backstage.forgerock.com/knowledge/advisories/article/a61848355", + "source": "responsible-disclosure@pingidentity.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json b/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json index f34277d0903..98cf795f4fa 100644 --- a/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json +++ b/CVE-2025/CVE-2025-224xx/CVE-2025-22467.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22467", "sourceIdentifier": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", "published": "2025-02-11T16:15:50.840", - "lastModified": "2025-02-11T16:15:50.840", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:53:06.133", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,91 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*", + "versionEndIncluding": "22.7", + "matchCriteriaId": "82432B1B-F50E-4D85-B4B5-6C91923F1BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*", + "matchCriteriaId": "2927A40D-E8A3-4DB6-9C93-04A6C6035C3D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*", + "matchCriteriaId": "1399BBB4-E62B-4FF6-B9E3-6AAC68D4D583" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*", + "matchCriteriaId": "1EAD1423-4477-4C35-BF93-697A2C0697C6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*", + "matchCriteriaId": "858353BC-12CB-4014-BFCA-DA7B1B3DD4B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*", + "matchCriteriaId": "865F72BF-57B2-4B0C-BACE-3500E0AE6751" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*", + "matchCriteriaId": "39E11407-E0C0-454F-B731-7DA4CBC696EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*", + "matchCriteriaId": "247E71F8-A03B-4097-B7BF-09F8BF3ED4D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*", + "matchCriteriaId": "E0059C69-4A18-4153-9D9A-5C1B03AD1453" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*", + "matchCriteriaId": "FC523C88-115E-4CD9-A8CB-AE6E6610F7D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*", + "matchCriteriaId": "3447428E-DBCD-4553-B51D-AC08ECAFD881" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*", + "matchCriteriaId": "A08BAF98-7F05-4596-8BFC-91F1A79D3BD1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*", + "matchCriteriaId": "40717D97-A062-49C4-B105-C22AAC3A206A" + } + ] + } + ] + } + ], "references": [ { "url": "https://forums.ivanti.com/s/article/February-Security-Advisory-Ivanti-Connect-Secure-ICS-Ivanti-Policy-Secure-IPS-and-Ivanti-Secure-Access-Client-ISAC-Multiple-CVEs", - "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75" + "source": "3c1d8aa1-5a33-4ea4-8992-aadd6440af75", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json index 5d556283370..bc8b8f35237 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24011.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24011", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-21T16:15:14.760", - "lastModified": "2025-01-21T16:15:14.760", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:44:29.017", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,98 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.3.2", + "matchCriteriaId": "1D80F7E9-B08B-4634-87DB-72C6772B3458" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.1.2", + "matchCriteriaId": "98EFFDE3-BE84-4F6C-B28B-42EE448FA462" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/559c6c9f312df1d6eb1bde82c4b81c0896da6382", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/commit/839b6816f2ae3e5f54459a0f09dad6b17e2d1e07", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-hmg4-wwm5-p999", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json index cb23e93a33b..e6b0b8c2b55 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24012.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24012", "sourceIdentifier": "security-advisories@github.com", "published": "2025-01-21T16:15:14.923", - "lastModified": "2025-01-21T16:15:14.923", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T16:45:15.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "14.0.0", + "versionEndExcluding": "14.3.2", + "matchCriteriaId": "1D80F7E9-B08B-4634-87DB-72C6772B3458" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:umbraco:umbraco_cms:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0.0", + "versionEndExcluding": "15.1.2", + "matchCriteriaId": "98EFFDE3-BE84-4F6C-B28B-42EE448FA462" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/umbraco/Umbraco-CMS/commit/d4f8754f933895b3a329296e25ddea6f84a0aea2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/umbraco/Umbraco-CMS/security/advisories/GHSA-wv8v-rmw2-25wc", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json index 4544159d6a5..d73d1a4a948 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24896.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24896", "sourceIdentifier": "security-advisories@github.com", "published": "2025-02-11T16:15:51.477", - "lastModified": "2025-02-11T16:15:51.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-20T15:48:37.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -51,14 +71,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:misskey:misskey:*:*:*:*:*:*:*:*", + "versionStartIncluding": "12.109.0", + "versionEndIncluding": "2025.1.0", + "matchCriteriaId": "1CD22A7E-7810-47A9-8B23-6783D9863694" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/misskey-dev/misskey/commit/ba9f295ef2bf31cc90fa587e20b9a7655b7a1824", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/misskey-dev/misskey/security/advisories/GHSA-w98m-j6hq-cwjm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json index c1b91b57fa5..d04c1320ff2 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25901.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25901", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:50.180", - "lastModified": "2025-02-18T14:57:24.510", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-20T15:15:14.380", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ @@ -88,6 +118,14 @@ "Exploit", "Third Party Advisory" ] + }, + { + "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_5.pdf", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25942.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25942.json index a43ba50cdd7..dadb92a6fc9 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25942.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25942.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25942", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.310", - "lastModified": "2025-02-19T23:15:15.310", + "lastModified": "2025-02-20T15:15:14.587", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released." + }, + { + "lang": "es", + "value": "Un problema en Bento4 V1.6.0-641 permite a un atacante obtener informaci\u00f3n confidencial a trav\u00e9s de la herramienta MP4Fragment al procesar archivos no v\u00e1lidos. Espec\u00edficamente, la memoria asignada en SamplearRay :: SamplearRay en MP4Fragment.cpp no ??se libera correctamente." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/993", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25943.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25943.json index 1156979b8e8..96e0becb47c 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25943.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25943.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25943", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.417", - "lastModified": "2025-02-19T23:15:15.417", + "lastModified": "2025-02-20T15:15:14.743", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp." + }, + { + "lang": "es", + "value": "La vulnerabilidad del desbordamiento del b\u00fafer en Bento4 v.1.6.0-641 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s del componente AP4_STZ2ATOM :: AP4_STZ2ATOM ubicado en AP4STZ2ATOM.CPP." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/993", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25944.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25944.json index 711a6be9609..6f007c5e8d9 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25944.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25944.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25944", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.530", - "lastModified": "2025-02-19T23:15:15.530", + "lastModified": "2025-02-20T15:15:14.900", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en Bento4 v.1.6.0-641 permite a un atacante local ejecutar c\u00f3digo arbitrario a trav\u00e9s de Ap4RtpAtom.cpp, espec\u00edficamente en AP4_RtpAtom::AP4_RtpAtom, durante la ejecuci\u00f3n de mp4fragment con un archivo de entrada MP4 manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/993", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25945.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25945.json index 296c368b0cf..3bee8ee296f 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25945.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25945.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25945", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.630", - "lastModified": "2025-02-19T23:15:15.630", + "lastModified": "2025-02-20T15:15:15.073", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp." + }, + { + "lang": "es", + "value": "Un problema en Bento4 V1.6.0-641 permite que un atacante obtenga informaci\u00f3n confidencial a trav\u00e9s del mp4fragment.cpp y en ap4_descriptorFactory :: createscriptorFromStream en ap4descriptorFactory.cpp." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/993", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25946.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25946.json index 283b9a8544d..44e69de3388 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25946.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25946.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25946", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.743", - "lastModified": "2025-02-19T23:15:15.743", + "lastModified": "2025-02-20T15:15:15.227", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially crafted MP4 input file." + }, + { + "lang": "es", + "value": "Un problema en Bento4 v1.6.0-641 permite a un atacante provocar una p\u00e9rdida de memoria a trav\u00e9s de Ap4Marlin.cpp y Ap4Processor.cpp, espec\u00edficamente en AP4_MarlinIpmpEncryptingProcessor::Initialize y AP4_Processor::Process, durante la ejecuci\u00f3n de mp4encrypt con un archivo de entrada MP4 especialmente manipulado." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/994", diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25947.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25947.json index 63027989b4e..9e6baabf9db 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25947.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25947.json @@ -2,16 +2,55 @@ "id": "CVE-2025-25947", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-19T23:15:15.850", - "lastModified": "2025-02-19T23:15:15.850", + "lastModified": "2025-02-20T15:15:15.530", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file." + }, + { + "lang": "es", + "value": "Un problema en Bento4 v1.6.0-641 permite que un atacante active una falla de segmentaci\u00f3n a trav\u00e9s de ap4atom.cpp, espec\u00edficamente en ap4_atomparent :: removechild, durante la ejecuci\u00f3n de mp4Encrypt con un archivo de entrada especialmente manipulado MP4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/axiomatic-systems/Bento4/issues/994", diff --git a/README.md b/README.md index fcc8ee73d4d..3ca6759b949 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-20T15:01:53.624408+00:00 +2025-02-20T17:00:56.445324+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-20T14:15:33.627000+00:00 +2025-02-20T16:51:45.987000+00:00 ``` ### Last Data Feed Release @@ -33,20 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281894 +281920 ``` ### CVEs added in the last Commit -Recently added CVEs: `1` +Recently added CVEs: `26` -- [CVE-2025-1039](CVE-2025/CVE-2025-10xx/CVE-2025-1039.json) (`2025-02-20T13:15:08.387`) +- [CVE-2023-51308](CVE-2023/CVE-2023-513xx/CVE-2023-51308.json) (`2025-02-20T15:15:11.793`) +- [CVE-2023-51309](CVE-2023/CVE-2023-513xx/CVE-2023-51309.json) (`2025-02-20T15:15:11.920`) +- [CVE-2023-51310](CVE-2023/CVE-2023-513xx/CVE-2023-51310.json) (`2025-02-20T15:15:12.050`) +- [CVE-2023-51311](CVE-2023/CVE-2023-513xx/CVE-2023-51311.json) (`2025-02-20T15:15:12.170`) +- [CVE-2023-51312](CVE-2023/CVE-2023-513xx/CVE-2023-51312.json) (`2025-02-20T15:15:12.293`) +- [CVE-2023-51313](CVE-2023/CVE-2023-513xx/CVE-2023-51313.json) (`2025-02-20T15:15:12.437`) +- [CVE-2023-51314](CVE-2023/CVE-2023-513xx/CVE-2023-51314.json) (`2025-02-20T15:15:12.563`) +- [CVE-2023-51315](CVE-2023/CVE-2023-513xx/CVE-2023-51315.json) (`2025-02-20T15:15:12.680`) +- [CVE-2023-51316](CVE-2023/CVE-2023-513xx/CVE-2023-51316.json) (`2025-02-20T15:15:12.810`) +- [CVE-2023-51317](CVE-2023/CVE-2023-513xx/CVE-2023-51317.json) (`2025-02-20T16:15:34.600`) +- [CVE-2023-51318](CVE-2023/CVE-2023-513xx/CVE-2023-51318.json) (`2025-02-20T16:15:34.703`) +- [CVE-2023-51319](CVE-2023/CVE-2023-513xx/CVE-2023-51319.json) (`2025-02-20T16:15:34.803`) +- [CVE-2023-51320](CVE-2023/CVE-2023-513xx/CVE-2023-51320.json) (`2025-02-20T16:15:34.903`) +- [CVE-2023-51321](CVE-2023/CVE-2023-513xx/CVE-2023-51321.json) (`2025-02-20T16:15:35.007`) +- [CVE-2023-51323](CVE-2023/CVE-2023-513xx/CVE-2023-51323.json) (`2025-02-20T16:15:35.110`) +- [CVE-2023-51324](CVE-2023/CVE-2023-513xx/CVE-2023-51324.json) (`2025-02-20T16:15:35.210`) +- [CVE-2023-51325](CVE-2023/CVE-2023-513xx/CVE-2023-51325.json) (`2025-02-20T16:15:35.330`) +- [CVE-2023-51326](CVE-2023/CVE-2023-513xx/CVE-2023-51326.json) (`2025-02-20T16:15:35.437`) +- [CVE-2023-51327](CVE-2023/CVE-2023-513xx/CVE-2023-51327.json) (`2025-02-20T16:15:35.543`) +- [CVE-2023-51330](CVE-2023/CVE-2023-513xx/CVE-2023-51330.json) (`2025-02-20T16:15:35.647`) +- [CVE-2023-51331](CVE-2023/CVE-2023-513xx/CVE-2023-51331.json) (`2025-02-20T16:15:35.750`) +- [CVE-2023-51332](CVE-2023/CVE-2023-513xx/CVE-2023-51332.json) (`2025-02-20T16:15:35.850`) +- [CVE-2024-57401](CVE-2024/CVE-2024-574xx/CVE-2024-57401.json) (`2025-02-20T15:15:13.347`) +- [CVE-2025-0161](CVE-2025/CVE-2025-01xx/CVE-2025-0161.json) (`2025-02-20T16:15:36.333`) +- [CVE-2025-20059](CVE-2025/CVE-2025-200xx/CVE-2025-20059.json) (`2025-02-20T15:15:13.957`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `65` +- [CVE-2024-21689](CVE-2024/CVE-2024-216xx/CVE-2024-21689.json) (`2025-02-20T15:23:21.377`) +- [CVE-2024-2472](CVE-2024/CVE-2024-24xx/CVE-2024-2472.json) (`2025-02-20T15:28:10.360`) +- [CVE-2024-37361](CVE-2024/CVE-2024-373xx/CVE-2024-37361.json) (`2025-02-20T15:15:13.190`) +- [CVE-2024-47073](CVE-2024/CVE-2024-470xx/CVE-2024-47073.json) (`2025-02-20T16:20:40.547`) +- [CVE-2024-47908](CVE-2024/CVE-2024-479xx/CVE-2024-47908.json) (`2025-02-20T15:57:06.850`) +- [CVE-2024-52295](CVE-2024/CVE-2024-522xx/CVE-2024-52295.json) (`2025-02-20T16:21:26.323`) +- [CVE-2024-55952](CVE-2024/CVE-2024-559xx/CVE-2024-55952.json) (`2025-02-20T16:22:50.240`) +- [CVE-2024-55953](CVE-2024/CVE-2024-559xx/CVE-2024-55953.json) (`2025-02-20T16:25:07.667`) +- [CVE-2024-56511](CVE-2024/CVE-2024-565xx/CVE-2024-56511.json) (`2025-02-20T16:26:58.487`) +- [CVE-2024-8911](CVE-2024/CVE-2024-89xx/CVE-2024-8911.json) (`2025-02-20T15:30:18.643`) +- [CVE-2024-8943](CVE-2024/CVE-2024-89xx/CVE-2024-8943.json) (`2025-02-20T15:30:59.567`) +- [CVE-2025-1176](CVE-2025/CVE-2025-11xx/CVE-2025-1176.json) (`2025-02-20T16:40:56.790`) +- [CVE-2025-1177](CVE-2025/CVE-2025-11xx/CVE-2025-1177.json) (`2025-02-20T15:58:50.097`) +- [CVE-2025-1189](CVE-2025/CVE-2025-11xx/CVE-2025-1189.json) (`2025-02-20T16:24:17.783`) +- [CVE-2025-22467](CVE-2025/CVE-2025-224xx/CVE-2025-22467.json) (`2025-02-20T15:53:06.133`) +- [CVE-2025-24011](CVE-2025/CVE-2025-240xx/CVE-2025-24011.json) (`2025-02-20T16:44:29.017`) +- [CVE-2025-24012](CVE-2025/CVE-2025-240xx/CVE-2025-24012.json) (`2025-02-20T16:45:15.377`) +- [CVE-2025-24896](CVE-2025/CVE-2025-248xx/CVE-2025-24896.json) (`2025-02-20T15:48:37.877`) +- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-20T15:15:14.380`) +- [CVE-2025-25942](CVE-2025/CVE-2025-259xx/CVE-2025-25942.json) (`2025-02-20T15:15:14.587`) +- [CVE-2025-25943](CVE-2025/CVE-2025-259xx/CVE-2025-25943.json) (`2025-02-20T15:15:14.743`) +- [CVE-2025-25944](CVE-2025/CVE-2025-259xx/CVE-2025-25944.json) (`2025-02-20T15:15:14.900`) +- [CVE-2025-25945](CVE-2025/CVE-2025-259xx/CVE-2025-25945.json) (`2025-02-20T15:15:15.073`) +- [CVE-2025-25946](CVE-2025/CVE-2025-259xx/CVE-2025-25946.json) (`2025-02-20T15:15:15.227`) +- [CVE-2025-25947](CVE-2025/CVE-2025-259xx/CVE-2025-25947.json) (`2025-02-20T15:15:15.530`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 83196ad446c..e2a5470ed78 100644 --- a/_state.csv +++ b/_state.csv @@ -145359,7 +145359,7 @@ CVE-2020-10091,0,0,0023df9918fdadf5afde7a589c871143ff25422b0de5b843dd37446810a20 CVE-2020-10092,0,0,bed5d552f5b0bb036c3eba1f155fae926f11ff2232ff3d62a715ff4a0ef59ea4,2024-11-21T04:54:47.620000 CVE-2020-10093,0,0,8d0aacd8361af89ed8fce3d23dd783fc6ebd0d8701df0b06ae901731b7ad72e2,2024-11-21T04:54:47.750000 CVE-2020-10094,0,0,6beba78c56501a731d17d4bafa1b7bfd29c7992446387d70f96b80c08094f2cd,2024-11-21T04:54:47.943000 -CVE-2020-10095,0,0,08f5a92f213899508322e9e450a4a375c976f643d6148c73e535e6041d18ea74,2025-02-19T18:15:21.953000 +CVE-2020-10095,0,1,6e2cb772a320574510998ddad9ce8e0be81b33039e5cca2cfff813da71474a90,2025-02-20T16:15:32.050000 CVE-2020-10096,0,0,83bee2203a7f767077f6e40b91b5e7f86c8349ada403a759a945e38e30f5b09d,2024-11-21T04:54:48.140000 CVE-2020-10097,0,0,b53a137dcc84c6f9a450665caecc8824e07d3b31ad927277cb99bd9e9b8f13c6,2024-11-21T04:54:48.277000 CVE-2020-10098,0,0,f339d753f3504f60ee2bba806202c760ab227ba9d95ed2b4ebdd071aab6eee53,2024-11-21T04:54:48.413000 @@ -148500,7 +148500,7 @@ CVE-2020-13474,0,0,74c4914a43840fa6e12dd2b53c69ece53ee5a95a7a94ae3930fd8e8a2420f CVE-2020-13476,0,0,cf0a65f58de6a051d6c0e19448011654ef686aa415974f52eecd957162dfb0bb,2024-11-21T05:01:21.103000 CVE-2020-1348,0,0,a9b6f338f457c1b2fb5fb90f4dd043111447cbd66f8ac00dfb2af910a3226e23,2024-11-21T05:10:17.980000 CVE-2020-13480,0,0,5b25db3b1580aa288920d42b9b54622f48b7bf339d5a2131430bb02df62f2c06,2024-11-21T05:01:21.253000 -CVE-2020-13481,0,0,6de53c6fade997b4104b77543a0260f7f7b7c46a5c8971e19c7194d44ace8af4,2025-02-19T19:15:10.630000 +CVE-2020-13481,0,1,0f519cd7a7f26e98c6f0bb00022a093ebb9314726065b47afe6705bf77f67a6f,2025-02-20T16:15:32.720000 CVE-2020-13482,0,0,c3adf851d39e5a118e124354d5ac6f55d29bdc276513f621b483678ff1a7566e,2024-11-21T05:01:21.413000 CVE-2020-13483,0,0,ee2229aa912f53fce6524ec444822b1c650cad80395874d5fb423ba8ff8fa71f,2024-11-21T05:01:21.573000 CVE-2020-13484,0,0,53f1e472880fa0d80a8ad749380a006e55911a59405653282e32e67c54cafd0e,2024-11-21T05:01:21.727000 @@ -158513,7 +158513,7 @@ CVE-2020-35540,0,0,6bd64b059b520580fc1288131d694e2faf21edb8f793d207b450f97b8fdf5 CVE-2020-35541,0,0,8d5365eb0cabd9fb3bbef386a7a8573f0770d7f02e50738d63f9bc34f5836ae4,2023-11-07T03:21:58.650000 CVE-2020-35542,0,0,cf77cdeac798a3a257ffcb234660d4518d214cb4498ec8c17e86fd96ebfc678f,2024-11-21T05:27:31.673000 CVE-2020-35545,0,0,90718e2ddefe9ba5082932c97e23e972baa70313d1d4fdf00f695b1d71c6cc9b,2024-11-21T05:27:31.870000 -CVE-2020-35546,0,0,9baa0fb9dbdaf5787e3f4fb43280cac2788c9bb47d9c80aba4c3cc9a70be1c42,2025-02-19T19:15:10.753000 +CVE-2020-35546,0,1,4f26a22c783b92492a92818000739c3d9dd7ddb2602ff336a588a06ece9b3108,2025-02-20T16:15:32.870000 CVE-2020-35547,0,0,0b56fd34bbcf6f73360d1254a0790470258ba9dfdd070f322adb5be0ea6a8538,2024-11-21T05:27:32.053000 CVE-2020-35548,0,0,d7355cb5b84b5b614d93237f5cbb2796f3a81213009605c0528bcf58e0d77ec2,2024-11-21T05:27:32.280000 CVE-2020-35549,0,0,6a5d8eef45e56534ec7da225d0cd05db4848ea6f60c0898ba9512b7ec9f90052,2024-11-21T05:27:32.460000 @@ -209941,7 +209941,7 @@ CVE-2022-4458,0,0,192c505acac2dca8dc3917e8ce2ad50b37e61fd6b24832a0220a2cc7916316 CVE-2022-44580,0,0,1853f516861af1bdf42c74118d4da1d78e165ffb9737892b9636796df575431d,2024-11-21T07:28:09.657000 CVE-2022-44581,0,0,c3574e38c9269af9fd19b1ebf323c712e1313fd8428037a97f7166891237fcde,2024-11-21T07:28:09.773000 CVE-2022-44582,0,0,ab7c8aa0b744df343c2efa6f49df3e2120ade672dfebaf27bbaf41972c94de55,2024-11-21T07:28:09.910000 -CVE-2022-44583,0,0,923ee40a48b405150fc6d7bda076e5bb306ea4bd23993a934fff3a391e40d90d,2024-11-21T07:28:10.040000 +CVE-2022-44583,0,1,00802e3fe5e8d5c79d75d2a8c442637c00e06e65cc5d081ffb96246c39bf0601,2025-02-20T15:15:10.123000 CVE-2022-44584,0,0,6a47cb16261f5a8edd1470398f86011a9af92c9f9186fcc59739e048dd1f030e,2024-11-21T07:28:10.153000 CVE-2022-44585,0,0,2444819fca6202dd5f513ba043d6869c7cd739cb13c9f4a195bafc9d86534f3b,2024-11-21T07:28:10.263000 CVE-2022-44586,0,0,2c3de69e1a21c0631cf5f1736061582b06bb6865f225acefb4d279b67beddab4,2024-11-21T07:28:10.380000 @@ -215956,14 +215956,14 @@ CVE-2023-21058,0,0,64330bb9c4249333ce6f10ddaa280396ef4bb32482959b6db5e7e9f6f3b63 CVE-2023-21059,0,0,70972c21ff5031e5a8812f2b89330f3bb3733e080c457204297376dcabb2f5e1,2024-11-21T07:42:05.127000 CVE-2023-2106,0,0,54915b7d25a40346ce2e235b5fe9b0fa20a7ab6d3baae2189ffdb54ce7556511,2025-02-06T16:15:36.850000 CVE-2023-21060,0,0,ed6a1ed343bc5908d4275aafe515b039b63037861daff961d4fd11deac6d0845,2024-11-21T07:42:05.240000 -CVE-2023-21061,0,0,e0606e33da15ce1130782a6e53259d5a1f547ffea17378748f6734fc784e307d,2024-11-21T07:42:05.357000 +CVE-2023-21061,0,1,7273ed70ff85a6169baa589c710a5851fd1d66a885a49beca70b97880fae7748,2025-02-20T16:15:33.217000 CVE-2023-21062,0,0,5e5b5d7600fd0d3dd7a9942040f4966711abc6b36e9bb29aa93767415087a9fc,2024-11-21T07:42:05.473000 CVE-2023-21063,0,0,20a4c3f6408a88e1c28159889207c238ab338761b1694db207a9f40672d7a4ac,2024-11-21T07:42:05.580000 CVE-2023-21064,0,0,f66e6a7ec4713e6a44090694f45ba9d60b4264c55e2ed80bc5bd402cbd8005c3,2024-11-21T07:42:05.693000 CVE-2023-21065,0,0,94d2bbc43c1b96f9732745485dc5f1641c6bc254138879f3df272c7166e2db6e,2024-11-21T07:42:05.817000 CVE-2023-21066,0,0,f3310930fd44b4ceafd1bc0f3a1442d00659ef92bf9c822f23789082b5e2acbd,2024-11-21T07:42:05.940000 -CVE-2023-21067,0,0,0af98db8af61a37cad16be3f46303f3f5b346c6da74aa6ecb40ab8ae48364424,2024-11-21T07:42:06.067000 -CVE-2023-21068,0,0,9e389570051155eb7d03b853be815442ffc225a5869ba74acae0f72dc74cbae9,2024-11-21T07:42:06.187000 +CVE-2023-21067,0,1,01050eb75f93c090bcbbf1a3d087f86ead1cb3cb954a6522f1f6adcb54243523,2025-02-20T16:15:33.510000 +CVE-2023-21068,0,1,261483c08947a78e25d50bbff26846bb2a8245ddf198c445bf54ba8027c9ff31,2025-02-20T16:15:33.613000 CVE-2023-21069,0,0,7997a769d0fc1eb29768d5d5204d9a0da76475cb9cf6af165e778132a8be14a4,2024-11-21T07:42:06.303000 CVE-2023-2107,0,0,b37e87d1922ae828ac557e5cc8f42c5406432b2bbc0f1d675673e3290327b00a,2024-11-21T07:57:57.197000 CVE-2023-21070,0,0,2b115936a5d121763e30e349ca2d0580b34609ea9a496b2fbfe446f7bf106484,2024-11-21T07:42:06.423000 @@ -217160,7 +217160,7 @@ CVE-2023-22308,0,0,906012441499d1c849365e5400b5357dda9cc467b769670e76ddebf0ea235 CVE-2023-22309,0,0,a7231f19d4cb4ea22c4d4790a3de2cc23a6aa0b434c7b7b587091619c74b99b1,2024-11-21T07:44:30.073000 CVE-2023-2231,0,0,7a123ab9506421883b22a81ab048ba2bb77ff795874a80b8d72ffaa1959d6e3b,2024-11-21T07:58:12.077000 CVE-2023-22310,0,0,e89d325885a14d654c2cee0362e627ca7ab351551936d19e0a6836ce159a1e18,2024-11-21T07:44:30.180000 -CVE-2023-22311,0,0,3668f195b27e18c55d05f4d2d2db1d99116a034536e0844f15c9f5e44c4093a4,2024-11-21T07:44:30.300000 +CVE-2023-22311,0,1,7848a1fdc7b6efc3edbc4ee7ab45d31e7d98e0d770963db7959cb8df01de9539,2025-02-20T15:02:08.147000 CVE-2023-22312,0,0,8f16bf32172036bbf9d1043ae97ca6b0cb5e5a789a3dbfc9b22e7ce5eaaa7503,2024-11-21T07:44:30.403000 CVE-2023-22313,0,0,13cb67bb3f4d7e26a2fe173a2a963218db5dc4219566bf32470782958642ea07,2024-11-21T07:44:30.573000 CVE-2023-22314,0,0,bee80a2df35df35d1b61930267b541e9f11caf7a46751f021047134245f44a3d,2024-11-21T07:44:30.700000 @@ -221334,7 +221334,7 @@ CVE-2023-27513,0,0,c9fbd584e51c51b70e2e0cc07b756cefd3914b4ced409ad8d42a8da7c34f7 CVE-2023-27514,0,0,fa8070be4b10f5741aae673be622be3e7d98ffcb2a84bdd30ae540dbca14459c,2025-01-16T20:15:31.333000 CVE-2023-27515,0,0,8dfc9617f583bdd1babe238c49e7e58612036e70ee685520461ed821ca4854ca,2024-11-21T07:53:04.393000 CVE-2023-27516,0,0,63cc8b4dfa2de06886c95f604edc887930374b8e766f7347b609a4a1d828c6aa,2024-11-21T07:53:04.520000 -CVE-2023-27517,0,0,7a85bd8631558a4f1c51f4ef9ecd17db6da99592c83a599fc24a29f9268f289f,2024-11-21T07:53:04.653000 +CVE-2023-27517,0,1,3502cc4dc0ec46d859d221be870ca61288e9f76a4a8f082e0d50af84a00a11b2,2025-02-20T15:10:10.427000 CVE-2023-27518,0,0,9baf0d487aa874353bba8cde2f44da2f0c67dd17f3eb5b570347204d068fdfbe,2025-01-31T15:15:08.247000 CVE-2023-27519,0,0,717790a336c8f9e5a77a95e0bd0274d8d47193d1a8993a7207854ff0bd8ab7ac,2024-11-21T07:53:04.963000 CVE-2023-2752,0,0,6d790d550f8804fc5c5478d21ae5ee8d7bd1da5991dfa9817023711eac8596b0,2024-11-21T07:59:13.467000 @@ -235734,7 +235734,7 @@ CVE-2023-46266,0,0,81806eaa6162d2628009ed70de1b2798f644cbf4406448d48f1535898504c CVE-2023-46267,0,0,56d82f2136293ec805643b7aa2c34e057834346a4d6f8a282f29d606a8893e13,2023-11-07T04:21:53.713000 CVE-2023-4627,0,0,44c2ecd7362aa4de1a961a6fa4371a3240ed6fa84366e6d7bf5b1fbfa11dd3d2,2025-01-15T16:37:02.837000 CVE-2023-46270,0,0,0789f887abfd7ae93c1dbe57cd351d8a2da80170c7bc99a18d2256a683596402,2024-11-21T08:28:12.507000 -CVE-2023-46271,0,0,7d4b1b3d8143858fd802f269081937bd4f22b37fb9ff2feb9ca1d7a3c1c43555,2025-02-19T19:15:13.797000 +CVE-2023-46271,0,1,0cb5cef1216ae4571fac17acc07f7ec094b33e801dd2864185b007cd417ef1d6,2025-02-20T16:15:34.310000 CVE-2023-46272,0,0,6a5674c01f30ce0183e1dce1cb0349944e1e60fbf99477dd2701847f7d87dbc8,2025-02-19T19:15:13.917000 CVE-2023-46277,0,0,e192ca50b4060017d85c73fc1706fd083f6c682d8478108f323ab6790e52648a,2024-11-21T08:28:12.653000 CVE-2023-46278,0,0,46ac4ffdac079997c9016c6dbfffc7ffe6e42561a011802cecf40b1219ef36f9,2024-11-21T08:28:12.860000 @@ -239298,20 +239298,43 @@ CVE-2023-5128,0,0,bfe204edd11054b27893926793a261843cc5aafcba80836f465a9cbe06b587 CVE-2023-51281,0,0,13c5d72ef411be7896310c619236218fa85e3239b473c76db8a7fc7598f5af7d,2024-11-21T08:37:56.467000 CVE-2023-51282,0,0,8e64a1bfc8d57aa569e5ddaeb84ba0deccb82f824ea2197546b9a82d011d8c15,2024-11-21T08:37:56.710000 CVE-2023-5129,0,0,3c0d5df1426e0bdb75917cedbbb32908a5a7c5fa2c2f7eca16ba24a2fca6eb00,2023-11-07T04:23:29.527000 -CVE-2023-51293,0,0,01e3d2f15d08f98b38f70fbc2a682481ccbb5a4411748304f63a82deea4b9aa9,2025-02-19T19:15:14.027000 -CVE-2023-51296,0,0,6471918cecd5ab553bcfd16f032d80c097b645c065f3a63da77145c2a7ca9431,2025-02-19T19:15:14.150000 +CVE-2023-51293,0,1,4aaa159936ab6219fd7a1260471f42dacea51e0b8e538ea4dee8e49279158602,2025-02-20T16:15:34.460000 +CVE-2023-51296,0,1,4b46fa0e4c1f1e238758695b9394f441f53e8e496cb7faa1fb33aebab119eb49,2025-02-20T15:15:10.293000 CVE-2023-51297,0,0,82a03c125c89e9c5feb7167bc5c79f32a86cc86d30fa01646e6efbdc926b03eb,2025-02-19T20:15:34.770000 -CVE-2023-51298,0,0,5b29efe8fa3be42fec8f93d58d7025c30b8b467232cc09005c13ecd16519daaf,2025-02-19T20:15:34.937000 -CVE-2023-51299,0,0,386fa09ecfd51bb1ed7e8527bee18b5050c9dd131f37acc63ee8363622cac197,2025-02-19T20:15:35.040000 +CVE-2023-51298,0,1,0a73ff740f43c08713be0b01a0d2a61be5909ee990fdffa87eb931b4bba3af99,2025-02-20T15:15:10.473000 +CVE-2023-51299,0,1,ee204374983c91e4a81c4f0c807a9717ee9d9eee0f2c2b9150adc78f344a34ae,2025-02-20T15:15:10.633000 CVE-2023-5130,0,0,7764b4080ce182f2cbfb3f51ce85fb48c8388daca3eeaf39f36bf8b5ff048d08,2024-11-21T08:41:07.267000 -CVE-2023-51300,0,0,0d8eb0a2ada5b29cf997f4edc56774f82e817a3e7fa7536bd0b60c5bb9f951d2,2025-02-19T21:15:14.727000 -CVE-2023-51301,0,0,fbf1518094006f654be2952d6fdbc79caf53bdeba69064abe7315e607a6dc1c8,2025-02-19T21:15:14.867000 -CVE-2023-51302,0,0,d86d4ca1537c2143750aa7c81c7cd20a1e63c704506b7a9e9d8895bb2b3bd012,2025-02-19T21:15:14.980000 -CVE-2023-51303,0,0,b9596b4c0ec592fba4cdce7a52d69ac3826078585868ba9c2f6b68fe2492afb3,2025-02-19T21:15:15.097000 -CVE-2023-51305,0,0,d29e376213b19bb7b3852ecc3889dd5ceb35fd56ab6798932ca128a1fe291599,2025-02-19T23:15:09.567000 +CVE-2023-51300,0,1,0f055d95d81302eadc0934757a8907bcd0169b38480cc25eff225963fecdfeb8,2025-02-20T15:15:10.820000 +CVE-2023-51301,0,1,9c4e76ef1784f81ef03c13aff5ece5f0c4000a3ddee7980bf3127f38a6a48934,2025-02-20T15:15:10.993000 +CVE-2023-51302,0,1,2a2a629e028fadf85676a9ec90e701230400ff0e14da25614e070b1b12c7a323,2025-02-20T15:15:11.173000 +CVE-2023-51303,0,1,5607bb153ecb6857b5c285c2d78c60ac93b1768ce62baab40912356cb664f295,2025-02-20T15:15:11.333000 +CVE-2023-51305,0,1,94c9859147775854f4fe017d88d7dc2aa4c058076353100b1d5ee8642d3a3620,2025-02-20T15:15:11.507000 +CVE-2023-51306,1,1,9abb5db728e8fe46856cf7f999df226ea525572318f83566b985a5915b4d98dc,2025-02-20T15:15:11.673000 +CVE-2023-51308,1,1,8a5cce85965c497d99411e14d7ddb84a3485b88a66065edf5dd36026ad89ef52,2025-02-20T15:15:11.793000 +CVE-2023-51309,1,1,d5a34397b2d3712a4de0493249687b8ab829c9c913c53ab0eb208f0231b7e47f,2025-02-20T15:15:11.920000 CVE-2023-5131,0,0,ea7fb93c4dbd8bd2f769e40008c92349338343ffec9aef4cd684c52a4f03daea,2024-11-21T08:41:07.410000 +CVE-2023-51310,1,1,04555726acd1d4321ddba39dd114106b5d6b5d634e69030505aa3132d2e331bf,2025-02-20T15:15:12.050000 +CVE-2023-51311,1,1,6575096cf9588af68549263dd8fe4fd9ac6ca19f8c16fd21ce87579eec4885a8,2025-02-20T15:15:12.170000 +CVE-2023-51312,1,1,24df8ac219fd57ec3572cef764abdf460dd12ed44613d62f818ae74ace712664,2025-02-20T15:15:12.293000 +CVE-2023-51313,1,1,ecb7283cecdf3851dcd9f3dac756939e43c63a6abab5a2801b24b0ce64cd7004,2025-02-20T15:15:12.437000 +CVE-2023-51314,1,1,8e6485d513acdb9b63f3ce03417ddc6a6d52c1f9a2853c47e64af6c834ab1777,2025-02-20T15:15:12.563000 +CVE-2023-51315,1,1,132e3dd91521663a35e221b7a999ef09c182eb57c48d8ad573a4dc220cc18f59,2025-02-20T15:15:12.680000 +CVE-2023-51316,1,1,24f90e52eb9f2ee3efdd4303af4204fb2b2db48dc9ee4e66c7e4c2ca06dae737,2025-02-20T15:15:12.810000 +CVE-2023-51317,1,1,7f9f5b550e35dd8e634965b30be68534535138097cec95e49eb38256e5f53431,2025-02-20T16:15:34.600000 +CVE-2023-51318,1,1,f5ce695c6eca3c365541aa97f79aa692177cb4b44d64fd10b094343c8e2b8506,2025-02-20T16:15:34.703000 +CVE-2023-51319,1,1,ac4116ffaf596da9295f0f7d8f0f0b2f7ec444b699d93d2c1af5af10ebdd757e,2025-02-20T16:15:34.803000 CVE-2023-5132,0,0,3a50c79f3182856bf1a8f272b84346a7ecfc5aa8bca0e713ce49774805195cc4,2024-11-21T08:41:07.540000 +CVE-2023-51320,1,1,79a114082655d7bb64f646c844b066a60f0c5c8b7f89a39965390c6c7a485520,2025-02-20T16:15:34.903000 +CVE-2023-51321,1,1,fe1356f30cb97f0bf1f3b6c26e1c05f062bd4486059c682dca2bbddcbaa5cab6,2025-02-20T16:15:35.007000 +CVE-2023-51323,1,1,ed280025906fb157f30101c4ec2af5dcb4e8049994300268f8d4e929415eb7c8,2025-02-20T16:15:35.110000 +CVE-2023-51324,1,1,1297f43ed3f254c5bd52ca69a1313b239e55faa9ae9f2875d64bc52c1b4ef217,2025-02-20T16:15:35.210000 +CVE-2023-51325,1,1,d9bce55484426b97e5206f92ca8131481536ba82ebadc469adf7d081660cea41,2025-02-20T16:15:35.330000 +CVE-2023-51326,1,1,46eb96dbf29c4b2241b5562c5d43fb74ee2dcd0e7c1ee8a4d8d840d472ea0aa2,2025-02-20T16:15:35.437000 +CVE-2023-51327,1,1,5a20d74bdf0b1ea0bcb9e4e68927ac775377adad269ecd68bf8aba7a80ca8283,2025-02-20T16:15:35.543000 CVE-2023-5133,0,0,0018a6a351ee401af2daab5bec3a8b6563a0922f375ff71fcd99140986e7d09f,2024-11-21T08:41:07.690000 +CVE-2023-51330,1,1,f6ddadd04f6bc79dd4ed033e5a2c587bce52b3f4671127e98010c92709f4a14b,2025-02-20T16:15:35.647000 +CVE-2023-51331,1,1,211968e4b68bfaa16cc15ac1ca70eaad44c69bc6fd42b28475e85551c06c8918,2025-02-20T16:15:35.750000 +CVE-2023-51332,1,1,1f0734dc885312d91e40d1b3167395e307e144bd8e608075edd4dd7c3f53282f,2025-02-20T16:15:35.850000 CVE-2023-5134,0,0,4883dceb94c3f0cc4b1b00f2283b580de20b785803ef8febb697d90c06bd591d,2024-11-21T08:41:07.850000 CVE-2023-5135,0,0,877454aba62f703a281ed8cbe6f67c849efb5f5f63261252e74d9df5c2c3773f,2024-11-21T08:41:07.980000 CVE-2023-51350,0,0,3e6b1a93404e3494b28f6f9c928c88f04bb91fa7582d839166c6383b89c1b64d,2024-11-21T08:37:56.867000 @@ -244337,7 +244360,7 @@ CVE-2024-10957,0,0,d1cb42f5761d863482eb30829593415e9d53941312c7ff44dbe5eee56f45c CVE-2024-10958,0,0,ef36e0bbdfdc2ca66f68ef0f42219502fb71c2dbb5344b8f90bed966330b4e84,2024-11-14T14:57:23.103000 CVE-2024-10959,0,0,fa8e8dfd4e8771ae8c76641a0e2a5e25525492fab6efcc641940a89152f76196,2024-12-10T11:15:05.913000 CVE-2024-1096,0,0,361a397f658718594f88eb8768eb59d67142285dd6bbccd93ad2ca45f5461047,2024-11-21T08:49:47.217000 -CVE-2024-10960,0,0,d6fb983e120feec96a65fdddc45b3a1d64427c9905644918906bb7d08d47354d,2025-02-12T12:15:28.027000 +CVE-2024-10960,0,1,7c77074df08ec3f9a2d2c00313216fdcbd907f993207a145e679e9aaa87132fa,2025-02-20T16:26:54.527000 CVE-2024-10961,0,0,4a5dff05569e8c840a1fbc59c3367b15e681c98f036051571da83eeda89d3631,2024-12-06T01:15:16.933000 CVE-2024-10962,0,0,01c3565bb569e73f17c44eff56e212818b4d6f0ce2501db43a4a28cdf597d31c,2024-11-15T13:58:08.913000 CVE-2024-10963,0,0,88ee5c2fdd930e041e628fd88533cc2aa09098433a7f71485a3c3209ceea91c4,2025-02-06T06:15:29.240000 @@ -244354,8 +244377,8 @@ CVE-2024-10972,0,0,94ad4fe97792a860dbbbaf6ed1055424200bc83bc27354926dcdaef27787b CVE-2024-10973,0,0,cbeb6f65a45bfdf6ca686d53bee20b1187ff9c0a45640545d25c45f64f615a94,2024-12-17T23:15:05.423000 CVE-2024-10975,0,0,87dd438a371aa254e8d367f54246f88f9b61e035fde8423a2dec0ee6b83d81a4,2024-11-08T19:01:03.880000 CVE-2024-10976,0,0,add1dc642ca0b3839b02b45025e0871bcc2dc4571c371fa1948c8c2b0fc1c9e1,2025-02-11T17:46:21.280000 -CVE-2024-10977,0,0,7e77acbad52c6027c704b593926f8450e38a8ef011adc268448e2f06c6758e02,2024-11-15T13:58:08.913000 -CVE-2024-10978,0,0,2ad1fe4e28705cc365a72d5a36fdf3bacf7244c37418175735413c023fdc2b3b,2024-11-21T22:15:07.033000 +CVE-2024-10977,0,1,6d2fa74e2441271cd530850635b1ae5a3c8833ecad983f63c3544b6ca14fa848,2025-02-20T15:38:01.697000 +CVE-2024-10978,0,1,72fb3d471cb26f3efc482353d870432bf7129ae06ff689d70016902d4b1e6d26,2025-02-20T15:41:14.847000 CVE-2024-10979,0,0,c563f753316fdbc35fc0c4266561157efcd47ba87314ae829bfbd5ca249cb75d,2025-02-11T21:27:49.273000 CVE-2024-1098,0,0,975a882834838eb3bf48c2f536f6d321931f066d182e2d3421deafc25dfc3b5d,2024-11-21T08:49:47.500000 CVE-2024-10980,0,0,21985ec12d369d83f43992fef14c6cbc6da6c1d5ef9577ac04d2bad895eff395,2024-11-29T15:15:15.903000 @@ -245509,7 +245532,7 @@ CVE-2024-1221,0,0,992589062229663edb93b0d8ce0f2928fe9cc25fcf6d182d572f9549d84b72 CVE-2024-12210,0,0,fcdbe73e10e5bb8e25626395e1c0b8dfb21d78601eb91a6e83c928772c0881ff,2024-12-24T06:15:32.973000 CVE-2024-12211,0,0,deb11f537ecb2479a2bce6b180557d850bc7e81da75598fcd5b04e01b9150472,2025-01-13T18:15:15.157000 CVE-2024-12212,0,0,4068a90166bc858f8bfa4c7fe1dbc180f7e4e033930f31a1b74471c9abd7763b,2024-12-13T01:15:05.810000 -CVE-2024-12213,0,0,77dd0769fcd1ec64c147536ecec19775a8e1cab6ffc264bc896be8253cf11377,2025-02-12T10:15:08.737000 +CVE-2024-12213,0,1,98df6fdb82f8dcce9cdcc7c0bf263347f16e89097035ec4ee4346e7d756115f4,2025-02-20T16:08:26.203000 CVE-2024-12214,0,0,145b7db175966477886a9ffd7c811efe626794ad8e1d70413662bfa5c01eb691,2025-01-07T05:15:16.470000 CVE-2024-12218,0,0,c54e0970e9fa3f5da91494a744c33c1884c0ee1f4d82830e251b56e753e1af4a,2025-01-09T11:15:12.280000 CVE-2024-12219,0,0,30a275e193bbba91aa16bdcd2e01caf0ae8c253910825d417094094009d7c6a9,2024-12-17T08:15:05.010000 @@ -245584,7 +245607,7 @@ CVE-2024-12291,0,0,92bd6430c2e668a17bac8eff58d5c2110f868302e763b561cafc443091528 CVE-2024-12292,0,0,9c2e3f4715c47523d2f1e1d813aca821c280ab211aff2eeed6650ad59c376aa9,2024-12-12T12:15:22.470000 CVE-2024-12293,0,0,2953fa4e59ad0d89a9c80037ec9c293444942d58e596c71e3b8975df1192ecb7,2024-12-17T09:15:05.347000 CVE-2024-12294,0,0,beb757b9be530a21bd62fb0889c97c31013e2208ab8db98bc3384b757caf5365,2024-12-11T11:15:06.623000 -CVE-2024-12296,0,0,cece6230a00a6654d5de87f2517ca2b8fe46b44a0e3e2076c03724581a429faa,2025-02-12T10:15:10.230000 +CVE-2024-12296,0,1,2e1864fa6072ab80c406429c59d508ec6233147fe965c5fb3773394e06f5d391,2025-02-20T16:09:14.287000 CVE-2024-12297,0,0,fd281d2af15f3a460c7c72b16a57d9adb41153bf01efdd2829811ff4b89362f7,2025-01-15T10:15:07.237000 CVE-2024-12298,0,0,cc5fe609045dfd20e01ee8b5a4a2dfa91435af5a3c75ddd1927f875f5047d786,2025-01-14T01:15:09.423000 CVE-2024-12299,0,0,6bf8e5e626459eb3d35ab60bd9555f090eb208e414339f648c4215470dc975d2,2025-01-31T18:22:07.800000 @@ -245665,7 +245688,7 @@ CVE-2024-12382,0,0,f70294886a1865641a484753f3298929660ab1bd7002caff75777615f01f2 CVE-2024-12383,0,0,19d74999b8b2bcff68543eb20d97d9dc601a395c1ae1c74bde3b1e01160ff201,2025-01-07T06:15:15.790000 CVE-2024-12384,0,0,f1312e19de6c9643af9162852b5499e7f57a4620a6ff1aef3fac1b374cc11e84,2025-01-07T06:15:15.983000 CVE-2024-12385,0,0,9021d1d140cebb7e5a9313d82a4b746bc2441f3dad59f522fa0786a000238683,2025-01-18T07:15:06.667000 -CVE-2024-12386,0,0,e653ba6addd0b76a37cea5332e53d1936d52b392d8f071196bf6a21de1e07dc5,2025-02-12T12:15:28.470000 +CVE-2024-12386,0,1,5fc1e01f5e9fd108b16f7e2ffa29cb9e004d42ac5dc30102bf32ad04864ac122,2025-02-20T16:29:39.023000 CVE-2024-1239,0,0,e372911200db947b5d23f4c5c4ab976b80519731ada570ba51a10f8cbec0919a,2025-01-17T18:34:30.327000 CVE-2024-12393,0,0,f3d3d4aeb55dacdbdda4d3e84dd9efd2b47893e24f5c1cd3a62a5960b9b718f2,2024-12-11T17:15:14.657000 CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000 @@ -245815,7 +245838,7 @@ CVE-2024-12547,0,0,3f0e92c84a89218e43c1a9ba1cd6f8c12d84a71973f4849c6aa0fb3a0a553 CVE-2024-12548,0,0,77922e1cebb9b12b642cb156e302118664c3413919f6206c7ce46499ef18a017,2025-02-19T15:24:20.273000 CVE-2024-12549,0,0,786bf1f405686730a3eda8c40e91a1ca05e30b496bcc97442c1d6d89e74a2f49,2025-02-19T15:24:10.513000 CVE-2024-1255,0,0,5935182eb4eb024c7cf7e3cda464e0c74472c4e58bc0030bb090a2a8f708b72f,2024-11-21T08:50:10.150000 -CVE-2024-12550,0,0,ce35987631aeae68370296bb98f0ac6cdc9ccf871b6be5fcf0b50bad33472e95,2025-02-11T20:15:33.800000 +CVE-2024-12550,0,1,599ddfe20f39f119f4e94a38d83730af776facfe248d409cfc564431c6297483,2025-02-20T16:05:43.313000 CVE-2024-12551,0,0,d5c261bbe6b94af8441d06fcc618acf8580b5206376f9fb5b385dc9aa6b753cc,2025-02-18T21:41:17.900000 CVE-2024-12552,0,0,8443c6d0851e2c1de6fc0e2780c54c711d712f43dce29b5a9fc2e07cff55adf4,2024-12-13T23:15:05.553000 CVE-2024-12553,0,0,cd61f311646d40093b2eea8b09f233e945a3d877e60c1a1abbe43e2cfcd9ea6a,2024-12-13T23:15:06.310000 @@ -246603,13 +246626,13 @@ CVE-2024-1347,0,0,b12a4cbf8e4f285872bf9a248874204d9208208e515ae74de2299237bb6626 CVE-2024-13470,0,0,62d62489ae69e29df63f8eb0190e3d2c26ee16e4de50a68486e1e17ce16780e9,2025-02-04T18:51:38.467000 CVE-2024-13472,0,0,78a083d4b9b0a592d2a2cc443e9c6a93e0d6fbb4d284dd5848fb1a89da8cee59,2025-02-11T21:06:13.237000 CVE-2024-13473,0,0,9f1cf3419ff4cec497cc77086acc28179e477b7bcff14ca4047a6f9eefd9483f,2025-02-18T18:15:18.990000 -CVE-2024-13475,0,0,5092e9173eadac632d984f8d6b080371e4a16d09f059f921441142bd53ed3c18,2025-02-12T10:15:11.777000 +CVE-2024-13475,0,1,2d4908141327829ba705ddda18014501694bda29df9ff8e97ff8fd75581f147d,2025-02-20T16:10:58.387000 CVE-2024-13476,0,0,e536d7c12b219bc57ecc07fef47f72334a7428667d6be5f52a983e55580fccce,2025-02-20T10:15:09.990000 -CVE-2024-13477,0,0,994d41dcdca8ea2949161c6a3039cf39facb69cdf429b9bbd695e457cde87ed6,2025-02-12T12:15:28.660000 +CVE-2024-13477,0,1,a10f6bfa8b4dbe093935988668d3d033816e04272de56afa6d2fc4005b71a58d,2025-02-20T16:30:34.457000 CVE-2024-13478,0,0,3d283885de2ff5694d473a7458eb6a9fee1962d7b2f3d84adb8d26453f66b0b0,2025-02-19T12:15:29.777000 CVE-2024-13479,0,0,265f3fc391e53c595bed244b3e7c3502077a0bb4298bb2e92ab4714dd5430254,2025-02-19T12:15:30.610000 CVE-2024-1348,0,0,1859f4ea1d00e7386fbff1ae86e38e3076d8135556fc20b2256d2f026d728722,2024-11-21T08:50:23.040000 -CVE-2024-13480,0,0,321567d1345fefc0890e4d3a03a4c0335890e5df8d4b67eb97bbb9ba1c937e06,2025-02-12T12:15:28.840000 +CVE-2024-13480,0,1,3428580d93454953fae6c3b4142b76858120218f0add18e922992ee88cb52af5,2025-02-20T16:31:52.163000 CVE-2024-13481,0,0,18f6163dfd9d1440b7c7726ceaa029ecf7615c66174a2f06ab95e8be286bcd48,2025-02-19T12:15:30.753000 CVE-2024-13483,0,0,36b609d73c634ce761bc3a61cf94037aa579c6e7fb89e544a11515a27c0ee3f1,2025-02-19T12:15:30.900000 CVE-2024-13484,0,0,4fd55912c77d8dadbebe472ff2c71e4e3fb03970b04450aedc08c21b110060a9,2025-02-12T17:15:23.177000 @@ -246618,7 +246641,7 @@ CVE-2024-13487,0,0,8a4e4265754362ec1c9263cf9e3081850883bf6400106e8f9bffb81274d80 CVE-2024-13488,0,0,4b8066bce6198329d93f932502dadbbf2e639dfefb1f2df4c60df4f085c6e1e4,2025-02-15T12:15:30.457000 CVE-2024-13489,0,0,d540270a20044e19f885eb9c1b6edeac3dc59f7c6064bf65855c9960dc59957b,2025-02-19T10:15:08.870000 CVE-2024-1349,0,0,8b85fafe827f099aa626e71779ca220a8bf1ec034e9ea4e44b28a687cd219e20,2024-12-31T17:15:36.763000 -CVE-2024-13490,0,0,261a201adcbc7bc2dbe4303b4c424a3f72ae3e81ef333b356e5b443e47516d97,2025-02-12T10:15:11.973000 +CVE-2024-13490,0,1,778d9fa72dbdad7c6f858cf2d129bef7c755c267cfff033efd2ee0f0281250f5,2025-02-20T16:14:27.897000 CVE-2024-13491,0,0,3901e563b54ff00b6149844edb6c3aec1c2bb14d137786d8368044d8dc0748a8,2025-02-19T12:15:31.187000 CVE-2024-13492,0,0,e986e613e4183bc9c7afb601a232e5681edf1984e4b97b5e25f6a769df2e2a60,2025-02-07T16:15:36.123000 CVE-2024-13493,0,0,7eded31e5b5002f824861b02e021048420482345b3c4a7249f8ceb434a843767,2025-02-14T17:15:15.230000 @@ -246657,8 +246680,8 @@ CVE-2024-13528,0,0,122b895828098f2015afce9673bbbf513eb3f4c3f5ac9acd2733bf0b49a30 CVE-2024-13529,0,0,200d7b0e051dd0616db8204a0f4feb61aaed03439a2d376a4ab184bb8a3a6125,2025-02-04T10:15:08.333000 CVE-2024-1353,0,0,afe5e84ebbb775598783ab5b808c4fd20532e7440cc7da3552115f2ac18ba752,2024-11-21T08:50:23.700000 CVE-2024-13530,0,0,79b95d03a65d37f6bd7247a320ee91efecfa7853e8fca4111e89d02aab16e68f,2025-01-31T08:15:07.543000 -CVE-2024-13531,0,0,d0896acc17735e856b06d8e0c3a5b2f52d9e0cbd22880e913d28c402f6195055,2025-02-12T10:15:12.317000 -CVE-2024-13532,0,0,afd84c2f186b0b681f34e67a86ddb00ec0310f61d9e69cd64ac60428b6884a22,2025-02-12T12:15:29.023000 +CVE-2024-13531,0,1,7b21b6087dc09e5243c8446026ea2766597c7d8ebd45487cbb44d57448365755,2025-02-20T16:23:02.090000 +CVE-2024-13532,0,1,277704b2d9eb0c92befe05022d60a0db9ec5b21719af0eafdeb96198d3e899d6,2025-02-20T16:46:25.600000 CVE-2024-13533,0,0,dca093e418f506c56c7b721bf19c66fbd6fc8408ab62d8e654c432036b784a95,2025-02-19T12:15:31.333000 CVE-2024-13534,0,0,24e878dd73461d45240baee5013d359ea0437394343be594e0594e5922b1d61d,2025-02-19T12:15:31.480000 CVE-2024-13535,0,0,dec80695a517d3768819588f0daa6dc70d633cccd453511cce85b18d61e52a4d,2025-02-18T05:15:12.773000 @@ -246669,8 +246692,8 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166 CVE-2024-13540,0,0,b68ecde40b732145c347461191cbcc1ffd4b9ba81b4500231d1f6c3e44c75163,2025-02-18T05:15:13.427000 CVE-2024-13541,0,0,4e9d1f97a299ff6127f5d36e7cb13e30abee458413408a9b4f57ec8d00d54529,2025-02-12T04:15:09.347000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 -CVE-2024-13543,0,0,e978bc49ff488db2b344d5d8ed3663103952e081a7e5e2e0d652ffcd5a679db1,2025-02-11T15:15:16.633000 -CVE-2024-13544,0,0,ab4ac6cabc7b36f3edfcf2efc7c25d339765c5d6b37adf1ffeb2e251cad13a5b,2025-02-11T16:15:38.953000 +CVE-2024-13543,0,1,313912351d5c53f4223a6d5b805b81f4ef85173ca4b09805270d61361b904099,2025-02-20T16:09:08.567000 +CVE-2024-13544,0,1,40fd8d3043f2111bdb8eb0b8c5ce28fe2ce983b5b6a5fd7fe7c1666b74685deb,2025-02-20T16:11:08.567000 CVE-2024-13545,0,0,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 CVE-2024-13547,0,0,b1bf985e28e62dd9ee8a2daea2848b4acba32b136937b02955ac8251827bc741,2025-02-01T04:15:30.857000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 @@ -246688,7 +246711,7 @@ CVE-2024-13563,0,0,a22d7bca0cd120477dc1fa3e57922c805548e0065756a928efb634339816e CVE-2024-13565,0,0,09484b11000b3ae55a8d4aa1c14df152d867ff650645b8d7539db7f4a1952ba8,2025-02-18T05:15:13.803000 CVE-2024-13566,0,0,4e1012bf67cdbac097d1c63a1c7fd79c8a8116508864b50fb7c66cdc833178a3,2025-01-31T09:15:06.847000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 -CVE-2024-13570,0,0,bd29cdd9a7035d220844b35d0e7ba2f79edf50e314a280da902fd81fc517776e,2025-02-11T16:15:39.090000 +CVE-2024-13570,0,1,5f3f1655b91dc3bee949d16de77a481687b9936ecee52594dcd7e9a641c4eac8,2025-02-20T16:12:22.823000 CVE-2024-13572,0,0,532a725cb20bed55876f1b16270869e2ecd9d5cd846a67b1cf929aa084c91b6f,2025-02-05T01:25:51.813000 CVE-2024-13573,0,0,4c15c78a9615e8ce64f7592c831c2a81f25bc5a0e24ca1c3a58f764690185d7a,2025-02-18T05:15:14.007000 CVE-2024-13575,0,0,17926a8a3c44e671cffd1d8c13b88294d3fea4b6a59023fa8be054801e0a5de0,2025-02-18T08:15:09.653000 @@ -246723,7 +246746,7 @@ CVE-2024-13607,0,0,971007da10a9fc294b65e85316c324b849c3e2d15fb730239949152f9e552 CVE-2024-13608,0,0,b8b173401de3e1097c36a401f8928ae8cd5257912fc8cac1e3eea9f3234c491d,2025-02-19T19:15:14.260000 CVE-2024-13609,0,0,f6b426da9160449350ccd1dc2595915af601bdc725430ae991e1018a5193a1be,2025-02-18T05:15:17.160000 CVE-2024-1361,0,0,97ae7bef997d0711a578d7bb7fe15767bd1e10109291fe764008616829a40faf,2025-01-15T18:39:23.493000 -CVE-2024-13612,0,0,552127c2046be21ad3d3bc25df0920820f31b497c8eb5b9bb46c66cbfd8336ca,2025-02-01T13:15:21.320000 +CVE-2024-13612,0,1,b4eebc3a0ba94cd7de5a857ae3d4519c3aaa03da31361c68d970a3c283ce20a7,2025-02-20T16:51:45.987000 CVE-2024-13614,0,0,e58c8adf8c29e7e85021326638f400d4333ddf67f47f6ad8c608c33ab2021149,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,1bf34831bc70bdad1bc996e752545d1e0c7befef2013c4482e56f5d7529aa921,2025-01-15T18:40:30.490000 CVE-2024-13622,0,0,2a60756e3c1f8e2c67b3815a15c7e2ffcb84513035babc6bcdd160486b03b340,2025-02-18T05:15:17.557000 @@ -246837,7 +246860,7 @@ CVE-2024-1380,0,0,189ef0e7c99b94999bf853d72512eb8cc5fd5c5f665b06c2b0baa188813ae8 CVE-2024-13800,0,0,f8189949096d0fbf1e64f83c4f4243db2d6cd8eee32b0c9aa4085efbf0645426,2025-02-12T05:15:12.810000 CVE-2024-13802,0,0,fd81c83638437a642a8e1df7595c3a3a89a54e0438783fe338ef7efb14df6f36,2025-02-20T10:15:11.100000 CVE-2024-1381,0,0,f79abe04d98fb58eb4a1bc15edce6ddf9cf798d335c45513b35103feeb919d6b,2024-11-21T08:50:27.453000 -CVE-2024-13813,0,0,a0414a00a2a30561fb3007f9bc2cc4b58102a245d589b97ea6ee429ccb8e907a,2025-02-11T16:15:39.220000 +CVE-2024-13813,0,1,fdc4ad5ea8556267af57de167767e42189cf8d83fe0a9d1183500203243c2b38,2025-02-20T15:56:04.087000 CVE-2024-13814,0,0,1eaa34671c59ff347de019eb0f7db92c91d554728619786a007d058e64ccd6e0,2025-02-18T21:30:00.523000 CVE-2024-13817,0,0,b5a69d8e5693042f6213842e77c8ea5e9adad031b258d4d25f98e0b0bd22c27b,2025-01-31T03:15:10.910000 CVE-2024-1382,0,0,46ba372cc585c5cc80406db23ae24542751b0e1ef43905cbc6e0bcf967676a5e,2025-01-21T17:04:33.737000 @@ -246849,8 +246872,8 @@ CVE-2024-13834,0,0,b3a753413a4c1c1c8fb1941598bdc1cadfaac89f934ae66577e6a8bb7cdc2 CVE-2024-13837,0,0,b186071e4ea62233d731f5821d490b3ab777186a5f4da25e22f6fedfafcbdd0c,2025-02-17T19:15:09.463000 CVE-2024-1384,0,0,f50cb0336a3fe51b62fe599c783d20749a5fb92b8e797d5c0ac36d466c13f7ad,2024-09-19T22:13:04.370000 CVE-2024-13841,0,0,42857531268142aae6c02637b3b6e7d79dd71736d6804136946d48ddaede14a2,2025-02-07T07:15:14.573000 -CVE-2024-13842,0,0,955b2791810b1a10a02616a1134c790dde9472870ffb2ecef1b260eb338bf89c,2025-02-11T16:15:39.513000 -CVE-2024-13843,0,0,510b2676ce058323607c3a8a5ac880be2eb8da89d56b6ba23759e15b6c5d2ded,2025-02-11T16:15:39.667000 +CVE-2024-13842,0,1,e27bb87d0390ea96b584ec0f6fbe747157fb2de816ea15a1791b354e66567fcd,2025-02-20T15:55:29.770000 +CVE-2024-13843,0,1,7b075d61798f8069984290c52e4033a7424dc56423296944d32554dce61a6d7f,2025-02-20T15:55:03.547000 CVE-2024-13848,0,0,df6c3059e3b4c6e50b09360738ce65b75366af6866f9db1d8dd4c079c2d2cfbe,2025-02-18T05:15:19.157000 CVE-2024-13849,0,0,d98f7937784c29e9abe71d6667822b62b2ca578c3586a491787af9ba63c49a21,2025-02-20T10:15:11.330000 CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed005096,2024-11-21T08:50:27.933000 @@ -248966,9 +248989,9 @@ CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fb CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 CVE-2024-21685,0,0,3c4c971d45d65495f5592903972ee9cd75db6eb0dc168987da35ab904c4102e3,2025-02-19T16:00:53.703000 CVE-2024-21686,0,0,0d4af5eeb52a1b56cf89baffd989a415c4ed1853dde7091d90226451bf24db64,2025-02-13T17:09:31.977000 -CVE-2024-21687,0,0,61dd115c9b058b7191477ed6f478ab4abf9d9c1c2c09f46ba6956bd27091cc8b,2024-11-21T08:54:51.880000 +CVE-2024-21687,0,1,e73c6bcb8f1514456c4ba9176c664a14addfbdb548c45aae992434166dda0dd4,2025-02-20T15:20:02.967000 CVE-2024-21688,0,0,5b8415c8724c6d841bc6d9d4e0c517ae2ecd0ff5c1fbdac85271979721c9c3d9,2025-01-01T00:15:36.373000 -CVE-2024-21689,0,0,a01a1bca13f2c42e57e070cc6d909423aa132c1df6ed296e0ae2b6c0052407b9,2024-08-20T15:44:20.567000 +CVE-2024-21689,0,1,46892f81d466ffededaa54f4f25d900071c01a1d5bfac907f444793fc2ee1b68,2025-02-20T15:23:21.377000 CVE-2024-2169,0,0,20f842630ee9719988f642b8fdd4eece4307ca504a94d22a1bb05345971c6393,2024-11-21T09:09:10.397000 CVE-2024-21690,0,0,3415a4c120235aa54d0dba86283afdeaa6d4147fd2fc657a4e07d3a39ee56f61,2024-11-06T19:35:13.787000 CVE-2024-21691,0,0,fe5e849ee55ece29d4fddce98b1adddbd2b988d0e042cc6a0fcdd846d5a267bd,2025-01-01T00:15:36.447000 @@ -251134,7 +251157,7 @@ CVE-2024-24716,0,0,2a1681202601d9e99709e6831ac4b63ea8c43e8b87405bb1f57ab626394c1 CVE-2024-24717,0,0,75805cbf14610b8ac5098a39951fb1a53c50c5d54fe991e08ae0e81f017efa6f,2024-11-21T08:59:34.317000 CVE-2024-24718,0,0,0bd4850cb3528e2664d36327d098a9e4583ca04b2f7a9e91e5fad6d001286c79,2025-01-31T18:23:45.550000 CVE-2024-24719,0,0,80dd1c9548ebeae5158782803ec3348dd95a3e7ac18027462986588f41af4eaf,2024-11-21T08:59:34.593000 -CVE-2024-2472,0,0,1b52ea4958b068d45766ffc212459cbf6a4302f92eb304d3cdb6ece10b845ad4,2024-11-21T09:09:49.730000 +CVE-2024-2472,0,1,78def4d4a990956640bdb077e14c5a7dcb1847a727dfd6649f6164a8bc5f6947,2025-02-20T15:28:10.360000 CVE-2024-24720,0,0,8628ac8d7758cf71f494cd53411e3db2365b79617d5b84f61a2eb40133f852e2,2024-11-21T08:59:34.710000 CVE-2024-24721,0,0,de3870c41ecf7e97c4a338a6370e359e038b4867c4358ac9aa4190cfd6f83e78,2024-11-21T08:59:34.940000 CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5366,2024-11-21T08:59:35.147000 @@ -260936,7 +260959,7 @@ CVE-2024-37358,0,0,d63f36f666a30bc5a531bdee61d9493741ce80a82a2db30dba675779712c5 CVE-2024-37359,0,0,0164b4be005f853818bcdcce258948ef3b9e1daade18f9e2f8fca5b602fd2996,2025-02-19T23:15:10.330000 CVE-2024-3736,0,0,6e4a1ef94c0273eebc8e9e6b2b5445ce88780aebebada592671bcb41b0d8c2d8,2024-11-21T09:30:16.647000 CVE-2024-37360,0,0,a4091fe21f26d9058b42d48095351e79c48d46ff5ddb54aa2e6a91e3943ae007,2025-02-19T23:15:10.537000 -CVE-2024-37361,0,0,49bbba64aa5c5f7a658f3636f8ca2e294c069f968ed4e978b2889a4f20f21b0c,2025-02-20T00:15:19.507000 +CVE-2024-37361,0,1,b797737a930223717c8fd1f79a748b570a5c9575cecff473e8a7aab7d7365aab,2025-02-20T15:15:13.190000 CVE-2024-37362,0,0,bb8cf118a60dd5876d1853971fb911924b6e1d70593c134cd474c796067a2140,2025-02-20T00:15:19.630000 CVE-2024-37363,0,0,82ca42c41eab0f0de2c367f2c6182f5bcfc400fd0a5fa6cd33611ca15fd803e3,2025-02-20T00:15:19.750000 CVE-2024-37364,0,0,c4ba2eb3ad001e136c90a8138bde00d47fa986718a2e611803c5ba1d95d0615c,2024-11-21T09:23:42.810000 @@ -268083,7 +268106,7 @@ CVE-2024-4707,0,0,e65b188ea06841988570af59fea3d47c9f9ac747dd0bff4b49dca436b75799 CVE-2024-47070,0,0,f44cb16339f89c133e15084d069c0fb846144ea38144e388a800586a53fe0e83,2024-09-30T12:45:57.823000 CVE-2024-47071,0,0,ba349c35770c0b38461f4a8cd0cb017eb80bd299da2b0136e08a2f2a4f3af1d6,2024-10-04T13:51:25.567000 CVE-2024-47072,0,0,5396eeb2e43ea0b6080e1687e9e26b1d765ba3b900cbaf26034407d05f09195a,2024-11-08T19:01:03.880000 -CVE-2024-47073,0,0,3d093396fb3f062c2b9f4c4828481f73c2760c30da62b1bc38b8b8ddb3a2d9a0,2024-11-21T17:15:16.160000 +CVE-2024-47073,0,1,c54d6f2f172da9b4086ba207e2a3af6a5ae26482e1c467e6988f73b19a51c862,2025-02-20T16:20:40.547000 CVE-2024-47074,0,0,5945c0ec22658edf552da4d4d0e2c77a971cac91f2ef7f591a767b9f728bed9b,2024-11-12T19:52:38.023000 CVE-2024-47075,0,0,a2d6efb1d41afa02c7ea509cf6e92889c9a139c99ce90d9a00872aa72d65ae14,2024-09-30T12:46:20.237000 CVE-2024-47076,0,0,66607a2d6fa007363ac6549c2a23f1ab8af8f0bcb4165cd6338f82d994cf0c10,2024-11-21T09:39:23.823000 @@ -268832,7 +268855,7 @@ CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d4 CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000 CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000 CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000 -CVE-2024-47908,0,0,e7271cdf8a9626532e80846e60acf4fa03f1b58c03117b023ce1ae3ef0c92d11,2025-02-11T16:15:40.247000 +CVE-2024-47908,0,1,b8a01f67ef29d1d76d6b0a947bada6666fc9b15d6e0aef7780ff896b88de7611,2025-02-20T15:57:06.850000 CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000 CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000 CVE-2024-47910,0,0,2b512b73d2b6b5c66fe1cf4c33853e3228b1071f06eada4fd9fbf32862f1d5d5,2024-10-07T19:37:43.677000 @@ -271817,7 +271840,7 @@ CVE-2024-52291,0,0,67366554fa12fc5f80ea7a37ab4efbcf755b65176915cc467a885e5d178f4 CVE-2024-52292,0,0,98ff7782d74c8a880b21aa3925ef392e3d7f9afb5fb086d700b2918ea0d38572,2024-11-19T18:27:21.567000 CVE-2024-52293,0,0,48995c1833d437873320d2a00d4716843128fee61b180655a95bba4546c3a839,2024-11-19T17:51:39.460000 CVE-2024-52294,0,0,6292d16468fc827dd6fc5e9bde5041230ca83aa97d2fa7a45b6fdf7131f4357f,2024-12-30T17:15:09.467000 -CVE-2024-52295,0,0,e1efe4101b45f07177f061e2ac83f686fb357430fe974441f146b398fc7fd083,2024-11-21T15:15:32.900000 +CVE-2024-52295,0,1,acf2270c494b9d0a06ede4aec3f02a8feb72be5c0ba92ae2a0788122d05c2dd9,2025-02-20T16:21:26.323000 CVE-2024-52296,0,0,b562f18595b8ca53024157f705b18f7c73f8b643fe6d08b20dc5b815792285b0,2024-11-13T17:01:58.603000 CVE-2024-52297,0,0,5528a19c9c06652e4abd378b7e62659078889b6d0c1cac57d71cfe9d52fe1e73,2024-11-13T17:01:58.603000 CVE-2024-52298,0,0,0e82a2c04d492598179d5deb8d7d99c3d515ec084ea8200a762f2512cbb5ddcf,2024-11-18T17:29:27.170000 @@ -273910,8 +273933,8 @@ CVE-2024-55949,0,0,730f7b9444cd8d481c090272c978e37b84fbd5b51226a21ecf1c6c64d8e22 CVE-2024-5595,0,0,5c3da38e1b5f1812e17cdadfa64cfac3c13c5342e8821d9036b7da1dd32b505d,2024-08-02T17:35:43.927000 CVE-2024-55950,0,0,452ca7158ead07675fe20f22ab4fa2cbef70b0c04825b5afe33473c735fabe96,2024-12-27T17:15:08.480000 CVE-2024-55951,0,0,a51355b6ae0f3b8ff81aa1c7eb7d8610a8ed0d99cdcd6fefacc2c260861ccc4a,2024-12-16T20:15:13.823000 -CVE-2024-55952,0,0,c5c9e3ddc2dde0fdaafe60e16029d6acd7a5c8b9fe490f67edd3c62939aa431b,2024-12-18T19:15:11.933000 -CVE-2024-55953,0,0,db9cd8f82466bee8b44b5fcb7d2ef52f7e161949a8e96e2914214fd35e1b6b39,2024-12-18T19:15:12.067000 +CVE-2024-55952,0,1,684761dbbacb6f645db365e7e0599f9e3370b7e14b8eb486a81092d66a1bf19a,2025-02-20T16:22:50.240000 +CVE-2024-55953,0,1,90fcdea482c120744930d556fbdd18847db93825072c3df028dd92a54d371f9d,2025-02-20T16:25:07.667000 CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 CVE-2024-55956,0,0,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000 @@ -274310,7 +274333,7 @@ CVE-2024-56508,0,0,62a7f3a0dfedbfdc727f7144b117b7a6dd3c469bd925b864f6c6e3be9baa3 CVE-2024-56509,0,0,9fdcd292e86fd0e8d6251a00e018f2adcb8bb6eae15c539496a66732d314837e,2024-12-27T21:15:08.483000 CVE-2024-5651,0,0,32bbfd3237660b59f36b0fed977113a2851ca445319041dc9e59d5754bb27734,2024-08-30T14:15:16.820000 CVE-2024-56510,0,0,4f41482ea166ed5c7202c0301fb2df4e26c47402a9de7a28e23eace289425385,2024-12-26T21:15:06.743000 -CVE-2024-56511,0,0,00b81ec3fa7f59774b13c1a985c50c77979e7bf8e4540f7395f2c60a588f7023,2025-01-10T16:15:29.510000 +CVE-2024-56511,0,1,5366dbb656a4a7481616000b94cc615953e9cccaf1bda7d00415cef2308d3dc5,2025-02-20T16:26:58.487000 CVE-2024-56512,0,0,599da64766ce0e1c2bd7cfcf30544268a9ad3bb7673ddbfdef2855ca9f183344,2025-02-11T16:10:28.690000 CVE-2024-56513,0,0,9b984981824a0c6f095fb5665637efc179ff6f540261d1adf328a60bce18b5fd,2025-01-03T17:15:08.840000 CVE-2024-56514,0,0,e058d052cba75c8abceb7466be1ca70fd5102e5e0d800171ed2174e12e737c27,2025-01-03T17:15:09.017000 @@ -274827,6 +274850,7 @@ CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b CVE-2024-5739,0,0,c5c2a01c52729f34b70d0ba17b3b2c0fc6065fac9c4acf57edb649a485cbd474,2025-02-20T11:15:09.400000 CVE-2024-57392,0,0,7b9989fcc73c1df35c96288876a5368c643f8db4e87836a57a99cbb5dea65395,2025-02-11T15:15:18.900000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 +CVE-2024-57401,1,1,2859063cdfe20a40f5a31b63fc9e0efa3eb2097c3ed482aa578fc1d041897bac,2025-02-20T15:15:13.347000 CVE-2024-57407,0,0,45e1a10510320897f48f1620e894947df2f73cd6e1f003632125a8e02b442b2e,2025-02-19T21:15:15.393000 CVE-2024-57408,0,0,175db0428293ce57c99d60d486d8cbd43e580b93d14f299c67a8f76d88381cb5,2025-02-11T00:15:28.707000 CVE-2024-57409,0,0,0b05f5863a283decb12d24250619815c0ec7b2696059e21578dc2420bbab0e60,2025-02-11T00:15:28.863000 @@ -277933,7 +277957,7 @@ CVE-2024-8907,0,0,51c2686e57db6be1a13996b2715ca4c00712b0dfaff67ec4c63726bf925972 CVE-2024-8908,0,0,5817f53ddb99ab4a81fefd746445a2c702eaf4a55d3e4f8367bc04682257df1a,2024-09-23T17:59:14.137000 CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa23a,2024-09-23T17:51:11.790000 CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000 -CVE-2024-8911,0,0,1c055f3e09829fb21c04c14ae3a8152042ba8c9ae34aa262827c4d7c5665eb14,2024-10-10T12:56:30.817000 +CVE-2024-8911,0,1,246797851c97ea5b7f755ea5f1c4d1b908435f8aae081e002abae966ffcba0c0,2025-02-20T15:30:18.643000 CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000 CVE-2024-8913,0,0,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000 CVE-2024-8914,0,0,ce4fb597594217313bfdde28ad4b8137ce4048a1c3742ef10b91b3c3978b838a,2025-01-27T18:15:40.230000 @@ -277962,7 +277986,7 @@ CVE-2024-8939,0,0,c25a02094c7c1751d20525b12c6e0eb5406cee4bacfaf03c2adb4b584bb9a3 CVE-2024-8940,0,0,9a3c4329418a0e3104a91f652312bd7ae60a157cfba240489e078a14636eee06,2024-10-01T17:21:01.550000 CVE-2024-8941,0,0,8e9c3f4e719097ce642538ebd62ea55c93311c5fe6daf8b2d296986fc9c234e5,2024-09-30T19:45:43.223000 CVE-2024-8942,0,0,c4ece599c1d45ba712aee1c379ddee7479ad369e987935d035985aa672bd599d,2024-09-30T17:39:28.417000 -CVE-2024-8943,0,0,e3f9879d74432198676a63296f791a6faa12885ac8bf7bd31eea59cb73160181,2024-10-10T12:56:30.817000 +CVE-2024-8943,0,1,5e19655e35ac3d84c57759b3e5c18b3e8838fbb8ed2c65606c5291003392b119,2025-02-20T15:30:59.567000 CVE-2024-8944,0,0,4d54f1a0baaf503429d63b0c7baf27b829b5af54b4fe40f08a44318e73509207,2024-09-23T16:56:34.637000 CVE-2024-8945,0,0,49fe08fa5001a52fcc4b693eea0010b97a8789b0d8d21b7f4e3e0328bdefe156,2024-09-25T19:24:25.167000 CVE-2024-8946,0,0,bcb0cae889a0e634e570c2499f9be0b5c400d66b6bfab9c51dd0c42de347d94a,2024-09-24T13:11:17.417000 @@ -278883,6 +278907,7 @@ CVE-2025-0146,0,0,5b6cbf7778d150dc0f764d560e6920d84643598a762755ba92a93cdb6447e0 CVE-2025-0147,0,0,a6050aa713d7ae074010769aeb6cd57025126d14dd2a5867c45c4d515d5bfa43,2025-01-30T20:15:35.253000 CVE-2025-0148,0,0,b7337835a1848c842fc2b56ea72e1a0898aa28c40787a276d8091bbd669c236a,2025-02-03T23:15:08.217000 CVE-2025-0158,0,0,f3073b33a682c6c4fcb1bbe908bc9fc861912bdae73f97919c33833b929dfa0a,2025-02-06T21:15:21.923000 +CVE-2025-0161,1,1,6a5cec8bbd7fe4ae87879953341dc15816450e6791f75fba2567a9ddc4b48b23,2025-02-20T16:15:36.333000 CVE-2025-0167,0,0,d4663f95972209d56dcdcbcde80e33737ce4bcc3e802817579e13c9b67abdfd2,2025-02-06T15:15:16.967000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0169,0,0,a5d0b3b918a183dd75efd99915b694a33b31e217f0fac0641a3f178803662807,2025-02-11T18:15:24.260000 @@ -279380,7 +279405,7 @@ CVE-2025-1025,0,0,88de3d5b0a73f8ebb31a09c003423921c8f28cb5c5fcc232fde8c177bdee96 CVE-2025-1026,0,0,035fc1dc2474697a852e52233cc9d299f677e1a0207511b21278e18a7e117de5,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,7d86a6dffcd03cc50ed664d1f7c2b2eb464439e0b7dbc2e8aafa1f3f61bb44bb,2025-02-05T04:15:06.543000 CVE-2025-1035,0,0,d903f294151be8a3e62456157037514ca824f897e40f9739bb45f708f03b9002,2025-02-18T12:15:16.087000 -CVE-2025-1039,1,1,dc35f96e066d0f1c0e4583992324060e73a8fefc79481a755adf446f58a96b39,2025-02-20T14:15:33.627000 +CVE-2025-1039,0,0,dc35f96e066d0f1c0e4583992324060e73a8fefc79481a755adf446f58a96b39,2025-02-20T14:15:33.627000 CVE-2025-1042,0,0,e4600eb751c0559414826534607894ec791f03e01157094495f2034b236d6aad,2025-02-12T15:15:16.230000 CVE-2025-1043,0,0,c607b275d7254bbcb4ccac200e10fd3b263d060b985922e80bbb9468afeab30b,2025-02-20T12:15:11.030000 CVE-2025-1044,0,0,9f8be6c10874ff2755d0454f22f2307f6446f5aad49de046e6d1d7bccf9d96f4,2025-02-18T21:34:01.863000 @@ -279463,8 +279488,8 @@ CVE-2025-1172,0,0,cf08703b66582ec9de3e473fcab67a2dbafe69d53a075dc9b8254b1bcc7063 CVE-2025-1173,0,0,3256d2a06a1e205d73caa7c7b35a941bd06320937c6ee57d5e3a1dfb4b5dac94,2025-02-18T18:15:32.097000 CVE-2025-1174,0,0,b277eefc10bbea1c65bde415abd8b710cfabaaf26b49d8adc747498793fad326,2025-02-11T05:15:13.810000 CVE-2025-1175,0,0,e4e505608345f018f25d9a8f47aadfc991d7592689b77a43eab3f49ae131ee56,2025-02-10T13:15:26.593000 -CVE-2025-1176,0,0,3ce63005f2d6955454d119dc789ba0c338f09f10e1ca69523a11a4e76ebec2d2,2025-02-11T06:15:22.433000 -CVE-2025-1177,0,0,5d479a05ee98fce9bd1df94de6d3bb9d103629ca41a0e69997601547f088af7c,2025-02-11T06:15:22.623000 +CVE-2025-1176,0,1,8cf8a70dcc94a89a62919366b7487a3dfdce95e8c69cdb3cf8f5341719553f93,2025-02-20T16:40:56.790000 +CVE-2025-1177,0,1,2750688ea305a99d2156eb5379d393b0bc9b7de2dab06fab402b7d10b18283f9,2025-02-20T15:58:50.097000 CVE-2025-1178,0,0,6e9bc15abee46095fa45b59249884a86b08db54b5b6bfb3dfcc9175f57316032,2025-02-11T16:15:50.410000 CVE-2025-1179,0,0,b0d6771b78105fabc5cb05959af91d00a6aa6f0f241f8fe7fdd0d3377e4112f5,2025-02-11T07:15:30.230000 CVE-2025-1180,0,0,e33150e1627a57b9cd6fa38d34bee2af60b28a8fa910407013e14bac501bc1ce,2025-02-11T15:15:20.260000 @@ -279476,7 +279501,7 @@ CVE-2025-1185,0,0,cc25ee2f77a3103fcd68a3f1611fd1f716189b46d9cae5c522939b670d5fe6 CVE-2025-1186,0,0,8086a12ea65738a60ab99220576d2e18e33f078a2bf72100e8b879a5e3eef2f8,2025-02-18T18:15:32.870000 CVE-2025-1187,0,0,4d377fdf42828c943e4e7e7e9bc0ee6d4b95eda485220a10fe3d04dafc88feff,2025-02-18T21:28:37.800000 CVE-2025-1188,0,0,705852bbbd5f869ccd9a3fec289796fb3a53a8119c986f44aa0b13a8e84aa3bc,2025-02-18T18:15:33.103000 -CVE-2025-1189,0,0,9d048b706e0c633092d2636c584e408a87b9bacdb8dd7e3545dee61fb5f96c9c,2025-02-12T10:15:14.540000 +CVE-2025-1189,0,1,3b6e41cbcc65254efe4e87c6b632c90e93a50ee5dc1bb04dd5b747e87cec7253,2025-02-20T16:24:17.783000 CVE-2025-1190,0,0,bdc8e5317e46e46a9ca4a9bb55f67f9139555824a181f8bdaf33c4b7f757c764,2025-02-18T18:47:00.127000 CVE-2025-1191,0,0,1c6bbb235a5b5708d13f9a9dc19f35d51e2568dd188a3fd7f6e46662095fe78f,2025-02-18T17:51:51.260000 CVE-2025-1192,0,0,88623588fdc59389c24d2321b3658ac92ffbf7f63f6d3e4f84f69d25664fc37a,2025-02-18T17:52:35.107000 @@ -279580,6 +279605,7 @@ CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19 CVE-2025-20045,0,0,ba0ef320c9e613957cdfe0d3749dda7745ee780500cd8bc568a221eb62e504a9,2025-02-05T18:15:29.760000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 CVE-2025-20058,0,0,af25661117d7a8f1ae52c2135ac2ae15c5889bbaee5a55db180a54f06b9f9e1f,2025-02-05T18:15:29.943000 +CVE-2025-20059,1,1,f562912b659dee303ce52787c7776cf1978b99a8e34b3ae810a23469ead25e2a,2025-02-20T15:15:13.957000 CVE-2025-20061,0,0,e62e8a8fd4ab6d97299876ba25c6f346e45990a2a45061ca766da62571a8af24,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20075,0,0,b30b32e2f08da502fea0698f2946161a425eb310144fa5e17bbcbe0fe4f71804,2025-02-18T00:15:21.107000 @@ -280248,7 +280274,7 @@ CVE-2025-22402,0,0,3d05349369555f44f15217004f13f07d59bb4bf46759f4c867640d0bca502 CVE-2025-22445,0,0,b624e4e02bffb5e86c49cb4f27a7947d07caad44049ae2738e6a5025f36e7b72,2025-01-09T07:15:28.617000 CVE-2025-22449,0,0,bbe6983ada373fe96f2acc3f2babe8a504c2fad76654b8fe6101ea89ee7b3f6f,2025-01-09T07:15:28.777000 CVE-2025-22450,0,0,08efaa8a0b7289f6e07d2143106d9ab0ee4947a312acaf42c999e908a6f4e398,2025-01-22T06:15:14.327000 -CVE-2025-22467,0,0,79f72ccd5b3a974b689712a969e184ac73efee9466b0950e634b839d4d74346a,2025-02-11T16:15:50.840000 +CVE-2025-22467,0,1,8bd8bd517db848742ab03a7d28d508822057ab7be14ae3f2dcda13c476e2f133,2025-02-20T15:53:06.133000 CVE-2025-22475,0,0,15e2f0e4f859c49a221c12f5e1eb7e46b6c6aca8f0ab3cc88af90136ef2fdb5f,2025-02-07T20:42:39.800000 CVE-2025-22480,0,0,30f78fb08b81b0a4a0f02016506c54aff4f612e77005946c54cb0114603ea9f7,2025-02-18T18:39:56.053000 CVE-2025-22498,0,0,f3f7d57a5c074cef7d66fd0b0c22de1f5c4ac45e596ff524016d32b7cab75963,2025-01-13T14:15:10.787000 @@ -281107,8 +281133,8 @@ CVE-2025-23997,0,0,77e65675aa34b148df76ab43b9568b71cc7208d39621afbe6f65c277717cb CVE-2025-23998,0,0,4ced4b8f68a6d09d5a1c825ec6107a84dbbb418c96e80844463996fce823e3ed,2025-01-21T14:15:13.413000 CVE-2025-24001,0,0,2c753840ec158b2e8c5040a7ed2631e45b8667250a806707291f782ebc7cf4aa,2025-01-21T14:15:13.600000 CVE-2025-24010,0,0,755be8be1475b71408bd0286ec94084c98023c6a02427820a8766e3be39154b8,2025-01-20T16:15:28.730000 -CVE-2025-24011,0,0,f293290e6460b1cd8914f5613f3369d3446787903b23580aebaaaa42416d5ed4,2025-01-21T16:15:14.760000 -CVE-2025-24012,0,0,9d2250800d70ae062590b777d53f5900dbc9b4bfdd2d45d866c2ca6c753985af,2025-01-21T16:15:14.923000 +CVE-2025-24011,0,1,4997002c63d87a94e8865776add6314e721049c559bd5f674a539776486b7a16,2025-02-20T16:44:29.017000 +CVE-2025-24012,0,1,d7756088832c18500532400fd59d99bc70c3afd7fc4835be1603f2f4ad48aacf,2025-02-20T16:45:15.377000 CVE-2025-24013,0,0,7b40cfb2c3b6c4eade342d9fc55e4330f563cbcf759855be6657139e406290d2,2025-01-20T16:15:28.877000 CVE-2025-24014,0,0,c01e1782ee7131bc5ad5aeeb3c598dd08e570d6bc857e837f2feba5725cf242d,2025-01-21T03:15:06.393000 CVE-2025-24016,0,0,c090754f26d92875e7dde6ca613307138b21fce6005c542e3bd734afb516a0ac,2025-02-10T20:15:42.540000 @@ -281546,7 +281572,7 @@ CVE-2025-24891,0,0,fa354bb024eafc83868e45bcfabfb6da90613ba074888a78bff8f3e35d34b CVE-2025-24892,0,0,51c367e6866b01e462dd4aa6239e7b847dd4ef3a2e44ef848d7f38e79a738768,2025-02-10T16:15:39.310000 CVE-2025-24894,0,0,719537e2b65db00c391760a0cd638c15406668ed57b32d2a279ec49cb0e3adaa,2025-02-18T19:15:28.090000 CVE-2025-24895,0,0,b00a9ba498d0a292ef1f9fa7a927fff9b8cfa424cc9586cb281d28faa6ce8d74,2025-02-18T19:15:28.240000 -CVE-2025-24896,0,0,aec136f16d507a4ff319c0cbf4875cbc3a2af117b9ba5311873360f82c290541,2025-02-11T16:15:51.477000 +CVE-2025-24896,0,1,990844e95cf5f001626311cb46be899bcd7e5e93cef08984ed7570a5b8885bfe,2025-02-20T15:48:37.877000 CVE-2025-24897,0,0,b4a9ca153078c9451982223cb67d9a48c46e9b9480f45d60a768c29a811f5d8a,2025-02-11T16:15:51.610000 CVE-2025-24898,0,0,8b656476c3e6384183d80bdf8cadd585c7688e8bfb1105b9b189df49539552e9,2025-02-11T08:15:32.003000 CVE-2025-24899,0,0,b464e96610aff8658de3c88cb6a2e44c2520453b604cb150cf8f488249a2b344,2025-02-03T21:15:15.703000 @@ -281742,13 +281768,13 @@ CVE-2025-25897,0,0,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30ca CVE-2025-25898,0,0,04c24c833076238e0492d1c61fe2318923b61fe34c2d487dd0ee957f99c08670,2025-02-18T18:15:35.503000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 -CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000 -CVE-2025-25942,0,0,85ab4062eb43878f0fdb1e9875b98a7e10521685ddf48033df109e4b98271d9e,2025-02-19T23:15:15.310000 -CVE-2025-25943,0,0,d8f46691dc91eee9e4a20a2f1b3cb0f319f6b0cceb5f86c13d7f054eee11d83f,2025-02-19T23:15:15.417000 -CVE-2025-25944,0,0,92e5875cc75dd022b4c4515b2b71e73c344be84ce672451cb2474c3087b576f2,2025-02-19T23:15:15.530000 -CVE-2025-25945,0,0,cdd982f3067d9f331d55d648a036c2ff012b6b52b47fbaa5476ef9b27e1463c9,2025-02-19T23:15:15.630000 -CVE-2025-25946,0,0,7337752975888d8ec631a94282133e81248aa33cbd1be6b828382b2886ad9d96,2025-02-19T23:15:15.743000 -CVE-2025-25947,0,0,ab800ba5d018949119fcd4ce2569459b29e4005fcc6eea426b0205535350332d,2025-02-19T23:15:15.850000 +CVE-2025-25901,0,1,dbbaa66456410cc814c13398a9419347a95d4c008549889e82c9e08064439afb,2025-02-20T15:15:14.380000 +CVE-2025-25942,0,1,aaefa1472b5a3a4ffd45a7b82843a4fba08935bb07eb639c11b55e6ffce6e19f,2025-02-20T15:15:14.587000 +CVE-2025-25943,0,1,3d5d9a9e07fdb25bf040079f5fee5cc6a8e0580e939f6bf77bd76c374978b2a7,2025-02-20T15:15:14.743000 +CVE-2025-25944,0,1,be3957e03ef6cc753272acb47a0146e6f3e330f45af5947134f7dfc1abcce0e4,2025-02-20T15:15:14.900000 +CVE-2025-25945,0,1,11a45dbb9f85298a4f5f5f1ffa2ff82703bd23ae19884ad1bb8a03ee40102cde,2025-02-20T15:15:15.073000 +CVE-2025-25946,0,1,b9c23bf08cd92d7c9cca31f0d0d39dfabaeeb4f8fda065f73ab8d2322e4edf92,2025-02-20T15:15:15.227000 +CVE-2025-25947,0,1,bf5a589bf21a858d30ce3f9e75804530a939c4b2ce95d48bea111bb37f0f00d5,2025-02-20T15:15:15.530000 CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 CVE-2025-25990,0,0,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000