From 2ad9d9eb46e2127a3e0f4dfc310915d6124d20b7 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 5 Feb 2025 21:05:19 +0000 Subject: [PATCH] Auto-Update: 2025-02-05T21:01:53.795162+00:00 --- CVE-2017/CVE-2017-15xx/CVE-2017-1515.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1516.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1532.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1540.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1545.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1563.json | 22 +- CVE-2017/CVE-2017-15xx/CVE-2017-1567.json | 22 +- CVE-2018/CVE-2018-149xx/CVE-2018-14933.json | 34 +- CVE-2018/CVE-2018-14xx/CVE-2018-1457.json | 22 +- CVE-2021/CVE-2021-08xx/CVE-2021-0881.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0882.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0883.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0884.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0885.json | 32 +- CVE-2021/CVE-2021-231xx/CVE-2021-23165.json | 9 +- CVE-2021/CVE-2021-339xx/CVE-2021-33970.json | 32 +- CVE-2021/CVE-2021-339xx/CVE-2021-33971.json | 22 +- CVE-2021/CVE-2021-339xx/CVE-2021-33972.json | 32 +- CVE-2022/CVE-2022-280xx/CVE-2022-28085.json | 8 +- CVE-2022/CVE-2022-480xx/CVE-2022-48020.json | 32 +- CVE-2022/CVE-2022-481xx/CVE-2022-48174.json | 13 +- CVE-2023/CVE-2023-209xx/CVE-2023-20909.json | 32 +- CVE-2023/CVE-2023-209xx/CVE-2023-20935.json | 32 +- CVE-2023/CVE-2023-209xx/CVE-2023-20941.json | 32 +- CVE-2023/CVE-2023-209xx/CVE-2023-20950.json | 32 +- CVE-2023/CVE-2023-209xx/CVE-2023-20967.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21080.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21081.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21082.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21083.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21084.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21085.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21086.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21087.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21088.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21089.json | 22 +- CVE-2023/CVE-2023-210xx/CVE-2023-21090.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21091.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21092.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21098.json | 32 +- CVE-2023/CVE-2023-210xx/CVE-2023-21099.json | 22 +- CVE-2023/CVE-2023-211xx/CVE-2023-21100.json | 32 +- CVE-2023/CVE-2023-226xx/CVE-2023-22621.json | 32 +- CVE-2023/CVE-2023-226xx/CVE-2023-22645.json | 32 +- CVE-2023/CVE-2023-228xx/CVE-2023-22893.json | 32 +- CVE-2023/CVE-2023-228xx/CVE-2023-22894.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25759.json | 32 +- CVE-2023/CVE-2023-257xx/CVE-2023-25760.json | 32 +- CVE-2023/CVE-2023-261xx/CVE-2023-26100.json | 32 +- CVE-2023/CVE-2023-265xx/CVE-2023-26599.json | 32 +- CVE-2023/CVE-2023-284xx/CVE-2023-28458.json | 32 +- CVE-2023/CVE-2023-284xx/CVE-2023-28459.json | 32 +- CVE-2023/CVE-2023-299xx/CVE-2023-29910.json | 32 +- CVE-2023/CVE-2023-299xx/CVE-2023-29911.json | 32 +- CVE-2023/CVE-2023-299xx/CVE-2023-29912.json | 32 +- CVE-2023/CVE-2023-299xx/CVE-2023-29915.json | 32 +- CVE-2023/CVE-2023-299xx/CVE-2023-29916.json | 32 +- CVE-2023/CVE-2023-300xx/CVE-2023-30076.json | 32 +- CVE-2023/CVE-2023-307xx/CVE-2023-30748.json | 47 +- CVE-2023/CVE-2023-343xx/CVE-2023-34302.json | 36 +- CVE-2023/CVE-2023-357xx/CVE-2023-35710.json | 36 +- CVE-2023/CVE-2023-393xx/CVE-2023-39308.json | 8 +- CVE-2023/CVE-2023-521xx/CVE-2023-52163.json | 45 +- CVE-2023/CVE-2023-521xx/CVE-2023-52164.json | 45 +- CVE-2024/CVE-2024-03xx/CVE-2024-0379.json | 64 +- CVE-2024/CVE-2024-06xx/CVE-2024-0689.json | 74 ++- CVE-2024/CVE-2024-09xx/CVE-2024-0903.json | 74 ++- CVE-2024/CVE-2024-103xx/CVE-2024-10323.json | 57 +- CVE-2024/CVE-2024-109xx/CVE-2024-10936.json | 37 +- CVE-2024/CVE-2024-10xx/CVE-2024-1041.json | 74 ++- CVE-2024/CVE-2024-120xx/CVE-2024-12043.json | 54 +- CVE-2024/CVE-2024-121xx/CVE-2024-12129.json | 32 +- CVE-2024/CVE-2024-121xx/CVE-2024-12131.json | 32 +- CVE-2024/CVE-2024-121xx/CVE-2024-12132.json | 32 +- CVE-2024/CVE-2024-124xx/CVE-2024-12494.json | 59 +- CVE-2024/CVE-2024-12xx/CVE-2024-1237.json | 84 ++- CVE-2024/CVE-2024-12xx/CVE-2024-1279.json | 71 ++- CVE-2024/CVE-2024-135xx/CVE-2024-13511.json | 36 +- CVE-2024/CVE-2024-135xx/CVE-2024-13545.json | 64 +- CVE-2024/CVE-2024-135xx/CVE-2024-13594.json | 57 +- CVE-2024/CVE-2024-136xx/CVE-2024-13659.json | 59 +- CVE-2024/CVE-2024-136xx/CVE-2024-13680.json | 57 +- CVE-2024/CVE-2024-136xx/CVE-2024-13683.json | 37 +- CVE-2024/CVE-2024-136xx/CVE-2024-13699.json | 78 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1400.json | 54 +- CVE-2024/CVE-2024-14xx/CVE-2024-1419.json | 80 ++- CVE-2024/CVE-2024-14xx/CVE-2024-1468.json | 54 +- CVE-2024/CVE-2024-226xx/CVE-2024-22667.json | 60 +- CVE-2024/CVE-2024-24xx/CVE-2024-2436.json | 84 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2507.json | 74 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2538.json | 86 ++- CVE-2024/CVE-2024-25xx/CVE-2024-2543.json | 66 +- CVE-2024/CVE-2024-280xx/CVE-2024-28094.json | 72 ++- CVE-2024/CVE-2024-280xx/CVE-2024-28095.json | 72 ++- CVE-2024/CVE-2024-280xx/CVE-2024-28096.json | 72 ++- CVE-2024/CVE-2024-280xx/CVE-2024-28097.json | 72 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2878.json | 8 +- CVE-2024/CVE-2024-364xx/CVE-2024-36437.json | 45 +- CVE-2024/CVE-2024-39xx/CVE-2024-3976.json | 8 +- CVE-2024/CVE-2024-410xx/CVE-2024-41071.json | 104 +-- CVE-2024/CVE-2024-490xx/CVE-2024-49052.json | 46 +- CVE-2024/CVE-2024-515xx/CVE-2024-51567.json | 6 +- CVE-2024/CVE-2024-531xx/CVE-2024-53104.json | 147 ++++- CVE-2024/CVE-2024-539xx/CVE-2024-53943.json | 45 +- CVE-2024/CVE-2024-555xx/CVE-2024-55511.json | 39 +- CVE-2024/CVE-2024-559xx/CVE-2024-55956.json | 6 +- CVE-2024/CVE-2024-55xx/CVE-2024-5528.json | 8 +- CVE-2024/CVE-2024-561xx/CVE-2024-56131.json | 56 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56132.json | 56 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56133.json | 56 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56134.json | 56 ++ CVE-2024/CVE-2024-561xx/CVE-2024-56135.json | 56 ++ CVE-2024/CVE-2024-570xx/CVE-2024-57095.json | 41 +- CVE-2024/CVE-2024-572xx/CVE-2024-57277.json | 41 +- CVE-2024/CVE-2024-574xx/CVE-2024-57437.json | 41 +- CVE-2024/CVE-2024-575xx/CVE-2024-57519.json | 6 +- CVE-2024/CVE-2024-575xx/CVE-2024-57556.json | 60 +- CVE-2024/CVE-2024-62xx/CVE-2024-6232.json | 62 +- CVE-2024/CVE-2024-75xx/CVE-2024-7595.json | 25 + CVE-2024/CVE-2024-75xx/CVE-2024-7596.json | 25 + CVE-2024/CVE-2024-89xx/CVE-2024-8913.json | 44 +- CVE-2024/CVE-2024-96xx/CVE-2024-9631.json | 8 +- CVE-2025/CVE-2025-06xx/CVE-2025-0665.json | 6 +- CVE-2025/CVE-2025-10xx/CVE-2025-1009.json | 45 +- CVE-2025/CVE-2025-10xx/CVE-2025-1010.json | 45 +- CVE-2025/CVE-2025-10xx/CVE-2025-1011.json | 45 +- CVE-2025/CVE-2025-10xx/CVE-2025-1018.json | 45 +- CVE-2025/CVE-2025-10xx/CVE-2025-1019.json | 45 +- CVE-2025/CVE-2025-10xx/CVE-2025-1022.json | 6 +- CVE-2025/CVE-2025-10xx/CVE-2025-1025.json | 6 +- CVE-2025/CVE-2025-200xx/CVE-2025-20029.json | 100 +++ CVE-2025/CVE-2025-200xx/CVE-2025-20045.json | 100 +++ CVE-2025/CVE-2025-200xx/CVE-2025-20058.json | 100 +++ CVE-2025/CVE-2025-201xx/CVE-2025-20124.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20125.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20169.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20170.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20171.json | 44 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20172.json | 44 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20173.json | 44 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20174.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20175.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20176.json | 44 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20179.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20180.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20183.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20184.json | 56 ++ CVE-2025/CVE-2025-201xx/CVE-2025-20185.json | 56 ++ CVE-2025/CVE-2025-202xx/CVE-2025-20204.json | 56 ++ CVE-2025/CVE-2025-202xx/CVE-2025-20205.json | 56 ++ CVE-2025/CVE-2025-202xx/CVE-2025-20207.json | 56 ++ CVE-2025/CVE-2025-210xx/CVE-2025-21087.json | 100 +++ CVE-2025/CVE-2025-210xx/CVE-2025-21091.json | 100 +++ CVE-2025/CVE-2025-211xx/CVE-2025-21171.json | 101 ++- CVE-2025/CVE-2025-211xx/CVE-2025-21172.json | 117 +++- CVE-2025/CVE-2025-211xx/CVE-2025-21173.json | 93 ++- CVE-2025/CVE-2025-211xx/CVE-2025-21176.json | 411 +++++++++++- CVE-2025/CVE-2025-211xx/CVE-2025-21187.json | 75 ++- CVE-2025/CVE-2025-213xx/CVE-2025-21313.json | 51 +- CVE-2025/CVE-2025-213xx/CVE-2025-21380.json | 60 +- CVE-2025/CVE-2025-213xx/CVE-2025-21385.json | 48 +- CVE-2025/CVE-2025-222xx/CVE-2025-22205.json | 33 +- CVE-2025/CVE-2025-228xx/CVE-2025-22846.json | 100 +++ CVE-2025/CVE-2025-228xx/CVE-2025-22891.json | 100 +++ CVE-2025/CVE-2025-232xx/CVE-2025-23239.json | 100 +++ CVE-2025/CVE-2025-233xx/CVE-2025-23369.json | 10 +- CVE-2025/CVE-2025-234xx/CVE-2025-23412.json | 100 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23413.json | 100 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23415.json | 100 +++ CVE-2025/CVE-2025-234xx/CVE-2025-23419.json | 104 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24312.json | 100 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24319.json | 100 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24320.json | 100 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24326.json | 100 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24372.json | 76 +++ CVE-2025/CVE-2025-244xx/CVE-2025-24497.json | 100 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24803.json | 86 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24804.json | 86 +++ CVE-2025/CVE-2025-248xx/CVE-2025-24805.json | 82 +++ README.md | 88 ++- _state.csv | 664 +++++++++++--------- 181 files changed, 8984 insertions(+), 926 deletions(-) create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56131.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56132.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56133.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56134.json create mode 100644 CVE-2024/CVE-2024-561xx/CVE-2024-56135.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7595.json create mode 100644 CVE-2024/CVE-2024-75xx/CVE-2024-7596.json create mode 100644 CVE-2025/CVE-2025-200xx/CVE-2025-20029.json create mode 100644 CVE-2025/CVE-2025-200xx/CVE-2025-20045.json create mode 100644 CVE-2025/CVE-2025-200xx/CVE-2025-20058.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20124.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20125.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20169.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20170.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20171.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20172.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20173.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20174.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20175.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20176.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20179.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20180.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20183.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20184.json create mode 100644 CVE-2025/CVE-2025-201xx/CVE-2025-20185.json create mode 100644 CVE-2025/CVE-2025-202xx/CVE-2025-20204.json create mode 100644 CVE-2025/CVE-2025-202xx/CVE-2025-20205.json create mode 100644 CVE-2025/CVE-2025-202xx/CVE-2025-20207.json create mode 100644 CVE-2025/CVE-2025-210xx/CVE-2025-21087.json create mode 100644 CVE-2025/CVE-2025-210xx/CVE-2025-21091.json create mode 100644 CVE-2025/CVE-2025-228xx/CVE-2025-22846.json create mode 100644 CVE-2025/CVE-2025-228xx/CVE-2025-22891.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23239.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23412.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23413.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23415.json create mode 100644 CVE-2025/CVE-2025-234xx/CVE-2025-23419.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24312.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24319.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24320.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24326.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24372.json create mode 100644 CVE-2025/CVE-2025-244xx/CVE-2025-24497.json create mode 100644 CVE-2025/CVE-2025-248xx/CVE-2025-24803.json create mode 100644 CVE-2025/CVE-2025-248xx/CVE-2025-24804.json create mode 100644 CVE-2025/CVE-2025-248xx/CVE-2025-24805.json diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1515.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1515.json index be8b40e7ffd..b8018cffe3a 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1515.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1515.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1515", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.507", - "lastModified": "2024-11-21T03:22:00.173", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1516.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1516.json index a10346fab91..93df4afe705 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1516.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1516.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1516", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.570", - "lastModified": "2024-11-21T03:22:00.320", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1532.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1532.json index b2558050047..9830a2b4bf3 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1532.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1532.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1532", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.650", - "lastModified": "2024-11-21T03:22:01.727", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1540.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1540.json index b401d9891b4..d857c72bc88 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1540.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1540.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1540", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.710", - "lastModified": "2024-11-21T03:22:02.713", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1545.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1545.json index 11fcb3cf2f4..9d00c6bba2b 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1545.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1545.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1545", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.773", - "lastModified": "2024-11-21T03:22:03.133", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1563.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1563.json index 5960026850c..439c24e00f8 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1563.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1563.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1563", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.837", - "lastModified": "2024-11-21T03:22:05.263", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2017/CVE-2017-15xx/CVE-2017-1567.json b/CVE-2017/CVE-2017-15xx/CVE-2017-1567.json index 7e6c11a06a0..738e5bd19a1 100644 --- a/CVE-2017/CVE-2017-15xx/CVE-2017-1567.json +++ b/CVE-2017/CVE-2017-15xx/CVE-2017-1567.json @@ -2,7 +2,7 @@ "id": "CVE-2017-1567", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-01-26T21:29:00.900", - "lastModified": "2024-11-21T03:22:05.657", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,38 +85,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.0.0", "versionEndIncluding": "9.5.0.7", - "matchCriteriaId": "18D8B61D-8C61-47FE-9333-46D3BBC2054E" + "matchCriteriaId": "96E0933B-B5DE-4D2D-A618-399EDCA60BEC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1.0", "versionEndIncluding": "9.5.1.8", - "matchCriteriaId": "D663D277-4979-44F4-8AC4-40C609213859" + "matchCriteriaId": "F5CC40FB-5AFC-4170-87AA-3EA32BC005AD" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2.0", "versionEndIncluding": "9.5.2.7", - "matchCriteriaId": "E602E686-F359-4A68-8F2F-85FA40AEDD66" + "matchCriteriaId": "A5749236-FBDA-4CB8-9B0A-B14E74F5D07C" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0.0", "versionEndIncluding": "9.6.0.6", - "matchCriteriaId": "0F09A87C-CF16-485D-ACD6-A59836A6693C" + "matchCriteriaId": "DC96FBA4-2236-4ABF-AA1F-655A00D79F56" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1.0", "versionEndIncluding": "9.6.1.9", - "matchCriteriaId": "FE5CAEFC-C2D9-45F0-9BD4-2315DEC1DEC3" + "matchCriteriaId": "8E068BAB-D96A-49D0-AE8C-049D76F8CF17" } ] } diff --git a/CVE-2018/CVE-2018-149xx/CVE-2018-14933.json b/CVE-2018/CVE-2018-149xx/CVE-2018-14933.json index e3621b76418..6d04c2dff3a 100644 --- a/CVE-2018/CVE-2018-149xx/CVE-2018-14933.json +++ b/CVE-2018/CVE-2018-149xx/CVE-2018-14933.json @@ -2,7 +2,7 @@ "id": "CVE-2018-14933", "sourceIdentifier": "cve@mitre.org", "published": "2018-08-04T19:29:00.263", - "lastModified": "2024-12-19T02:00:02.193", + "lastModified": "2025-02-05T20:15:32.577", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "nvd@nist.gov", @@ -78,6 +100,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2018/CVE-2018-14xx/CVE-2018-1457.json b/CVE-2018/CVE-2018-14xx/CVE-2018-1457.json index 9d9e5db6f3a..4daa1934d53 100644 --- a/CVE-2018/CVE-2018-14xx/CVE-2018-1457.json +++ b/CVE-2018/CVE-2018-14xx/CVE-2018-1457.json @@ -2,7 +2,7 @@ "id": "CVE-2018-1457", "sourceIdentifier": "psirt@us.ibm.com", "published": "2018-06-27T18:29:00.617", - "lastModified": "2024-11-21T03:59:51.440", + "lastModified": "2025-02-05T18:38:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -108,38 +108,38 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.1", "versionEndIncluding": "9.5.1.9", - "matchCriteriaId": "F4F9B1FC-322B-4310-8358-F3460959258E" + "matchCriteriaId": "36419474-B956-4A9A-9DD4-47B0D58864E4" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.5.2", "versionEndIncluding": "9.5.2.8", - "matchCriteriaId": "40378A9B-60F7-4BEE-B7E2-AA7A5A0DCE24" + "matchCriteriaId": "EF287FA0-FFA0-48A5-95DE-5123793ACDAC" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.0", "versionEndIncluding": "9.6.0.7", - "matchCriteriaId": "8382CDEE-D8A3-470B-9F04-FF5D2F09B9CE" + "matchCriteriaId": "15BC1590-6F9A-49DA-9EF7-0F7185D009B2" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.6.1", "versionEndIncluding": "9.6.1.10", - "matchCriteriaId": "73709907-FCD4-4978-B479-D0D7A845963D" + "matchCriteriaId": "0847A729-3BAA-4CAD-8570-7DC72B0438B5" }, { "vulnerable": true, - "criteria": "cpe:2.3:a:ibm:rational_doors:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:ibm:engineering_requirements_management_doors:*:*:*:*:*:*:*:*", "versionStartIncluding": "9.7.0", "versionEndIncluding": "9.7.2", - "matchCriteriaId": "29081FDC-6E0D-431A-A8F2-B13263401962" + "matchCriteriaId": "3994EDDD-2720-4186-A161-385EBB5767F7" } ] }, diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0881.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0881.json index 33861c9e583..d691029989a 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0881.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0881.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0881", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.643", - "lastModified": "2024-11-21T05:43:12.800", + "lastModified": "2025-02-05T17:15:11.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0882.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0882.json index 4466228d391..10961f4c15c 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0882.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0882.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0882", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.697", - "lastModified": "2024-11-21T05:43:12.890", + "lastModified": "2025-02-05T17:15:11.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0883.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0883.json index a37b0db08e3..8fd7543a126 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0883.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0883.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0883", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.743", - "lastModified": "2024-11-21T05:43:12.990", + "lastModified": "2025-02-05T17:15:11.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0884.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0884.json index 656bd2c042b..23596f41688 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0884.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0884.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0884", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.790", - "lastModified": "2024-11-21T05:43:13.083", + "lastModified": "2025-02-05T17:15:11.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0885.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0885.json index e23500d7e8b..a47006d1ce5 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0885.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0885.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0885", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.833", - "lastModified": "2024-11-21T05:43:13.173", + "lastModified": "2025-02-05T17:15:12.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-231xx/CVE-2021-23165.json b/CVE-2021/CVE-2021-231xx/CVE-2021-23165.json index c262182b346..60c01463108 100644 --- a/CVE-2021/CVE-2021-231xx/CVE-2021-23165.json +++ b/CVE-2021/CVE-2021-231xx/CVE-2021-23165.json @@ -2,8 +2,8 @@ "id": "CVE-2021-23165", "sourceIdentifier": "secalert@redhat.com", "published": "2022-03-16T15:15:10.157", - "lastModified": "2024-11-21T05:51:18.590", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T20:25:25.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -98,11 +98,6 @@ "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", "versionEndExcluding": "1.9.12", "matchCriteriaId": "8D1CE1F4-17A1-430E-9C8B-0CE88A07514B" - }, - { - "vulnerable": true, - "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:1.9.12:*:*:*:*:*:*:*", - "matchCriteriaId": "645554AD-DA7C-4B11-864A-89F423B08291" } ] } diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33970.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33970.json index 0999b218756..db37c2a2c5e 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33970.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33970.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33970", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T22:15:10.023", - "lastModified": "2024-11-21T06:09:49.520", + "lastModified": "2025-02-05T17:15:12.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33971.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33971.json index e56a51d696c..413c58d2cf0 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33971.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33971.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33971", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T22:15:10.077", - "lastModified": "2024-11-21T06:09:49.683", + "lastModified": "2025-02-05T17:15:12.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-339xx/CVE-2021-33972.json b/CVE-2021/CVE-2021-339xx/CVE-2021-33972.json index 0a76f6463cf..890f721f2bf 100644 --- a/CVE-2021/CVE-2021-339xx/CVE-2021-33972.json +++ b/CVE-2021/CVE-2021-339xx/CVE-2021-33972.json @@ -2,7 +2,7 @@ "id": "CVE-2021-33972", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T21:15:06.647", - "lastModified": "2024-11-21T06:09:49.850", + "lastModified": "2025-02-05T17:15:12.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-280xx/CVE-2022-28085.json b/CVE-2022/CVE-2022-280xx/CVE-2022-28085.json index dba8ae13d6a..f1529fb6e92 100644 --- a/CVE-2022/CVE-2022-280xx/CVE-2022-28085.json +++ b/CVE-2022/CVE-2022-280xx/CVE-2022-28085.json @@ -2,8 +2,8 @@ "id": "CVE-2022-28085", "sourceIdentifier": "cve@mitre.org", "published": "2022-04-27T03:15:39.650", - "lastModified": "2024-11-21T06:56:44.667", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T20:23:24.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -86,8 +86,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:htmldoc_project:htmldoc:*:*:*:*:*:*:*:*", - "versionEndExcluding": "2022-03-24", - "matchCriteriaId": "F787F29F-1158-45BF-861E-34694739EDD6" + "versionEndExcluding": "1.9.16", + "matchCriteriaId": "AF5FC4A4-81ED-4559-9ABE-B689F001E877" } ] } diff --git a/CVE-2022/CVE-2022-480xx/CVE-2022-48020.json b/CVE-2022/CVE-2022-480xx/CVE-2022-48020.json index 26e97fa13f2..fe8862bc738 100644 --- a/CVE-2022/CVE-2022-480xx/CVE-2022-48020.json +++ b/CVE-2022/CVE-2022-480xx/CVE-2022-48020.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48020", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T16:15:09.340", - "lastModified": "2024-11-21T07:32:44.107", + "lastModified": "2025-02-05T18:15:25.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-481xx/CVE-2022-48174.json b/CVE-2022/CVE-2022-481xx/CVE-2022-48174.json index 6da3f77f836..1653da10da0 100644 --- a/CVE-2022/CVE-2022-481xx/CVE-2022-48174.json +++ b/CVE-2022/CVE-2022-481xx/CVE-2022-48174.json @@ -2,8 +2,8 @@ "id": "CVE-2022-48174", "sourceIdentifier": "cve@mitre.org", "published": "2023-08-22T19:16:31.080", - "lastModified": "2024-11-29T12:15:05.320", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T18:02:49.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -57,8 +57,8 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:busybox:busybox:*:*:*:*:*:*:*:*", - "versionEndExcluding": "1.35.0", - "matchCriteriaId": "0CD0AEFF-77FD-4EFB-89C5-11227CEFCDF3" + "versionEndIncluding": "1.35.0", + "matchCriteriaId": "50324EB3-E070-4585-A2F4-DE7C0D1932B3" } ] } @@ -84,7 +84,10 @@ }, { "url": "https://security.netapp.com/advisory/ntap-20241129-0001/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20909.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20909.json index 0e0f60f7241..cde2281a87a 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20909.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20909.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20909", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.953", - "lastModified": "2024-11-21T07:41:48.027", + "lastModified": "2025-02-05T19:15:11.493", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20935.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20935.json index 11c2b0e8831..74325b22aac 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20935.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20935.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20935", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.993", - "lastModified": "2024-11-21T07:41:51.010", + "lastModified": "2025-02-05T19:15:11.667", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20941.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20941.json index a628e2b4ad9..b0fb3fc19f3 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20941.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20941.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20941", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.033", - "lastModified": "2024-11-21T07:41:51.757", + "lastModified": "2025-02-05T19:15:11.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.7, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 6.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.7, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20950.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20950.json index 397b987855b..8c56eda5708 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20950.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20950.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20950", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.077", - "lastModified": "2024-11-21T07:41:52.753", + "lastModified": "2025-02-05T19:15:11.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-863" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20967.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20967.json index dc18e5806c7..0fe7d598218 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20967.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20967.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20967", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.120", - "lastModified": "2024-11-21T07:41:55.163", + "lastModified": "2025-02-05T19:15:12.153", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21080.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21080.json index 5f7483f8a86..79c421233fd 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21080.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21080.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21080", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.157", - "lastModified": "2024-11-21T07:42:07.477", + "lastModified": "2025-02-05T19:15:12.323", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21081.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21081.json index 01426cec058..380c342e7d0 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21081.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21081.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21081", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.213", - "lastModified": "2024-11-21T07:42:07.597", + "lastModified": "2025-02-05T19:15:12.487", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21082.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21082.json index 35fed51dedc..11c07bef4a8 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21082.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21082.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21082", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.260", - "lastModified": "2024-11-21T07:42:07.713", + "lastModified": "2025-02-05T19:15:12.660", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-441" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21083.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21083.json index 3ac67bf38d3..7e7532e6bcd 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21083.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21083.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21083", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.303", - "lastModified": "2024-11-21T07:42:07.833", + "lastModified": "2025-02-05T20:15:35.277", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21084.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21084.json index 42c4249f477..6f74a3e6f17 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21084.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21084.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21084", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.347", - "lastModified": "2024-11-21T07:42:07.940", + "lastModified": "2025-02-05T20:15:35.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21085.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21085.json index 0564a251d00..3cfe836d15f 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21085.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21085.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21085", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.393", - "lastModified": "2024-11-21T07:42:08.050", + "lastModified": "2025-02-05T20:15:35.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21086.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21086.json index c71978e34e9..ada59aaaee1 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21086.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21086.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21086", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.443", - "lastModified": "2024-11-21T07:42:08.180", + "lastModified": "2025-02-05T20:15:35.763", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21087.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21087.json index c1ecd9c88df..50c7f4271ee 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21087.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21087.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21087", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.490", - "lastModified": "2024-11-21T07:42:08.290", + "lastModified": "2025-02-05T19:15:12.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21088.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21088.json index c2bcc62b4d2..5279f93aa4d 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21088.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21088.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21088", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.533", - "lastModified": "2024-11-21T07:42:08.403", + "lastModified": "2025-02-05T19:15:13.010", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21089.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21089.json index 80543f2dcb1..ce8cef692f0 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21089.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21089.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21089", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.583", - "lastModified": "2024-11-21T07:42:08.527", + "lastModified": "2025-02-05T19:15:13.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21090.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21090.json index cd219df2e34..045f0ddee8d 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21090.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21090.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21090", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.630", - "lastModified": "2024-11-21T07:42:08.640", + "lastModified": "2025-02-05T19:15:13.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.3, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21091.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21091.json index f39fd8cbea9..92af211f99c 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21091.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21091", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.680", - "lastModified": "2024-11-21T07:42:08.750", + "lastModified": "2025-02-05T19:15:13.850", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21092.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21092.json index 4fa40a4d5ee..f2537164f36 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21092.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21092.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21092", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.727", - "lastModified": "2024-11-21T07:42:08.863", + "lastModified": "2025-02-05T19:15:14.043", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21098.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21098.json index 3b155189f52..e736de8b877 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21098.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21098.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21098", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.933", - "lastModified": "2024-11-21T07:42:09.550", + "lastModified": "2025-02-05T18:15:27.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-288" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-210xx/CVE-2023-21099.json b/CVE-2023/CVE-2023-210xx/CVE-2023-21099.json index 9f3e8725c07..392b839ca6e 100644 --- a/CVE-2023/CVE-2023-210xx/CVE-2023-21099.json +++ b/CVE-2023/CVE-2023-210xx/CVE-2023-21099.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21099", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:11.980", - "lastModified": "2024-11-21T07:42:09.677", + "lastModified": "2025-02-05T17:15:12.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21100.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21100.json index f44766ec391..34cf5b2ef96 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21100.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21100.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21100", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:12.023", - "lastModified": "2024-11-21T07:42:09.783", + "lastModified": "2025-02-05T17:15:13.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22621.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22621.json index 5b8c5ff5af2..5c4b1695050 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22621.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22621.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22621", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T16:15:07.213", - "lastModified": "2024-11-21T07:45:04.550", + "lastModified": "2025-02-05T17:15:13.307", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json b/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json index c75f70fed96..7167961f7e1 100644 --- a/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json +++ b/CVE-2023/CVE-2023-226xx/CVE-2023-22645.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22645", "sourceIdentifier": "meissner@suse.de", "published": "2023-04-19T12:15:07.960", - "lastModified": "2024-11-21T07:45:07.300", + "lastModified": "2025-02-05T17:15:17.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22893.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22893.json index 4aa779c85f0..2f63110f845 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22893.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22893.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22893", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T16:15:07.253", - "lastModified": "2024-11-21T07:45:35.940", + "lastModified": "2025-02-05T17:15:18.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-228xx/CVE-2023-22894.json b/CVE-2023/CVE-2023-228xx/CVE-2023-22894.json index 562a9365d1f..211e9ae3315 100644 --- a/CVE-2023/CVE-2023-228xx/CVE-2023-22894.json +++ b/CVE-2023/CVE-2023-228xx/CVE-2023-22894.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22894", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T16:15:07.303", - "lastModified": "2024-11-21T07:45:36.077", + "lastModified": "2025-02-05T17:15:18.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25759.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25759.json index e6019440974..e3d63bfc6f3 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25759.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25759.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25759", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T12:15:08.040", - "lastModified": "2024-11-21T07:50:07.923", + "lastModified": "2025-02-05T17:15:18.767", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25760.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25760.json index 1548c03d3c8..d959aac4b98 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25760.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25760.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25760", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T12:15:08.083", - "lastModified": "2024-11-21T07:50:08.107", + "lastModified": "2025-02-05T17:15:18.933", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-261xx/CVE-2023-26100.json b/CVE-2023/CVE-2023-261xx/CVE-2023-26100.json index 1aaebddbc6f..e59e3653924 100644 --- a/CVE-2023/CVE-2023-261xx/CVE-2023-26100.json +++ b/CVE-2023/CVE-2023-261xx/CVE-2023-26100.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26100", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T12:15:07.457", - "lastModified": "2024-11-21T07:50:46.477", + "lastModified": "2025-02-05T20:15:36.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-265xx/CVE-2023-26599.json b/CVE-2023/CVE-2023-265xx/CVE-2023-26599.json index 65671b13bc3..f5272c3d091 100644 --- a/CVE-2023/CVE-2023-265xx/CVE-2023-26599.json +++ b/CVE-2023/CVE-2023-265xx/CVE-2023-26599.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26599", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-19T12:15:08.127", - "lastModified": "2024-11-21T07:51:49.787", + "lastModified": "2025-02-05T17:15:19.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28458.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28458.json index 5027c2a1dda..972d0a8f663 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28458.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28458.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28458", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-20T21:15:08.770", - "lastModified": "2024-11-21T07:55:07.423", + "lastModified": "2025-02-05T17:15:19.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-284xx/CVE-2023-28459.json b/CVE-2023/CVE-2023-284xx/CVE-2023-28459.json index a0f80590823..630d5099a16 100644 --- a/CVE-2023/CVE-2023-284xx/CVE-2023-28459.json +++ b/CVE-2023/CVE-2023-284xx/CVE-2023-28459.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28459", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-20T21:15:08.823", - "lastModified": "2024-11-21T07:55:07.603", + "lastModified": "2025-02-05T17:15:19.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29910.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29910.json index 347303c4946..4f7216af3a3 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29910.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29910.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29910", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T15:15:07.453", - "lastModified": "2024-11-21T07:57:37.543", + "lastModified": "2025-02-05T17:15:19.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29911.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29911.json index 95e5d941091..510deb83980 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29911.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29911.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29911", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T15:15:07.500", - "lastModified": "2024-11-21T07:57:37.670", + "lastModified": "2025-02-05T17:15:19.837", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29912.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29912.json index 7c1a3c61d16..02338be2234 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29912.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29912.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29912", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T15:15:07.547", - "lastModified": "2024-11-21T07:57:37.807", + "lastModified": "2025-02-05T17:15:20.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29915.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29915.json index 80934bee69d..958b3ca66ec 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29915.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29915.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29915", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T15:15:07.687", - "lastModified": "2024-11-21T07:57:38.200", + "lastModified": "2025-02-05T20:15:36.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29916.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29916.json index 42a577863aa..36a8e2c921e 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29916.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29916.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29916", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-21T15:15:07.730", - "lastModified": "2024-11-21T07:57:38.333", + "lastModified": "2025-02-05T20:15:36.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30076.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30076.json index 44585ccb063..910fcf0cab8 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30076.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30076.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30076", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-20T19:15:07.567", - "lastModified": "2024-11-21T07:59:46.000", + "lastModified": "2025-02-05T17:15:20.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json index ca3e33f3fe4..388515148ed 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30748.json @@ -2,8 +2,8 @@ "id": "CVE-2023-30748", "sourceIdentifier": "audit@patchstack.com", "published": "2024-12-09T13:15:28.030", - "lastModified": "2024-12-09T13:15:28.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T20:26:23.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easy-appointments:easy_appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "3.11.1", + "matchCriteriaId": "2B3DF107-456C-463A-842C-E42BA0AE2802" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/wordpress/plugin/easy-appointments/vulnerability/wordpress-easy-appointments-plugin-3-10-7-auth-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json index 9ca05f7c748..b1326c9eee4 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34302.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34302", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:31.207", - "lastModified": "2024-11-21T08:06:58.153", + "lastModified": "2025-02-05T17:15:20.573", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -42,7 +64,17 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json b/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json index 66f04076bc7..2fd4b82991f 100644 --- a/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json +++ b/CVE-2023/CVE-2023-357xx/CVE-2023-35710.json @@ -2,7 +2,7 @@ "id": "CVE-2023-35710", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T02:15:33.090", - "lastModified": "2024-11-21T08:08:33.130", + "lastModified": "2025-02-05T17:15:20.760", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -42,7 +64,17 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2023/CVE-2023-393xx/CVE-2023-39308.json b/CVE-2023/CVE-2023-393xx/CVE-2023-39308.json index d1a9a969d14..52c79f39589 100644 --- a/CVE-2023/CVE-2023-393xx/CVE-2023-39308.json +++ b/CVE-2023/CVE-2023-393xx/CVE-2023-39308.json @@ -2,8 +2,8 @@ "id": "CVE-2023-39308", "sourceIdentifier": "audit@patchstack.com", "published": "2023-09-29T14:15:10.183", - "lastModified": "2024-11-21T08:15:07.447", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T17:51:56.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,9 +80,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:userfeedback:userfeedback:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:monsterinsights:userfeedback:*:*:*:*:lite:wordpress:*:*", "versionEndIncluding": "1.0.7", - "matchCriteriaId": "816B0EC6-4C5B-43A4-8073-D57409949C73" + "matchCriteriaId": "01198544-4DC7-4BE6-91B9-31AE8F093CC3" } ] } diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52163.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52163.json index 904e2854b34..890a5441a5b 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52163.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52163.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52163", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:12.060", - "lastModified": "2025-02-03T21:15:12.060", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:20.950", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,9 +16,48 @@ { "lang": "en", "value": "Digiever DS-2105 Pro 3.1.0.71-11 devices allow time_tzsetup.cgi Command Injection. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "Los dispositivos Digiever DS-2105 Pro 3.1.0.71-11 permiten la inyecci\u00f3n del comando time_tzsetup.cgi. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con fabricante." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing", diff --git a/CVE-2023/CVE-2023-521xx/CVE-2023-52164.json b/CVE-2023/CVE-2023-521xx/CVE-2023-52164.json index e3dbdde3d9a..47eed49ae1a 100644 --- a/CVE-2023/CVE-2023-521xx/CVE-2023-52164.json +++ b/CVE-2023/CVE-2023-521xx/CVE-2023-52164.json @@ -2,8 +2,8 @@ "id": "CVE-2023-52164", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T21:15:12.180", - "lastModified": "2025-02-03T21:15:12.180", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:21.100", + "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", @@ -16,9 +16,48 @@ { "lang": "en", "value": "access_device.cgi on Digiever DS-2105 Pro 3.1.0.71-11 devices allows arbitrary file read. NOTE: This vulnerability only affects products that are no longer supported by the maintainer." + }, + { + "lang": "es", + "value": "El archivo access_device.cgi en los dispositivos Digiever DS-2105 Pro 3.1.0.71-11 permite la lectura de archivos arbitrarios. NOTA: Esta vulnerabilidad solo afecta a los productos que ya no son compatibles con fabricante." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.akamai.com/blog/security-research/digiever-fix-that-iot-thing", diff --git a/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json b/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json index 291dcd1203e..55bd2f5e7a6 100644 --- a/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json +++ b/CVE-2024/CVE-2024-03xx/CVE-2024-0379.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0379", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:10.100", - "lastModified": "2024-11-21T08:46:27.353", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:10:45.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smashballoon:custom_twitter_feeds:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.2", + "matchCriteriaId": "315247A0-2F6D-4D10-8094-2ACD0495908C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3032345%40custom-twitter-feeds%2Ftrunk&new=3032345%40custom-twitter-feeds%2Ftrunk&sfp_email=&sfph_mail=#file3", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29e2ff11-053b-45cc-adf1-d276f1ee576e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3032345%40custom-twitter-feeds%2Ftrunk&new=3032345%40custom-twitter-feeds%2Ftrunk&sfp_email=&sfph_mail=#file3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/29e2ff11-053b-45cc-adf1-d276f1ee576e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0689.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0689.json index 5f8839c30f1..52e7911a259 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0689.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0689.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0689", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T03:15:06.883", - "lastModified": "2024-11-21T08:47:09.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:11:53.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:custom_field_suite_project:custom_field_suite:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "E4630D29-29D9-4C5E-9CBB-897392F28C2B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042177%40custom-field-suite&new=3042177%40custom-field-suite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e967ce-fd36-44de-acca-c1985642ee5b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3042177%40custom-field-suite&new=3042177%40custom-field-suite&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d8e967ce-fd36-44de-acca-c1985642ee5b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-09xx/CVE-2024-0903.json b/CVE-2024/CVE-2024-09xx/CVE-2024-0903.json index 5e407d0efd9..accc1d31e42 100644 --- a/CVE-2024/CVE-2024-09xx/CVE-2024-0903.json +++ b/CVE-2024/CVE-2024-09xx/CVE-2024-0903.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0903", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-22T06:15:57.453", - "lastModified": "2024-11-21T08:47:40.100", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:42:03.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monsterinsights:userfeedback:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "1.0.14", + "matchCriteriaId": "FCD2089C-283B-4CF6-BB9F-E0F2FB14B58A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038797%40userfeedback-lite&new=3038797%40userfeedback-lite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a649fbea-65cf-45c9-b853-2733f27518af?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3038797%40userfeedback-lite&new=3038797%40userfeedback-lite&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a649fbea-65cf-45c9-b853-2733f27518af?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-103xx/CVE-2024-10323.json b/CVE-2024/CVE-2024-103xx/CVE-2024-10323.json index e4ecd8f0ee1..584e068c616 100644 --- a/CVE-2024/CVE-2024-103xx/CVE-2024-10323.json +++ b/CVE-2024/CVE-2024-103xx/CVE-2024-10323.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10323", "sourceIdentifier": "security@wordfence.com", "published": "2024-11-12T07:15:03.770", - "lastModified": "2024-11-12T13:55:21.227", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:18:49.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.19", + "matchCriteriaId": "35FE596E-A5AD-4060-B521-4F092333F588" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3184475/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/jetwidgets-for-elementor/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4b4e4ba-ab66-496a-b77f-8dd77cd16ea8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json b/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json index 251e09544e0..b49f71fd084 100644 --- a/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json +++ b/CVE-2024/CVE-2024-109xx/CVE-2024-10936.json @@ -2,8 +2,8 @@ "id": "CVE-2024-10936", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-21T09:15:06.850", - "lastModified": "2025-01-21T09:15:06.850", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T19:16:15.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:instawp:string_locator:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.7", + "matchCriteriaId": "58A24F54-7A13-4982-8348-D43313BFCF6B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/string-locator/trunk/includes/Extension/SearchReplace/Replace/class-sql.php#L170", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3222952/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1404f034-2d1d-44b2-87e5-61f72f215417?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json b/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json index 88246e10efc..845394be1da 100644 --- a/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json +++ b/CVE-2024/CVE-2024-10xx/CVE-2024-1041.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1041", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-10T05:15:47.820", - "lastModified": "2024-11-21T08:49:39.917", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:16:58.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmilitary:wp_radio:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "3.1.9", + "matchCriteriaId": "A538A29B-1BD9-4E0E-B50A-75385A6EB30F" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/wp-radio/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/486ffdc9-a3e7-4f4c-89b1-b668a5d41aa5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/wp-radio/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/486ffdc9-a3e7-4f4c-89b1-b668a5d41aa5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json index 77b6ccd47a3..fe6affc7cc4 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12043.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12043", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-23T11:15:09.147", - "lastModified": "2025-01-23T11:15:09.147", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T18:52:58.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:prime_slider:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.16.6", + "matchCriteriaId": "B2A2F969-2F39-4EB3-B38D-26770509FC17" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3222179%40bdthemes-prime-slider-lite&new=3222179%40bdthemes-prime-slider-lite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/23e1fffa-9170-4bc2-ad7e-27708a08033b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12129.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12129.json index dbe1bcc17a3..c595f1f9210 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12129.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12129.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12129", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-30T14:15:31.530", - "lastModified": "2025-01-30T14:15:31.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:51:37.247", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-royal-themes:royal_core:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.9.2", + "matchCriteriaId": "CC6C0EB1-EBE9-4052-BF96-03C382B40F56" + } + ] + } + ] + } + ], "references": [ { "url": "https://themeforest.net/item/hyperx-portfolio-for-freelancers-agencies/13439786", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6ca0a45-cbb3-419b-a2fd-7427935524d8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json index dd37e18f848..6bab43f7ba3 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12131.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12131", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T13:15:06.440", - "lastModified": "2025-01-07T13:15:06.440", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T19:34:09.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.6", + "matchCriteriaId": "CD7347D4-AD3D-415C-AEF5-889195E43E30" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/wp-job-portal/tags/2.2.6/modules/jobapply/model.php?rev=3216415", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4772ab0-41cd-4b35-bda9-d72e0fd7b7a5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-121xx/CVE-2024-12132.json b/CVE-2024/CVE-2024-121xx/CVE-2024-12132.json index fc05a221647..acc6fdc9cee 100644 --- a/CVE-2024/CVE-2024-121xx/CVE-2024-12132.json +++ b/CVE-2024/CVE-2024-121xx/CVE-2024-12132.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12132", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-03T09:15:05.983", - "lastModified": "2025-01-03T09:15:05.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T19:37:43.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpjobportal:wp_job_portal:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.2.5", + "matchCriteriaId": "807116FA-EF5D-4117-9838-013948498B12" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3210251/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d19ac6fc-029f-4f19-913e-e082acecc594?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json b/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json index fb91847d44c..5c9c453d941 100644 --- a/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json +++ b/CVE-2024/CVE-2024-124xx/CVE-2024-12494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-12494", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T10:15:07.457", - "lastModified": "2025-01-24T10:15:07.457", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:09:07.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bmltenabled:meeting_map:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "2.6.1", + "matchCriteriaId": "1EE59100-46B3-41B5-AF7C-1BC8ED88A6AC" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bmlt-meeting-map/tags/2.6.0/meeting_map.php#L33", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bmlt-meeting-map/tags/2.6.0/meeting_map.php#L462", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/73c01967-262c-48ab-a464-401b1cadd4be?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1237.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1237.json index 1b044cecffc..a8fae79b7ee 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1237.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1237", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-13T16:15:18.617", - "lastModified": "2024-11-21T08:50:07.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:13:17.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:elementor_header_\\&_footer_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.25", + "matchCriteriaId": "8CB2C220-F5B7-4AAB-A896-DCCE6F2B50B3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.24/inc/widgets-manager/widgets/class-navigation-menu.php#L1951", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034938%40header-footer-elementor&new=3034938%40header-footer-elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82644c46-205b-4005-bba8-6b3e45769639?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/header-footer-elementor/tags/1.6.24/inc/widgets-manager/widgets/class-navigation-menu.php#L1951", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034938%40header-footer-elementor&new=3034938%40header-footer-elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82644c46-205b-4005-bba8-6b3e45769639?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json index 8688d0d287c..bcb0fc7acef 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1279", "sourceIdentifier": "contact@wpscan.com", "published": "2024-03-11T18:15:17.950", - "lastModified": "2024-11-21T08:50:13.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:54:36.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,15 +15,76 @@ "value": "El complemento Paid Memberships Pro de WordPress anterior a 2.12.9 no impide que el usuario con al menos el rol de colaborador filtre metadatos confidenciales de otros usuarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:strangerstudios:paid_memberships_pro:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.12.9", + "matchCriteriaId": "1E698C05-229F-4CBE-93BB-D305137F2BCA" + } + ] + } + ] + } + ], "references": [ { "url": "https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/", - "source": "contact@wpscan.com" + "source": "contact@wpscan.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://wpscan.com/vulnerability/4c537264-0c23-428e-9a11-7a9e74fb6b69/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json index a8eb21e9341..6857793d365 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13511.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13511", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-23T10:15:07.253", - "lastModified": "2025-01-23T10:15:07.253", + "lastModified": "2025-02-05T18:22:40.217", "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ @@ -51,18 +51,46 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:variation_swatches_for_woocommerce_project:variation_swatches_for_woocommerce:*:*:*:*:*:wordpress:*:*", + "versionStartIncluding": "1.0.8", + "versionEndExcluding": "1.3.3", + "matchCriteriaId": "5963DC23-A705-4CCC-BBF0-42CE5250FE8C" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/th-variation-swatches/tags/1.3.1/inc/thvs-settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3226822/th-variation-swatches/trunk/inc/thvs-settings.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c43b9b4-4394-428a-b381-d6a776fcd130?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json index 1240a0f445f..107e1793818 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13545.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13545", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T09:15:22.797", - "lastModified": "2025-01-24T09:15:22.797", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:12:11.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -42,23 +62,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:g5plus:ultimate_bootstrap_elements_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.4.9", + "matchCriteriaId": "44F880CF-AAC6-470A-B9B4-DCE7C4035F76" + } + ] + } + ] } ], "references": [ { "url": "https://themes.trac.wordpress.org/browser/bootstrap-ultimate/1.4.9/docs/index.php#L8", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae07af10-e5fc-4f28-a343-f56c0e2bc324?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13594.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13594.json index 9b515b5a9b4..3ff6cf9800d 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13594.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13594.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13594", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T11:15:09.667", - "lastModified": "2025-01-24T11:15:09.667", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:01:24.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:neofix:simple_downloads_list:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.4.3", + "matchCriteriaId": "4C98DFCB-FFE7-4157-B58B-9F48EB4D86B4" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/simple-downloads-list/trunk/lists/list_1/download_list_1.php#L20", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3226486%40simple-downloads-list&new=3226486%40simple-downloads-list&sfp_email=&sfph_mail=#file14", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/49f5bb21-d18f-453b-bef4-e3b234d162c8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json index 3dbae5c5a74..dcec30f5be7 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13659.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13659", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T06:15:26.557", - "lastModified": "2025-01-24T06:15:26.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:40:49.037", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:listamester:listamester:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.3.5", + "matchCriteriaId": "A0190B01-D8BB-428E-BDD8-18ADBCFA7AE2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/listamester/trunk/includes/class-listamester.php#L105", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3225538%40listamester&new=3225538%40listamester&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68b4358d-d4b4-415b-a19f-e58b155ceac9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json index 0995331b9c2..dd2e3245a37 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13680.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13680", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T07:15:06.930", - "lastModified": "2025-01-24T07:15:06.930", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:37:37.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,6 +19,26 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:codepeople:form_builder_cp:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.42", + "matchCriteriaId": "9FB805C7-FAD3-443F-9CA4-BC38EEE5CFF3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/cp-easy-form-builder/tags/1.2.41/cp_easy_form_builder.php#L297", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3214984%40cp-easy-form-builder&new=3214984%40cp-easy-form-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a018fcb1-b7a6-456f-ab0b-59ccc1fd5b67?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json index 31d0ae1758e..e7f6b50771b 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13683.json @@ -2,8 +2,8 @@ "id": "CVE-2024-13683", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-24T07:15:08.523", - "lastModified": "2025-01-24T07:15:08.523", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:18:36.090", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sperse:automate_hub:*:*:*:*:free:wordpress:*:*", + "versionEndIncluding": "1.7.0", + "matchCriteriaId": "10761187-DDB1-4EA4-BF50-D1878CC5169F" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/automate-hub-free-by-sperse-io/trunk/apps/s/sperse/sperse.php#L141", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/automate-hub-free-by-sperse-io/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6d90ca3-dc24-4634-9f98-83a909e3e093?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13699.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13699.json index 59035647bd3..22d264a284e 100644 --- a/CVE-2024/CVE-2024-136xx/CVE-2024-13699.json +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13699.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13699", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-04T13:15:07.953", - "lastModified": "2025-02-04T13:15:07.953", - "vulnStatus": "Received", + "lastModified": "2025-02-05T18:33:09.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Qi Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018cursor\u2019 parameter in all versions up to, and including, 1.8.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in versions 1.8.5, 1.8.6, and 1.8.7." + }, + { + "lang": "es", + "value": "El complemento Qi Addons For Elementor para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del par\u00e1metro 'cursor' en todas las versiones hasta la 1.8.7 y incluida, debido a un escape insuficiente de desinfecci\u00f3n de entrada y salida. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada. La vulnerabilidad fue parcialmente corregida en las versiones 1.8.5, 1.8.6 y 1.8.7." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,30 +71,66 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:qodeinteractive:qi_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.8.7", + "matchCriteriaId": "6CCB1305-9BF2-41B2-9937-179A1C1EDE8D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/qi-addons-for-elementor/trunk/inc/shortcodes/typeout-text/class-qiaddonsforelementor-typeout-text-shortcode.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3230342/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3231980/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3232550/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3234136/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/add39d28-4070-44e2-8dff-0371e0c58453?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json index b39d280b97e..4bb47985607 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1400.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1400", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-11T22:15:54.490", - "lastModified": "2024-11-21T08:50:30.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:56:20.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wobbie:mollie_forms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.4", + "matchCriteriaId": "48F50D84-1C10-4A5C-91DC-F306D1EC6C59" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43c4ca71-0bf0-4529-97d9-2349f96bbb9e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3046896/mollie-forms/trunk/classes/Admin.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/43c4ca71-0bf0-4529-97d9-2349f96bbb9e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json index 6bc8bf95afa..5325a1c8f4f 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1419.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1419", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-07T07:15:07.733", - "lastModified": "2024-11-21T08:50:32.870", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:50:31.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,93 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.4.1", + "matchCriteriaId": "E745BF60-B988-4A1F-8D09-23E49876DCB2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.4.1", + "matchCriteriaId": "5127D333-113E-4CFC-B76C-92B2329160FF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3043999/the-plus-addons-for-elementor-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b3d83b-9695-40c5-b6ee-2a76c940de6e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3043999/the-plus-addons-for-elementor-page-builder", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0b3d83b-9695-40c5-b6ee-2a76c940de6e?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json index edd0cb3fd68..e252883acf6 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1468.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1468", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T04:15:06.020", - "lastModified": "2024-11-21T08:50:38.970", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:12:24.317", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.11.5", + "matchCriteriaId": "7BE9E5F4-E793-486B-B4A7-4C04D0C18B8B" + } + ] + } + ] + } + ], "references": [ { "url": "https://avada.com/documentation/avada-changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://avada.com/documentation/avada-changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cde6e758-9723-43f2-9972-32be8aeb2b91?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-226xx/CVE-2024-22667.json b/CVE-2024/CVE-2024-226xx/CVE-2024-22667.json index fca533b7a1c..1cdce6b5b4a 100644 --- a/CVE-2024/CVE-2024-226xx/CVE-2024-22667.json +++ b/CVE-2024/CVE-2024-226xx/CVE-2024-22667.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22667", "sourceIdentifier": "cve@mitre.org", "published": "2024-02-05T08:15:44.110", - "lastModified": "2024-11-21T08:56:33.347", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T17:29:53.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -22,13 +22,13 @@ "type": "Primary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "baseScore": 7.8, "baseSeverity": "HIGH", "attackVector": "LOCAL", "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", @@ -67,6 +67,26 @@ ] } ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*", + "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*", + "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646" + } + ] + } + ] } ], "references": [ @@ -87,15 +107,24 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240223-0008/", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.githubusercontent.com/henices/2467e7f22dcc2aa97a2453e197b55a0c/raw/7b54bccc9a129c604fb139266f4497ab7aaa94c7/gistfile1.txt", @@ -114,15 +143,24 @@ }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UI44Y4LJLG34D4HNB6NTPLUPZREHAEL7/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UIQLVUSYHDN3644K6EFDI7PRZOTIKXM3/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20240223-0008/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json index f737cd6160d..905e7a58294 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2436.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2436", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:33.850", - "lastModified": "2024-11-21T09:09:45.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:36:33.517", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:smartwp:lightweight_accordion:*:*:*:*:*:wordpress:*:*", + "versionEndIncluding": "1.5.16", + "matchCriteriaId": "E34C0057-D7F9-4098-9AC7-48F4C15DD97B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/lightweight-accordion/trunk/lightweight-accordion.php#L39", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056945@lightweight-accordion/trunk&old=2889281@lightweight-accordion/trunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/545dae6b-7983-4f02-a9a0-0be8cf935a78?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/lightweight-accordion/trunk/lightweight-accordion.php#L39", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3056945@lightweight-accordion/trunk&old=2889281@lightweight-accordion/trunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/545dae6b-7983-4f02-a9a0-0be8cf935a78?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json index 38671dc92f5..8df5e9bcb20 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2507.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2507", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:34.857", - "lastModified": "2024-11-21T09:09:54.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:28:13.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.17", + "matchCriteriaId": "E7484440-436A-43F6-9B1C-B1EB453ECC3D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/jetwidgets-for-elementor/tags/1.0.16&old=3055510&new_path=/jetwidgets-for-elementor/tags/1.0.17&new=3055510&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a02f0a23-0b2b-4e16-9f6d-ec6302a0d23b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/jetwidgets-for-elementor/tags/1.0.16&old=3055510&new_path=/jetwidgets-for-elementor/tags/1.0.17&new=3055510&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a02f0a23-0b2b-4e16-9f6d-ec6302a0d23b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2538.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2538.json index baa4db221f0..6867f9444a4 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2538.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2538.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2538", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-20T06:15:12.423", - "lastModified": "2024-11-21T09:09:58.220", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T18:15:22.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,103 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.3.2", + "matchCriteriaId": "CB4E94F1-7845-4825-BE95-03FF85EFD4BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3052848#file35", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70cd028d-122d-4e3c-ac09-150dec07a2cd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Xib3rR4dAr/b1eec00e844932c6f2f30a63024b404e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3052848#file35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/70cd028d-122d-4e3c-ac09-150dec07a2cd?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json index d706a1c94ba..0d39fc98e55 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2543.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2543", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:35.433", - "lastModified": "2024-11-21T09:09:58.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:11:54.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,80 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:permalink_manager_lite_project:permalink_manager_lite:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.4.3.2", + "matchCriteriaId": "CB4E94F1-7845-4825-BE95-03FF85EFD4BC" + } + ] + } + ] + } + ], "references": [ { "url": "https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3053899/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74f6bf42-3406-47c5-b255-6cc1e8084fb5?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://gist.github.com/Xib3rR4dAr/a248426dfee107c6fda08e80f98fa894", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3053899/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/74f6bf42-3406-47c5-b255-6cc1e8084fb5?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28094.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28094.json index 5610e410b77..4b4d8c2bcdd 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28094.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28094.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28094", "sourceIdentifier": "vdp@themissinglink.com.au", "published": "2024-03-07T04:15:07.333", - "lastModified": "2024-11-21T09:05:48.043", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:15:25.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schoolbox:schoolbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "74EE0444-60C1-4AB1-9D79-4681443BFA26" + } + ] + } + ] } ], "references": [ { "url": "https://schoolbox.education/", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28094", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://schoolbox.education/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28094", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28095.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28095.json index a47e2872dcd..b7a4599204b 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28095.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28095", "sourceIdentifier": "vdp@themissinglink.com.au", "published": "2024-03-07T04:15:07.527", - "lastModified": "2024-11-21T09:05:48.183", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:22:23.773", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schoolbox:schoolbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "74EE0444-60C1-4AB1-9D79-4681443BFA26" + } + ] + } + ] } ], "references": [ { "url": "https://schoolbox.education/", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28095", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://schoolbox.education/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28095", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28096.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28096.json index 3eadbb139c7..769f2c3ad99 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28096.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28096.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28096", "sourceIdentifier": "vdp@themissinglink.com.au", "published": "2024-03-07T04:15:07.703", - "lastModified": "2024-11-21T09:05:48.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:22:49.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schoolbox:schoolbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "74EE0444-60C1-4AB1-9D79-4681443BFA26" + } + ] + } + ] } ], "references": [ { "url": "https://schoolbox.education/", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28096", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://schoolbox.education/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28096", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-280xx/CVE-2024-28097.json b/CVE-2024/CVE-2024-280xx/CVE-2024-28097.json index 3fb34fd5f4b..9e6e52fe506 100644 --- a/CVE-2024/CVE-2024-280xx/CVE-2024-28097.json +++ b/CVE-2024/CVE-2024-280xx/CVE-2024-28097.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28097", "sourceIdentifier": "vdp@themissinglink.com.au", "published": "2024-03-07T04:15:07.897", - "lastModified": "2024-11-21T09:05:48.423", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:23:01.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:schoolbox:schoolbox:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.1.3", + "matchCriteriaId": "74EE0444-60C1-4AB1-9D79-4681443BFA26" + } + ] + } + ] } ], "references": [ { "url": "https://schoolbox.education/", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28097", - "source": "vdp@themissinglink.com.au" + "source": "vdp@themissinglink.com.au", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://schoolbox.education/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.themissinglink.com.au/security-advisories/cve-2024-28097", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json index b2485aa09d7..72d3616fc7f 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2878.json @@ -2,7 +2,7 @@ "id": "CVE-2024-2878", "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T13:15:22.523", - "lastModified": "2025-02-05T13:15:22.523", + "lastModified": "2025-02-05T20:15:44.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "cve@gitlab.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://hackerone.com/reports/2416356", "source": "cve@gitlab.com" + }, + { + "url": "https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11-2-released/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-364xx/CVE-2024-36437.json b/CVE-2024/CVE-2024-364xx/CVE-2024-36437.json index f836613a43e..454b4c4c93b 100644 --- a/CVE-2024/CVE-2024-364xx/CVE-2024-36437.json +++ b/CVE-2024/CVE-2024-364xx/CVE-2024-36437.json @@ -2,16 +2,55 @@ "id": "CVE-2024-36437", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T18:15:33.733", - "lastModified": "2025-02-03T18:15:33.733", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:21.337", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The com.enflick.android.TextNow (aka TextNow: Call + Text Unlimited) application 24.17.0.2 for Android enables any installed application (with no permissions) to place phone calls without user interaction by sending a crafted intent via the com.enflick.android.TextNow.activities.DialerActivity component." + }, + { + "lang": "es", + "value": "La aplicaci\u00f3n com.enflick.android.TextNow (tambi\u00e9n conocida como TextNow: Call + Text Unlimited) 24.17.0.2 para Android permite que cualquier aplicaci\u00f3n instalada (sin permisos) realice llamadas telef\u00f3nicas sin interacci\u00f3n del usuario enviando una intenci\u00f3n manipulado a trav\u00e9s del componente com.enflick.android.TextNow.activities.DialerActivity." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-926" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/com.enflick.android.TextNow/blob/main/CVE-2024-36437", diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json index cc29730744e..9373fc5d567 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3976.json @@ -2,7 +2,7 @@ "id": "CVE-2024-3976", "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T12:15:27.627", - "lastModified": "2025-02-05T12:15:27.627", + "lastModified": "2025-02-05T20:15:44.750", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "cve@gitlab.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://hackerone.com/reports/2470939", "source": "cve@gitlab.com" + }, + { + "url": "https://about.gitlab.com/releases/2024/05/08/patch-release-gitlab-16-11-2-released/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json b/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json index 1e7f260da1c..2401e8d2f4a 100644 --- a/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json +++ b/CVE-2024/CVE-2024-410xx/CVE-2024-41071.json @@ -2,109 +2,15 @@ "id": "CVE-2024-41071", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-07-29T15:15:14.863", - "lastModified": "2024-11-21T09:32:11.200", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T19:15:22.200", + "vulnStatus": "Rejected", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: Avoid address calculations via out of bounds array indexing\n\nreq->n_channels must be set before req->channels[] can be used.\n\nThis patch fixes one of the issues encountered in [1].\n\n[ 83.964255] UBSAN: array-index-out-of-bounds in net/mac80211/scan.c:364:4\n[ 83.964258] index 0 is out of range for type 'struct ieee80211_channel *[]'\n[...]\n[ 83.964264] Call Trace:\n[ 83.964267] \n[ 83.964269] dump_stack_lvl+0x3f/0xc0\n[ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110\n[ 83.964278] ieee80211_prep_hw_scan+0x2db/0x4b0\n[ 83.964281] __ieee80211_start_scan+0x601/0x990\n[ 83.964291] nl80211_trigger_scan+0x874/0x980\n[ 83.964295] genl_family_rcv_msg_doit+0xe8/0x160\n[ 83.964298] genl_rcv_msg+0x240/0x270\n[...]\n\n[1] https://bugzilla.kernel.org/show_bug.cgi?id=218810" - }, - { - "lang": "es", - "value": " En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: wifi: mac80211: evitar c\u00e1lculos de direcciones mediante indexaci\u00f3n de matriz fuera de los l\u00edmites. Se debe configurar req->n_channels antes de poder usar req->channels[]. Este parche soluciona uno de los problemas encontrados en [1]. [83.964255] UBSAN: \u00edndice de matriz fuera de los l\u00edmites en net/mac80211/scan.c:364:4 [83.964258] el \u00edndice 0 est\u00e1 fuera de rango para el tipo 'struct ieee80211_channel *[]' [...] [ 83.964264] Seguimiento de llamadas: [ 83.964267] [ 83.964269] dump_stack_lvl+0x3f/0xc0 [ 83.964274] __ubsan_handle_out_of_bounds+0xec/0x110 [ 83.964278] escaneo+0x2db/0x4b0 [ 83.964281] __ieee80211_start_scan+0x601/0x990 [ 83.964291] nl80211_trigger_scan+0x874/ 0x980 [83.964295] genl_family_rcv_msg_doit+0xe8/0x160 [83.964298] genl_rcv_msg+0x240/0x270 [...] [1] https://bugzilla.kernel.org/show_bug.cgi?id=218810" + "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], - "metrics": { - "cvssMetricV31": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 7.8, - "baseSeverity": "HIGH", - "attackVector": "LOCAL", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 1.8, - "impactScore": 5.9 - } - ] - }, - "weaknesses": [ - { - "source": "nvd@nist.gov", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-129" - } - ] - } - ], - "configurations": [ - { - "nodes": [ - { - "operator": "OR", - "negate": false, - "cpeMatch": [ - { - "vulnerable": true, - "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", - "versionEndExcluding": "6.9.11", - "matchCriteriaId": "E5165B93-C9B7-47E9-8137-35D791A1B1D1" - } - ] - } - ] - } - ], - "references": [ - { - "url": "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/26b177ecdd311f20de4c379f0630858a675dfc0c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/a2bb0c5d0086be5ab5054465dfaa381a1144905c", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" - }, - { - "url": "https://git.kernel.org/stable/c/2663d0462eb32ae7c9b035300ab6b1523886c718", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - }, - { - "url": "https://git.kernel.org/stable/c/4f43a614b1b84f0d1e3c48cc541c3bfdf414a6d0", - "source": "af854a3a-2127-422b-91ae-364da2661108", - "tags": [ - "Patch" - ] - } - ] + "metrics": {}, + "references": [] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-490xx/CVE-2024-49052.json b/CVE-2024/CVE-2024-490xx/CVE-2024-49052.json index f227e1ae877..39c84a5a390 100644 --- a/CVE-2024/CVE-2024-490xx/CVE-2024-49052.json +++ b/CVE-2024/CVE-2024-490xx/CVE-2024-49052.json @@ -2,8 +2,8 @@ "id": "CVE-2024-49052", "sourceIdentifier": "secure@microsoft.com", "published": "2024-11-26T20:15:32.723", - "lastModified": "2024-11-26T20:15:32.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:36:56.830", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -58,10 +78,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_functions:-:*:*:*:*:*:*:*", + "matchCriteriaId": "55C8D12F-35AE-4DEF-B47C-D686B0F11B0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49052", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json b/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json index 4a6ffb86c04..d2ec8c801a5 100644 --- a/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json +++ b/CVE-2024/CVE-2024-515xx/CVE-2024-51567.json @@ -2,8 +2,8 @@ "id": "CVE-2024-51567", "sourceIdentifier": "cve@mitre.org", "published": "2024-10-29T23:15:04.307", - "lastModified": "2024-11-08T21:14:28.807", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-05T20:15:44.913", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -80,7 +80,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-306" } ] } diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53104.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53104.json index d5125a0ab76..b112c30d71f 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53104.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53104.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53104", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-02T08:15:08.687", - "lastModified": "2024-12-11T15:15:18.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T20:34:45.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,42 +81,137 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.6.26", + "versionEndExcluding": "4.19.324", + "matchCriteriaId": "68D54A7F-73FB-4CC5-AA42-317A87945790" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "4.20", + "versionEndExcluding": "5.4.286", + "matchCriteriaId": "9952C897-8A61-4D4B-9D6D-7D063E9EA15E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.5", + "versionEndExcluding": "5.10.230", + "matchCriteriaId": "BF5B32D0-72C9-41C3-A0BB-D4946153C134" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.11", + "versionEndExcluding": "5.15.172", + "matchCriteriaId": "88812664-4296-42AC-AE0F-ED71086C1BB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "5.16", + "versionEndExcluding": "6.1.117", + "matchCriteriaId": "0DD7F755-2F6B-4707-8973-78496AD5AA8E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.2", + "versionEndExcluding": "6.6.61", + "matchCriteriaId": "630ED7EB-C97E-4435-B884-1E309E40D6F3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.7", + "versionEndExcluding": "6.11.8", + "matchCriteriaId": "0BD000F7-3DAD-4DD3-8906-98EA1EC67E95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", + "versionStartIncluding": "6.12", + "versionEndExcluding": "6.12.1", + "matchCriteriaId": "822EAD12-FA29-4559-BAC2-8AEFC53F6D37" + } + ] + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/1ee9d9122801eb688783acd07791f2906b87cb4f", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/467d84dc78c9abf6b217ada22b3fdba336262e29", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/575a562f7a3ec2d54ff77ab6810e3fbceef2a91d", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/622ad10aae5f5e03b7927ea95f7f32812f692bb5", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/684022f81f128338fe3587ec967459669a1204ae", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/95edf13a48e75dc2cc5b0bc57bf90d6948a22fe8", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/beced2cb09b58c1243733f374c560a55382003d6", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/ecf2b43018da9579842c774b7f35dbe11b5c38dd", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] }, { "url": "https://git.kernel.org/stable/c/faff5bbb2762c44ec7426037b3000e77a11d6773", - "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "tags": [ + "Patch" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-539xx/CVE-2024-53943.json b/CVE-2024/CVE-2024-539xx/CVE-2024-53943.json index 612f6990ecd..958e2b009c6 100644 --- a/CVE-2024/CVE-2024-539xx/CVE-2024-53943.json +++ b/CVE-2024/CVE-2024-539xx/CVE-2024-53943.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53943", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T18:15:36.733", - "lastModified": "2025-02-03T18:15:36.733", - "vulnStatus": "Received", + "lastModified": "2025-02-05T19:15:44.257", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in NRadio N8-180 NROS-1.9.2.n3.c5 devices. The /cgi-bin/luci/nradio/basic/radio endpoint is vulnerable to XSS via the 2.4 GHz and 5 GHz name parameters, allowing an attacker to execute JavaScript within the context of the current user by injecting JavaScript into the SSID field. If an administrator logs into the device, the injected script runs in their browser, executing the malicious payload." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en los dispositivos NRadio N8-180 NROS-1.9.2.n3.c5. El /cgi-bin/luci/nradio/basic/radio endpoint es vulnerable a XSS a trav\u00e9s de los par\u00e1metros de nombre de 2,4 GHz y 5 GHz, lo que permite a un atacante ejecutar JavaScript dentro del contexto del usuario actual al inyectar JavaScript en el campo SSID. Si un administrador inicia sesi\u00f3n en el dispositivo, el script inyectado se ejecuta en su navegador y ejecuta el payload malicioso." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/actuator/cve/blob/main/NRADIO/CVE-2024-53943.txt", diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json index 2c211cd77c7..273496a4c4f 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55511.json @@ -2,7 +2,7 @@ "id": "CVE-2024-55511", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-16T22:15:40.327", - "lastModified": "2025-01-28T23:15:07.820", + "lastModified": "2025-02-05T17:15:21.570", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": " Una vulnerabilidad de desreferencia de puntero nulo en Macrium Reflect anterior a 8.1.8017 permite a un atacante elevar sus privilegios mediante la ejecuci\u00f3n de un ejecutable especialmente manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], "references": [ { "url": "https://github.com/nikosecurity/CVE-2024-55511", diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json index 5364079d79e..cd58b9fd810 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55956.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55956", "sourceIdentifier": "cve@mitre.org", "published": "2024-12-13T21:15:13.767", - "lastModified": "2024-12-20T15:21:39.287", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-05T19:15:44.450", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -80,7 +80,7 @@ "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-77" } ] } diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json index 74dfc0f8f36..f5af77b0257 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5528.json @@ -2,7 +2,7 @@ "id": "CVE-2024-5528", "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T11:15:17.160", - "lastModified": "2025-02-05T11:15:17.160", + "lastModified": "2025-02-05T20:15:45.090", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "cve@gitlab.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://hackerone.com/reports/2523654", "source": "cve@gitlab.com" + }, + { + "url": "https://about.gitlab.com/releases/2024/07/10/patch-release-gitlab-17-1-2-released/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json new file mode 100644 index 00000000000..dad0b12f366 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56131.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56131", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-05T18:15:28.507", + "lastModified": "2025-02-05T18:15:28.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json new file mode 100644 index 00000000000..276722c66dd --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56132.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56132", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-05T18:15:28.700", + "lastModified": "2025-02-05T18:15:28.700", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json new file mode 100644 index 00000000000..0174b1e63de --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56133.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56133", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-05T18:15:28.880", + "lastModified": "2025-02-05T18:15:28.880", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json new file mode 100644 index 00000000000..2bb3dfcd640 --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56134.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56134", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-05T18:15:29.050", + "lastModified": "2025-02-05T18:15:29.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nMulti-Tenant Hypervisor \n\n\n\n\n\n7.1.35.12 and all prior versions \n\n\n\n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json new file mode 100644 index 00000000000..6e5c35bfb1c --- /dev/null +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56135.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-56135", + "sourceIdentifier": "security@progress.com", + "published": "2025-02-05T18:15:29.210", + "lastModified": "2025-02-05T18:15:29.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Input Validation vulnerability of Authenticated User in Progress LoadMaster allows : OS Command Injection.\n\nThis issue affects:\n\n\n\n\u202fProduct \n\n\n\n\n\nAffected Versions \n\n\n\n\n\nLoadMaster \n\n\n\n\n\nFrom 7.2.55.0 to 7.2.60.1 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\nFrom 7.2.49.0 to 7.2.54.12 (inclusive) \n\n\n\n\n\n\u202f\u00a0\n\n\n\n\n\n7.2.48.12 and all prior versions \n\n\n\n\n\n\n\n\nECS\n\n\n\n\n\nAll prior versions to 7.2.60.1 (inclusive)" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@progress.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.7, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security@progress.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://community.progress.com/s/article/LoadMaster-Security-Vulnerability-CVE-2024-56131-CVE-2024-56132-CVE-2024-56133-CVE-2024-56134-CVE-2024-56135", + "source": "security@progress.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json index 6fd1e355fd6..2db98b09783 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57095.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57095", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T20:15:33.473", - "lastModified": "2025-01-24T20:15:33.473", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:21.720", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "La vulnerabilidad de inyecci\u00f3n SQL en Go-CMS v.1.1.10 permite a un atacante remoto ejecutar c\u00f3digo arbitrario a trav\u00e9s de un payload manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/wjlin0/ff3ee8afb8f8001faff89bbc03805605", diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json index a9a09b162a9..6bc38b79776 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57277.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57277", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-24T20:15:33.587", - "lastModified": "2025-01-24T20:15:33.587", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:21.863", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "InnoShop V.0.3.8 y versiones anteriores son vulnerables a Cross Site Scripting (XSS) a trav\u00e9s de la carga de archivos SVG." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/innocommerce/innoshop/issues/115", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json index 84e8a7fa20f..48350723e72 100644 --- a/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57437", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-29T15:15:17.183", - "lastModified": "2025-01-29T15:15:17.183", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:22.003", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -15,7 +15,42 @@ "value": "Se descubri\u00f3 que RuoYi v4.8.0 conten\u00eda una vulnerabilidad de inyecci\u00f3n SQL a trav\u00e9s del par\u00e1metro orderby en /monitor/online/list." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], "references": [ { "url": "https://gitee.com/y_project/RuoYi", diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json index 5e88a8b23b7..1dfbe19e4d1 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57519", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:08.230", - "lastModified": "2025-01-29T15:15:17.483", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:22.157", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -46,7 +46,7 @@ "description": [ { "lang": "en", - "value": "CWE-770" + "value": "CWE-617" } ] } diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57556.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57556.json index 7300c2a59b4..ce4d1e0269d 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57556.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-57556", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:15.277", - "lastModified": "2025-01-24T21:15:10.680", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T17:44:31.293", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,34 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nbubna:store:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.14.2", + "matchCriteriaId": "A9CD1CC5-48E3-477E-A0DB-FE6340F1939C" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/nbubna/store/issues/127", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Issue Tracking", + "Mitigation", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-62xx/CVE-2024-6232.json b/CVE-2024/CVE-2024-62xx/CVE-2024-6232.json index a02317a9176..84a8945adfd 100644 --- a/CVE-2024/CVE-2024-62xx/CVE-2024-6232.json +++ b/CVE-2024/CVE-2024-62xx/CVE-2024-6232.json @@ -2,8 +2,8 @@ "id": "CVE-2024-6232", "sourceIdentifier": "cna@python.org", "published": "2024-09-03T13:15:05.363", - "lastModified": "2025-01-31T20:15:32.030", - "vulnStatus": "Modified", + "lastModified": "2025-02-05T19:09:39.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -71,8 +71,36 @@ { "vulnerable": true, "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", - "versionEndIncluding": "3.12.5", - "matchCriteriaId": "5621585D-59F4-4B27-9980-E7602EA0B750" + "versionEndExcluding": "3.8.20", + "matchCriteriaId": "B475FA53-D1F3-44C8-80CD-0CEA88129109" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.9.0", + "versionEndExcluding": "3.9.20", + "matchCriteriaId": "9365E878-106E-49B6-98FC-9FA339CD5216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.10.0", + "versionEndExcluding": "3.10.15", + "matchCriteriaId": "BFD756EB-DF07-4485-A2AA-59FBD7260A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.11.0", + "versionEndExcluding": "3.11.10", + "matchCriteriaId": "9EE0E5D8-452F-4862-9C23-23AC1DDEFB1E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:python:python:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.12.0", + "versionEndExcluding": "3.12.6", + "matchCriteriaId": "5D4E662B-59E4-495E-941E-2246D2168B42" }, { "vulnerable": true, @@ -142,7 +170,10 @@ "references": [ { "url": "https://github.com/python/cpython/commit/34ddb64d088dd7ccc321f6103d23153256caa5d4", - "source": "cna@python.org" + "source": "cna@python.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/python/cpython/commit/4eaf4891c12589e3c7bdad5f5b076e4c8392dd06", @@ -160,11 +191,17 @@ }, { "url": "https://github.com/python/cpython/commit/7d1f50cd92ff7e10a1c15a8f591dde8a6843a64d", - "source": "cna@python.org" + "source": "cna@python.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/python/cpython/commit/b4225ca91547aa97ed3aca391614afbb255bc877", - "source": "cna@python.org" + "source": "cna@python.org", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/python/cpython/commit/d449caf8a179e3b954268b3a88eb9170be3c8fbf", @@ -206,11 +243,18 @@ }, { "url": "http://www.openwall.com/lists/oss-security/2024/09/03/5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Mailing List", + "Third Party Advisory" + ] }, { "url": "https://security.netapp.com/advisory/ntap-20241018-0007/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json new file mode 100644 index 00000000000..4026103ccd9 --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7595.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-7595", + "sourceIdentifier": "cret@cert.org", + "published": "2025-02-05T18:15:29.360", + "lastModified": "2025-02-05T18:15:29.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GRE and GRE6 Protocols (RFC2784) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors.\r\n\r\nThis can be considered similar to CVE-2020-10136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://datatracker.ietf.org/doc/html/rfc2784", + "source": "cret@cert.org" + }, + { + "url": "https://www.rfc-editor.org/rfc/rfc6169.html", + "source": "cret@cert.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json new file mode 100644 index 00000000000..83e0ed6379d --- /dev/null +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7596.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-7596", + "sourceIdentifier": "cret@cert.org", + "published": "2025-02-05T18:15:29.470", + "lastModified": "2025-02-05T18:15:29.470", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Proposed Generic UDP Encapsulation (GUE) (IETF Draft) do not validate or verify the source of a network packet allowing an attacker to spoof and route arbitrary traffic via an exposed network interface that can lead to spoofing, access control bypass, and other unexpected network behaviors.\r\n\r\nThis can be considered similar to CVE-2020-10136." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://datatracker.ietf.org/doc/draft-ietf-intarea-gue/", + "source": "cret@cert.org" + }, + { + "url": "https://www.rfc-editor.org/rfc/rfc6169.html", + "source": "cret@cert.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8913.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8913.json index 7cf3c67813c..9bc155d1605 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8913.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8913.json @@ -2,8 +2,8 @@ "id": "CVE-2024-8913", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:17.040", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T17:18:08.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,23 +42,57 @@ "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.6.12", + "matchCriteriaId": "310F7444-D2DA-4CEB-BDEB-836CBDC810AD" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3165763/the-plus-addons-for-elementor-page-builder", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/46126f88-416a-4430-8596-12f72cd2c1e7?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json b/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json index 3dbbb235060..f49bed7d261 100644 --- a/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json +++ b/CVE-2024/CVE-2024-96xx/CVE-2024-9631.json @@ -2,7 +2,7 @@ "id": "CVE-2024-9631", "sourceIdentifier": "cve@gitlab.com", "published": "2025-02-05T11:15:17.567", - "lastModified": "2025-02-05T11:15:17.567", + "lastModified": "2025-02-05T20:15:45.210", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "cve@gitlab.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -55,6 +55,10 @@ { "url": "https://hackerone.com/reports/2650086", "source": "cve@gitlab.com" + }, + { + "url": "https://gitlab.com/gitlab-org/gitlab/-/issues/480867", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json b/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json index 10704995a9a..c63274ef5f1 100644 --- a/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json +++ b/CVE-2025/CVE-2025-06xx/CVE-2025-0665.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0665", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-02-05T10:15:22.857", - "lastModified": "2025-02-05T15:15:21.230", + "lastModified": "2025-02-05T20:15:45.310", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -63,6 +63,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/02/05/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/05/5", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json index 29b322813de..dbf7026787b 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1009", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.653", - "lastModified": "2025-02-04T14:15:31.653", - "vulnStatus": "Received", + "lastModified": "2025-02-05T19:15:44.887", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda haber provocado un Use-after-free a trav\u00e9s de datos XSLT manipulado, lo que habr\u00eda provocado un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936613", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json index 89ced1873c8..e31f93f4cc1 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1010", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.767", - "lastModified": "2025-02-04T14:15:31.767", - "vulnStatus": "Received", + "lastModified": "2025-02-05T19:15:45.040", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Un atacante podr\u00eda haber provocado un Use-after-free a trav\u00e9s de la API de resaltado personalizado, lo que habr\u00eda provocado un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936982", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json index 05b17a0b070..d9883c3fb9a 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1011", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.887", - "lastModified": "2025-02-04T14:15:31.887", - "vulnStatus": "Received", + "lastModified": "2025-02-05T19:15:45.200", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Un error en la generaci\u00f3n de c\u00f3digo de WebAssembly podr\u00eda haber provocado un bloqueo. Es posible que un atacante haya podido aprovecharlo para ejecutar el c\u00f3digo. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936454", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json index 66a9d30a78a..e6e0ad8d159 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1018", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.727", - "lastModified": "2025-02-04T14:15:32.727", - "vulnStatus": "Received", + "lastModified": "2025-02-05T17:15:22.293", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135." + }, + { + "lang": "es", + "value": "La notificaci\u00f3n de pantalla completa se oculta prematuramente cuando el usuario vuelve a solicitar la pantalla completa r\u00e1pidamente. Esto podr\u00eda haberse aprovechado para realizar un posible ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 135 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910818", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json index 4078b514231..a82577f35c8 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json @@ -2,16 +2,55 @@ "id": "CVE-2025-1019", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.850", - "lastModified": "2025-02-04T14:15:32.850", - "vulnStatus": "Received", + "lastModified": "2025-02-05T19:15:45.343", + "vulnStatus": "Undergoing Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The z-order of the browser windows could be manipulated to hide the fullscreen notification. This could potentially be leveraged to perform a spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135." + }, + { + "lang": "es", + "value": "El orden z de las ventanas del navegador podr\u00eda manipularse para ocultar la notificaci\u00f3n de pantalla completa. Esto podr\u00eda aprovecharse para realizar un ataque de suplantaci\u00f3n de identidad. Esta vulnerabilidad afecta a Firefox < 135 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940162", diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json index d08c71dabbd..a843a532087 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1022.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1022", "sourceIdentifier": "report@snyk.io", "published": "2025-02-05T05:15:10.337", - "lastModified": "2025-02-05T05:15:10.337", + "lastModified": "2025-02-05T20:15:45.470", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,6 +107,10 @@ { "url": "https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747", "source": "report@snyk.io" + }, + { + "url": "https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json index 0b43ca6fa54..61ba0985262 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1025.json @@ -2,7 +2,7 @@ "id": "CVE-2025-1025", "sourceIdentifier": "report@snyk.io", "published": "2025-02-05T05:15:10.517", - "lastModified": "2025-02-05T05:15:10.517", + "lastModified": "2025-02-05T20:15:45.593", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -107,6 +107,10 @@ { "url": "https://security.snyk.io/vuln/SNYK-PHP-COCKPITHQCOCKPIT-8516320", "source": "report@snyk.io" + }, + { + "url": "https://gist.github.com/CHOOCS/fe1227443544d5d74c33982814f290af", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json new file mode 100644 index 00000000000..b0a45f12709 --- /dev/null +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20029.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-20029", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:29.573", + "lastModified": "2025-02-05T18:15:29.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000148587", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json new file mode 100644 index 00000000000..c4f5b83e481 --- /dev/null +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20045.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-20045", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:29.760", + "lastModified": "2025-02-05T18:15:29.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When SIP session Application Level Gateway mode (ALG) profile with Passthru Mode enabled and SIP router ALG profile are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.\u00a0\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138932", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json b/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json new file mode 100644 index 00000000000..11e267e348c --- /dev/null +++ b/CVE-2025/CVE-2025-200xx/CVE-2025-20058.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-20058", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:29.943", + "lastModified": "2025-02-05T18:15:29.943", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization.\u00a0Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140947", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json new file mode 100644 index 00000000000..31367bac5d4 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20124.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20124", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:22.457", + "lastModified": "2025-02-05T17:15:22.457", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.\r\n\r\nThis vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges.\r\nNote: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json new file mode 100644 index 00000000000..a81f3698560 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20125.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20125", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:22.610", + "lastModified": "2025-02-05T17:15:22.610", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node.\r\n\r\nThis vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device.\r\nNote: To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 5.3 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json new file mode 100644 index 00000000000..2fec0f27b6a --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20169.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20169", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:22.777", + "lastModified": "2025-02-05T17:15:22.777", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json new file mode 100644 index 00000000000..0947ebb8c2e --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20170.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20170", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:23.283", + "lastModified": "2025-02-05T17:15:23.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json new file mode 100644 index 00000000000..e039b2860c1 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20171.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-20171", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:23.753", + "lastModified": "2025-02-05T17:15:23.753", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json new file mode 100644 index 00000000000..821c713c541 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20172.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-20172", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:24.020", + "lastModified": "2025-02-05T17:15:24.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software, Cisco IOS XE Software, and Cisco IOS XR Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. For Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. For Cisco IOS XR Software, a successful exploit could allow the attacker to cause the SNMP process to restart, resulting in an interrupted SNMP response from an affected device. Devices that are running Cisco IOS XR Software will not reload. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json new file mode 100644 index 00000000000..322e8cc3e97 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20173.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-20173", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:24.263", + "lastModified": "2025-02-05T17:15:24.263", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json new file mode 100644 index 00000000000..64a138cc346 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20174.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20174", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:24.513", + "lastModified": "2025-02-05T17:15:24.513", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json new file mode 100644 index 00000000000..cb715dfc58e --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20175.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20175", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:24.720", + "lastModified": "2025-02-05T17:15:24.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-805" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json new file mode 100644 index 00000000000..468b3700818 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20176.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2025-20176", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:24.997", + "lastModified": "2025-02-05T17:15:24.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. \r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.0 + } + ] + }, + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json new file mode 100644 index 00000000000..9e0ebd24ce2 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20179.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20179", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:25.210", + "lastModified": "2025-02-05T17:15:25.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Expressway Series could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability exists because the web-based management interface does not properly validate user-supplied input. An attacker could exploit this vulnerability by persuading a user of the interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information.\r\nNote: Cisco Expressway Series refers to Cisco Expressway Control (Expressway-C) devices and Cisco Expressway Edge (Expressway-E) devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-expressway-xss-uexUZrEW", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json new file mode 100644 index 00000000000..5f0bf3b47e3 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20180.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20180", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:25.370", + "lastModified": "2025-02-05T17:15:25.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email and Web Manager and Secure Email Gateway could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user input. An attacker could exploit this vulnerability by persuading a user of an affected interface to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Operator." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-xss-WCk2WcuG", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json new file mode 100644 index 00000000000..1075e02e7d1 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20183.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20183", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:25.527", + "lastModified": "2025-02-05T17:15:25.527", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in a policy-based Cisco Application Visibility and Control (AVC) implementation of Cisco AsyncOS Software for Cisco Secure Web Appliance could allow an unauthenticated, remote attacker to evade the antivirus scanner and download a malicious file onto an endpoint. \r\n\r\nThe vulnerability is due to improper handling of a crafted range request header. An attacker could exploit this vulnerability by sending an HTTP request with a crafted range request header through the affected device. A successful exploit could allow the attacker to evade the antivirus scanner and download malware onto the endpoint without detection by Cisco Secure Web Appliance." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N", + "baseScore": 5.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-swa-range-bypass-2BsEHYSu", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json new file mode 100644 index 00000000000..76db4ed5032 --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20184.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20184", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:25.697", + "lastModified": "2025-02-05T17:15:25.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco AsyncOS Software for Cisco Secure Email Gateway and Cisco Secure Web Appliance could allow an authenticated, remote attacker to perform command injection attacks against an affected device. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to insufficient validation of XML configuration files by an affected device. An attacker could exploit this vulnerability by uploading a crafted XML configuration file. A successful exploit could allow the attacker to inject commands to the underlying operating system with root privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json new file mode 100644 index 00000000000..1c6433013cf --- /dev/null +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20185.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20185", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:25.883", + "lastModified": "2025-02-05T17:15:25.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the implementation of the remote access functionality of Cisco AsyncOS Software for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, local attacker to elevate privileges to root. The attacker must authenticate with valid administrator credentials.\r\n\r\nThis vulnerability is due to an architectural flaw in the password generation algorithm for the remote access functionality. An attacker could exploit this vulnerability by generating a temporary password for the service account. A successful exploit could allow the attacker to execute arbitrary commands as root and access the underlying operating system.\r\nNote: The Security Impact Rating (SIR) for this vulnerability is Medium due to the unrestricted scope of information that is accessible to an attacker." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.4, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-250" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-multi-yKUJhS34", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json new file mode 100644 index 00000000000..7cac22217bb --- /dev/null +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20204.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20204", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:26.077", + "lastModified": "2025-02-05T17:15:26.077", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. \r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json new file mode 100644 index 00000000000..3d95dbd97ac --- /dev/null +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20205.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20205", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:26.243", + "lastModified": "2025-02-05T17:15:26.243", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface. \r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have valid administrative credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-42tgsdMG", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json b/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json new file mode 100644 index 00000000000..a72de321780 --- /dev/null +++ b/CVE-2025/CVE-2025-202xx/CVE-2025-20207.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-20207", + "sourceIdentifier": "psirt@cisco.com", + "published": "2025-02-05T17:15:26.410", + "lastModified": "2025-02-05T17:15:26.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in Simple Network Management Protocol (SNMP) polling for Cisco Secure Email and Web Manager, Cisco Secure Email Gateway, and Cisco Secure Web Appliance could allow an authenticated, remote attacker to obtain confidential information about the underlying operating system.\r\n\r\nThis vulnerability exists because the appliances do not protect confidential information at rest in response to SNMP poll requests. An attacker could exploit this vulnerability by sending a crafted SNMP poll request to the affected appliance. A successful exploit could allow the attacker to discover confidential information that should be restricted. To exploit this vulnerability, an attacker must have the configured SNMP credentials." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@cisco.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + } + ] + } + ], + "references": [ + { + "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-wsa-snmp-inf-FqPvL8sX", + "source": "psirt@cisco.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json new file mode 100644 index 00000000000..c91020ddb6b --- /dev/null +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21087.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21087", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:30.430", + "lastModified": "2025-02-05T18:15:30.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When Client or Server SSL profiles are configured on a Virtual Server, or DNSSEC signing operations are in use, undisclosed traffic can cause an increase in memory and CPU resource utilization.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000134888", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json b/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json new file mode 100644 index 00000000000..7f2a5e67ab6 --- /dev/null +++ b/CVE-2025/CVE-2025-210xx/CVE-2025-21091.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-21091", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:30.613", + "lastModified": "2025-02-05T18:15:30.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When SNMP v1 or v2c are disabled on the BIG-IP, undisclosed requests can cause an increase in memory resource utilization.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated" + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140933", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json index 56cdc15b08d..8fd35b8c0d2 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21171.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21171", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.100", - "lastModified": "2025-01-14T18:15:30.100", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:07:01.797", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,107 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:powershell:7.5.0:*:*:*:*:*:*:*", + "matchCriteriaId": "55470C2B-D908-46C8-97F4-2ABFF4DD73F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.22", + "matchCriteriaId": "4C373831-8981-462F-8A57-9C71D1839052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.17", + "matchCriteriaId": "9CA6DD18-569B-449D-82FF-4BE3A57E7150" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.10", + "matchCriteriaId": "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.12.0", + "versionEndExcluding": "17.12.4", + "matchCriteriaId": "4CDB41EA-38E1-4325-8DE7-27E187C1695B" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21171", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json index a0f4aafc70e..ffcbded4bb1 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21172.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21172", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.300", - "lastModified": "2025-01-14T18:15:30.300", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T20:03:33.053", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -53,12 +53,121 @@ "value": "CWE-190" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB25C50-5246-435F-B5C6-C4643ADBEC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] + }, + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndIncluding": "15.8", + "matchCriteriaId": "754856ED-0708-4505-B3CC-C3CF1818DD59" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:*:*:*", + "versionStartIncluding": "16.0", + "versionEndIncluding": "16.10", + "matchCriteriaId": "26472C42-CDB4-4176-B10B-3BF26F5030E3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.22", + "matchCriteriaId": "4C373831-8981-462F-8A57-9C71D1839052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.17", + "matchCriteriaId": "9CA6DD18-569B-449D-82FF-4BE3A57E7150" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.10", + "matchCriteriaId": "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.12.0", + "versionEndExcluding": "17.12.4", + "matchCriteriaId": "4CDB41EA-38E1-4325-8DE7-27E187C1695B" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21172", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json index 9d443ec887a..0ea27e2f581 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21173.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21173", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.480", - "lastModified": "2025-01-14T19:15:34.583", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T18:56:08.103", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,104 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-379" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.22", + "matchCriteriaId": "4C373831-8981-462F-8A57-9C71D1839052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.17", + "matchCriteriaId": "9CA6DD18-569B-449D-82FF-4BE3A57E7150" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.10", + "matchCriteriaId": "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.12.0", + "versionEndExcluding": "17.12.4", + "matchCriteriaId": "4CDB41EA-38E1-4325-8DE7-27E187C1695B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:8.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "ECB25C50-5246-435F-B5C6-C4643ADBEC47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*", + "matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21173", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json index d4daff13a98..00c78abfc5b 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21176.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21176", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.650", - "lastModified": "2025-01-14T18:15:30.650", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T19:12:24.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,422 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9.69", + "matchCriteriaId": "2B35392C-DFB3-4AEE-AB3C-09CE3D2B7A7D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6:*:*:*:*:*:*:*", + "matchCriteriaId": "280FE663-23BE-45D2-9B31-5F577E390B48" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542DAEEC-73CC-46C6-A630-BF474A3446AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E039CE1F-B988-4741-AE2E-5B36E2AF9688" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8.1:*:*:*:*:*:*:*", + "matchCriteriaId": "934D4E46-12C1-41DC-A28C-A2C430E965E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D4793BFB-2E4E-4067-87A5-4B8749025CA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42D329B2-432D-4029-87EB-4C3C5F55CD95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A529CED5-0DF0-4203-85C0-894CAF37E159" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75CCACE6-A0EE-4A6F-BD5A-7AA504B02717" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "734112B3-1383-4BE3-8721-C0F84566B764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B0E40A-84EF-4099-A395-75D6B8CDA196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E039CE1F-B988-4741-AE2E-5B36E2AF9688" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.6.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A16AD2B0-2189-4E8E-B7FC-CE598CA1CB2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7:*:*:*:*:*:*:*", + "matchCriteriaId": "734112B3-1383-4BE3-8721-C0F84566B764" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.1:*:*:*:*:*:*:*", + "matchCriteriaId": "36B0E40A-84EF-4099-A395-75D6B8CDA196" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:3.5:*:*:*:*:*:*:*", + "matchCriteriaId": "E039CE1F-B988-4741-AE2E-5B36E2AF9688" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.7.2:*:*:*:*:*:*:*", + "matchCriteriaId": "3EF7A75E-EE27-4AA7-8D84-9D696728A4CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "306B7CE6-8239-4AED-9ED4-4C9F5B349F58" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "345FCD64-D37B-425B-B64C-8B1640B7E850" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F513002-D8C1-4D3A-9F79-4B52498F67E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8DC08D-A860-493A-8AA6-1AD4A0A511AD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB79EE26-FC32-417D-A49C-A1A63165A968" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:-:*:*:*:*:*:*:*", + "matchCriteriaId": "821614DD-37DD-44E2-A8A4-FE8D23A33C3C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net_framework:4.8:*:*:*:*:*:*:*", + "matchCriteriaId": "2D3F18AF-84ED-473B-A8DF-65EB23C475AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x64:*", + "matchCriteriaId": "5E491E46-1917-41FE-8F9A-BB0BDDEB42C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:-:*:*:*:*:*:x86:*", + "matchCriteriaId": "0A1BC97A-263E-4291-8AEF-02EE4E6031E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", + "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:.net:9.0.0:*:*:*:*:*:*:*", + "matchCriteriaId": "5DFE5320-88E8-42C2-BC1C-E402FE71ECBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21176", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json index ab99b99e2ff..92ac478046c 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21187.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21187", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.187", - "lastModified": "2025-01-14T18:15:31.187", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T19:14:06.093", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,86 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-94" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.46", + "versionEndExcluding": "2.46.184.25013", + "matchCriteriaId": "A3AE490E-B66C-45D1-81FE-46C8DB0D9A7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.47", + "versionEndExcluding": "2.47.126.25010", + "matchCriteriaId": "78453D1B-A64E-4596-9208-462526C0627C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.48", + "versionEndExcluding": "2.48.164.25010", + "matchCriteriaId": "1BAD3381-BDB2-42FC-89E7-96A388288F09" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.49", + "versionEndExcluding": "2.49.182.25010", + "matchCriteriaId": "91E8C064-A7DB-4C2D-8594-28A6C1012A88" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.50", + "versionEndExcluding": "2.50.139.25010", + "matchCriteriaId": "23AE7E1D-6A5D-4750-BB9A-2D626CC0CE1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:power_automate_for_desktop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.51", + "versionEndExcluding": "2.51.349.24355", + "matchCriteriaId": "C03A1069-DBBE-4C3A-A315-C80870819A80" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21187", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json index e925328cedc..bf3f92aea17 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21313.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21313", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.007", - "lastModified": "2025-01-14T18:15:55.007", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-05T19:40:54.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,62 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-833" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "155593BE-9192-4286-81F7-2C66B55B0438" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21313", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json index 1fd236f69f5..5547bdf8baa 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21380.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21380", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-09T23:15:08.340", - "lastModified": "2025-01-09T23:15:08.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T19:29:52.457", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -26,7 +26,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -43,25 +43,75 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_marketplace:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B18F83F7-96C2-4B36-A68F-5B8C4E41D066" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21380", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json index 4e82cc77da3..d7a946b1527 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21385.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21385", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-09T22:15:29.980", - "lastModified": "2025-01-09T22:15:29.980", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-05T19:32:55.867", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -26,7 +26,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -58,10 +78,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7387D350-6697-4865-BF5B-1D36F1B1A8DF" + } + ] + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21385", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22205.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22205.json index edefbc79584..d1256cae90e 100644 --- a/CVE-2025/CVE-2025-222xx/CVE-2025-22205.json +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22205.json @@ -2,16 +2,43 @@ "id": "CVE-2025-22205", "sourceIdentifier": "security@joomla.org", "published": "2025-02-04T08:15:32.703", - "lastModified": "2025-02-04T08:15:32.703", - "vulnStatus": "Received", + "lastModified": "2025-02-05T18:15:30.803", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper handling of input variables lead to multiple path traversal vulnerabilities in the Admiror Gallery extension for Joomla in version branch 4.x." + }, + { + "lang": "es", + "value": "La gesti\u00f3n inadecuada de las variables de entrada conduce a m\u00faltiples vulnerabilidades Path Traversal en la extensi\u00f3n Admiror Gallery para Joomla en la rama de versi\u00f3n 4.x." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@joomla.org", diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json new file mode 100644 index 00000000000..10905567c50 --- /dev/null +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22846.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-22846", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:31.000", + "lastModified": "2025-02-05T18:15:31.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When SIP Session and Router ALG profiles are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.\n\n\n\n\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139780", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json b/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json new file mode 100644 index 00000000000..c58fca21b01 --- /dev/null +++ b/CVE-2025/CVE-2025-228xx/CVE-2025-22891.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-22891", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:31.190", + "lastModified": "2025-02-05T18:15:31.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When BIG-IP PEM Control Plane listener Virtual Server is configured with Diameter Endpoint profile, undisclosed traffic can cause the Virtual Server to stop processing new client connections and an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-772" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139778", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json new file mode 100644 index 00000000000..dd655291196 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23239.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-23239", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:31.373", + "lastModified": "2025-02-05T18:15:31.373", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When running in Appliance mode, an authenticated remote command injection vulnerability exists in an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000138757", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json b/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json index ee12f24f882..ea22f13f774 100644 --- a/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json +++ b/CVE-2025/CVE-2025-233xx/CVE-2025-23369.json @@ -2,7 +2,7 @@ "id": "CVE-2025-23369", "sourceIdentifier": "product-cna@github.com", "published": "2025-01-21T19:15:12.147", - "lastModified": "2025-01-21T19:15:12.147", + "lastModified": "2025-02-05T19:15:45.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,16 +22,16 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 6.1, - "baseSeverity": "MEDIUM", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.6, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "HIGH", "attackRequirements": "PRESENT", "privilegesRequired": "LOW", "userInteraction": "NONE", "vulnerableSystemConfidentiality": "HIGH", - "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemIntegrity": "HIGH", "vulnerableSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json new file mode 100644 index 00000000000..b2eec1841ba --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23412.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-23412", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:31.580", + "lastModified": "2025-02-05T18:15:31.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When BIG-IP APM Access Profile is configured on a virtual server, undisclosed request can cause TMM to terminate.\n\n\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000141003", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json new file mode 100644 index 00000000000..41dcaeb7f48 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23413.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-23413", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:31.930", + "lastModified": "2025-02-05T18:15:31.930", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When users log in through the webUI or API using local authentication, BIG-IP Next Central Manager may log sensitive information in the pgaudit log files. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000149185", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json new file mode 100644 index 00000000000..8fba3cd3ac1 --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23415.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-23415", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:32.573", + "lastModified": "2025-02-05T18:15:32.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An insufficient verification of data authenticity vulnerability exists in BIG-IP APM Access Policy endpoint inspection that may allow an attacker to bypass endpoint inspection checks for VPN connection initiated thru BIG-IP APM browser network access VPN client for Windows, macOS and Linux.\n\n \n\n\n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000139656", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json b/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json new file mode 100644 index 00000000000..aa9b07a9daf --- /dev/null +++ b/CVE-2025/CVE-2025-234xx/CVE-2025-23419.json @@ -0,0 +1,104 @@ +{ + "id": "CVE-2025-23419", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:33.347", + "lastModified": "2025-02-05T20:15:45.717", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication.\u00a0\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-287" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000149173", + "source": "f5sirt@f5.com" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/05/8", + "source": "af854a3a-2127-422b-91ae-364da2661108" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json new file mode 100644 index 00000000000..ba3f7281deb --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24312.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24312", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:34.060", + "lastModified": "2025-02-05T18:15:34.060", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When BIG-IP AFM is provisioned with IPS module enabled and protocol inspection profile is configured on a virtual server or firewall rule or policy, undisclosed traffic can cause an increase in CPU resource utilization.\u00a0\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000141380", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json new file mode 100644 index 00000000000..d3bc173b632 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24319.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24319", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:34.557", + "lastModified": "2025-02-05T18:15:34.557", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When BIG-IP Next Central Manager is running, undisclosed requests to the BIG-IP Next Central Manager API can cause the BIG-IP Next Central Manager Node's Kubernetes service to terminate.\n\n\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000148412", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json new file mode 100644 index 00000000000..7d9b9aaa140 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24320.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24320", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:34.960", + "lastModified": "2025-02-05T18:15:34.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A stored cross-site scripting (XSS) vulnerability exists in an undisclosed page of the BIG-IP Configuration utility that allows an attacker to run JavaScript in the context of the currently logged-in user. This vulnerability is due to an incomplete fix for CVE-2024-31156 https://my.f5.com/manage/s/article/K000138636 .\u00a0\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.0, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140578", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json new file mode 100644 index 00000000000..9c39d2cd856 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24326.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24326", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:35.420", + "lastModified": "2025-02-05T18:15:35.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When BIG-IP Advanced WAF/ASM Behavioral DoS (BADoS) TLS Signatures feature is configured, undisclosed traffic can case an increase in memory resource utilization.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.9, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "PRESENT", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140950", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json new file mode 100644 index 00000000000..8295c29ed46 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24372.json @@ -0,0 +1,76 @@ +{ + "id": "CVE-2025-24372", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-05T19:15:46.010", + "lastModified": "2025-02-05T19:15:46.010", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "CKAN is an open-source DMS (data management system) for powering data hubs and data portals. Using a specially crafted file, a user could potentially upload a file containing code that when executed could send arbitrary requests to the server. If that file was opened by an administrator, it could lead to escalation of privileges of the original submitter or other malicious actions. Users must have been registered to the site to exploit this vulnerability. This vulnerability has been fixed in CKAN 2.10.7 and 2.11.2. Users are advised to upgrade. On versions prior to CKAN 2.10.7 and 2.11.2, site maintainers can restrict the file types supported for uploading using the `ckan.upload.user.mimetypes` / `ckan.upload.user.types` and `ckan.upload.group.mimetypes` / `ckan.upload.group.types` config options. To entirely disable file uploads users can use: `ckan.upload.user.types = none`" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-mimetypes", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-group-types", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-mimetypes", + "source": "security-advisories@github.com" + }, + { + "url": "https://docs.ckan.org/en/latest/maintaining/configuration.html#ckan-upload-user-types", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ckan/ckan/commit/7da6a26c6183e0a97a356d1b1d2407f3ecc7b9c8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/ckan/ckan/security/advisories/GHSA-7pq5-qcp6-mcww", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json new file mode 100644 index 00000000000..7c9557d38bc --- /dev/null +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24497.json @@ -0,0 +1,100 @@ +{ + "id": "CVE-2025-24497", + "sourceIdentifier": "f5sirt@f5.com", + "published": "2025-02-05T18:15:35.613", + "lastModified": "2025-02-05T18:15:35.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "When URL categorization is configured on a virtual server, undisclosed requests can cause TMM to terminate.\u00a0 Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "f5sirt@f5.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "f5sirt@f5.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://my.f5.com/manage/s/article/K000140920", + "source": "f5sirt@f5.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json new file mode 100644 index 00000000000..b20340d4443 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24803.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-24803", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-05T19:15:46.207", + "lastModified": "2025-02-05T19:15:46.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A\u2013Z, a\u2013z, and 0\u20139), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `CFBundleIdentifier` value. The `dynamic_analysis.html` file does not sanitize the received bundle value from Corellium and as a result, it is possible to break the HTML context and achieve Stored XSS. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-cxqq-w3x5-7ph3", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json new file mode 100644 index 00000000000..c691457233b --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24804.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-24804", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-05T19:15:46.350", + "lastModified": "2025-02-05T19:15:46.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. According to Apple's documentation for bundle ID's, it must contain only alphanumeric characters (A\u2013Z, a\u2013z, and 0\u20139), hyphens (-), and periods (.). However, an attacker can manually modify this value in the `Info.plist` file and add special characters to the `CFBundleIdentifier` value. When the application parses the wrong characters in the bundle ID, it encounters an error. As a result, it will not display content and will throw a 500 error instead. The only way to make the pages work again is to manually remove the malicious application from the system. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1287" + } + ] + } + ], + "references": [ + { + "url": "https://developer.apple.com/documentation/bundleresources/information-property-list/cfbundleidentifier", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-jrm8-xgf3-fwqr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json new file mode 100644 index 00000000000..3e0036c5064 --- /dev/null +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24805.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-24805", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-05T19:15:46.487", + "lastModified": "2025-02-05T19:15:46.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mobile Security Framework (MobSF) is an automated, all-in-one mobile application (Android/iOS/Windows) pen-testing, malware analysis and security assessment framework. A local user with minimal privileges is able to make use of an access token for materials for scopes which it should not be accepted. This issue has been addressed in version 4.3.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-269" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/commit/05206e72cae35b311615a70e51e1a946955c5e83", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/MobSF/Mobile-Security-Framework-MobSF/security/advisories/GHSA-79f6-p65j-3m2m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 1f9e9812530..416b2a2bf3a 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-05T17:00:47.327507+00:00 +2025-02-05T21:01:53.795162+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-05T16:51:57.997000+00:00 +2025-02-05T20:56:20.887000+00:00 ``` ### Last Data Feed Release @@ -33,47 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -280125 +280171 ``` ### CVEs added in the last Commit -Recently added CVEs: `3` +Recently added CVEs: `46` -- [CVE-2024-39564](CVE-2024/CVE-2024-395xx/CVE-2024-39564.json) (`2025-02-05T16:15:40.270`) -- [CVE-2024-42207](CVE-2024/CVE-2024-422xx/CVE-2024-42207.json) (`2025-02-05T16:15:40.447`) -- [CVE-2025-0858](CVE-2025/CVE-2025-08xx/CVE-2025-0858.json) (`2025-02-05T15:15:21.580`) +- [CVE-2025-20180](CVE-2025/CVE-2025-201xx/CVE-2025-20180.json) (`2025-02-05T17:15:25.370`) +- [CVE-2025-20183](CVE-2025/CVE-2025-201xx/CVE-2025-20183.json) (`2025-02-05T17:15:25.527`) +- [CVE-2025-20184](CVE-2025/CVE-2025-201xx/CVE-2025-20184.json) (`2025-02-05T17:15:25.697`) +- [CVE-2025-20185](CVE-2025/CVE-2025-201xx/CVE-2025-20185.json) (`2025-02-05T17:15:25.883`) +- [CVE-2025-20204](CVE-2025/CVE-2025-202xx/CVE-2025-20204.json) (`2025-02-05T17:15:26.077`) +- [CVE-2025-20205](CVE-2025/CVE-2025-202xx/CVE-2025-20205.json) (`2025-02-05T17:15:26.243`) +- [CVE-2025-20207](CVE-2025/CVE-2025-202xx/CVE-2025-20207.json) (`2025-02-05T17:15:26.410`) +- [CVE-2025-21087](CVE-2025/CVE-2025-210xx/CVE-2025-21087.json) (`2025-02-05T18:15:30.430`) +- [CVE-2025-21091](CVE-2025/CVE-2025-210xx/CVE-2025-21091.json) (`2025-02-05T18:15:30.613`) +- [CVE-2025-22846](CVE-2025/CVE-2025-228xx/CVE-2025-22846.json) (`2025-02-05T18:15:31.000`) +- [CVE-2025-22891](CVE-2025/CVE-2025-228xx/CVE-2025-22891.json) (`2025-02-05T18:15:31.190`) +- [CVE-2025-23239](CVE-2025/CVE-2025-232xx/CVE-2025-23239.json) (`2025-02-05T18:15:31.373`) +- [CVE-2025-23412](CVE-2025/CVE-2025-234xx/CVE-2025-23412.json) (`2025-02-05T18:15:31.580`) +- [CVE-2025-23413](CVE-2025/CVE-2025-234xx/CVE-2025-23413.json) (`2025-02-05T18:15:31.930`) +- [CVE-2025-23415](CVE-2025/CVE-2025-234xx/CVE-2025-23415.json) (`2025-02-05T18:15:32.573`) +- [CVE-2025-23419](CVE-2025/CVE-2025-234xx/CVE-2025-23419.json) (`2025-02-05T18:15:33.347`) +- [CVE-2025-24312](CVE-2025/CVE-2025-243xx/CVE-2025-24312.json) (`2025-02-05T18:15:34.060`) +- [CVE-2025-24319](CVE-2025/CVE-2025-243xx/CVE-2025-24319.json) (`2025-02-05T18:15:34.557`) +- [CVE-2025-24320](CVE-2025/CVE-2025-243xx/CVE-2025-24320.json) (`2025-02-05T18:15:34.960`) +- [CVE-2025-24326](CVE-2025/CVE-2025-243xx/CVE-2025-24326.json) (`2025-02-05T18:15:35.420`) +- [CVE-2025-24372](CVE-2025/CVE-2025-243xx/CVE-2025-24372.json) (`2025-02-05T19:15:46.010`) +- [CVE-2025-24497](CVE-2025/CVE-2025-244xx/CVE-2025-24497.json) (`2025-02-05T18:15:35.613`) +- [CVE-2025-24803](CVE-2025/CVE-2025-248xx/CVE-2025-24803.json) (`2025-02-05T19:15:46.207`) +- [CVE-2025-24804](CVE-2025/CVE-2025-248xx/CVE-2025-24804.json) (`2025-02-05T19:15:46.350`) +- [CVE-2025-24805](CVE-2025/CVE-2025-248xx/CVE-2025-24805.json) (`2025-02-05T19:15:46.487`) ### CVEs modified in the last Commit -Recently modified CVEs: `174` +Recently modified CVEs: `133` -- [CVE-2024-50698](CVE-2024/CVE-2024-506xx/CVE-2024-50698.json) (`2025-02-05T15:15:20.790`) -- [CVE-2024-52389](CVE-2024/CVE-2024-523xx/CVE-2024-52389.json) (`2025-02-05T15:28:15.587`) -- [CVE-2024-53751](CVE-2024/CVE-2024-537xx/CVE-2024-53751.json) (`2025-02-05T16:00:46.273`) -- [CVE-2024-54488](CVE-2024/CVE-2024-544xx/CVE-2024-54488.json) (`2025-02-05T16:15:40.983`) -- [CVE-2024-54543](CVE-2024/CVE-2024-545xx/CVE-2024-54543.json) (`2025-02-05T16:15:41.137`) -- [CVE-2024-55192](CVE-2024/CVE-2024-551xx/CVE-2024-55192.json) (`2025-02-05T15:15:20.950`) -- [CVE-2024-6007](CVE-2024/CVE-2024-60xx/CVE-2024-6007.json) (`2025-02-05T15:49:54.563`) -- [CVE-2024-6725](CVE-2024/CVE-2024-67xx/CVE-2024-6725.json) (`2025-02-05T15:20:39.150`) -- [CVE-2024-9170](CVE-2024/CVE-2024-91xx/CVE-2024-9170.json) (`2025-02-05T16:42:39.357`) -- [CVE-2024-9239](CVE-2024/CVE-2024-92xx/CVE-2024-9239.json) (`2025-02-05T16:41:42.517`) -- [CVE-2025-0373](CVE-2025/CVE-2025-03xx/CVE-2025-0373.json) (`2025-02-05T16:15:41.290`) -- [CVE-2025-0374](CVE-2025/CVE-2025-03xx/CVE-2025-0374.json) (`2025-02-05T16:15:41.450`) -- [CVE-2025-0665](CVE-2025/CVE-2025-06xx/CVE-2025-0665.json) (`2025-02-05T15:15:21.230`) -- [CVE-2025-0725](CVE-2025/CVE-2025-07xx/CVE-2025-0725.json) (`2025-02-05T15:15:21.383`) -- [CVE-2025-1012](CVE-2025/CVE-2025-10xx/CVE-2025-1012.json) (`2025-02-05T16:15:41.677`) -- [CVE-2025-24086](CVE-2025/CVE-2025-240xx/CVE-2025-24086.json) (`2025-02-05T15:15:21.750`) -- [CVE-2025-24087](CVE-2025/CVE-2025-240xx/CVE-2025-24087.json) (`2025-02-05T15:15:21.923`) -- [CVE-2025-24096](CVE-2025/CVE-2025-240xx/CVE-2025-24096.json) (`2025-02-05T16:15:41.840`) -- [CVE-2025-24100](CVE-2025/CVE-2025-241xx/CVE-2025-24100.json) (`2025-02-05T15:15:22.070`) -- [CVE-2025-24104](CVE-2025/CVE-2025-241xx/CVE-2025-24104.json) (`2025-02-05T15:15:22.223`) -- [CVE-2025-24107](CVE-2025/CVE-2025-241xx/CVE-2025-24107.json) (`2025-02-05T16:15:42.013`) -- [CVE-2025-24120](CVE-2025/CVE-2025-241xx/CVE-2025-24120.json) (`2025-02-05T15:15:22.373`) -- [CVE-2025-24127](CVE-2025/CVE-2025-241xx/CVE-2025-24127.json) (`2025-02-05T16:15:42.163`) -- [CVE-2025-24131](CVE-2025/CVE-2025-241xx/CVE-2025-24131.json) (`2025-02-05T16:15:42.357`) -- [CVE-2025-24150](CVE-2025/CVE-2025-241xx/CVE-2025-24150.json) (`2025-02-05T16:15:42.517`) +- [CVE-2024-57277](CVE-2024/CVE-2024-572xx/CVE-2024-57277.json) (`2025-02-05T17:15:21.863`) +- [CVE-2024-57437](CVE-2024/CVE-2024-574xx/CVE-2024-57437.json) (`2025-02-05T17:15:22.003`) +- [CVE-2024-57519](CVE-2024/CVE-2024-575xx/CVE-2024-57519.json) (`2025-02-05T17:15:22.157`) +- [CVE-2024-57556](CVE-2024/CVE-2024-575xx/CVE-2024-57556.json) (`2025-02-05T17:44:31.293`) +- [CVE-2024-6232](CVE-2024/CVE-2024-62xx/CVE-2024-6232.json) (`2025-02-05T19:09:39.523`) +- [CVE-2024-8913](CVE-2024/CVE-2024-89xx/CVE-2024-8913.json) (`2025-02-05T17:18:08.830`) +- [CVE-2024-9631](CVE-2024/CVE-2024-96xx/CVE-2024-9631.json) (`2025-02-05T20:15:45.210`) +- [CVE-2025-0665](CVE-2025/CVE-2025-06xx/CVE-2025-0665.json) (`2025-02-05T20:15:45.310`) +- [CVE-2025-1009](CVE-2025/CVE-2025-10xx/CVE-2025-1009.json) (`2025-02-05T19:15:44.887`) +- [CVE-2025-1010](CVE-2025/CVE-2025-10xx/CVE-2025-1010.json) (`2025-02-05T19:15:45.040`) +- [CVE-2025-1011](CVE-2025/CVE-2025-10xx/CVE-2025-1011.json) (`2025-02-05T19:15:45.200`) +- [CVE-2025-1018](CVE-2025/CVE-2025-10xx/CVE-2025-1018.json) (`2025-02-05T17:15:22.293`) +- [CVE-2025-1019](CVE-2025/CVE-2025-10xx/CVE-2025-1019.json) (`2025-02-05T19:15:45.343`) +- [CVE-2025-1022](CVE-2025/CVE-2025-10xx/CVE-2025-1022.json) (`2025-02-05T20:15:45.470`) +- [CVE-2025-1025](CVE-2025/CVE-2025-10xx/CVE-2025-1025.json) (`2025-02-05T20:15:45.593`) +- [CVE-2025-21171](CVE-2025/CVE-2025-211xx/CVE-2025-21171.json) (`2025-02-05T20:07:01.797`) +- [CVE-2025-21172](CVE-2025/CVE-2025-211xx/CVE-2025-21172.json) (`2025-02-05T20:03:33.053`) +- [CVE-2025-21173](CVE-2025/CVE-2025-211xx/CVE-2025-21173.json) (`2025-02-05T18:56:08.103`) +- [CVE-2025-21176](CVE-2025/CVE-2025-211xx/CVE-2025-21176.json) (`2025-02-05T19:12:24.030`) +- [CVE-2025-21187](CVE-2025/CVE-2025-211xx/CVE-2025-21187.json) (`2025-02-05T19:14:06.093`) +- [CVE-2025-21313](CVE-2025/CVE-2025-213xx/CVE-2025-21313.json) (`2025-02-05T19:40:54.683`) +- [CVE-2025-21380](CVE-2025/CVE-2025-213xx/CVE-2025-21380.json) (`2025-02-05T19:29:52.457`) +- [CVE-2025-21385](CVE-2025/CVE-2025-213xx/CVE-2025-21385.json) (`2025-02-05T19:32:55.867`) +- [CVE-2025-22205](CVE-2025/CVE-2025-222xx/CVE-2025-22205.json) (`2025-02-05T18:15:30.803`) +- [CVE-2025-23369](CVE-2025/CVE-2025-233xx/CVE-2025-23369.json) (`2025-02-05T19:15:45.747`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 8a31f330b30..b4a003f89bd 100644 --- a/_state.csv +++ b/_state.csv @@ -98563,7 +98563,7 @@ CVE-2017-15146,0,0,4726670f52a0cfceb817ff160f38bc49300a02c152a5230aea58cb0141814 CVE-2017-15147,0,0,e6f45799ccc1528848a9888a27173249ba1dea2f602e5a1aa6206e7b81469c97,2023-11-07T02:39:23.250000 CVE-2017-15148,0,0,054fd44b3516a1ae070b2fd702bd8f69f725d6c2576aed667e60c5ed4c260560,2023-11-07T02:39:23.490000 CVE-2017-15149,0,0,22f2617d6e8c3e9fb139d905a72a161d843d6e6ba1583cd616812aa1efea4a49,2023-11-07T02:39:23.723000 -CVE-2017-1515,0,0,3cc533d0a1c0ac6951eced8cb5659524a909291c2be9e79f539904b2419dc186,2024-11-21T03:22:00.173000 +CVE-2017-1515,0,1,e2ad95df80f4810d1c5b4a32541336b292985363d550f06c886a1983a1dacf56,2025-02-05T18:38:27.383000 CVE-2017-15150,0,0,709f0bd517c0cd293da9a9682ebe07d837012171b97c744b15d0e868f96676ae,2023-11-07T02:39:23.957000 CVE-2017-15151,0,0,97b7456e6f286c9a80c68ce914c23f84225fc27542463e983b8583477e017789,2023-11-07T02:39:24.187000 CVE-2017-15152,0,0,c4f795d92e140fcdc71b3e11f4f595994ee59e2c5543b5f60a57751840247e01,2023-11-07T02:39:24.510000 @@ -98574,7 +98574,7 @@ CVE-2017-15156,0,0,ea9dd56355877bbf6e2a0ac75030deb3d2c852d88008a1919f6cfa8ecabb6 CVE-2017-15157,0,0,94743b3e015728bd543289bbfa300c938070c4714c2b913f69485c2077797b57,2023-11-07T02:39:25.750000 CVE-2017-15158,0,0,94b930aa03a7313635f4130cce6ef9a79a70eca80c212b2b894551be2f0b6a81,2023-11-07T02:39:25.997000 CVE-2017-15159,0,0,f91cc1152d3a2be7da0945208706486a2c0764052da151e5d8f41f5aee42f1c3,2023-11-07T02:39:26.240000 -CVE-2017-1516,0,0,b54c27897a0843544234e3bdcefd611bfc3a768ea26faac7777886ea40bbe681,2024-11-21T03:22:00.320000 +CVE-2017-1516,0,1,4214827d0685d8ca1f2c57d33e9a74516f33883e531c947873df806a9d7f9be8,2025-02-05T18:38:27.383000 CVE-2017-15160,0,0,a92c4c76130ab47aa7e6baf56dfd5e6cd8b38e1854254675a88ac4587d46a21f,2023-11-07T02:39:26.563000 CVE-2017-15161,0,0,6cc7fdb8b8e054b4c19e9317116e2e2fe18e12d3c7b05b7ee22b24a550bdfc33,2023-11-07T02:39:26.813000 CVE-2017-15162,0,0,dd33f0bf79600e3f052f3479a27c1633b74a4b54a9621e6776c94c35522ba3a9,2023-11-07T02:39:27.050000 @@ -98732,7 +98732,7 @@ CVE-2017-15316,0,0,233072da59d4789373465430919bff0ddb72fd9eb070d6863a5efebaf7476 CVE-2017-15317,0,0,a8bc66cb1820e1330f312b2567700ed92fde33a83344e6fdca04587e907d5215,2024-11-21T03:14:27.050000 CVE-2017-15318,0,0,db12bef1ef942c1823ba0929b314d4be72720e09337c647ccf9246f0a9065982,2024-11-21T03:14:27.217000 CVE-2017-15319,0,0,b1957bb9434a1666794c186d7dede1ff3b471669e1bec778805d8a446baa09be,2024-11-21T03:14:27.337000 -CVE-2017-1532,0,0,845240ba54eff11e7b60c9da9bbcffb73ec539f848e0ce31aee92ea32857101d,2024-11-21T03:22:01.727000 +CVE-2017-1532,0,1,9a7ab87804ee1155d2642092febc9874fc54f514feee21d817212f783f56c415,2025-02-05T18:38:27.383000 CVE-2017-15320,0,0,ddde92685d2e7db31960bc38f3c68e2a1410e155aa6c8fccd1d31c3c474e9d8b,2024-11-21T03:14:27.453000 CVE-2017-15321,0,0,2e7af75802862d158ae4f591e5096ac4e55963843c85347dcafe7c0e6e41cc34,2024-11-21T03:14:27.580000 CVE-2017-15322,0,0,ccae5067d56b02f19d27e1489cf42462761c6b1ccfc2b6c97e42e156b57ce8ab,2024-11-21T03:14:27.690000 @@ -98818,7 +98818,7 @@ CVE-2017-15396,0,0,53d843b289ad6202ac44f2b693f7392bf790aa77d919defebba102b77db9c CVE-2017-15397,0,0,8783164afb7cddfd2e6fe82f39ba1cb2fd72034cd635f8320e59ac2a0d4304db,2024-11-21T03:14:37.990000 CVE-2017-15398,0,0,ebc7935508ceb54e8da2a227a7051a36c99c54f2445be73417774ec9e86453ba,2024-11-21T03:14:38.100000 CVE-2017-15399,0,0,136b9104bf1e30d54b4e9185879213da85b07dd9e26ef32b7ee6739b5a7c03a5,2024-11-21T03:14:38.220000 -CVE-2017-1540,0,0,678cfe76ed69f2b9279d3ffc0a83b056fb43981f9c56da9b64f066e7f7b62395,2024-11-21T03:22:02.713000 +CVE-2017-1540,0,1,0cad528731d41d33c0e635c1ac77f58581e9645a08a49507fe90aeb0798aa873,2025-02-05T18:38:27.383000 CVE-2017-15400,0,0,2a58e185aae5afd398d01e170b1f28a878045b703e3d7a0f606455a645709042,2024-11-21T03:14:38.320000 CVE-2017-15401,0,0,343d1a4fab6756a816a81fb9932b82c3826435d12c653e4a13fe71299d4b14d7,2024-11-21T03:14:38.413000 CVE-2017-15402,0,0,0694e9b0865b68836865712b1693958ce4f1e2e482ef38db2a7a698cb8585d74,2024-11-21T03:14:38.510000 @@ -98868,7 +98868,7 @@ CVE-2017-15446,0,0,0f8bc54bf17aa86f42112c6785fa440edc23c51b962fa27aee40062d03a76 CVE-2017-15447,0,0,566bd7469f05d4b92727be8d97448f823434d92d6abaeb2763c3694ebc458b87,2023-11-07T02:39:55.703000 CVE-2017-15448,0,0,05411d6c3ef705833d9895d837f6eb0c3cd382f74b7f1f480cc0091b993eb2c8,2023-11-07T02:39:55.933000 CVE-2017-15449,0,0,4d00ecfe5b1192ea269af4f563dfdb7620b8d2e7859ec9dcf0f668aa15367ef6,2023-11-07T02:39:56.167000 -CVE-2017-1545,0,0,2c744e09235a5eb05fec015a3c46bbec87d787b8780ee4a3e89d588f83cb27f5,2024-11-21T03:22:03.133000 +CVE-2017-1545,0,1,a01f99159a34f149220ebb483a563e429755aae0f2543ccd81be74a7bd1408c4,2025-02-05T18:38:27.383000 CVE-2017-15450,0,0,3572544f7995098e3e473b72380d73f301db81dfbf285da82deb2845425decbd,2023-11-07T02:39:56.427000 CVE-2017-15451,0,0,ed33e7d4dba30795c54ea552ce808825bfbfefaec56cb035545e79983edb73d0,2023-11-07T02:39:56.660000 CVE-2017-15452,0,0,0f5b4de84abd719964a0e85efe0f59910b3cb94c37b64e4d88d8e56617e24332,2023-11-07T02:39:56.900000 @@ -99056,7 +99056,7 @@ CVE-2017-15626,0,0,81366f75729ba19edd136bf53bed64aa3387a2c136fe040697bca19199236 CVE-2017-15627,0,0,3dec56cdf36f77a216cd158c3dbdf2744577439a3ac67f1558a1e4fcc307fa61,2024-11-21T03:14:53.877000 CVE-2017-15628,0,0,c5cca0f5d80c272456ed3882faa2dc784ed9d189923266064e1f2fe26683d6e8,2024-11-21T03:14:54.057000 CVE-2017-15629,0,0,544839a34e06dbd7a796b41dc071230f3de4f4d3842647867214781e55e4b5ba,2024-11-21T03:14:54.237000 -CVE-2017-1563,0,0,f18f24c6d60c8d60cc288330421bc90b3ade794bdeb18984058163da8eb60dab,2024-11-21T03:22:05.263000 +CVE-2017-1563,0,1,b12cf45d3e532127cfe2e1fc63fb261af44496f8836fb6e27161ccfff30af164,2025-02-05T18:38:27.383000 CVE-2017-15630,0,0,4452be9d7e3f34050b86a66bab84082b71ba9f8df8e684a1fae585b3d359bfc3,2024-11-21T03:14:54.407000 CVE-2017-15631,0,0,49f76f78c89653f871e2143209cdf30aa25c07d7a0335ee45bf26f7477bcb59f,2024-11-21T03:14:54.577000 CVE-2017-15632,0,0,5ca3c3619a6007d393f8efb2ed345b1b152278c0327a5c17d43cf75703217203,2024-11-21T03:14:54.737000 @@ -99090,7 +99090,7 @@ CVE-2017-15663,0,0,da543aed2b27557a92c84c1c9b4cbd41bf600b59d571f8ba18597cdfacd19 CVE-2017-15664,0,0,edb03bb534ce98c58a0cad37a458ab9f80ed5afcf53b04c3b61776a3d6713797,2024-11-21T03:14:58.767000 CVE-2017-15665,0,0,d0d7efdf709bba2bd17d0f12f218c524f5f70aa18e74c0eec902d6b1d6493793,2024-11-21T03:14:58.897000 CVE-2017-15667,0,0,01a07f96366b1fba38da677271594501b5bf21d9010e4ec43fac29848eae3ba1,2024-11-21T03:14:59.023000 -CVE-2017-1567,0,0,8765138979f3b7b593d79b3906dbec6a48df9293366e0ebead60be64259ce6df,2024-11-21T03:22:05.657000 +CVE-2017-1567,0,1,f8c873e94af335d63f0ea2ebbfa4c9e4cfd27adf243fe10adc1f7721839aff5f,2025-02-05T18:38:27.383000 CVE-2017-15670,0,0,f21a9616ab3ddeeb519a2470927332caa4a96c83174a735d4e9622dbc26e5e7a,2024-11-21T03:14:59.147000 CVE-2017-15671,0,0,cec108f71f157a56b12f7e48b12a522f03492aef674ea04842d747d3141f852c,2024-11-21T03:14:59.277000 CVE-2017-15672,0,0,8334a87f979b19697085dc59a6ff1a8f11b4544a9e4c27a8ee39535f52e18bf2,2024-11-21T03:14:59.407000 @@ -115259,7 +115259,7 @@ CVE-2018-14564,0,0,0a6d4ee4fb589de68823aefba6fb7202721641c7b234dec582656092a475a CVE-2018-14565,0,0,2c9d9cc2f6647c94e2131e0a472e1dbb0ef610eef43df3deb14297f6d6a24f84,2024-11-21T03:49:19.227000 CVE-2018-14567,0,0,b122cc62da3f97047fa29d4c2b1d04c7916c8e942f08e8551d50e68778236b42,2024-11-21T03:49:19.370000 CVE-2018-14568,0,0,3d8bb785e20fa81de20a0dca401695cb47f6c1b85b23b79196b760ee4f3c31e6,2024-11-21T03:49:19.567000 -CVE-2018-1457,0,0,7bc7a1642a035402ad8a597ec4e33af0031cfe8a1c7fda192142710686eae20c,2024-11-21T03:59:51.440000 +CVE-2018-1457,0,1,e48aa0aae7bbaa98892ecb99df17b6d341273ae7e9fa61949a78b9e0c5c7d6a4,2025-02-05T18:38:27.383000 CVE-2018-14570,0,0,8f8a139eec1011aef2b28cec658b051be035876f98474f510928f221694044c8,2024-11-21T03:49:19.717000 CVE-2018-14572,0,0,5c03f78ac5f44c9d28784f217efbe4010b93f00730f40930f471533ab9d35600,2024-11-21T03:49:19.857000 CVE-2018-14573,0,0,73f8c43e995ba8c219e9789af8d1ec2f3bc96d1c8299beeb87dac6fbe31e6610,2024-11-21T03:49:20.003000 @@ -115590,7 +115590,7 @@ CVE-2018-14928,0,0,61b77f745a4e6dd616dabcb2c06451a47c830ba72cb3deb3c87bf2ede1e9a CVE-2018-14929,0,0,4824c0243639e6f8c90f4709a45411099a2655b382788dc82ceb8fd1b8631c36,2024-11-21T03:50:06.327000 CVE-2018-14930,0,0,4d5cd074875b933a3c692bc1a69e04128c826ce9bc012b0015b7410c031a1fe6,2024-11-21T03:50:06.487000 CVE-2018-14931,0,0,107b578fd111e4508fd67c9caca9e45301bdfd00121447a8272ee24967982ca4,2024-11-21T03:50:06.640000 -CVE-2018-14933,0,0,9992ae200c1dd58db95230cedb2c6abbeff23c29a9b0fed157b1cc6f2b46765a,2024-12-19T02:00:02.193000 +CVE-2018-14933,0,1,14918c5e0af032da093b52e584ba6c4f95b455a7b528d72a4745af02ec47f843,2025-02-05T20:15:32.577000 CVE-2018-14934,0,0,e172bc6c5524e0f83eadd8f654b725a00d996e241ea4e9ad3fc5bb22b4c8062c,2024-11-21T03:50:06.960000 CVE-2018-14935,0,0,82d80a5512c52745b4c735a32ca1d1946cd2948504053efd25a326cc13d2cd58,2024-11-21T03:50:07.120000 CVE-2018-14936,0,0,62c891c2360ebc42fbc2de8eb83420e59085c83b5b2ce1c7f1cbbcb9467c88e2,2024-11-21T03:50:07.277000 @@ -165560,11 +165560,11 @@ CVE-2021-0877,0,0,c2e5cd30d0c477a2e68bc1e7d07537fb61bd5004c669d9456ede730fc55754 CVE-2021-0878,0,0,74054f38cbbca55331fda5f8dd7583715f509e18eeeced7decaee7dd72ee0770,2024-11-21T05:43:12.513000 CVE-2021-0879,0,0,b6d6a2c57e18595dc6074214481ede8a1a3a28cc41d86bfe2d6f3e905f1d0032,2024-11-21T05:43:12.610000 CVE-2021-0880,0,0,4612a9a40bedad3fd32283245ba201e18cb9e0bcf74c0ab05ea53f65dc15f628,2024-11-21T05:43:12.703000 -CVE-2021-0881,0,0,0c083f96b3c53619cd047cbeebf88d6c989b67341c2168c629b593ce9bd2ac02,2024-11-21T05:43:12.800000 -CVE-2021-0882,0,0,7650d0d6547d1f961db1c5dce4fd90b77ea59490680cf662d9f844e0ea2e9423,2024-11-21T05:43:12.890000 -CVE-2021-0883,0,0,33c3e1c07f8eac46b7b85db82737041083b5a5fbadaf81ac0e76297be469483b,2024-11-21T05:43:12.990000 -CVE-2021-0884,0,0,f1729f17948a785fde2f21fbaf39ddd98ae820d665d214a846e47101e3a74e36,2024-11-21T05:43:13.083000 -CVE-2021-0885,0,0,4bd46cfb2db9789432b2eabcb125b1259aa63d1d2b5feab9b077d4006de0e0f6,2024-11-21T05:43:13.173000 +CVE-2021-0881,0,1,535003c42fa4b18cd1e39520b67377ac5238f8afbf2d45cf4cf50b742480b97a,2025-02-05T17:15:11.423000 +CVE-2021-0882,0,1,017614272e7ed61aa1ca48c84e9e66177a4472d360390b44947b277a1a9f3f3b,2025-02-05T17:15:11.620000 +CVE-2021-0883,0,1,75f26bb2c3e8749d2f4f27ed434db706260ffb3906ad27bbc4fe7ebb1413550b,2025-02-05T17:15:11.790000 +CVE-2021-0884,0,1,1af135a9cba4b3ef1f23c3312946caa3cdfb1769f61b645e5eacf74d506c860e,2025-02-05T17:15:11.957000 +CVE-2021-0885,0,1,d252fdee1bdad645be900967d65c41c451bd37bea26c254a823f3de2705584c3,2025-02-05T17:15:12.127000 CVE-2021-0887,0,0,30af602086c59609177ac00ba70a2df2c506e8aa3ad6e66f80079900d9da85fb,2024-11-21T05:43:13.267000 CVE-2021-0889,0,0,1b601c4f3f1a033310534128fdcbdc3d6e9f5ab5e14be3d8c399caa2b35f1b82,2024-11-21T05:43:13.360000 CVE-2021-0891,0,0,285de275d93c5b041ab76f9c8be646b0fa7d5d3fa340dd07dd50ec25ba394dbd,2024-11-21T05:43:13.460000 @@ -169636,7 +169636,7 @@ CVE-2021-2316,0,0,a23d88249dd93c4512cae696dd0c9b07cafce14d6f7c9e361fd2fff9775b74 CVE-2021-23161,0,0,2f50b71a9c98702a51d1566f0f8a274cf30984c0d40bf270c850781a880f0302,2023-11-07T03:30:48.733000 CVE-2021-23162,0,0,33dca7fe1269ac57533d0b12e6ce85b2882b9db8fc452157e3d7a5b90f802fc4,2024-11-21T05:51:18.327000 CVE-2021-23163,0,0,16f75e585ea92d6fd5d601b2b5c2cf48c7b05798a264585dfa883820d28d2b94,2024-11-21T05:51:18.443000 -CVE-2021-23165,0,0,796dcf44671f9a610a74ce853ea664c195aa1143c1ddb7f2f19e8577d8a104c1,2024-11-21T05:51:18.590000 +CVE-2021-23165,0,1,26661d71dafc074b90bff71a4444b552df2ba235b4d224b157fd5b1e4104f9dc,2025-02-05T20:25:25.763000 CVE-2021-23166,0,0,11a860d8096e10a126a41cc82c2020278ddd9b98bac2e4b5824627b189336f63,2025-02-03T18:15:26.993000 CVE-2021-23167,0,0,80f6801f32ecdc1c5ab51f4ddc7bc38fd06df457deb0789a7328f5e5cf251a17,2024-11-21T05:51:18.867000 CVE-2021-23168,0,0,a657db069ab86784018507f9fcf2c1bbbd6eeddca014e7993308e43fed523c0a,2024-11-21T05:51:18.990000 @@ -177656,12 +177656,12 @@ CVE-2021-33963,0,0,399ae6fcc70e92dfd40d581a71f5bba2132642cc9bf9efc43aea8f4250bbd CVE-2021-33964,0,0,d03c8b7308eb4c43756fa9cfc91a997a542017539a7eddbe58e9d2b596ab805f,2024-11-21T06:09:49.017000 CVE-2021-33965,0,0,a24075cb309f2baae6953de3a0bdff06fa687f01c5ada10807226605824cee39,2024-11-21T06:09:49.180000 CVE-2021-33966,0,0,7360cd5c9e95a6164a94da5437c386b3c138cf7fa2cb9cb4e87ad2bad25a1366,2024-11-21T06:09:49.357000 -CVE-2021-33970,0,0,35b81a23ac038231809d57fd37eff6a43ee57d597be87fbfd50a6028a82b2c1b,2024-11-21T06:09:49.520000 -CVE-2021-33971,0,0,c21853cf7ad13eb9e3b7fa317caaf0b245e880eeff5ea133180897e94b3f1674,2024-11-21T06:09:49.683000 -CVE-2021-33972,0,0,f8b909db70eff09c3367b9c968cb1798d941e5ee0236b7e91c9957567ed72f3c,2024-11-21T06:09:49.850000 -CVE-2021-33973,0,1,6df153e7aa768b2637d3b38e4731e02e3e7caabd829b1b810b19e39d49a7fa89,2025-02-05T16:15:29.713000 -CVE-2021-33974,0,1,6258276ddfeeb050bdb65986e5dc9c4f407aa4ddcc91b68151bc87e90c49bdce,2025-02-05T16:15:30.683000 -CVE-2021-33975,0,1,e11e23a06b0bd6a7cbf6a6b9ba00dd95692dc5a01e87a17dfdeac9e031a877c2,2025-02-05T16:15:30.840000 +CVE-2021-33970,0,1,07288c4565e1fff52a9eb0fb7e177231ae55e59b6f7d0a9022b01c6eb270d4e9,2025-02-05T17:15:12.300000 +CVE-2021-33971,0,1,e3f66dde71b919a0d327de6b0265f798a17b7eeb9586001c52c85777509cdbc5,2025-02-05T17:15:12.473000 +CVE-2021-33972,0,1,6d6ea42476dc03335527094532a006f10d186bdcbd21bfb337905740b28f21b5,2025-02-05T17:15:12.647000 +CVE-2021-33973,0,0,6df153e7aa768b2637d3b38e4731e02e3e7caabd829b1b810b19e39d49a7fa89,2025-02-05T16:15:29.713000 +CVE-2021-33974,0,0,6258276ddfeeb050bdb65986e5dc9c4f407aa4ddcc91b68151bc87e90c49bdce,2025-02-05T16:15:30.683000 +CVE-2021-33975,0,0,e11e23a06b0bd6a7cbf6a6b9ba00dd95692dc5a01e87a17dfdeac9e031a877c2,2025-02-05T16:15:30.840000 CVE-2021-3398,0,0,b391ffef680ab3d1905a68d8f8aecb236461bb9918cd6106beee89927d9b4de8,2024-11-21T06:21:24.870000 CVE-2021-33981,0,0,e1a376d67ed045fff4ddc87e8da805c3289fac28b1e753c252da3bf96e4082cf,2024-11-21T06:09:50.533000 CVE-2021-33982,0,0,73ee637a13a25d30906d76f31b7a03a5e635870553587c3bfe929fd8a9bffe1b,2024-11-21T06:09:50.697000 @@ -177780,7 +177780,7 @@ CVE-2021-34272,0,0,687367d535117e12ff04b890fbb761253939ae5c2eb75eb14a08db0382e48 CVE-2021-34273,0,0,82d1f44905eb48fa50e15a31f8f7439960786ed3115483d332707158b6878212,2024-11-21T06:10:05.220000 CVE-2021-3428,0,0,593b59f904d0b8df56ea845a86495cc7df61ac1a2022288c5bd510b8adf4ab97,2024-11-21T06:21:29.090000 CVE-2021-34280,0,0,b6f4eab497f8c887e77dff0ad4d3ea984286e107ea3ffa33578a871685eeaea2,2024-11-21T06:10:05.380000 -CVE-2021-3429,0,1,d58dd3b3752d5aae8888cf1e94cb3beeb23d74e079178ba80d170c9f426677c3,2025-02-05T15:15:13.403000 +CVE-2021-3429,0,0,d58dd3b3752d5aae8888cf1e94cb3beeb23d74e079178ba80d170c9f426677c3,2025-02-05T15:15:13.403000 CVE-2021-34291,0,0,9395dbd0581d6fe39bfec13e208d875c33305c3170e8b6de7ad0924902bffd0f,2024-11-21T06:10:05.550000 CVE-2021-34292,0,0,fef3b7a581303b7fb0a7fef076d54b44b82e8db5cfcfb4c41acbee0cdb7c2f5b,2024-11-21T06:10:05.687000 CVE-2021-34293,0,0,87aaa152fa1efc4f260680a4c8ed17fcc4e44fcca6556883ee53ad26a7cef405,2024-11-21T06:10:05.823000 @@ -179435,7 +179435,7 @@ CVE-2021-36431,0,0,dd980866339285a0e770a4296a2666c7f5c57c0e349ee78c84252d51e489f CVE-2021-36432,0,0,b37984df9db52d2bd66aa10100f8933b261363b20641353ad6f84a82a7830328,2024-11-21T06:13:43.363000 CVE-2021-36433,0,0,aac3c9d7495a17ab366c45c129759322ca8cdca3f1c00bbf1a3ee1c7ff798ced,2024-11-21T06:13:43.520000 CVE-2021-36434,0,0,d2ae3f893ec887e63fa856256382b477d3cc05e48501056e61a807f63bb1af18,2024-11-21T06:13:43.670000 -CVE-2021-36436,0,1,541d329644c2b195cf6e58dfd1f4605dd5353ff3a17a5666b7053816a501ce32,2025-02-05T16:15:31.020000 +CVE-2021-36436,0,0,541d329644c2b195cf6e58dfd1f4605dd5353ff3a17a5666b7053816a501ce32,2025-02-05T16:15:31.020000 CVE-2021-3644,0,0,250cf98a3afb2f4af3360c6b3998b3611c6a3ce2920203518e15bc134a8ef562,2024-11-21T06:22:03.773000 CVE-2021-36440,0,0,65ad1ff1d489c55b079782b6d9c407ff5014352bd9a1f367d180a09151e3018f,2024-11-21T06:13:43.990000 CVE-2021-36443,0,0,c12e55d8ba6e2b3e43cfe16c8e4558bc6a63ff06e8442bc8916ee63891be051e,2024-11-21T06:13:44.180000 @@ -180853,8 +180853,8 @@ CVE-2021-3836,0,0,2adcd758d8695751fdd75ef1c7fba8d4c245523cc0afce8e48294d59aa7851 CVE-2021-38360,0,0,5bb608df07705e170113198b11eaf97ee9ac91ec1c4659faf0e7648682d7b0bb,2024-11-21T06:16:54.003000 CVE-2021-38361,0,0,968492a37c34ab1e44b78b1fc88e9ffbf2fe41a386627a189488397b55b2748d,2024-11-21T06:16:54.167000 CVE-2021-38362,0,0,64dae6e23b3480341a8da9701fec804cf3af99d9bce02cb4e812bd7e40080ec9,2024-11-21T06:16:54.317000 -CVE-2021-38363,0,1,f4a8db0e2447888bbc96ea284fc256fe1e4e09b7c464644aa693340bb2b6bc01,2025-02-05T16:15:31.203000 -CVE-2021-38364,0,1,4615154dc756670c49a549c5a4b09ec584b627b90026f3a93bec5255cfa2bc15,2025-02-05T16:15:31.367000 +CVE-2021-38363,0,0,f4a8db0e2447888bbc96ea284fc256fe1e4e09b7c464644aa693340bb2b6bc01,2025-02-05T16:15:31.203000 +CVE-2021-38364,0,0,4615154dc756670c49a549c5a4b09ec584b627b90026f3a93bec5255cfa2bc15,2025-02-05T16:15:31.367000 CVE-2021-38365,0,0,2cac2530d3d0fb7ddfc46ba45b5f2d6eba88e0a30f3e503b8875a90e909e0e3e,2024-11-21T06:16:54.830000 CVE-2021-38366,0,0,0150ba9d76dee32d5f47b033c995353ba89d590f66926e8693a3b9c980bd51fa,2024-11-21T06:16:55.003000 CVE-2021-3837,0,0,a891b73ce1c0ffa1881c4e1c5f5c245af50674852d09fa7ed8f17851e2e736ec,2024-11-21T06:22:36.013000 @@ -185068,7 +185068,7 @@ CVE-2021-43815,0,0,301d7fbb2e8179b6f9fc3a7c9f8e147ed8f86586a345e47e8b77e190729f0 CVE-2021-43816,0,0,f66593cb57e7e47939c473057cef1646f3f8f852e90d0929288cd00cbf970374,2024-11-21T06:29:51.197000 CVE-2021-43817,0,0,481e7fd764eba06ec20887e0926e3c4ac8929aaae13fe10321541557a214891d,2024-11-21T06:29:51.367000 CVE-2021-43818,0,0,1b9a52536395b70f5d212f539c5e9b702ba44add51878fbd45a3e5b6aec57531,2024-11-21T06:29:51.497000 -CVE-2021-43819,0,1,882fb9c1d13187d25e038f90dec4305f96903ac21cde1461d4f3b8d30df6f593,2025-02-05T15:15:14.383000 +CVE-2021-43819,0,0,882fb9c1d13187d25e038f90dec4305f96903ac21cde1461d4f3b8d30df6f593,2025-02-05T15:15:14.383000 CVE-2021-4382,0,0,92ac30b501103af640af7a78417f75a398103d3fb6fbdf1fd766e5dea24ec7de,2024-11-21T06:37:33.457000 CVE-2021-43820,0,0,9ba0ad89eb01342d49b346f3a7b08504d4762c3ea2ab805bfd3c1ded1011575e,2024-11-21T06:29:51.850000 CVE-2021-43821,0,0,f48a32b620871a6bdb1747cfb3e0febd9cbdd02a25dde0829467dffc221937b8,2024-11-21T06:29:51.980000 @@ -190630,7 +190630,7 @@ CVE-2022-20836,0,0,adbd9b97dae73fc9e2b8566d8c9fd05a36cf52c2519165e4d1343a016d0ac CVE-2022-20837,0,0,f4b2c9dfb7270a641538d2b9d4a185b6890bacb0577c731623e4a6746a125fd4,2024-11-21T06:43:39.510000 CVE-2022-20838,0,0,890756cf2c941b5615293c8dc97a4d82a5e6422e035a0dfaca924881cba7c133,2024-11-26T16:09:02.407000 CVE-2022-20839,0,0,15286b2f1bd0eb29431ede447fe902f04b156038fe9651dda77f98d56599a13a,2024-11-26T16:09:02.407000 -CVE-2022-2084,0,1,1cefc03b38831364a787aba51f49609d1d6385d4f9e99f2f15718fe722b8972e,2025-02-05T15:15:15.360000 +CVE-2022-2084,0,0,1cefc03b38831364a787aba51f49609d1d6385d4f9e99f2f15718fe722b8972e,2025-02-05T15:15:15.360000 CVE-2022-20840,0,0,3b682d7c8037b4217dd35c01bd552562400c1ca4512d8543478a063432640a5a,2024-11-26T16:09:02.407000 CVE-2022-20841,0,0,d6df8ac2c84f71ca2271d75e5e90f20e7c063b7e3a29e67af67be516c70a8f0a,2024-11-21T06:43:39.987000 CVE-2022-20842,0,0,a7044125e80147765c1a1a7dc84df5a4059ac528e7056e589007a277d30fb342,2024-11-21T06:43:40.107000 @@ -193540,7 +193540,7 @@ CVE-2022-2403,0,0,1d0e827622033d3a8fff79c292e9fcaae9c30d2fdd4b51e29bbce9c8c44884 CVE-2022-24030,0,0,336eea125133b61bf6a13c85c6d7d1907b8b67fc4958e8695d7452fe675367d7,2024-11-21T06:49:41.630000 CVE-2022-24031,0,0,e57567aaa5d26e445b9c211ea0ec50051a325bc3244219529d40022a400d817c,2024-11-21T06:49:41.807000 CVE-2022-24032,0,0,914d826c8ffbe76761a442516e7359a9fc016e12b6693fbf8c87f0ca86e09393,2024-11-21T06:49:41.960000 -CVE-2022-24035,0,1,cfc402cbf596953ed97823cf6f40ce779cebd6b17e71ef18e00fba723424935e,2025-02-05T16:15:31.533000 +CVE-2022-24035,0,0,cfc402cbf596953ed97823cf6f40ce779cebd6b17e71ef18e00fba723424935e,2025-02-05T16:15:31.533000 CVE-2022-24036,0,0,a1e61b8d65cc31cbcb55cb59b95f03675c562c8e0a423866b783cc03b110b0a3,2024-11-21T06:49:42.260000 CVE-2022-24037,0,0,ad1705adeaa15e52ce1d1a38f4f30aeb2b621e88c1c5d6a79d16a71ed271c902,2024-11-21T06:49:42.400000 CVE-2022-24038,0,0,496f00938f969487e034b5164ceb8aed16d0bd9b786ddfa4e94167b9f5113e3c,2024-11-21T06:49:42.530000 @@ -193606,7 +193606,7 @@ CVE-2022-24105,0,0,b2ddf475eb756522bb2b5b21e7aef9850106eab198d36fddf332bb5a751ad CVE-2022-24106,0,0,a809b1eb2caccce4a068d54fe24a379062bd8f870287251f05170dd3508f59c7,2024-11-21T06:49:48.917000 CVE-2022-24107,0,0,2422f1dd15f3d0a3d5b0069afd41b63d004e4d992bff789bcc27aef557c9207c,2024-11-21T06:49:49.070000 CVE-2022-24108,0,0,f9d21305d469680469d960692a119e017c84dc089b689eabbcf984b90a6432aa,2024-11-21T06:49:49.213000 -CVE-2022-24109,0,1,a3de6fcc683c4c7b24080380d7f925454da13c54d2235023ab88990cec1321ef,2025-02-05T16:15:31.740000 +CVE-2022-24109,0,0,a3de6fcc683c4c7b24080380d7f925454da13c54d2235023ab88990cec1321ef,2025-02-05T16:15:31.740000 CVE-2022-2411,0,0,ca9c83615b5a4bd566bcb71d857b9368ab54551d81d57dcdfb30e5919176e56c,2024-11-21T07:00:56.170000 CVE-2022-24110,0,0,65f3dde568ed3390fbba963d442b71ce7e2da467bfd1ead012e4e3a6bacd3f5a,2024-11-21T06:49:49.510000 CVE-2022-24111,0,0,fd2ffe0efb98d197c7531f3defe6abfe786dae537f59e2e8e8e77681cf8e5e19,2024-11-21T06:49:49.657000 @@ -194478,7 +194478,7 @@ CVE-2022-25061,0,0,291eab7923a1606a12b650199f4a3210931e3abb1a7455baade12165bd6b1 CVE-2022-25062,0,0,5530dfa6765af53cb9cb19a149b362ddaeacfbe1183e9913eaa03982b019a080,2024-11-21T06:51:36.067000 CVE-2022-25064,0,0,2859cd803467041f7660422bbfc3595504adb00faef0c5d106113a807c997107,2024-11-21T06:51:36.190000 CVE-2022-25069,0,0,da7696b6b9035f9702d7f2d41aa29d7fb50c3bea419840ebdb531591d937c859,2024-11-21T06:51:36.317000 -CVE-2022-2507,0,1,d030a1f14212ccf0988efbb8cf40bbe31303aea8782f36cc70a575bb15bd73f0,2025-02-05T16:15:32.950000 +CVE-2022-2507,0,0,d030a1f14212ccf0988efbb8cf40bbe31303aea8782f36cc70a575bb15bd73f0,2025-02-05T16:15:32.950000 CVE-2022-25072,0,0,489dd12311a6814467a4b1f14d3efcc96816d038bbf79d058f97aba3d9e43bd4,2024-11-21T06:51:36.447000 CVE-2022-25073,0,0,609096eb137182b6b62fbb769d41889f31c3e226956cbbf5323bba1caa358207,2024-11-21T06:51:36.573000 CVE-2022-25074,0,0,12a3058a43ad73c41b279db28b09969a3e98c0761709646a75d347a15017ddf1,2024-11-21T06:51:36.700000 @@ -195204,7 +195204,7 @@ CVE-2022-25912,0,0,d88f9a3d6240b92cbcfbda23fbd5c317b40840120cc8b3a5102a07f98561f CVE-2022-25914,0,0,ea85b3d20fcdba40e98a1f2cdcd647c8276d14d85844e934ba691037c0cb5188,2024-11-21T06:53:12.377000 CVE-2022-25915,0,0,5aa003b7e1f84307c964e23607671f46a7f7788a33952f993ccefd1f2966489a,2024-11-21T06:53:12.477000 CVE-2022-25916,0,0,51bc212d2cf21d9ecefeb0ff518bc4557dc9aad9ab03dcb986ad88daa438fe07,2024-11-21T06:53:12.607000 -CVE-2022-25917,0,1,9bd770e6850cc2e12264df689badff3efaa99220946ea2457a30300e0f4a7b1c,2025-02-05T16:15:31.900000 +CVE-2022-25917,0,0,9bd770e6850cc2e12264df689badff3efaa99220946ea2457a30300e0f4a7b1c,2025-02-05T16:15:31.900000 CVE-2022-25918,0,0,5abdd79e3aeb73251d14e5cb37af630394f5b15ca4a330d3b60e2080daf91698,2024-11-21T06:53:12.840000 CVE-2022-2592,0,0,40cb734077644b941ec8702ba654ad6b21b7e972565529118853c5120586b075,2024-11-21T07:01:18.747000 CVE-2022-25920,0,0,66d9c2abde03e238bc19825aae4ee75ced60aa5e228ae6eaf08c2f0c78540ed4,2023-11-07T03:44:53.053000 @@ -195256,7 +195256,7 @@ CVE-2022-25997,0,0,35277f50a4fb7bf7b30c477e07f0063c974c344f17b8d570ec86d7625d676 CVE-2022-25999,0,0,40607a236352932b1269d125a25bac1f8c6eeaa640e8a8a58360d6b3c062c46c,2024-11-21T06:53:18.470000 CVE-2022-2600,0,0,264fddcd8f1b4e556dea4fbb256e425a933b489baad0b39d70559c897f38c5d8,2024-11-21T07:01:19.753000 CVE-2022-26002,0,0,d7861731a9f3d87798c2c282845d50485b15aea5c00b6903e4cd292543f9e861,2024-11-21T06:53:18.573000 -CVE-2022-26006,0,1,7fa9d6a460eedd58cbfd7c7f56551d68d11ce8134bd0d3f01b814092fb798c1e,2025-02-05T15:15:14.610000 +CVE-2022-26006,0,0,7fa9d6a460eedd58cbfd7c7f56551d68d11ce8134bd0d3f01b814092fb798c1e,2025-02-05T15:15:14.610000 CVE-2022-26007,0,0,26f9f1f1ed8811c95394b4d9c2acd0fd512fedcba66036cffe13d19b6666b434,2024-11-21T06:53:18.943000 CVE-2022-26009,0,0,1852fe28e1a116c9cd34f4903254bbbe8a4d4cc068beaf38dccf66b5f389484a,2024-11-21T06:53:19.070000 CVE-2022-2601,0,0,1e64e42927fb64c8d33c7df7b3e39a579057e1345fd53b91cf1732746443469b,2024-11-21T07:01:19.873000 @@ -195355,7 +195355,7 @@ CVE-2022-26120,0,0,488a8cbc8048a3ec36dd6741bcecd09fa9b680c4d31398c505d6293418700 CVE-2022-26121,0,0,b646864faa9ba3f2abfed6eff503a8d81d264b4e645770dc72052d9f24ed6164,2024-11-21T06:53:28.427000 CVE-2022-26122,0,0,8d463869b219c649d1276b874c9c8304170b2948ab4f2d8bf269c24f80b5522b,2024-11-21T06:53:28.560000 CVE-2022-26123,0,0,ba8a4869a7e0224496c783469ec06573e81b62d874a435bc2876fc86b9dee7a3,2023-11-07T03:44:55.963000 -CVE-2022-26124,0,1,071fdf188fd8627dcf9c247fd1a5604082a08ac442ff1be0c3b31ad0f2525127,2025-02-05T16:15:32.047000 +CVE-2022-26124,0,0,071fdf188fd8627dcf9c247fd1a5604082a08ac442ff1be0c3b31ad0f2525127,2025-02-05T16:15:32.047000 CVE-2022-26125,0,0,92502c97f9332d2cf295ff80ed684e69abd2dab7f5abe18c72381fd486b734ba,2024-11-21T06:53:28.813000 CVE-2022-26126,0,0,ff4525f8dfad8cd4c23ec3852303d237580f210c229cca65aba0d6259d5b6ae8,2024-11-21T06:53:29.007000 CVE-2022-26127,0,0,4e422056d34a0813e3ecdb26c70a36272d39edd1c35c1f9e92c9a8db23ec4257,2024-11-21T06:53:29.123000 @@ -196883,7 +196883,7 @@ CVE-2022-2808,0,0,8cb393fbd964c78b53277356a9ce5a7f26e6f9d942913d8799159edec502c8 CVE-2022-28080,0,0,8dd5bc9cfa6313033dc42e729c1302d9ac6a420e09c78d0117be47fa9bda3e09,2024-11-21T06:56:44.230000 CVE-2022-28081,0,0,56f5c03690572fdd2a6693d1aee618b4f10fb848a235b3bd6c85460736f80e1d,2024-11-21T06:56:44.383000 CVE-2022-28082,0,0,b33b9104697421a6c69a7d8e324e1cab4cf0a0e346bced1bd90707e8ad5448b2,2024-11-21T06:56:44.523000 -CVE-2022-28085,0,0,6e279171d63d8f8225689967f416b3e9ab88526449e04d3cbdb182b09dd7e9cc,2024-11-21T06:56:44.667000 +CVE-2022-28085,0,1,ebf536d995e3183c94ebcf015a992b30492116b15d28c7c728e9204d9b8e276c,2025-02-05T20:23:24.330000 CVE-2022-2809,0,0,333b7881df730dcca078e3220f684da862b6c6e598177082888a55ef95199ea3,2024-11-21T07:01:44.037000 CVE-2022-28090,0,0,fa673191cc4cdb108f29fb9a091b28a990854579151029327f5fccb3d23f5577,2024-11-21T06:56:44.810000 CVE-2022-28093,0,0,5f79503b2d5adeff57d5f3e51dc37f354e020fdda1ff21326cf9df85492c08a1,2024-11-21T06:56:44.947000 @@ -198164,12 +198164,12 @@ CVE-2022-29600,0,0,499a8c792e8f887eeb8b56831fb3b803cbd812cde5f8b07c2ff8beff827e6 CVE-2022-29601,0,0,6ae6cf3c601bdf661e831e477e3dc8bc750a32e77aa52802cc64f6a1dddb0ae2,2024-11-21T06:59:24.217000 CVE-2022-29602,0,0,0c9377fb122f5ba5cc58df721e4c4ed19108432dce21d0155ac5619c1b04b13d,2024-11-21T06:59:24.367000 CVE-2022-29603,0,0,ace97aca25636530591099b1ed3c09b5beacb6da211fa0a0b7b280a1e1a4c864,2024-11-21T06:59:24.513000 -CVE-2022-29604,0,1,a52f062f0ceb72fe188e9ff2ac0131c6c60a7b659cedae5364cdd11add3fb96e,2025-02-05T16:15:32.197000 -CVE-2022-29605,0,1,3fc8550f7f96f3a2dc859bdbd22012c92484cf217e1cd97b58cb11ff314a7069,2025-02-05T16:15:32.353000 -CVE-2022-29606,0,1,6d26ba5fd5a16c6e0310d6d4bcc4484c2d900a111cb9b22bdba34aa67feb1ed9,2025-02-05T15:15:14.930000 -CVE-2022-29607,0,1,9ed184e4f37793e405507c3e3d25b7e6993f83eebf60111ebe89ecdfb302962b,2025-02-05T15:15:15.180000 -CVE-2022-29608,0,1,bf1c4ba0a81687247e99451e0ab3cd1381065e6d815a93ade641a104a5d6ef59,2025-02-05T16:15:32.500000 -CVE-2022-29609,0,1,8516e4462a21b8f7143a92e82ba476e4f72d755633ddb5de5df0773dc0a43a21,2025-02-05T16:15:32.643000 +CVE-2022-29604,0,0,a52f062f0ceb72fe188e9ff2ac0131c6c60a7b659cedae5364cdd11add3fb96e,2025-02-05T16:15:32.197000 +CVE-2022-29605,0,0,3fc8550f7f96f3a2dc859bdbd22012c92484cf217e1cd97b58cb11ff314a7069,2025-02-05T16:15:32.353000 +CVE-2022-29606,0,0,6d26ba5fd5a16c6e0310d6d4bcc4484c2d900a111cb9b22bdba34aa67feb1ed9,2025-02-05T15:15:14.930000 +CVE-2022-29607,0,0,9ed184e4f37793e405507c3e3d25b7e6993f83eebf60111ebe89ecdfb302962b,2025-02-05T15:15:15.180000 +CVE-2022-29608,0,0,bf1c4ba0a81687247e99451e0ab3cd1381065e6d815a93ade641a104a5d6ef59,2025-02-05T16:15:32.500000 +CVE-2022-29609,0,0,8516e4462a21b8f7143a92e82ba476e4f72d755633ddb5de5df0773dc0a43a21,2025-02-05T16:15:32.643000 CVE-2022-2961,0,0,3017553ebc29538861b85fa08ab7b268bb69d752bcd7fb66d60020259e7dca73,2024-11-21T07:01:59.550000 CVE-2022-29610,0,0,58f8880673c20ada99ecd4c26acc9aaa1058cc263d71253377657e0782c3dd38,2024-11-21T06:59:25.557000 CVE-2022-29611,0,0,f0f87d81739c83ad0430d8a9a6797de3c1af9893c6e6dfd5de24ce46f8225109,2024-11-21T06:59:25.690000 @@ -198447,7 +198447,7 @@ CVE-2022-29939,0,0,c98e6d3ecd0c5bcce6dea71378f025c8a9108195fe4377a4fc1b6232889fe CVE-2022-29940,0,0,ea4661bc4396dbff672185d660fd6a6104072e0200ec64ae63e13fbf6cd064c3,2024-11-21T07:00:01.120000 CVE-2022-29942,0,0,2cd10de932bf460bc174313b1bd36adb46f24898c547fe9c58dd4824dcf22c97,2024-11-21T07:00:01.303000 CVE-2022-29943,0,0,29016e5c2ac5e1b2903e42a2879f9958163cc75e10da20e7c727182f9a5af20a,2024-11-21T07:00:01.470000 -CVE-2022-29944,0,1,162ff00a060694521c7b94c295f26397dde7db164fe54ba681995dc341dc05d3,2025-02-05T16:15:32.793000 +CVE-2022-29944,0,0,162ff00a060694521c7b94c295f26397dde7db164fe54ba681995dc341dc05d3,2025-02-05T16:15:32.793000 CVE-2022-29945,0,0,6cd6929ae5d7d796a1cf15c81027937a958e132c7df306827ad70a21f73b4edb,2024-11-21T07:00:01.837000 CVE-2022-29946,0,0,4dfd9c004cc309754554eda091fc57618a712144f93bc71580f52901a18edab0,2024-11-21T07:00:02.060000 CVE-2022-29947,0,0,f6bdf0e939771c3cd44f24bb9e6a40171fdbe804fcaf02d5f491727c24aa394d,2024-11-21T07:00:02.390000 @@ -198911,7 +198911,7 @@ CVE-2022-30539,0,0,6de0ff451e08ea02063a403ecfcd28e8f81720707407e28d3dc10f6ec730c CVE-2022-3054,0,0,21cdb342b3423460ac9c006e078d428093f80e0b4c7b63e2e3dc91ff35d2a323,2024-11-21T07:18:43.610000 CVE-2022-30540,0,0,2cf74e767999fd6e8266858159641d36af43c7b50cae59e97e42c2977746c821,2024-11-21T07:02:54.340000 CVE-2022-30541,0,0,d7cd03422c600fb4a72b551fa021b51c20c774e21629dfbfdbf273a6df02d75e,2024-11-21T07:02:54.453000 -CVE-2022-30542,0,1,d6e172fbf7eefdba6f597f0095590e67ae3e7612872ef43db5e8bb9559708062,2025-02-05T16:15:33.117000 +CVE-2022-30542,0,0,d6e172fbf7eefdba6f597f0095590e67ae3e7612872ef43db5e8bb9559708062,2025-02-05T16:15:33.117000 CVE-2022-30543,0,0,5b3805bc734cd37e66db9412aaafd8b0b1023167e76f677b7727ff4ca4f17c15,2024-11-21T07:02:54.673000 CVE-2022-30544,0,0,6e8e918c8bd0c218d5e596f55771bae678d0748c98af7fe527afb3b972f6700b,2024-11-21T07:02:54.787000 CVE-2022-30545,0,0,faed0fda1dfe53c56cecaaa7a53839c303f673177aa6afba0e8523c6e9d26279,2024-11-21T07:02:54.907000 @@ -202721,7 +202721,7 @@ CVE-2022-35271,0,0,d168a4033007141ef70171d95fb9afdaa94928ae161e83dec98375917524b CVE-2022-35272,0,0,46149a72a17ed0d8ff2971d2569a05c127fbf9ebee96d46442b1a0f11b9010df,2024-11-21T07:11:01.107000 CVE-2022-35273,0,0,22a022b6f31aeeccfdb14d3bbb32f74b070f1f6246a40bfd4f10787af4cd8e2b,2024-11-21T07:11:01.247000 CVE-2022-35275,0,0,f14c5b6159a60e943bc70125c85a47d15021a8775709c083a89bdb6642fa8ac0,2024-11-21T07:11:01.370000 -CVE-2022-35276,0,1,248e1e1c35d5efe71aa5ae3133edc4e3304991d4216f932be2d4699c6beada66,2025-02-05T16:15:33.267000 +CVE-2022-35276,0,0,248e1e1c35d5efe71aa5ae3133edc4e3304991d4216f932be2d4699c6beada66,2025-02-05T16:15:33.267000 CVE-2022-35277,0,0,663526ef14faebb63fefcb2b2c2f14d7d4e0fb96f36a16c78723694a6f8049eb,2024-11-21T07:11:01.643000 CVE-2022-35278,0,0,b79b24f5e2a6f2db4c9b8a06b12b67a2092db1cd2bd98064021d2ab482a7f2da,2024-11-21T07:11:01.790000 CVE-2022-35279,0,0,7fd29786b39213c40302dc036075bb4e6190838313f4fd655752b7c2ce89827f,2024-11-21T07:11:01.907000 @@ -203681,7 +203681,7 @@ CVE-2022-36367,0,0,7aee8f81253bb9f2364456f661409f9f1fc1076b0ce0074ffe29efde1b946 CVE-2022-36368,0,0,aea771b74846f71d82791aeabb9f2f76284263becc91eb7a68a14204f8c4c540,2024-11-21T07:12:52.913000 CVE-2022-36369,0,0,4a41f5530fc2cf5a85e15a18fe5e7bc42061754c9bfbbb407bbd4f36f8f8381d,2024-11-21T07:12:53.050000 CVE-2022-3637,0,0,2d05d902ee5480bbc48566957a7678ff3814cc70da1f6df617e3c2676ea143a6,2024-11-21T07:19:56.033000 -CVE-2022-36370,0,1,e42293718db78427195b939de3e0d16f197ae1c5a567e6d52bb1f0a0df108b59,2025-02-05T16:15:33.420000 +CVE-2022-36370,0,0,e42293718db78427195b939de3e0d16f197ae1c5a567e6d52bb1f0a0df108b59,2025-02-05T16:15:33.420000 CVE-2022-36372,0,0,5ef3d9db285228c54cc7006f10fcb133227eecdf84b961fe76324df5e63843e2,2024-11-21T07:12:53.297000 CVE-2022-36373,0,0,933f458e341daa18154d7342f71386b4178fbee79ffac73c92da7281b0eb9a75,2024-11-21T07:12:53.470000 CVE-2022-36374,0,0,03409a4bc977da61804a4f013290c3498e15f506763b0c03f3ac1d5b47f8a3bd,2024-11-21T07:12:53.603000 @@ -204476,7 +204476,7 @@ CVE-2022-37330,0,0,46eab85058d85b71ce0fa9ac9a3e642cacbfdbbabf5e89202bb26a669be89 CVE-2022-37331,0,0,cbd63f2773542f18cc5c54590e1d6908b9c39e3f757ba7e2b95d8ed8618f2817,2024-11-21T07:14:46.270000 CVE-2022-37332,0,0,6b22afdfbe1bf7d1aa3c1a5555e3e86884b08fd766bdc03dd4a138a88c0ee0d2,2024-11-21T07:14:46.427000 CVE-2022-37333,0,0,fe2671cab527a70387234c6d998e7be28f9a2d6ef392ddeb5aae43a80ab2dba3,2024-11-21T07:14:46.550000 -CVE-2022-37334,0,1,323b2da06bc50bf5a469ba4e23541e0f52d47ae844100ba9ec8923437730c7d8,2025-02-05T16:15:33.637000 +CVE-2022-37334,0,0,323b2da06bc50bf5a469ba4e23541e0f52d47ae844100ba9ec8923437730c7d8,2025-02-05T16:15:33.637000 CVE-2022-37335,0,0,87bef3c7ee9cbf4d2925542b7050588718f69467fef9cfc27a33958a2cf0c2c7,2024-11-21T07:14:46.810000 CVE-2022-37336,0,0,a44f26cfdfa5b5bc6717bf21e37ba07f453a8834774401760c5031e3764b3a5c,2024-11-21T07:14:46.933000 CVE-2022-37337,0,0,eb7946c138a2737241559cdeaea6291adb83bc58d910be3afcc062ce54cef528,2024-11-21T07:14:47.110000 @@ -204997,7 +204997,7 @@ CVE-2022-38121,0,0,82ef8183f270dc9344b63a369a93f0adf11f2a271b3047653515fadab35da CVE-2022-38122,0,0,b0427ea3986ea70c40f513c2be75ccf5cbe1ddade1966aef7790a92981ce1f32,2024-11-21T07:15:50.303000 CVE-2022-38123,0,0,d3b39861056e53c654f6b4cec30c7ed19164cb8776b13086b357097e64652b59,2024-11-21T07:15:50.430000 CVE-2022-38124,0,0,b486f3b521a4cee5a6e259689b443fc7984ad141a312ec5bc513d8ffc83fe5a3,2024-11-21T07:15:50.557000 -CVE-2022-38125,0,1,5d3f2857a2bac9e67a581a00131d85dd323eee3a7a2817694184f0eb761644a4,2025-02-05T15:15:15.660000 +CVE-2022-38125,0,0,5d3f2857a2bac9e67a581a00131d85dd323eee3a7a2817694184f0eb761644a4,2025-02-05T15:15:15.660000 CVE-2022-38126,0,0,adf692be85839aa54997db4e321a7d832b2dbe1050a3836c21605d220aac8669,2023-11-07T03:50:03.207000 CVE-2022-38127,0,0,57ebd295e93409c24d03bd03346d6fa4bb4e51c2a3a2ba8ae4de0b1cbb098221,2023-11-07T03:50:03.250000 CVE-2022-38128,0,0,d1605b4854be174d2e4b0d8de2c66f0382a9f091937e495eb82e7519a9309341,2023-11-07T03:50:03.290000 @@ -208817,7 +208817,7 @@ CVE-2022-43074,0,0,4e5460e5a1a9e546c3fc116103a2db11c4070d11d4e4d52a25f9764de568e CVE-2022-43076,0,0,245e4713b517f906023ec445d531ec476c1c8d624952e9aea7a7caacdf89a4fb,2024-11-21T07:25:53.653000 CVE-2022-43078,0,0,90b8e5dd0b6a6ecb4bfd5632cec91380d69406dc1c74f2982017f19fb9176b02,2024-11-21T07:25:53.807000 CVE-2022-43079,0,0,58a3571e035adbd8318a2f38ca451668e18449f996d62b9caea15548e3a309e5,2024-11-21T07:25:53.953000 -CVE-2022-4308,0,1,9b64bbaf570c1c8e5138d1d4fed14e566bbd2347023a0540cf52c162c9b7dcce,2025-02-05T15:15:16.267000 +CVE-2022-4308,0,0,9b64bbaf570c1c8e5138d1d4fed14e566bbd2347023a0540cf52c162c9b7dcce,2025-02-05T15:15:16.267000 CVE-2022-43081,0,0,06045fa2dd4482c4ab8f424c17219d620702f697797679355f7a65a300063090,2024-11-21T07:25:54.097000 CVE-2022-43082,0,0,592570632450a663de96e365b4535188eaae4a302ffa5fd900b1df1264e19c09,2024-11-21T07:25:54.253000 CVE-2022-43083,0,0,1d1949a63d16a257e86bd8def77de45ea90ce13bd5cdc657f637a3c8161fc38a,2024-11-21T07:25:54.410000 @@ -212158,7 +212158,7 @@ CVE-2022-47927,0,0,dae418bbe446bfb302132c725462cbf389cffc32bc8aed5619c8b790dd1df CVE-2022-47928,0,0,bb1f9509023e24d36d79fffee2d16ac8507bcf41ac832c4875a26f9520273dc1,2024-11-21T07:32:32.790000 CVE-2022-47929,0,0,c105528129c1ad3adf3ef95655112a0b94c7c2f1052bf2658939ef1f14203edc,2024-11-21T07:32:33.047000 CVE-2022-4793,0,0,a6d04485c5737445d4d6a7917664666f4a5f154d269223ff3a9dbfd5b67bef99,2024-11-21T07:35:57.187000 -CVE-2022-47930,0,1,e03c019ed7e8773170fcede93134398df90255663b9481165646fa65240a5bfe,2025-02-05T15:15:15.867000 +CVE-2022-47930,0,0,e03c019ed7e8773170fcede93134398df90255663b9481165646fa65240a5bfe,2025-02-05T15:15:15.867000 CVE-2022-47931,0,0,cbed6b57082cfcf48b426e4fbaadc4b3cc5aadef9d07d5df31e008cf13647219,2024-11-21T07:32:33.570000 CVE-2022-47932,0,0,04473a142685fa421cd99b8d78e80597d269e671d491d38412418d38f69c1357,2024-11-21T07:32:33.767000 CVE-2022-47933,0,0,ee749e377a724e9afa3b666c5d0f1f5457202faeb895c76c577a2da29003d4ff,2024-11-21T07:32:33.977000 @@ -212207,7 +212207,7 @@ CVE-2022-48012,0,0,4611572fbf5a8e32c78f09d10dc6f4f2e0f130cb7f129e213b26f8c4a2b04 CVE-2022-48013,0,0,445779374cec1e5adfa3369b6a0d97469febbf785d668ad1610b36eb24ebbecd,2024-11-21T07:32:43.147000 CVE-2022-48019,0,0,e5067d60a1a13259a3a74c7e0954a826bcb2690c021ccc7eef33ea775570f755,2024-11-21T07:32:43.317000 CVE-2022-4802,0,0,22eec20741e168027161476d458d358f39516dfdee813e8a77908832087505ed,2024-11-21T07:35:58.223000 -CVE-2022-48020,0,0,10c64d3501a103382491efb4224a0d08e769765e7f453c8fc3449e869b06a465,2024-11-21T07:32:44.107000 +CVE-2022-48020,0,1,42a655f37aee33433d414bb52eeb6ceda7533397e9e4643e687b6376d60c2349,2025-02-05T18:15:25.767000 CVE-2022-48021,0,0,538e85196aae9213831b6e068aea25d7b5613f4529bae447de98cfe681c4c32d,2024-11-21T07:32:44.333000 CVE-2022-48022,0,0,2593d02c5b09428eb5123b9f084ba90b1cb44496ec17a814bb26fea8a723b1a8,2024-11-21T07:32:44.947000 CVE-2022-48023,0,0,482bb440bcb20bfc40070853de1a69f76c1492e823df895b7c976f4f069604d1,2024-11-21T07:32:45.350000 @@ -212265,7 +212265,7 @@ CVE-2022-4814,0,0,48fb503ba256c4d1ed211f81dfd2979268aee79c67782135ec4850cdd75993 CVE-2022-48140,0,0,db63b5c7c5cc8aab0e6c5be53bc40f9ae958a92f842de1c2cdc246fb1fc1e644,2024-11-21T07:32:53.870000 CVE-2022-48149,0,0,91e975c7ef4150f7c6f7c9f6539901a24f39c92b9c912da8dbde4d831708bd09,2024-11-21T07:32:54.010000 CVE-2022-4815,0,0,944b10a4e442cfe70a7637eb0bccb87787ac6b041a0232979b5952965d04bd58,2024-11-21T07:35:59.923000 -CVE-2022-48150,0,1,6c83d3e82f2a46885ca094a6821a7681de61c84c9ec16161e5f9e3dc5655407a,2025-02-05T15:15:16.080000 +CVE-2022-48150,0,0,6c83d3e82f2a46885ca094a6821a7681de61c84c9ec16161e5f9e3dc5655407a,2025-02-05T15:15:16.080000 CVE-2022-48152,0,0,bccc0517b373cfe4e7e150fdc177c98b05d6259684451653a5b9e456e43d0a2e,2024-11-21T07:32:54.300000 CVE-2022-4816,0,0,34afe715e00ec3c22d047d6cd17ddb640c37810e371c4ad93293a4124fd3ed35,2024-11-21T07:36:00.060000 CVE-2022-48161,0,0,decea994c8decd6a94a35a7e816dd11d7b13bbaff5b2cb4fa3f55c299f70b3c6,2024-11-21T07:32:54.450000 @@ -212273,7 +212273,7 @@ CVE-2022-48164,0,0,6ee51ca2f6cc03fbbb48d03e6608b979f1ceb22fb7faf4377c5c05d20a87f CVE-2022-48165,0,0,afb678811a8f8b895285bd5354ae0c3c28189104ded28e3e98d5174faa0acf02,2024-11-21T07:32:54.733000 CVE-2022-48166,0,0,79569a1ced4e774fd6c82c54daedc57500dbc32ff9a36ca32f8283391f24915e,2024-11-21T07:32:54.883000 CVE-2022-4817,0,0,f0e15d2c836cdd546ed9d1a4f8bb5eeb7e4b0d94aae1960867b2c42008118c42,2024-11-21T07:36:00.190000 -CVE-2022-48174,0,0,b2e058c24c62c3387d97870dc51709e7aac48b12dd618d4de3c2dce6125c0f3e,2024-11-29T12:15:05.320000 +CVE-2022-48174,0,1,ed24bcae7077a6041e46ca4fbfc8590c099d4c58251200e5ceb4edc4cffdc7e0,2025-02-05T18:02:49.267000 CVE-2022-48175,0,0,6fece746388787891a725bedf1d79c50ba2ce6b9971433a3fe9ebe52c7c3defb,2024-11-21T07:32:55.190000 CVE-2022-48176,0,0,f9b97f333ed2e0a9d0a9b017dd2531ea920ca2a943855468d38a69dfb2365385,2024-11-21T07:32:55.340000 CVE-2022-48177,0,0,e6607dc15fad244eb2e9e3b36cdb09973cfe5348779f847bc5659439bcd6d22e,2024-11-21T07:32:55.510000 @@ -213473,7 +213473,7 @@ CVE-2023-0313,0,0,7913020ab5f6266c1daff7a696d1b2ccf658e2445a0360c74b1df7a79ae3a1 CVE-2023-0314,0,0,0e469043f4acc809fd34e92d6c05f901271f91bd2e0f8874de1c8b8fc5dbe322,2024-11-21T07:36:57.300000 CVE-2023-0315,0,0,0a113717308989b78bb3834fefe871782a24135346b3b7d6a6624c9d57c88bf8,2024-11-21T07:36:57.423000 CVE-2023-0316,0,0,46b293039af8438d2e1b58915f0167a989c941f5de9580717a0fae7c43259666,2024-11-21T07:36:57.540000 -CVE-2023-0317,0,1,681812e5e74dfc1d76af01b865fcd547b63af215035a4dc7cf5149b4321320f1,2025-02-05T15:15:16.450000 +CVE-2023-0317,0,0,681812e5e74dfc1d76af01b865fcd547b63af215035a4dc7cf5149b4321320f1,2025-02-05T15:15:16.450000 CVE-2023-0319,0,0,e7debad1f1e19f682550ea54d863173b3457c876c154c84f0bcb50ca97961e56,2024-11-21T07:36:57.790000 CVE-2023-0320,0,0,4e1723368939261289282e11a804fcc7a49c5f782d842e9d017adb2e44f999f5,2024-11-21T07:36:57.913000 CVE-2023-0321,0,0,f137b6758f72dc3a60f71ab8fa0331789ea7c104b584493d8455441c603e7928,2024-11-21T07:36:58.030000 @@ -214980,7 +214980,7 @@ CVE-2023-1895,0,0,9b19c968a1436ea04dc406d9d3de9c4566e8240bfb858ed68616d592089047 CVE-2023-1897,0,0,37f3ba0485c8a8cea6dbfe764cbc3f490cf35384552d1d09b01d2d3d77ac2a03,2024-11-21T07:40:06.230000 CVE-2023-1898,0,0,b95d208634a3b6ba95f67605ae969714e84cf7a74ae5518b4a29933a75414051,2024-11-21T07:40:06.340000 CVE-2023-1899,0,0,76a5e7e8a5861adf75ec19c2d658c45bde2d3bf9d4bc54cd7f870d1361714990,2024-11-21T07:40:06.440000 -CVE-2023-1900,0,1,5504a08b38742813d67b2c85b7423805a6e35ae789bfbde9da357f6b5c8bc9c0,2025-02-05T15:15:16.700000 +CVE-2023-1900,0,0,5504a08b38742813d67b2c85b7423805a6e35ae789bfbde9da357f6b5c8bc9c0,2025-02-05T15:15:16.700000 CVE-2023-1901,0,0,5a2f1c927180388023c098b47628c691a918d1dcf97601a6dd648293b9cca864,2024-11-21T07:40:06.653000 CVE-2023-1902,0,0,f263e7bfcf9c8bbf8c5d8e776abc5624dad5a11f841da7584a7136831f797691,2024-11-21T07:40:06.773000 CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb116071b,2024-11-21T07:40:06.883000 @@ -215713,10 +215713,10 @@ CVE-2023-20859,0,0,a149fcc9e6b397e6867e61052fc9e57bb8ebda4b9da8d77d31122383a87a7 CVE-2023-2086,0,0,4bd07e7f4519a004987d08259ec919f33db41e8bd2e5bac80d42e3053bac0b12,2024-11-21T07:57:54.533000 CVE-2023-20860,0,0,28644cca2d4a1aa876298a554ebed72e5f747c98d4bb1c5e10168d1da351b74f,2024-11-21T07:41:42.680000 CVE-2023-20861,0,0,9efefd5312d74c220ece6ad38776e5d7083c0d03cf14c94c23ce1e59970af873,2024-11-21T07:41:42.780000 -CVE-2023-20862,0,1,537bc0c1e87c96f541cb1c75163b059f68b9ec4ce6b422161a44daff12a3d254,2025-02-05T16:15:33.953000 +CVE-2023-20862,0,0,537bc0c1e87c96f541cb1c75163b059f68b9ec4ce6b422161a44daff12a3d254,2025-02-05T16:15:33.953000 CVE-2023-20863,0,0,93afcfb87ecabf8e7bc3bf1866f4ab45f8af3dc0c414b117664563ce790dff4c,2024-11-21T07:41:42.997000 -CVE-2023-20864,0,1,411ea13ebcced10931dae6ddf97a7384674dee08f3f2ba606d4ad810c1cd32de,2025-02-05T16:15:34.130000 -CVE-2023-20865,0,1,947c566c7db3a2fd6de48d53c8d520f7e7e462a2b3cf38df93d2db53519f7ba9,2025-02-05T16:15:34.283000 +CVE-2023-20864,0,0,411ea13ebcced10931dae6ddf97a7384674dee08f3f2ba606d4ad810c1cd32de,2025-02-05T16:15:34.130000 +CVE-2023-20865,0,0,947c566c7db3a2fd6de48d53c8d520f7e7e462a2b3cf38df93d2db53519f7ba9,2025-02-05T16:15:34.283000 CVE-2023-20866,0,0,9c22d9b11b1dceeb7840009cf21de1bb2ab7e6f8d80c19829701e60f0c57424b,2024-11-21T07:41:43.330000 CVE-2023-20867,0,0,1b255dd216adfe4a6c134d99f69d81023c9f3b2b5f17d34f031803d5c1a652d0,2024-11-21T07:41:43.433000 CVE-2023-20868,0,0,4ef12985aa287dd53088fc35032c16f405f309fb0d5f2c97fb98ad8b43ae1d82,2025-01-16T15:15:09.580000 @@ -215759,7 +215759,7 @@ CVE-2023-20904,0,0,cc501e38231d404089703d00d426498217c92ea5c756c597b139781344090 CVE-2023-20905,0,0,535d662fc1fc18a8fc2ba4249da78dcf99c59db951d3333269db4c095b718670,2024-11-21T07:41:47.690000 CVE-2023-20906,0,0,40b652f3a5d6440a4b36711716b5ce26dad4e584eab2aa441a9b4d252bdfc092,2024-11-21T07:41:47.800000 CVE-2023-20908,0,0,2d5d92ca0bfba1f97a6195c2c17a3f5a1aa7b56b52eb20428f9d70188fbaf6ca,2024-11-21T07:41:47.917000 -CVE-2023-20909,0,0,bd53a92e62ad5da91a26dce6876113841347437e91dee54cf425bcf92e12b2a4,2024-11-21T07:41:48.027000 +CVE-2023-20909,0,1,92e37a833f046e9889f25f773751f2eeb1bd1652afaf042cb560a5aa968d1d07,2025-02-05T19:15:11.493000 CVE-2023-2091,0,0,f515f6844f470f3c173cb09494b352e30a47eae077bf10fc91d92d2fbeab3dc2,2024-11-21T07:57:55.150000 CVE-2023-20910,0,0,42b469d1e40838cbc2cf37212366f0d94ff573dac305f6e83df5f05900c29636,2024-11-21T07:41:48.143000 CVE-2023-20911,0,0,ab40c86b9ae088eddceb5d780d2ee5f689d589c215dc35e9c7431f72c74f1d17,2024-11-21T07:41:48.260000 @@ -215788,14 +215788,14 @@ CVE-2023-20931,0,0,d3b038426854dbc70e7344bdda980fc79d5daaad38a9b0361f8ca72476b28 CVE-2023-20932,0,0,ab28ac247acecb824db440c588e9ebb9bc495ac7f65d5e471b1650aa0ccba933,2024-11-21T07:41:50.637000 CVE-2023-20933,0,0,a4eec22d73f22a806feb4c396f2b9e1e14b80acf59734b7f9d7828d4fdc36a15,2024-11-21T07:41:50.753000 CVE-2023-20934,0,0,bc3c4fe26270369f3a00ff21768fff9547f3b06b8df157d4f2f12091c047de78,2024-11-21T07:41:50.873000 -CVE-2023-20935,0,0,3eaccc2932bce727090c0906fb106fb496577faada734561a38f5fb94d8819af,2024-11-21T07:41:51.010000 +CVE-2023-20935,0,1,7650fde9c655d1b04f5b687346cc39a5f7a9fda6e2e94457ade61897fa73eb92,2025-02-05T19:15:11.667000 CVE-2023-20936,0,0,2037bd6592bb5858dba1d1ca05097dd7929f33df21c10e6fa9e1ceab0434ecb9,2024-11-21T07:41:51.130000 CVE-2023-20937,0,0,2b81949f4444dac96cde0de93b893d0dadccda3a7b3fd6accc661076e77ed97e,2024-11-21T07:41:51.240000 CVE-2023-20938,0,0,0c060ab4497f983758eb135dbec1e893650aa9447bbef6295395a4df2b2e25e7,2024-11-21T07:41:51.350000 CVE-2023-20939,0,0,3076338841d298f689d325c9a6099a8d4b5c1cb8dc8e006a0bff518a3467cef0,2024-11-21T07:41:51.537000 CVE-2023-2094,0,0,66a92264383a825648207375a01e51f7ad562de3cc2478ed67d218f8d63d0576,2024-11-21T07:57:55.540000 CVE-2023-20940,0,0,5046dae41420beeab9b321cecb8a9e01e767efbe46228ec3f77af0bca63b21e6,2024-11-21T07:41:51.640000 -CVE-2023-20941,0,0,4471572aa34765b9d9ff2079eb02329e2182385502dbf7d751e0df61ae5b0169,2024-11-21T07:41:51.757000 +CVE-2023-20941,0,1,bab5d6aed87423774a95f34d1f03c54254353edf473cbd35b625caaf035c84e3,2025-02-05T19:15:11.813000 CVE-2023-20942,0,0,ec35b0995b2bba7a2a3f009a0549215e917ce993687c5266b3147d1fdd809fbf,2024-11-21T07:41:51.863000 CVE-2023-20943,0,0,d06a926d01a25870f9c3a8e2918a206f89ae14b76686441e6e9aa4a2985bd922,2024-11-21T07:41:51.990000 CVE-2023-20944,0,0,f3ba54d283f3ec94a3b3706492bf10b1e4201b1c1ef754aae24f205cc9e1230a,2024-11-21T07:41:52.100000 @@ -215805,7 +215805,7 @@ CVE-2023-20947,0,0,44242ca74eb5efa9e4d6d12afc5e82c5d03bdf8a9588ef6c2057706169b52 CVE-2023-20948,0,0,44959db932b3a74476389aadd63f8f33c477e012fb83fa21ad56201e80d9b878,2024-11-21T07:41:52.527000 CVE-2023-20949,0,0,316dea8ef8347e96a4443d2b375666490d9da0b5bc49ada83bb0c6b2131ce34f,2024-11-21T07:41:52.637000 CVE-2023-2095,0,0,3c7b61baa8b47451def86a213a49c3157f17a9c9137789a496fd564cd76ce4fe,2024-11-21T07:57:55.663000 -CVE-2023-20950,0,0,2a5c635df2ce970b7d77f4ff44c9c6054ae1be389e25fb24df19d3d832b6afe3,2024-11-21T07:41:52.753000 +CVE-2023-20950,0,1,4865c61fce00fa55d1b6920408abf2784e24ef60f3b70a471e467b43c20a5d2c,2025-02-05T19:15:11.983000 CVE-2023-20951,0,0,0e80bd4980a72f5c93de8da5f8dcad97c2c9efdb3256c1aa98548dba44bfacba,2024-11-21T07:41:52.873000 CVE-2023-20952,0,0,83440e3e9b889d4d50a3adca98f6073110065c4846e9f9820887216438e4a588,2024-11-21T07:41:52.980000 CVE-2023-20953,0,0,ecb5f0fc9123ed8f6368ffa18e9ed79097be87eaf3f559b6db6e703745cd330a,2024-11-21T07:41:53.093000 @@ -215822,7 +215822,7 @@ CVE-2023-20963,0,0,46145ad8094d8e3ca63ec1423c2607433283b20a5bbdd471a36725c1cd8b8 CVE-2023-20964,0,0,20d110ce5a795edd4537cff4242b6cda72e3f3ea463028e325e7f2f4229fb918,2024-11-21T07:41:54.773000 CVE-2023-20965,0,0,01461091bfeef6ac48916b9486af09adaa9c310c2f4a484792c231c2f1824588,2024-11-21T07:41:54.873000 CVE-2023-20966,0,0,80937ab2ecea9dad01376008c3ee5054c94650f43ab1a65179f879558cc56f53,2024-11-21T07:41:55.057000 -CVE-2023-20967,0,0,9970d05b209d0bb0cf255b4af8d14f09be0b8424725072c8e7b12f06e1a10725,2024-11-21T07:41:55.163000 +CVE-2023-20967,0,1,792950a12425c08aad9b78af985ac491bf2d8949320d5d1a17888ef9569a1b24,2025-02-05T19:15:12.153000 CVE-2023-20968,0,0,4c7ddc0640a7d3cca2b011e9e0b2b53465ecaa4681e4a8011026f32ca8614063,2024-11-21T07:41:55.277000 CVE-2023-20969,0,0,61bed76d0869e7e919b82ef91c712d1d23f2120a549bb5e8a1624c0bf701a1d1,2024-11-21T07:41:55.387000 CVE-2023-2097,0,0,34065b0ad99224a8cc0d53120e653a33caf0dc2c791b0f161b51cc247fb16498,2024-11-21T07:57:55.907000 @@ -215943,29 +215943,29 @@ CVE-2023-21077,0,0,851a5b7345056eafdf93a04decc8f6b23adcd96451b30090f1f010fac817b CVE-2023-21078,0,0,99650f1b4bea7f6bfe00b0249a3870899d5493be0b16d659974106e8f5abdac6,2024-11-21T07:42:07.233000 CVE-2023-21079,0,0,5d7d1389b8cad4fb454db0d9a3c3ffa4b7921d9a010493a06331f2dd7e1f7a83,2024-11-21T07:42:07.347000 CVE-2023-2108,0,0,81a66d01e388988a71bb3aba87cae02ae215e5d5f31267560c99d65f4d7746b9,2024-11-21T07:57:57.323000 -CVE-2023-21080,0,0,cc7fdb1676cfc5b5eca520fbac7bdebe4e22fcb8252d50418cbed85e164cf826,2024-11-21T07:42:07.477000 -CVE-2023-21081,0,0,fae0afc447494d1d7060ca140ccd2c6b7e57238ff039c9c06d37e73bd30c233c,2024-11-21T07:42:07.597000 -CVE-2023-21082,0,0,edca51b36edf44e4de38418c8c05616f8f408e4a40e13c0f9154f6cd420a779b,2024-11-21T07:42:07.713000 -CVE-2023-21083,0,0,cab744d8a6676a80a7b9fa444b6feda2a78bd4025c38ffbd1b2ac56af50282e5,2024-11-21T07:42:07.833000 -CVE-2023-21084,0,0,f53660da7d3e48aeec0b66a5775486e687c44a15f4b6b4e6f5a41124530d08a5,2024-11-21T07:42:07.940000 -CVE-2023-21085,0,0,9ea5410b90eccfc2e92b1cea10cdadebd9c8c076a813ef4439e037d19a479bb0,2024-11-21T07:42:08.050000 -CVE-2023-21086,0,0,b80f577393e6fffcdf82bf0c51cccadb8e53cf4476ded8b79e8bb070d69dd27d,2024-11-21T07:42:08.180000 -CVE-2023-21087,0,0,cdbcf8f82503d813e1ab351692cc9907f945b0803f7df00a1d5cb8d54e57fdf8,2024-11-21T07:42:08.290000 -CVE-2023-21088,0,0,020f23d99033058f9f02fb15eacc3c5c20c68dac06de62a132d1f638621f6e4a,2024-11-21T07:42:08.403000 -CVE-2023-21089,0,0,1ed6bcf0a7a315df950b366e9e084b7149b3a14ee267fc52f50b1842f3dd185d,2024-11-21T07:42:08.527000 +CVE-2023-21080,0,1,62003e88fe3c324ade4c8835d51efb91f2bfcaba5a586f2675b377f915c7fd4e,2025-02-05T19:15:12.323000 +CVE-2023-21081,0,1,9d92b768ca7c8e4d9b440b07d6cc4296a37cf68747f3cb686fdc4b908ac6bb49,2025-02-05T19:15:12.487000 +CVE-2023-21082,0,1,c27fbc084da7123e6b6002291b250bdf08dc3a502e44bf38fe43d4fb9f89463f,2025-02-05T19:15:12.660000 +CVE-2023-21083,0,1,e4f91c6a601c1332366a839087b1685ac859e55c74a9782cc1c46c86ea8eabdd,2025-02-05T20:15:35.277000 +CVE-2023-21084,0,1,b19cd339e74256411c238e088c4eefb93500def31511a519fff655449d60b0c9,2025-02-05T20:15:35.437000 +CVE-2023-21085,0,1,38788aaca67b773cd481a289cc31ef23ad2c049dddb761e2486ada008b30d61a,2025-02-05T20:15:35.590000 +CVE-2023-21086,0,1,6ed7f2d44071dea9bba94c4d3fd12d336e96604e20aea8ec399a36c710b36cd0,2025-02-05T20:15:35.763000 +CVE-2023-21087,0,1,0e9494d74fc0aa5cddfe282e33ba869ce2ec7f8943043c374cdec08228652670,2025-02-05T19:15:12.830000 +CVE-2023-21088,0,1,fd6c59cdd1c09df8ecf75a952eb3348c0f93aa69176de0c073edc22cb2de1455,2025-02-05T19:15:13.010000 +CVE-2023-21089,0,1,50b23247f877eca49b87c49ee2e6efbc7ad3207647330b31985ac47f5db7241b,2025-02-05T19:15:13.173000 CVE-2023-2109,0,0,e2edb912d12f1b4e1baa6ffcb0dc2f9b915c0ab98b4888231bdf7c871393adae,2024-11-21T07:57:57.453000 -CVE-2023-21090,0,0,773ca8de52f80da643b09d1d2686d741fe2f4639bb6f0340b72f34340aeab458,2024-11-21T07:42:08.640000 -CVE-2023-21091,0,0,d4895f6a2f33b61de3ea4e93ff2aaabdc191729cdd5858765ab1ad11275e7c1c,2024-11-21T07:42:08.750000 -CVE-2023-21092,0,0,7087a7a78417998f5814d75eef10e615c594794de17c1eb2f18bb3d77b82ed29,2024-11-21T07:42:08.863000 -CVE-2023-21093,0,1,b7edbbc1ca15099be54fc910ea3465f0cc0253dd1dcba5b182965155546fb4aa,2025-02-05T16:15:34.440000 -CVE-2023-21094,0,1,4e9eb44083f8394330d45d315cde0395957d0e366e0a77a938adae85866a7d04,2025-02-05T16:15:34.600000 +CVE-2023-21090,0,1,e34badecfb00e25feb546bc92c68879ddcfc72e77f83b8ae7232b1899ac77fdf,2025-02-05T19:15:13.530000 +CVE-2023-21091,0,1,15e9f56c1b3b0223ed755a93a019084207c16ca7567dbb2a197ff02ef16d8ac0,2025-02-05T19:15:13.850000 +CVE-2023-21092,0,1,5af5d31fe27faba8b59b350cd2422818830ecb1b596fcd9423452de2489219c0,2025-02-05T19:15:14.043000 +CVE-2023-21093,0,0,b7edbbc1ca15099be54fc910ea3465f0cc0253dd1dcba5b182965155546fb4aa,2025-02-05T16:15:34.440000 +CVE-2023-21094,0,0,4e9eb44083f8394330d45d315cde0395957d0e366e0a77a938adae85866a7d04,2025-02-05T16:15:34.600000 CVE-2023-21095,0,0,1c4f264d5aceb155a983f8ad5e35a03e7e76326bdf6a88c2fa8db45dd47bb12c,2024-11-21T07:42:09.207000 -CVE-2023-21096,0,1,035514bd82d4638905a18c29eafc6b7b43a3505a520c349260bbc1bd1e469e50,2025-02-05T16:15:34.750000 -CVE-2023-21097,0,1,81584caa1bdbb875bf7fb0efe2ab4989992237675a0e42af8cc93f403f54df5c,2025-02-05T16:15:34.903000 -CVE-2023-21098,0,0,fea56c6ead8a7ac06e9266ed63deba2f4c3af99716c1141ed85441108f161f56,2024-11-21T07:42:09.550000 -CVE-2023-21099,0,0,afabd6091b22f62466375ddd2d5cf2dba66c45f7574132fd909c72a36e7ab7d9,2024-11-21T07:42:09.677000 +CVE-2023-21096,0,0,035514bd82d4638905a18c29eafc6b7b43a3505a520c349260bbc1bd1e469e50,2025-02-05T16:15:34.750000 +CVE-2023-21097,0,0,81584caa1bdbb875bf7fb0efe2ab4989992237675a0e42af8cc93f403f54df5c,2025-02-05T16:15:34.903000 +CVE-2023-21098,0,1,094ac187101f0e7471f0fbaea85eec6b73bb706902b6ddc39d32727f8ea142d0,2025-02-05T18:15:27.383000 +CVE-2023-21099,0,1,3cbc7076f4a73f36ed3a3e29b93698de574ec85ddbd4ca966e95e79cb9638690,2025-02-05T17:15:12.940000 CVE-2023-2110,0,0,718a01a86ed296dfb2aaf7f83682a9531cd721d906f14a1b1f42db7be1070ee9,2024-11-21T07:57:57.580000 -CVE-2023-21100,0,0,a6f5ad62f1a95ea60c7f4843f485008a1ed2c66f5cb727afe7540a39c9398c46,2024-11-21T07:42:09.783000 +CVE-2023-21100,0,1,14fcd6bce0f49590ec9f479e4028b450d4d879d24aeab1b8bbefc475af7c969a,2025-02-05T17:15:13.113000 CVE-2023-21101,0,0,38e7df0c443e508038a3e4161c84cfcbe9fa8e603833cd6af1be1d6a93d524fa,2024-11-21T07:42:09.897000 CVE-2023-21102,0,0,fe6581b7408e9ebb7ae2547494c92fe8527cef74da3f12efb6200baf57c43f9a,2025-01-24T18:15:30.103000 CVE-2023-21103,0,0,20c7440a93699015ea517e3301547543c2847fe28ca104a70a3ef6a848b1a5b5,2025-01-24T18:15:30.293000 @@ -216533,7 +216533,7 @@ CVE-2023-21656,0,0,e2dab208a06d6397e7ef28f86aad21b16decdb9627c794ee2c0a79f1e6185 CVE-2023-21657,0,0,ca7fc46c8a427a855bc6cfd792855f8847f97f3bfea2052d06b98e82727e617d,2024-11-21T07:43:19.597000 CVE-2023-21658,0,0,1f078793693b88e7262149de052a701cf281a4d4d4beac09c085c007b5eab42e,2024-11-21T07:43:19.940000 CVE-2023-21659,0,0,9037619d32ba8de5e12e55d1fc6cd0841b1cdef8867eafe37974f33a10b4aefd,2024-11-21T07:43:20.297000 -CVE-2023-2166,0,1,5db8a87c8b9cdde54f611bf6b33b1ebc429af31fb78311b24fbca78b0ed25b90,2025-02-05T16:15:38.740000 +CVE-2023-2166,0,0,5db8a87c8b9cdde54f611bf6b33b1ebc429af31fb78311b24fbca78b0ed25b90,2025-02-05T16:15:38.740000 CVE-2023-21660,0,0,47a70625230e46a405b91ea8c8df04ffebf7601a120db995e1b0b373c5a0adf7,2024-11-21T07:43:20.737000 CVE-2023-21661,0,0,39bc49bd6202e67e6e9d863460e1a296d506a4175e0ec74ba6e10eb6cf267068,2024-11-21T07:43:20.967000 CVE-2023-21662,0,0,c745826691d7b2f748f1465bf4321f3b590678d0bd9774817e3a84c2e92e1fda,2024-11-21T07:43:21.317000 @@ -217399,7 +217399,7 @@ CVE-2023-22617,0,0,ee2006362114d4cbff4561f970e0b230c808b631c6d016e12dbd5e9fdbc3d CVE-2023-22618,0,0,362f9742291993ec3a2f7ef73ad055ab8c944a4030735caa35113a2ca2504d35,2024-11-21T07:45:04.203000 CVE-2023-2262,0,0,ec622ebfe089834b1c61666067a562ba092ba9d70bfc8c67615a8352ebbc682d,2024-11-21T07:58:15.763000 CVE-2023-22620,0,0,ed5b6df1e0e922bec2863c0dbdbb6823aeb6be9c16122c5975faa087818d0a67,2024-11-21T07:45:04.387000 -CVE-2023-22621,0,0,7ffbcc882133d694c1fa3ab1b98f722bf1ec02c9602ea475db38f8efe0f393be,2024-11-21T07:45:04.550000 +CVE-2023-22621,0,1,e8c8c1e803b8252841fe0eaac24b1cbb73d7a7f9337303685f3045e933b312b6,2025-02-05T17:15:13.307000 CVE-2023-22622,0,0,63091ffaad64110b30d1a167d41d1f756220d9afd5902fcf0592cb35628ba53a,2024-11-21T07:45:04.733000 CVE-2023-22624,0,0,c5b01fbf8ae8da46f0e627cb98295a9cd9a8217ee685d28866e5b595fcf745e1,2024-11-21T07:45:04.890000 CVE-2023-22626,0,0,754ebc8c5e03d79b8e1fa237fb4bb8960aed67d212ae5a00131f35c2f1f18a45,2024-11-21T07:45:05.063000 @@ -217418,7 +217418,7 @@ CVE-2023-22641,0,0,bc70d8a2543862a102505ca312486c82af259f77f95b8b3ddaefb1a07280a CVE-2023-22642,0,0,43926c17d9be3054e98eccd52bf72eef933884d97febcfd2ad9d9aa2684d82dd,2024-11-21T07:45:06.863000 CVE-2023-22643,0,0,c4b6e274c455e6d029e18a55abcaf64ae4a3bb7eb275a78b7cc537d7e07bd7b2,2024-11-21T07:45:07 CVE-2023-22644,0,0,9766b10dd726b25726857e211ca7c0742a92a96bc81a79070cc2d5fd0d590d90,2024-11-21T07:45:07.143000 -CVE-2023-22645,0,0,c40eec8448e7ca9387ae1e4536c0be5283a756b2c31e8fdb376e61adb04e16f1,2024-11-21T07:45:07.300000 +CVE-2023-22645,0,1,a1f2acf4d99a0019ea87e38543d26497a3e69e20d95fc1677095b64894cc4862,2025-02-05T17:15:17.857000 CVE-2023-22647,0,0,4a15607d22b142f0a44192f7812f4f4e7337793c610329d539478f103b43c573,2024-11-21T07:45:07.430000 CVE-2023-22648,0,0,097fd76ec4051cc1df086753ad9aa40e172a9d23787738f06951d32f18cda026,2024-11-21T07:45:07.577000 CVE-2023-22649,0,0,2375ef2f7fa14438abd1468056a95e8850b6583160780decdb371e422977a080,2024-10-30T21:08:46.247000 @@ -217656,8 +217656,8 @@ CVE-2023-2289,0,0,6013867f705d189ecb694a4c75caacb35ccfe1ab1779a608673144f0d10ca3 CVE-2023-22890,0,0,594c803ebe43843c407dd09796d90846ed3fbf28e4010f104f3e4bc11928c0ed,2024-11-21T07:45:35.493000 CVE-2023-22891,0,0,6b960d5609fef2c7e51785d1776f82b9a9dc1c19fcf013319b8201924bfe16d4,2024-11-21T07:45:35.647000 CVE-2023-22892,0,0,bed5e7f25e629ecc89f6e80195ccbc99ade99e8eb19a2d0ed5a2c1e0b3697bee,2024-11-21T07:45:35.793000 -CVE-2023-22893,0,0,962f8e5190ea1e79a85c0f11e5d6bb595548c0ee4dccd9c8fc0627cf1fd633e1,2024-11-21T07:45:35.940000 -CVE-2023-22894,0,0,ff6c4ad497c1a77a01d26ef8d213ba47c9cd9a37941883f355540c7ac905afd1,2024-11-21T07:45:36.077000 +CVE-2023-22893,0,1,c3342eb32834df651051500937183e326b6ea2c855ec70350295dbe77a89ad74,2025-02-05T17:15:18.133000 +CVE-2023-22894,0,1,83a9bc4d6f652a5da819c8e1af0fc9a362d82f490b3fc0d16b028bb916c464fe,2025-02-05T17:15:18.590000 CVE-2023-22895,0,0,56d189325d26815b5c06ca899e2abcb81a36620a30974be41b02b29e9483f523,2024-11-21T07:45:36.257000 CVE-2023-22897,0,0,245bb74d0b0106a3ca80bb5830508ce5abb5665669150ebdc994f9e52f2a51bb,2024-11-21T07:45:36.423000 CVE-2023-22898,0,0,457d246fcc5b9739d0f6356262b108a5d8bd3e192962818bbbb513108f460d67,2024-11-21T07:45:36.570000 @@ -217966,7 +217966,7 @@ CVE-2023-23448,0,0,e385612513384c044abd5363557624b744b83e76d13bd3f03edd40f3432b5 CVE-2023-23449,0,0,c5234ad229754c153bb79613f0840f5621f932ce4eb094a1e5fd743df97fe1b8,2024-11-21T07:46:13.253000 CVE-2023-2345,0,0,a9fbcd39dc1b405e2b3eca6903f4768dd0d9f0ed5aa6af18f6e4929abde54e63,2024-11-21T07:58:25.630000 CVE-2023-23450,0,0,ed85c34c8cd78dd3a5207393ac9dd842dface30fa54b196cae78317e6f3f5382,2024-11-21T07:46:13.390000 -CVE-2023-23451,0,1,7016ceaa7de232a71f46d20b0dd707f2e5ff5659c5c54b0289b718d37fb4767d,2025-02-05T16:15:35.057000 +CVE-2023-23451,0,0,7016ceaa7de232a71f46d20b0dd707f2e5ff5659c5c54b0289b718d37fb4767d,2025-02-05T16:15:35.057000 CVE-2023-23452,0,0,7794609a7c92177d4b5f8d1512ca49423e2185c448c370f7f3280eaf0660b30e,2024-11-21T07:46:13.673000 CVE-2023-23453,0,0,04f3407a1aad9a40c2fb62291a56f14898581ac442d9f9aac1f99c295964ebcc,2024-11-21T07:46:13.790000 CVE-2023-23454,0,0,17508cb1e4954dff4fe359b63cd793535c5eb6e9ab057c38dcf9e40f67ea5f5f,2024-11-21T07:46:13.913000 @@ -218257,7 +218257,7 @@ CVE-2023-2375,0,0,b6a7467d777f895ee81e080b4aae4e3bf61999158d0f561cce0639e6c4a125 CVE-2023-23750,0,0,9ad321761b1d3c8b7e45131c216ba2129334bcee80af123fa4e7ff61963e4a52,2024-11-21T07:46:45.547000 CVE-2023-23751,0,0,01d099c1c1ae7f0e2a85aca3b633f5684cea1da58d4c0d5dd1c9411cc72fd140,2024-11-21T07:46:45.653000 CVE-2023-23752,0,0,6f6c6d3bafb3a101f4370bfb011e00f1bdf2c42f23dd4b185e7ca9107e57cc3c,2024-11-21T07:46:45.757000 -CVE-2023-23753,0,1,841c63f5a5e33e68bb30581823ca26a7d583841f4592d561e70526aaaeb88179,2025-02-05T16:15:35.237000 +CVE-2023-23753,0,0,841c63f5a5e33e68bb30581823ca26a7d583841f4592d561e70526aaaeb88179,2025-02-05T16:15:35.237000 CVE-2023-23754,0,0,a2a20f0e3edf231b890dbacf01bd741560b842cc9bc026f38e577fb8bd250437,2025-01-09T22:15:25.490000 CVE-2023-23755,0,0,c1aa99364d2437455a846edd9fa2f2da3bccfd6415a71cfef9b1343073ac30cc,2025-01-09T22:15:26.053000 CVE-2023-23756,0,0,002eb6460fa7d73e63b81be24f3ffe057d2f55f4def910dd864ca493731e070d,2024-11-21T07:46:46.273000 @@ -219794,7 +219794,7 @@ CVE-2023-25615,0,0,b2db9c1afba1c12b2d218dbf3635649bbe960e2d69e41cbc56f16affeb673 CVE-2023-25616,0,0,b4446e5e673b2a7b3a9d6482780098ccb00327b2202a636f8b41522da331d5a0,2024-11-21T07:49:50.240000 CVE-2023-25617,0,0,6f9a9a4b5dc012808cbb0be7c8678217ffad7a965aa5800ed715370d5cd2bf83,2024-11-21T07:49:50.370000 CVE-2023-25618,0,0,3835902b7df47dc78b892190ed872846683220b7535d848381afe6e2196ed7fa,2024-11-21T07:49:50.493000 -CVE-2023-25619,0,1,30bdb6781bea30192f03aff26ae9bc6e8896561eeb7267b6ab178a32c9ba1b32,2025-02-05T16:15:35.453000 +CVE-2023-25619,0,0,30bdb6781bea30192f03aff26ae9bc6e8896561eeb7267b6ab178a32c9ba1b32,2025-02-05T16:15:35.453000 CVE-2023-2562,0,0,a560d2c53ed1bbd212fecc3d22df43f319970ea07142acb7da770e618405ec2a,2024-11-21T07:58:50.070000 CVE-2023-25620,0,0,091c5b50fcd46fdbffb3a115bc8f20d5c4182da6b09cdb2f0bceac8dbbcb07e5,2024-11-21T07:49:50.757000 CVE-2023-25621,0,0,72173c8145d5d36b3dfaeda62234e1957127421826f0d4753f91d463e89ac4a4,2024-11-21T07:49:50.890000 @@ -219923,9 +219923,9 @@ CVE-2023-25755,0,0,0f025b13b3855c3b63781f78be57167458a8188e569f26bb0f9bb787d88c5 CVE-2023-25756,0,0,a77d615d00ae80ecab7fe8723caf94403e0f93df79d4ce0214ae51e110ddce81,2024-11-21T07:50:05.327000 CVE-2023-25757,0,0,94512af5e117622087eb3a40cbb3a1131f1746a1ff8077f5ababdf8649b2a178,2024-11-21T07:50:06.530000 CVE-2023-25758,0,0,e84eae33950eaa1d93c8f7b2b5977ec319809bf0df364ca076b5c69df8608435,2024-11-21T07:50:07.180000 -CVE-2023-25759,0,0,b70fd9f98d61d7623fb73499d58c6a52e06cf2cce1d0a0d68b2e9d1fc18fe803,2024-11-21T07:50:07.923000 +CVE-2023-25759,0,1,0afeea35e5c6d06722ba61e897527acb356d67ad44e78789f4114028282d969d,2025-02-05T17:15:18.767000 CVE-2023-2576,0,0,b34673ecdfcf4f5d2e116af6c6f211e927a96092cbb5af029ee86fe3ded5e65e,2024-11-21T07:58:51.890000 -CVE-2023-25760,0,0,b33fb014699093f4bd6e8c9fa7cf1c53b66888f23165e1c6942b35f4e92f7fcb,2024-11-21T07:50:08.107000 +CVE-2023-25760,0,1,45916bf9f2fe9896b4711de8c6c6bb92063846479311a8b431b74bae3ccc5c44,2025-02-05T17:15:18.933000 CVE-2023-25761,0,0,0a6421d97a4e2a747c176afbf1ee52f4f341b6a68801c24a12febce3dd6eba49,2024-11-21T07:50:08.287000 CVE-2023-25762,0,0,1599f815a505ef98c9f6261e53798bee4a539ad9dda862301bf37255f77dc704,2024-11-21T07:50:08.430000 CVE-2023-25763,0,0,8f2ada5b3f6c2b913e4e9811b38633d08725c783a157e7c90e697e9839ba6dfb,2024-11-21T07:50:08.563000 @@ -220239,8 +220239,8 @@ CVE-2023-26097,0,0,ab612e31dcc3901e3f78605eddf9e656a6a9090c14f336b1d9c2971ca6627 CVE-2023-26098,0,0,5106a943c572a0343f46ee9440e9b1bbba146cdf557b717b9c49be958965050a,2025-02-04T16:15:35.607000 CVE-2023-26099,0,0,daef45a4a5079e3664281482bb5aed531859143d74f266889fdf4d70272bd203,2024-11-21T07:50:46.327000 CVE-2023-2610,0,0,09b4faf2015566c48d195c0564ba2eaa8f67a730801f03b898ad9fb8b6160753,2024-11-29T12:15:05.820000 -CVE-2023-26100,0,0,7649602c1992276d9de891d2063623c153e3fd458b39141209b2fcb170dba9e2,2024-11-21T07:50:46.477000 -CVE-2023-26101,0,1,b5f97f93f6104ea87af9962b64069465926b1f82322929f11609f64ca3ccf2cb,2025-02-05T15:15:16.947000 +CVE-2023-26100,0,1,d594c19d8868f03c4d54d9d2f43f87203b1428ae199cf215eeef544fc3b5c47d,2025-02-05T20:15:36.030000 +CVE-2023-26101,0,0,b5f97f93f6104ea87af9962b64069465926b1f82322929f11609f64ca3ccf2cb,2025-02-05T15:15:16.947000 CVE-2023-26102,0,0,ad48db17daa5813c2c603727ba9c9458d6a541fdeff41ece33be20080052bdc5,2024-11-21T07:50:46.753000 CVE-2023-26103,0,0,67d924f6a6248c078884be02249520d89180acf15246c776306887f309ef4fc1,2024-11-21T07:50:46.877000 CVE-2023-26104,0,0,37baafd0bcdb118d526b5b6b1562a4acfe926b8a99d750a1fdcdf427cd789f8e,2024-11-21T07:50:47 @@ -220649,8 +220649,8 @@ CVE-2023-26552,0,0,13f2630c0984f3af0fdc64295791a300c84893fbdd346ec88e818ec11a2b1 CVE-2023-26553,0,0,2c1c2ef5cc649ba78502fa66fa33661e4268bd3eaa09d59e344f8f644fdbc55b,2024-11-21T07:51:44.210000 CVE-2023-26554,0,0,bb4f16c00e9ac52b145463c0d36aecc9ea61cede4efdfce73e5902935d4d60e5,2024-11-21T07:51:44.353000 CVE-2023-26555,0,0,59c6a58c47f7e0ef8d223cfa5c4e8107b62e14472c90d77c42db79a27fff7a2d,2024-11-21T07:51:44.487000 -CVE-2023-26556,0,1,95ea3b56371d804889327fb96253976a71d89899da008e0d4947cedb189a11c9,2025-02-05T15:15:17.130000 -CVE-2023-26557,0,1,1c88e93dac9f22c4ad6084b2c47e4559fce08beadf3146bbe4e5a07228fb8bc3,2025-02-05T15:15:17.343000 +CVE-2023-26556,0,0,95ea3b56371d804889327fb96253976a71d89899da008e0d4947cedb189a11c9,2025-02-05T15:15:17.130000 +CVE-2023-26557,0,0,1c88e93dac9f22c4ad6084b2c47e4559fce08beadf3146bbe4e5a07228fb8bc3,2025-02-05T15:15:17.343000 CVE-2023-26559,0,0,22d0251426fffa0264ed19ec859ba20757795325ada70a6e5bfc78212d8ea255,2024-11-21T07:51:44.920000 CVE-2023-2656,0,0,b71b650ca67d3b7186cb875b770791661512eabf755bc7e5377364764511aff5,2024-11-21T07:59:01.027000 CVE-2023-26560,0,0,51e9ef4b60ed16a61f95e3129b907dc7f4cd31bafb42a8b0619c791f98ab887f,2025-02-04T16:15:35.777000 @@ -220691,7 +220691,7 @@ CVE-2023-26593,0,0,602b25afeb2bba96821ac41e04ec66b11e15122d78baba05d0b03413cc5b4 CVE-2023-26595,0,0,24284420d89a05f6e69fa31b2fed484c822ce9177d22aea9b492fabed05f885f,2025-01-28T19:15:11.500000 CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a907,2024-11-21T07:51:49.530000 CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 -CVE-2023-26599,0,0,1dbb1f2d05db14b400489b090477c44b30116883ba51ce5b297c4ac394001c52,2024-11-21T07:51:49.787000 +CVE-2023-26599,0,1,c5e1c6a4e42725cee36588845ac1a7fc3d032881dab1d5f8abf0c196155e5cc9,2025-02-05T17:15:19.107000 CVE-2023-2660,0,0,c5e50d8f7c245a28f7e9c9d744a9c90d554ec4216b5e5c8e04bc31f8bfdce061,2025-01-24T17:15:13.147000 CVE-2023-26600,0,0,fc886529aff42ccdb72f3f96931777e9e70a1824ffc00cacb571e65058ac20b7,2024-11-21T07:51:49.920000 CVE-2023-26601,0,0,a5885f284434b5f08eb9e7edc10d2032bb0cda5c5996581471528822ba1aee62,2024-11-21T07:51:50.100000 @@ -220801,7 +220801,7 @@ CVE-2023-26861,0,0,7be74072fd0b71c0f05d067f3255f9a410239136f7d161580b69c9cd85ec0 CVE-2023-26862,0,0,a323e2b2eccf32f003aebb094d3787a2fd1d3fe0e44c7ec1d011fd797c458524,2024-05-16T22:15:08.847000 CVE-2023-26863,0,0,fa45799bdeec862e091523282c82eae136ca20292826d42a4738bf0162f57b88,2024-05-14T12:39:49.480000 CVE-2023-26864,0,0,dfc6bb834f68467d3d631f71b71357c04e5a6c382d94cc430da2223557bcf230,2024-11-21T07:52:01.560000 -CVE-2023-26865,0,1,64ff0babfdda514826b31e14d598dc9ad1ef45c4dc1d8b480dac14aecc6ae28c,2025-02-05T16:15:35.657000 +CVE-2023-26865,0,0,64ff0babfdda514826b31e14d598dc9ad1ef45c4dc1d8b480dac14aecc6ae28c,2025-02-05T16:15:35.657000 CVE-2023-26866,0,0,36f65c467324f6f057243a53d1b105307c695820cdad46511f9cd3b40298f733,2024-11-21T07:52:01.840000 CVE-2023-2687,0,0,8e40be6ff9e7b27e4741692562218cd9bb261ff9c3c786983a9f27137bcfc414,2024-11-21T07:59:05.140000 CVE-2023-26876,0,0,5803bd9c189b236777e9a8b7085a22fe07880b62538beefa014eb4e24c4b9206,2025-02-04T22:15:39.600000 @@ -220934,7 +220934,7 @@ CVE-2023-27087,0,0,62062eb54281a98680e3ca37472d8d8504959fb8cc251235c57f6fbe0712b CVE-2023-27088,0,0,02388a593b99babc1f18f212d3a41091d176beb534c47dbe7068491745b34256,2024-11-21T07:52:17.920000 CVE-2023-27089,0,0,a75d6ec4a19b11f39de9acb9868bc2c6fab6e5c8f3eed5d4b5445d496a9989eb,2024-11-21T07:52:18.070000 CVE-2023-2709,0,0,52c09fa0e8c7a11d32ae85c41382d6eb6a3bdb8b8ddc5db44b7b01be1d6a910a,2024-11-21T07:59:08 -CVE-2023-27090,0,1,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 +CVE-2023-27090,0,0,1a3f0320c4001f0d005218a016e3cd8f3d06fdcf83168c8eb42da3e6a3a64e35,2025-02-05T15:15:17.530000 CVE-2023-27091,0,0,d4ba304ffb75eea3be25d80217867e80c75976fcd193953ba519ec18469bb160,2024-11-21T07:52:18.373000 CVE-2023-27092,0,0,3494bfe7bf4e1b080c7ef3e8607c202fcbaacf0537210aad5ad7c9fa63e644a0,2024-11-21T07:52:18.527000 CVE-2023-27093,0,0,75ab2d12a6e9a95bb315b505a78454ddc548197730f843a655ef303062aa9b5e,2024-11-21T07:52:18.680000 @@ -221492,8 +221492,8 @@ CVE-2023-27770,0,0,ed5729dc90cfdfd81e54baf3fc09a238ce78bab89e2f6e2cdc6bf50976f7f CVE-2023-27771,0,0,1601262f483cc01b8eb86e0567d650da34ae4e3414ad3c99052e62bcadcff0bf,2024-11-21T07:53:27.830000 CVE-2023-27772,0,0,514827353aaa024439212639e04bf9be4ea67f371fcdc9e40e6caa12862208e3,2024-11-21T07:53:27.960000 CVE-2023-27775,0,0,9ae15fbd9256e03baffe4b812d8f1fcc01c19cb6cdfe529e9f8d65417b84b7c5,2024-11-21T07:53:28.107000 -CVE-2023-27776,0,1,821bfbcd28344012610595833b8a1c5c475750e44dd09aa01bb06cb83268ec2b,2025-02-05T16:15:35.903000 -CVE-2023-27777,0,1,1c2063d3072540194a244cda362095aeba193f1389f9ad1afe3ded887499e55b,2025-02-05T16:15:36.070000 +CVE-2023-27776,0,0,821bfbcd28344012610595833b8a1c5c475750e44dd09aa01bb06cb83268ec2b,2025-02-05T16:15:35.903000 +CVE-2023-27777,0,0,1c2063d3072540194a244cda362095aeba193f1389f9ad1afe3ded887499e55b,2025-02-05T16:15:36.070000 CVE-2023-27779,0,0,d790aa220c83551374b863e724a04b0aa308f2386e7397ef976fe38dadd06feb,2024-11-21T07:53:28.560000 CVE-2023-2778,0,0,5bbe029a7decd4d295a22ffd3ebadb06f532ede0609eb44bb288a23a23fa4562,2024-11-21T07:59:16.390000 CVE-2023-27781,0,0,e3fdf1e3961a5e7eac4856a5307c4b879ab7c3221a076c5199e21687df7797ac,2024-11-21T07:53:28.710000 @@ -221537,7 +221537,7 @@ CVE-2023-27844,0,0,d50e54915915a81c30ae45321cf2d2301ae4439b36ed52c01727a35a9a89b CVE-2023-27845,0,0,e777b579d76cec52bb5b019a8f229f789ae039687ebb3010325b3e376a4defbc,2024-11-21T07:53:33.737000 CVE-2023-27846,0,0,941104c667d49321aacb210fa29956f621f847ee2c27e41941b4c3ab6b70892f,2024-11-21T07:53:33.877000 CVE-2023-27847,0,0,62844f23ee37935036e80ce5acf5576fe72d6fb6cdc26d04ce4f7c19760cae59,2024-11-21T07:53:34.020000 -CVE-2023-27848,0,1,0c963388be691de5974f167a6917467d90a4a8da3b959203f2f48699548ee7ad,2025-02-05T16:15:36.227000 +CVE-2023-27848,0,0,0c963388be691de5974f167a6917467d90a4a8da3b959203f2f48699548ee7ad,2025-02-05T16:15:36.227000 CVE-2023-27849,0,0,a672b66aee18b9240ef056f8fa5466105af02d52c649cd6384b53c8d39a9a732,2025-02-04T21:15:23.217000 CVE-2023-2785,0,0,32a4fde4055fab2ae0babd5e2df22df8cc2bf5be43e046bbe98a3b2c6842764b,2024-11-21T07:59:17.157000 CVE-2023-27850,0,0,71b21b65fcd76eb680e8b031380805418217be8fa9ef4d61f11e0e59009a40da,2024-11-21T07:53:34.497000 @@ -221818,9 +221818,9 @@ CVE-2023-28119,0,0,177e497f643703ca71425d1fd44f8f0691bf1adeafa102f689da7214fb973 CVE-2023-2812,0,0,8ca2b5941b57d889e8050dd01df5d6332faab3b7c9be173cb34b6d5df0649316,2024-11-21T07:59:20.210000 CVE-2023-28120,0,0,57858c0e8bcf3062b0118eda472c86c2cdc9f51919a4f4773f1ac03b842e6fad,2025-01-09T22:15:26.470000 CVE-2023-28121,0,0,ec8fff6d6e41724f8544797a24801e52673d8d932749cae73931ca46b253f482,2024-11-21T07:54:26.807000 -CVE-2023-28122,0,1,b359e6236b4954ac09ea6a32bc8d9aa89032ba351b6849c3c2c28d16ea83d542,2025-02-05T16:15:36.393000 -CVE-2023-28123,0,1,46f37dbc0e0112cb0dd69e80793c68816a08e91d60f8e604dabec44aff3e353b,2025-02-05T16:15:36.570000 -CVE-2023-28124,0,1,b18e9b693b2a93383a97281dd224f7260b32cf72749320c4b7440536107c967d,2025-02-05T16:15:36.730000 +CVE-2023-28122,0,0,b359e6236b4954ac09ea6a32bc8d9aa89032ba351b6849c3c2c28d16ea83d542,2025-02-05T16:15:36.393000 +CVE-2023-28123,0,0,46f37dbc0e0112cb0dd69e80793c68816a08e91d60f8e604dabec44aff3e353b,2025-02-05T16:15:36.570000 +CVE-2023-28124,0,0,b18e9b693b2a93383a97281dd224f7260b32cf72749320c4b7440536107c967d,2025-02-05T16:15:36.730000 CVE-2023-28125,0,0,0616c4138262008237abdee41d5f561abece0c6d638bef244f113ce62e2e6682,2025-01-29T15:15:14.183000 CVE-2023-28126,0,0,bcb8774a138aa415cbb5c4ad25484eb894a58ab2d3cc19ed89da6e10d3d73bf8,2025-01-29T15:15:14.370000 CVE-2023-28127,0,0,cb19d557cd45d8477d19041eef65b871de8872b2af726736e204161a4df672c8,2025-01-28T21:15:13.850000 @@ -222147,8 +222147,8 @@ CVE-2023-28452,0,0,f7bdbc2707bc443c32295ea89c4ca1b1e877009a884c2b37f115deffda56d CVE-2023-28455,0,0,35ea718bf721353b2fccbefa5e75e3cd5d4db1c6d87124b3e260abdc51e1cbc4,2024-09-20T12:30:17.483000 CVE-2023-28456,0,0,b56a2ec13d364fd47f661f5ba31417649c631f13047894d771fb783c6fef2e0d,2024-09-20T12:30:17.483000 CVE-2023-28457,0,0,ed0f3ac2e4953436e0dc9bc5896ba5d257379eb46b862a12d1b17c963c152263,2024-09-20T12:30:17.483000 -CVE-2023-28458,0,0,c44cb971b55188dbb599680d67f7eed413ef57783f3c0196a24237763a332e8f,2024-11-21T07:55:07.423000 -CVE-2023-28459,0,0,610597647fb7a90dc167138425aaa91c68610fa3465e918af849b8e09426ed00,2024-11-21T07:55:07.603000 +CVE-2023-28458,0,1,684fdbe0aeb7a6b004b1659801326dbb0a943e2916f24604f089deeac708b770,2025-02-05T17:15:19.327000 +CVE-2023-28459,0,1,7c76063992eae86526662d50ecc282263d634e7f03574dc400a654ae98dc6654,2025-02-05T17:15:19.507000 CVE-2023-2846,0,0,7a507d7d271106d46b171e5e924f7857037c5f72738c2f9476b291552ffdb11b,2024-11-21T07:59:24.447000 CVE-2023-28460,0,0,8e137b0c1718b016f1ded4b801a04fe00403ef9226622c0fcb282f677e163fe3,2024-11-21T07:55:07.767000 CVE-2023-28461,0,0,b734dc37bc99200598f1ee9fcd5c811044ce1d1d95438d974fcc0a308eb66f72,2024-12-02T17:15:05.133000 @@ -223184,7 +223184,7 @@ CVE-2023-29581,0,0,b2d2330921442eb690e82ceaa993a97dc0e4db49222831eeff58ab8d51447 CVE-2023-29582,0,0,2add030c257342a987a9b60a6c0dfb5b426b66d701322d491cb826ce96ad9787,2024-11-21T07:57:19.117000 CVE-2023-29583,0,0,69974d66fdc717932bb8fccfcf9b06054e3bb6b3a73618d45e95b15a9bf6a87c,2024-11-21T07:57:19.260000 CVE-2023-29584,0,0,8e10567fc09e06b3c07aad2bc0705e845e680d300d45798207a6b76c42e2c104,2024-11-21T07:57:19.470000 -CVE-2023-29586,0,1,98116a856f01d9d4096d9a5075d89a1b4b440a9f61755d6757000f309a41a2c1,2025-02-05T16:15:36.960000 +CVE-2023-29586,0,0,98116a856f01d9d4096d9a5075d89a1b4b440a9f61755d6757000f309a41a2c1,2025-02-05T16:15:36.960000 CVE-2023-2959,0,0,a9aa08aa561b1d6c5732ee73448eaa9b45e1cb201497139b7bfed222d6966e25,2024-11-21T07:59:38.973000 CVE-2023-29596,0,0,1085bd16088b869d6a0822e3e3e6189decd8fc2b3882df4247b9172a570a9e3e,2025-02-03T18:15:29.870000 CVE-2023-29597,0,0,e1763ab618763e98f35a4c4923d04a00d0c2ecd63630e837c45d9638b844255e,2024-11-21T07:57:19.903000 @@ -223334,28 +223334,28 @@ CVE-2023-29881,0,0,743552443730fdd36f18e4ebad1dc0e6a7f1128edebcc69bad2b1c3ef8e16 CVE-2023-29887,0,0,28d33e24e42c7a56252eb1ade65cbfa65c608b0e4ddbc5ba0b5ae307cd213d46,2024-11-21T07:57:36.730000 CVE-2023-2989,0,0,3fc9cb6a14480daf23deeb01445decb3425c3d5e8c70d06b62a5de9fc4adf222,2024-11-21T07:59:42.480000 CVE-2023-2990,0,0,e9e2b2b5b5314d54af984abd061f93305ad382cfe787559622696405ee308d32,2024-11-21T07:59:42.607000 -CVE-2023-29905,0,1,2da9190f179b662d94b78c4786c051859268ab87a2446da169598d8fe1791d2a,2025-02-05T16:15:37.143000 -CVE-2023-29906,0,1,e34d7aeb8ca82d37463dbbb13668d0d4dfbf62b4be1da5c202b79574e614ddc2,2025-02-05T16:15:37.303000 -CVE-2023-29907,0,1,62793a99bbc2df78a35edbc59e1abc186ca1c3f080c3fa4c833d443c37d79e60,2025-02-05T16:15:37.450000 -CVE-2023-29908,0,1,ef43b97ceb37bdbb597d599d26a60849dad3316e1467d91cd0fcc83248a45876,2025-02-05T16:15:37.607000 -CVE-2023-29909,0,1,d6a6d33bfb856f6a5dd33e432ba7d696a8f97efbba52dd44eeb9515fcd51d947,2025-02-05T16:15:37.750000 +CVE-2023-29905,0,0,2da9190f179b662d94b78c4786c051859268ab87a2446da169598d8fe1791d2a,2025-02-05T16:15:37.143000 +CVE-2023-29906,0,0,e34d7aeb8ca82d37463dbbb13668d0d4dfbf62b4be1da5c202b79574e614ddc2,2025-02-05T16:15:37.303000 +CVE-2023-29907,0,0,62793a99bbc2df78a35edbc59e1abc186ca1c3f080c3fa4c833d443c37d79e60,2025-02-05T16:15:37.450000 +CVE-2023-29908,0,0,ef43b97ceb37bdbb597d599d26a60849dad3316e1467d91cd0fcc83248a45876,2025-02-05T16:15:37.607000 +CVE-2023-29909,0,0,d6a6d33bfb856f6a5dd33e432ba7d696a8f97efbba52dd44eeb9515fcd51d947,2025-02-05T16:15:37.750000 CVE-2023-2991,0,0,1fb5470532af59688ae4e2d4a43b180cee5fae471b78dd83681e01a7bf302208,2024-11-21T07:59:42.730000 -CVE-2023-29910,0,0,f86cfd4fefc29f835c81e6f5e702fbc0a9d8cc0a82ccffe9d4055871067f22bb,2024-11-21T07:57:37.543000 -CVE-2023-29911,0,0,4bf8501546d45252646eaabc3c1e1d893a60ce93866c2998401af5712fc87fbf,2024-11-21T07:57:37.670000 -CVE-2023-29912,0,0,74cd3446efd132c5787c21ce2b57993b549101268861aa13ecc1b7cac9da287d,2024-11-21T07:57:37.807000 -CVE-2023-29913,0,1,b29cd13c139daf25b8d81b947df3eb207e5e1ddf90378024365cdbbb60ce8c42,2025-02-05T15:15:18.437000 -CVE-2023-29914,0,1,777a9388331df443c2b7340c2c765acd7d604988d0f4d4ef4eb1d5bfd808b043,2025-02-05T15:15:19.060000 -CVE-2023-29915,0,0,0ce0397192842c252b846962bced464e60694e0efb915231157cc6a2f5bb39cb,2024-11-21T07:57:38.200000 -CVE-2023-29916,0,0,32e47b0c304e58029efd0b2bd53fdd0cc99d8d2784e9816056bd8fec28f9a672,2024-11-21T07:57:38.333000 -CVE-2023-29917,0,1,9f2fa7153d4f4b947b24b871446aede215e154eca6f9ac3c263eb32ade23c1ba,2025-02-05T16:15:37.900000 +CVE-2023-29910,0,1,50461737acb0f84c886c6472c915b7cfe5c391f8d5c4ccc9665326b33cb47759,2025-02-05T17:15:19.673000 +CVE-2023-29911,0,1,6c6ed791d6e6447b6978b42ed6e9c8b65370fcb51f55d64e99ea5b6e66df7025,2025-02-05T17:15:19.837000 +CVE-2023-29912,0,1,10c3076c3da7390a88f7810a798abca780a3f5947055014ccaea78919d31b05f,2025-02-05T17:15:20 +CVE-2023-29913,0,0,b29cd13c139daf25b8d81b947df3eb207e5e1ddf90378024365cdbbb60ce8c42,2025-02-05T15:15:18.437000 +CVE-2023-29914,0,0,777a9388331df443c2b7340c2c765acd7d604988d0f4d4ef4eb1d5bfd808b043,2025-02-05T15:15:19.060000 +CVE-2023-29915,0,1,6ce9913918262746f703050d5b123a3c04ffabf585e7b25570cc65bcb091f02f,2025-02-05T20:15:36.620000 +CVE-2023-29916,0,1,b25bf99a6144fb88d1680a139f9c571e4e62b04bd6cfbc553eb8288500e7fc37,2025-02-05T20:15:36.793000 +CVE-2023-29917,0,0,9f2fa7153d4f4b947b24b871446aede215e154eca6f9ac3c263eb32ade23c1ba,2025-02-05T16:15:37.900000 CVE-2023-29918,0,0,fef93d2a9a9687d4e52cf8002ec15e860b241f52e1a1e5e412daa0954741ed86,2025-01-30T17:15:15.450000 CVE-2023-29919,0,0,534b6a0e578a3fd9502e76366d66ebb50860789124d34973be718a270ba8a952,2025-01-17T19:15:28.213000 CVE-2023-2992,0,0,81c4ed0720a0b4f1ca1bbf98c6c15a905ea91d77d082061cdcae83daa76516dc,2024-11-21T07:59:42.850000 -CVE-2023-29921,0,1,30ee33613e8b1bd90c6b1658a37f202c2b3bb2062d6dbb5e5f9eac99b72d0eee,2025-02-05T16:15:38.050000 -CVE-2023-29922,0,1,d49a095fb1dc00f2dc379a624853ffe1d7fde0f64e0fe0756562216e786716c9,2025-02-05T16:15:38.203000 -CVE-2023-29923,0,1,1c0dda1f0ce1916519f31dc1219d41e1e24c1d34f0e04399c08999a57896e444,2025-02-05T16:15:38.350000 -CVE-2023-29924,0,1,e69288ae7fad881a3bcbd275aad85e2a1cf7aee5129343e422bf31d4a8f11eb6,2025-02-05T16:15:38.500000 -CVE-2023-29926,0,1,64d26e35af706e740066178b179a379019ca58462688aab1c27b65dba33229e8,2025-02-05T15:15:19.233000 +CVE-2023-29921,0,0,30ee33613e8b1bd90c6b1658a37f202c2b3bb2062d6dbb5e5f9eac99b72d0eee,2025-02-05T16:15:38.050000 +CVE-2023-29922,0,0,d49a095fb1dc00f2dc379a624853ffe1d7fde0f64e0fe0756562216e786716c9,2025-02-05T16:15:38.203000 +CVE-2023-29923,0,0,1c0dda1f0ce1916519f31dc1219d41e1e24c1d34f0e04399c08999a57896e444,2025-02-05T16:15:38.350000 +CVE-2023-29924,0,0,e69288ae7fad881a3bcbd275aad85e2a1cf7aee5129343e422bf31d4a8f11eb6,2025-02-05T16:15:38.500000 +CVE-2023-29926,0,0,64d26e35af706e740066178b179a379019ca58462688aab1c27b65dba33229e8,2025-02-05T15:15:19.233000 CVE-2023-29927,0,0,8c0ed9e92ee795f740bcdf7c131e3d0960c5a2e682f158e2b7aef95cb928028e,2025-01-23T17:15:08.900000 CVE-2023-29929,0,0,89689cc0d589b548565776a1f9c20a9242bc552fbd3ea504259e60f206c4df26,2024-10-24T20:35:02.040000 CVE-2023-2993,0,0,d09ce493716b6c2ceed43ad84793268baefda5e0740c034c26ea1ce6004043d2,2024-11-21T07:59:42.997000 @@ -223411,7 +223411,7 @@ CVE-2023-30061,0,0,44d8cc46dd8286395b41f25d8d4b34dd2d4e3f034d1a70776191aeddd1485 CVE-2023-30063,0,0,100e408460bc510f63b856e99bd8d362b458470bafa148964e558f6edb7dca2c,2025-01-30T18:15:30.587000 CVE-2023-30065,0,0,26a5814b4662731086b3c3d85417ca8bd31edc0c535576d71952cc8dd5b16fed,2025-01-29T18:15:46.160000 CVE-2023-3007,0,0,f0355e13f4eb14c81beaf2179390fb6061e9d5c3a775947390412e14a9933299,2024-11-21T08:16:13.547000 -CVE-2023-30076,0,0,f0314aac8f3678c61080de1422ef796fa7bf57029d3f4a8e49de2263fb0b67d6,2024-11-21T07:59:46 +CVE-2023-30076,0,1,9ce3e61d1601301bbdcb455bb70afc153badc0235c37aa47b5c2e6e9896a7337,2025-02-05T17:15:20.343000 CVE-2023-30077,0,0,482a59315e6ecb44b69a15206b1a9d71b4c61e87270f14332701c20638a80431,2025-01-29T20:15:31.980000 CVE-2023-30078,0,0,b59993147a62c797f33e7c496e57076f579e3cbe18fcb581691b3e11b875ebeb,2023-11-07T04:13:39.507000 CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f65ad,2023-11-07T04:13:39.547000 @@ -223573,9 +223573,9 @@ CVE-2023-30370,0,0,0dcfb08939f88694cace16ca81996d005560ab28efc2ffa2565718ca1efec CVE-2023-30371,0,0,4acb4109784a35dc60ebaceeeb69254dd0ed30054145a7fd5106e5487a8cb5e7,2025-02-04T21:15:25.117000 CVE-2023-30372,0,0,1716c5ff5e212f3369be75d957cdf7fb011e3d57c9c985c7e97194d3736af214,2025-02-04T20:15:47.100000 CVE-2023-30373,0,0,9fe2ae74bd39e6f3bd02aeae188f1446f7ccd60576d6ef7958c8635263ef6bc5,2025-02-04T20:15:47.290000 -CVE-2023-30375,0,1,1b03c091d3fa5b468a798e486c855f525624beebb2a6b43c28c6fe4bc2682cf7,2025-02-05T16:15:38.913000 -CVE-2023-30376,0,1,18f91fee15163dd880ecd5a32fa3e4157904606c602b2b25756807285b6fbc47,2025-02-05T16:15:39.070000 -CVE-2023-30378,0,1,a7ff979d71c77e16e50f5ebdbb1d209fe66445355eb0765065a97870e0b1286d,2025-02-05T16:15:39.213000 +CVE-2023-30375,0,0,1b03c091d3fa5b468a798e486c855f525624beebb2a6b43c28c6fe4bc2682cf7,2025-02-05T16:15:38.913000 +CVE-2023-30376,0,0,18f91fee15163dd880ecd5a32fa3e4157904606c602b2b25756807285b6fbc47,2025-02-05T16:15:39.070000 +CVE-2023-30378,0,0,a7ff979d71c77e16e50f5ebdbb1d209fe66445355eb0765065a97870e0b1286d,2025-02-05T16:15:39.213000 CVE-2023-3038,0,0,f94e5be791b5988f81c55513fb4e21975b5d007bb4a0dbf128136e9d14133ae6,2024-11-21T08:16:17.920000 CVE-2023-30380,0,0,332dbe6fc76c0a533761c26561e4eebf465c526cc07e8f10765e6ce80f6f1514,2025-01-31T19:15:14.680000 CVE-2023-30382,0,0,8b5439e9e1c0731e2487a576225ed7d67ba20cf2f5a7cd23dc6fc8a77464507c,2025-01-17T19:15:28.400000 @@ -223589,10 +223589,10 @@ CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000 CVE-2023-30404,0,0,4a301a48c4024f8447b46042761068d12c44dee209a91c3356951f47bc7ec7bd,2025-02-03T18:15:32.673000 CVE-2023-30405,0,0,f7e4fa427c57bcf1c9c6861612ffcad1ae14994e8d0a25ac5c7acb06b73af467,2025-01-30T21:15:12.067000 -CVE-2023-30406,0,1,1ee4b32445403ac766d24ef0f424bcfb1ca9196de93bdbaaa4de3c11cea22fa5,2025-02-05T16:15:39.403000 -CVE-2023-30408,0,1,5d504f3ba1f97f1c78fa0207d9ee733df3b0b00be0a065f323a028f7eea0be37,2025-02-05T16:15:39.583000 +CVE-2023-30406,0,0,1ee4b32445403ac766d24ef0f424bcfb1ca9196de93bdbaaa4de3c11cea22fa5,2025-02-05T16:15:39.403000 +CVE-2023-30408,0,0,5d504f3ba1f97f1c78fa0207d9ee733df3b0b00be0a065f323a028f7eea0be37,2025-02-05T16:15:39.583000 CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000 -CVE-2023-30410,0,1,07b654def952b9a2a48b1d0beac664474f28ae7a35d10f863f8518852bd5d967,2025-02-05T16:15:39.733000 +CVE-2023-30410,0,0,07b654def952b9a2a48b1d0beac664474f28ae7a35d10f863f8518852bd5d967,2025-02-05T16:15:39.733000 CVE-2023-30414,0,0,9aa30f715c05fc770bdab088b3113382f1f6aad254f3203431806deea5e6622a,2025-02-04T20:15:47.487000 CVE-2023-30415,0,0,efd35706be955fb3f0568ba745c5a2d63e9e799147ed7a7cf625c154c6aa8f00,2024-11-21T08:00:08.980000 CVE-2023-30417,0,0,4bbe51d65d2d171ff652f5e9fb583606ead4b32a5292bf5364f96b63506dc441,2025-02-03T18:15:32.860000 @@ -223630,7 +223630,7 @@ CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87 CVE-2023-30458,0,0,54efc1cdc6076bb0e9a5822f69d4f84e7010f56155d724984fcb662fabcfb5fc,2025-02-04T20:15:47.677000 CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000 CVE-2023-3046,0,0,0c43b83d572e31af7ba5dc3e0b4368bb707a94e6e7c71478ba4d056778b071d0,2024-11-21T08:16:19.097000 -CVE-2023-30463,0,1,55244da8ef2cf290fce70edf35038b84a2a1124cff9571767641e4518fa8a64a,2025-02-05T16:15:39.887000 +CVE-2023-30463,0,0,55244da8ef2cf290fce70edf35038b84a2a1124cff9571767641e4518fa8a64a,2025-02-05T16:15:39.887000 CVE-2023-30464,0,0,0567500deb00f0caee3bf16d21bfe9be68bcbc9636a9ba14fa4c72d936e16dc7,2024-09-20T12:30:17.483000 CVE-2023-30465,0,0,ae8116cd1c808d6d82c244e09060c865df1a708af2398ced071846be0a7a429f,2024-11-21T08:00:14.247000 CVE-2023-30466,0,0,d35c0bfc4b3c0ce67ca529c0a2f00e895f205331a36edd1ddc1e653e2b7c2f92,2024-11-21T08:00:14.443000 @@ -223770,8 +223770,8 @@ CVE-2023-30607,0,0,849ea2b0f51e89e6428424191235fecf33d2dab20e1182071c6a4d9945573 CVE-2023-30608,0,0,3589fabf4e6065426491640b1aa51cf9093ca8096a1cf497626b1e5acdbeea30,2024-11-21T08:00:29.867000 CVE-2023-30609,0,0,e3ceff4a27a3c448caac377407d9636e91975c92f28317e1babec8b4a33e9478,2024-11-21T08:00:30.010000 CVE-2023-3061,0,0,fcb4ddd8e394edb871a0cd70726b2ed8e3aa3b7c9c3541fc9006dfadded95a2b,2024-11-21T08:16:21.223000 -CVE-2023-30610,0,1,8a1fc13576aa95d5ed80c38ae01ffd829470cf0049a23d86a3275cf36c2fcf90,2025-02-05T15:15:19.460000 -CVE-2023-30611,0,1,6ad52b28281b49cc4df31ee0ac663d2885d3c38db8c56e0d13219d31eee4e746,2025-02-05T15:15:19.670000 +CVE-2023-30610,0,0,8a1fc13576aa95d5ed80c38ae01ffd829470cf0049a23d86a3275cf36c2fcf90,2025-02-05T15:15:19.460000 +CVE-2023-30611,0,0,6ad52b28281b49cc4df31ee0ac663d2885d3c38db8c56e0d13219d31eee4e746,2025-02-05T15:15:19.670000 CVE-2023-30612,0,0,d7f7e88aff6aa83a11b54529f2b37227e3c31ef1ebb694d42eebf428845447e0,2024-11-21T08:00:30.417000 CVE-2023-30613,0,0,cdc7b04e50f0a03dddbc6795ab9ad3eb27eaa8ff998d5c5a32ff4ff3f047d0c1,2025-02-04T19:15:29.360000 CVE-2023-30614,0,0,a08c6f3c3cca126fb6133dfe18153250c0830a444a929470a01945271a053b48,2024-11-21T08:00:30.693000 @@ -223919,7 +223919,7 @@ CVE-2023-30744,0,0,9964a8260f05c05411743fa374dcdceb2c015667c30060d42e40ab4f8a94f CVE-2023-30745,0,0,c16745a0400d8d19cfa3210ee056d0ce1a52865786d66ae56f94c3e5a9ea54f2,2024-11-21T08:00:49.253000 CVE-2023-30746,0,0,111029a9b27ac78f0ddef87aab72c622d620f5dae5231d8269f0430315cda5b6,2024-11-21T08:00:49.380000 CVE-2023-30747,0,0,1d40e5b176c2e04142b5b70c2926c73b1d9bccb8617298182ea095c931dbfef2,2024-11-21T08:00:49.510000 -CVE-2023-30748,0,0,b358d0b3e016ff6b33621fc49dc3952d73a18ac6dff62d4089c52ac8ab27a925,2024-12-09T13:15:28.030000 +CVE-2023-30748,0,1,de7f6886304405b5c7a5ec439fbc32f9997bfe9eb4f1d2598156429e263d5764,2025-02-05T20:26:23.203000 CVE-2023-30749,0,0,3b615d092c6e391764ff44cb989e10a830fd1a5f7a8b43ec90307fe0d61dada3,2024-11-21T08:00:49.650000 CVE-2023-3075,0,0,1075db2248221b590e8e8865d27212ab5af28bf75e5c538c2957eb6ac4aca257,2024-11-21T08:16:23.293000 CVE-2023-30750,0,0,2678ddcb2717728a18c2d3402b82f76d36d70bfe32c4c6311daf6a6310fac67d,2024-11-21T08:00:49.807000 @@ -223969,7 +223969,7 @@ CVE-2023-30791,0,0,8af240725d0fbeb118fa2f99d54364cfd184e2b65d09d8fe085a7f73c134e CVE-2023-30792,0,0,1c9ccbffa0866f88486178ac46d3bd535e6b60690cee2c6c9407503cccb28e36,2025-01-30T17:15:16.647000 CVE-2023-30795,0,0,706eba1a0a770e345d69e7da71cb132bd3b853f81b3bdab05a71689424c4b984,2024-11-21T08:00:55 CVE-2023-30796,0,0,8b23a9d82c53062ba8dcc167125aab3030e9e0f0bf2daa5ea43d651cf7117db7,2024-11-21T08:00:55.130000 -CVE-2023-30797,0,1,24eb5e4682d99baedf7b917ddcb2c52b2dd91a3aa162ff4e1a4c15dfc4254047,2025-02-05T15:15:19.940000 +CVE-2023-30797,0,0,24eb5e4682d99baedf7b917ddcb2c52b2dd91a3aa162ff4e1a4c15dfc4254047,2025-02-05T15:15:19.940000 CVE-2023-30798,0,0,ff10a837aabf43e724dff2b7aad01f5cfb30ea4eb6a3932571417a8c9f38b5a8,2024-11-21T08:00:55.400000 CVE-2023-30799,0,0,e828bb3744cf4e4f4b63c3f751e2ce61fc687f44357cba427c92d59e84cef371,2024-11-21T08:00:55.520000 CVE-2023-3080,0,0,cb6f034a8bdc4cd23371acf34e1cd83bd684bc48a09e27b8d8a073ba66044810,2024-11-21T08:16:24.033000 @@ -224206,7 +224206,7 @@ CVE-2023-31087,0,0,b21cb6ea1662dc000d52a1f3d395f431da26df974532991d646b813d116bf CVE-2023-31088,0,0,66b53938ae5149c85fdbb161e54ed016c2029b58ab1ecc6b6c28fa2172909b1d,2024-11-21T08:01:23.540000 CVE-2023-31089,0,0,6b9494d4c63f2a2b39c18c8735391c7411f330ebfdab193f99505d2bca82f208,2024-11-21T08:01:23.660000 CVE-2023-3109,0,0,2fa7e1fd33c9738996ba3c9fe26090868f2bd11bb25eb82d3031e606b5c42ea7,2024-11-21T08:16:28.740000 -CVE-2023-31090,0,1,102abfb3de28a41dae5f0d96099b0106f5e53a90b07d3fc35187dacd08f8f057,2025-02-05T15:45:37.097000 +CVE-2023-31090,0,0,102abfb3de28a41dae5f0d96099b0106f5e53a90b07d3fc35187dacd08f8f057,2025-02-05T15:45:37.097000 CVE-2023-31091,0,0,0c02a8e357e7f89a16b675e40ce18947720517c972b0a2ad8420885dc56618b4,2024-11-21T08:01:23.897000 CVE-2023-31092,0,0,44b8605e0deb7cb383dd847091b79ba4b67067b28b27774901f6dc865cc037ed,2024-11-21T08:01:24.017000 CVE-2023-31093,0,0,1be168c433939a02c2a5f667e9e6b93bf1a366ac23c55c49f7506d18e3f6ddaa,2024-11-21T08:01:24.133000 @@ -226427,7 +226427,7 @@ CVE-2023-33927,0,0,2cd420ab972737cb431353c51d5a13f68b965888b66df5031a55b764ddbf6 CVE-2023-33928,0,0,701a8ec856ec32ac0b30f27abc99c3e45734c3f684d688e7949a48603ee0d76a,2024-12-13T15:15:13.760000 CVE-2023-33929,0,0,e9475671a3eeece71d2b06bc14ba04daaa0d894d5ad63b3c55448c6bc73da24d,2024-11-21T08:06:13.690000 CVE-2023-3393,0,0,76959b40fe7647620e32a114e79ab8507b07b6a4b03312e5cecd6e5cf48dbde4,2024-11-21T08:17:10.440000 -CVE-2023-33930,0,1,3b63c63f2b16616cfe459ce3d971085334812f15c098441dfc554c36be635d4c,2025-02-05T15:35:49.303000 +CVE-2023-33930,0,0,3b63c63f2b16616cfe459ce3d971085334812f15c098441dfc554c36be635d4c,2025-02-05T15:35:49.303000 CVE-2023-33931,0,0,8f1b29b0f53282497566c5b0d92577ea88f4abf19e709528a535933798dc21ee,2024-11-21T08:06:13.933000 CVE-2023-33933,0,0,a4c2e5becba15435ece5946c27e58e5ac38f0d68b5e4dd23b9f2a66b0036f778,2024-11-21T08:06:14.060000 CVE-2023-33934,0,0,a642be573b2e7dd2f4d203889be0252b93ed7bec36614f588eb01ffcf9fadca1,2024-11-21T08:06:14.257000 @@ -226797,7 +226797,7 @@ CVE-2023-34299,0,0,499ddd41a5717b1b9008439dc2bc479f8ea277c44a33d707d0d40c5c09f3f CVE-2023-3430,0,0,d115ce20f6bc8b3eab0270d83b601f59080de37d6f423b10c90d4b7b6daf9023,2024-11-21T08:17:14.940000 CVE-2023-34300,0,0,7bd179ce7ca8155f53febe98fce0c635489d0193cb84b1b609bc6bf05c8f7b56,2024-11-21T08:06:57.930000 CVE-2023-34301,0,0,e62c8b771f054c8b49b78a5dd7193d3ad08e0c16be4183c8b216cd959e5dcaf0,2024-11-21T08:06:58.043000 -CVE-2023-34302,0,0,e37992e49d1ea49c7e0f47b73e26968ade80ddeaa98d1ff1efe3039caca678cf,2024-11-21T08:06:58.153000 +CVE-2023-34302,0,1,96ad3673b67be0d6243c10f94f2ab1a5cc2de1a701781efc604b2d185f7207fa,2025-02-05T17:15:20.573000 CVE-2023-34303,0,0,2b67742f8b628c3ea41957a97deb72a1dd461ef89f50d632c78f306262d31717,2024-11-21T08:06:58.267000 CVE-2023-34304,0,0,4e731349b14c397634f8c141ff52f7ba066fb5eedd33ea0ebe93c24a537e27be,2024-11-21T08:06:58.380000 CVE-2023-34305,0,0,629347a4675b076757cbaa8d89fd28dac10938e8ff707bf6605054fac7a19395,2024-11-21T08:06:58.503000 @@ -227589,7 +227589,7 @@ CVE-2023-35704,0,0,4255aa211913babac44aa634b0edab5461cdf457227a692c7e6ef9d22b3aa CVE-2023-35708,0,0,b65523d2611ebc61f8fbfc4fb0a0b41b10b4643677d838e9805a235a1f3c6cf2,2024-11-21T08:08:32.860000 CVE-2023-35709,0,0,c755a044fd0a1204ec07fa8317c367cfdac494dc10e92658cb3a9a05a548e7c9,2024-11-21T08:08:33.010000 CVE-2023-3571,0,0,c6ff9323dc2ab380d70a4ab141f3e78033076fef5eaaf09160335ed9099cdf7a,2024-11-21T08:17:34.437000 -CVE-2023-35710,0,0,b13910592944a7f567d1106fb3b639818c6bc6973799fd49f7acc858d973c172,2024-11-21T08:08:33.130000 +CVE-2023-35710,0,1,98d534ed28e9753c73897d2962e69c231bf90a06ac18b59f0c54cd5bea1f7cc9,2025-02-05T17:15:20.760000 CVE-2023-35711,0,0,ba748fc4951eca55c1f00647dcb0671237b5139394644a9c014025a8794d04a8,2024-11-21T08:08:33.247000 CVE-2023-35712,0,0,b72c5b3baac32cdb8484c4e23c4cf5bc4db35177931241ce80a1847121437b09,2025-02-04T17:15:15.947000 CVE-2023-35713,0,0,f41d6cbb9ff0b3aaa2bc5f87c7adb92738a549e38a7a62a9c203263da7f18037,2024-11-21T08:08:33.490000 @@ -230561,13 +230561,13 @@ CVE-2023-39302,0,0,cc97a2ac1f7f8d4f9dfe686a5c30a27a8c320728e5916237a0f3d842864fa CVE-2023-39303,0,0,659de3a62c707c45769dcd1e8ba9b95f664209df1466d05a52901e3090976b26,2024-11-21T08:15:07.003000 CVE-2023-39305,0,0,71d0053affa61dbc24433e34451d14b71b9e4b509bf5735976359a19da8a7b5e,2024-12-13T15:15:20.173000 CVE-2023-39306,0,0,fde80f38a4716443e084777d8c08f70218d62e5946eba1d9ddc6301c28779a58,2024-11-21T08:15:07.153000 -CVE-2023-39307,0,1,a7940eb1f8aad12fcf19a5f91b95cfb4f9a84b6419e2f80f0095183bf4bd4803,2025-02-05T15:39:33.487000 -CVE-2023-39308,0,0,b3ca1edf10eec974f65c518b4655493b17056b1bbbd3ec4460e1aa007aae2da6,2024-11-21T08:15:07.447000 +CVE-2023-39307,0,0,a7940eb1f8aad12fcf19a5f91b95cfb4f9a84b6419e2f80f0095183bf4bd4803,2025-02-05T15:39:33.487000 +CVE-2023-39308,0,1,75970ce6fe21086133b55990b0a557f26cb7bac51b69ae55b9c8216ce5e0e23b,2025-02-05T17:51:56.857000 CVE-2023-39309,0,0,1d763de988dfea400e3a675a54795f2a4a955f880fd5bc73c045b6b313b84037,2024-11-21T08:15:07.593000 CVE-2023-39310,0,0,75403b2f19816b4be9fd21a06e1da93f9cda4c8405f4f1bd05f52acf0391f8a5,2024-11-21T08:15:07.730000 CVE-2023-39311,0,0,00b57764f5417d506961324a939564ac46c04a85a4c22b3ad65671e66a0c2a96,2024-11-21T08:15:07.853000 CVE-2023-39312,0,0,6bd49d09bf3f892920b74a2bad2796d0d4d956d42622b2ecfd651511f389b423,2024-11-21T08:15:08.020000 -CVE-2023-39313,0,1,660a98aff174f5d7212a1e464a4d2aa5a449a0c686a3c4158e705be272326e70,2025-02-05T15:41:40.130000 +CVE-2023-39313,0,0,660a98aff174f5d7212a1e464a4d2aa5a449a0c686a3c4158e705be272326e70,2025-02-05T15:41:40.130000 CVE-2023-39314,0,0,504cbe8be7b5aff8535abf7196c1cabb026302d43d93333b447be3406f830056,2024-11-21T08:15:08.300000 CVE-2023-39316,0,0,7a4a612464832639758f30d5dc9bdcde3d50a3b97cfa2f09993430d0ca116066,2024-11-21T08:15:08.443000 CVE-2023-39317,0,0,8dbb4834a517f9a1227f238ecadd3f8ded704778c332feec666e3e06f1e09672,2024-11-21T08:15:08.577000 @@ -230994,7 +230994,7 @@ CVE-2023-39919,0,0,eceb8d1d5881fe8a149bd3052a23005b410596e9a3406c01afbe0cb673251 CVE-2023-3992,0,0,0b391223ae2f9e5d5f2cbe1ea6d0884ac9477f4cbd227db768055f7fd5e02948,2024-11-21T08:18:29.307000 CVE-2023-39920,0,0,01f1ef3a4c37cdb4d085868221ff9b980238074838047745fbcd40e253790ab4,2024-12-13T15:15:20.317000 CVE-2023-39921,0,0,218f0798cb145127f07692b3739ed5ec5c4d5cee27232b9cf214f9e652694688,2024-11-21T08:16:02.637000 -CVE-2023-39922,0,1,29521473c28de8c9c4afc93d0df88785767ef3f7822798aae6bc544030c4ef6f,2025-02-05T15:04:43.720000 +CVE-2023-39922,0,0,29521473c28de8c9c4afc93d0df88785767ef3f7822798aae6bc544030c4ef6f,2025-02-05T15:04:43.720000 CVE-2023-39923,0,0,45f105cd3d191131672c3e4c1872849540bd026ee3e33f27577e615813890d05,2024-11-21T08:16:02.910000 CVE-2023-39924,0,0,865f332b914e99f02ab7cb55e15281d38483647ff4cb8a601398e0ed34d05f2e,2024-11-21T08:16:03.057000 CVE-2023-39925,0,0,fc7989c86ed9b3a0ecaf08482cfbf4e657a6b51e83cab5f3cd7cd9b99a8ee4c5,2024-11-21T08:16:03.200000 @@ -236556,7 +236556,7 @@ CVE-2023-47489,0,0,e90a28b4fe0f175eb4ea0e3160524e16396ee8b9ead64f7259cb2e16cf838 CVE-2023-4749,0,0,ca6e00963a427aee3acbbc8d24dc61f96bd67c4c853715d4eab60b5c01e7a8e9,2024-11-21T08:35:53.720000 CVE-2023-4750,0,0,9d45405700fae72668fa764ee604d5c3a396ef6133cf85d1aafea757c35ead25,2024-11-21T08:35:53.867000 CVE-2023-47503,0,0,9fca13225c33e8309b44922e1ea82f491605dad4c9644c894d63e8a4d6141eac,2024-11-21T08:30:20.960000 -CVE-2023-47504,0,1,f095a3a721849af7b3fd0d77227552d259946c72ef8154f4ffb6f6b9b5ee356f,2025-02-05T15:34:19.050000 +CVE-2023-47504,0,0,f095a3a721849af7b3fd0d77227552d259946c72ef8154f4ffb6f6b9b5ee356f,2025-02-05T15:34:19.050000 CVE-2023-47505,0,0,a2d8587a1db48c5a36c97a4354ec129a2633f335cacb2373856e420f2b4ff23f,2024-11-21T08:30:21.227000 CVE-2023-47506,0,0,39a065681cc9da059e22f65df45214b67addbe5ac57ae742e1ca90534859582e,2024-11-21T08:30:21.360000 CVE-2023-47507,0,0,ebd3c16581f6fc9a06d362d2fdaa2003f4091ca49b932e006ccff37d8db6ee22,2024-11-21T08:30:21.500000 @@ -236714,7 +236714,7 @@ CVE-2023-47674,0,0,13e92f1c68ee32fccae49e819128ad8764f72000557cd58de7f6c9bd5ef88 CVE-2023-47675,0,0,c86344aaed815eec4ee17290ba6358516495f8d51a918dee1a4e4b6eee2fa5fc,2024-11-21T08:30:39.423000 CVE-2023-47677,0,0,3caebbd65cda08c6ddb656fd37c737c3e9211c156e00b441627180836d2293b8,2024-11-21T08:30:39.543000 CVE-2023-47678,0,0,bd43ee5401534c70b4dd1db98e6c2d8e8ef452acc10c37d537580fa6a5a6a699,2024-11-21T08:30:39.673000 -CVE-2023-47679,0,1,9ac883fb2be293b92b6d54b7855c11221a35ea62024f8679bc99b1c661e6e3f0,2025-02-05T15:13:38.287000 +CVE-2023-47679,0,0,9ac883fb2be293b92b6d54b7855c11221a35ea62024f8679bc99b1c661e6e3f0,2025-02-05T15:13:38.287000 CVE-2023-4768,0,0,dc991f44c397295fea641f116dcc52f827c8db5c3755a24f664c3cec4ee72a70,2024-11-21T08:35:56.537000 CVE-2023-47680,0,0,e35ef30b3b82a1bd29506e527c0fd015f612e4a6e2c3470d55865bb023e23c3d,2024-11-21T08:30:39.910000 CVE-2023-47681,0,0,1e5ded7f03ca99d2027f04e415413280f201dff50e132b6f3962059b292e7690,2024-11-21T08:30:40.030000 @@ -237577,7 +237577,7 @@ CVE-2023-48743,0,0,55efa3bc380c79f816f94897b3ef52c25a939ae092ed83b4babe41e152dc3 CVE-2023-48744,0,0,1a6c6617e9246729cbdd8a839d027c26c82c684c89898b5fd005a6d91063d909,2024-11-21T08:32:21.830000 CVE-2023-48745,0,0,66cd227ee13a642eaf6667711ffe1c7b7dc4d217424e7de8dbc3e2bc4602f87e,2024-11-21T08:32:21.953000 CVE-2023-48746,0,0,5b68d89c86c9cd7fde8199d9de04cd1542e7de1a6d74dfa119293e13201454d1,2024-11-21T08:32:22.073000 -CVE-2023-48747,0,1,5523197a8948354c7c8f64404fc341d43bf0c62920fceb41e21db3c58e61c08b,2025-02-05T15:36:48.923000 +CVE-2023-48747,0,0,5523197a8948354c7c8f64404fc341d43bf0c62920fceb41e21db3c58e61c08b,2025-02-05T15:36:48.923000 CVE-2023-48748,0,0,e8459ce1929bb8210a80d770469b74145ace7600b0dd6ae3fb92fcd4a4e8075a,2024-11-21T08:32:22.327000 CVE-2023-48749,0,0,0a5c46e9641d9e21a45e8874038a5601fd287644d77017966638871d5677af5a,2024-11-21T08:32:22.457000 CVE-2023-4875,0,0,f91e68d69e22fe9dc24c2d595dcfc999eb2fd4cf547d10ea4928ca94eb559beb,2024-11-21T08:36:10.107000 @@ -239349,8 +239349,8 @@ CVE-2023-51474,0,0,26f7a69f3548671df6c12a2efa6a26e2dfdf20d8e3224ec112703ec82a2d3 CVE-2023-51475,0,0,f9547df98ad05cd1d0c44d3ff53e90477aac2a5e8c574baaaf54d4307772d393,2024-11-21T08:38:12.137000 CVE-2023-51476,0,0,36fb29539bdbe76defe6579312c885a17799f7e4919a390505c576310707c7a0,2024-11-21T08:38:12.263000 CVE-2023-51477,0,0,a8d7aa9b54c9baf35f6739c582fff629519ef7be99f5e399caf1b79196d48648,2024-11-21T08:38:12.377000 -CVE-2023-51478,0,1,2e253cedaba0808b5d7f6c0dcbe4af65c56166738e62fb9a0841adf48f6d9ee2,2025-02-05T16:03:37.717000 -CVE-2023-51479,0,1,f3c38cccac1222f729074919c50c1fc890391851b3cb5986461a02e40fa2213e,2025-02-05T16:05:43.817000 +CVE-2023-51478,0,0,2e253cedaba0808b5d7f6c0dcbe4af65c56166738e62fb9a0841adf48f6d9ee2,2025-02-05T16:03:37.717000 +CVE-2023-51479,0,0,f3c38cccac1222f729074919c50c1fc890391851b3cb5986461a02e40fa2213e,2025-02-05T16:05:43.817000 CVE-2023-5148,0,0,8c8f2cf488e6f6ec35006d88b345c71d20e602ee3ce0fb8707f0444a5486722d,2024-11-21T08:41:09.713000 CVE-2023-51480,0,0,846838433db52442b8cc4b8d3fb8965f461aa7fdd83fd927a4ae549e3279ebc2,2024-11-21T08:38:12.727000 CVE-2023-51481,0,0,1f20d0af5df0890069b98d5e3542209514bf71503e98929dd5f0e70ef78fa932,2024-11-21T08:38:12.860000 @@ -239883,8 +239883,8 @@ CVE-2023-52159,0,0,6eb945cd9fef03740ac892ccde0f4b06fee1e4906c8d36e2826e00cbfba5f CVE-2023-52160,0,0,19fb4e397a5f0157e35e2583548edfe6ba46e6d8b3d42ca883782c1d0672d7f7,2024-11-21T08:39:18.380000 CVE-2023-52161,0,0,cc2ca74d32bca44f3652e1f4e14ffd83723d50b42d0c6e13fc3025c9ba0c88fd,2024-11-21T08:39:18.647000 CVE-2023-52162,0,0,a69328f8fb5f7f70dd12cdd38f629353874332b1168b51730a7e4274bd411616,2024-11-21T08:39:18.893000 -CVE-2023-52163,0,0,a817b5a2490fa755c4523b3727877a6db57e3b1875b856943a2aa5970b2bd8d8,2025-02-03T21:15:12.060000 -CVE-2023-52164,0,0,1220edbbadc2ceef714b7f1ca1d97823ec0cb200fcbc894b83ace1e408b7b09c,2025-02-03T21:15:12.180000 +CVE-2023-52163,0,1,d0db7f8714bd7c7bc69052ff4d565a82ddbfad80e4a821149bdfc65aa3f141d5,2025-02-05T17:15:20.950000 +CVE-2023-52164,0,1,3eb6ecf44fcb0dde6b30201471639d2822d49e8c5844aeff77bf98a493fcf35a,2025-02-05T17:15:21.100000 CVE-2023-52168,0,0,c7cd793d041918ccc6f2175c08a72a3489a14e0bb9eacde53b0b8fd2753e8f0d,2024-11-21T08:39:19.110000 CVE-2023-52169,0,0,9be3070ec5123d1f488bab859fcd5265610f3d610a72d91e6cf96799be93bcbb,2024-11-21T17:15:07.820000 CVE-2023-5217,0,0,d44e1d2f72cb8b5db95a55c2054613a61b82f8a9115f7aa84863f6c0994e909d,2025-02-03T14:15:37.370000 @@ -242429,7 +242429,7 @@ CVE-2023-7259,0,0,1c611eaee9f33d7ccd17c89183f492baf0d1cbca8df2084f000fb54a7cc465 CVE-2023-7260,0,0,5b13b64738d9f99d38b36ccafd3664ce3af226a3295d006866426dd31c7dada4,2024-10-16T12:53:08.807000 CVE-2023-7261,0,0,ddac2b275fa7ea517c7dade7545137efdda503fdf2e011abe40181729ccc83f3,2024-12-26T16:07:39.820000 CVE-2023-7263,0,0,47038b709984116a0d26fd831f91702cec9ad1d4cbf85af82cfc0a7adcb0f259,2024-12-28T07:15:19.580000 -CVE-2023-7264,0,1,741b4a65e6dc6b15f54fc03e73a9eb3513694445d12502d5b5c020625bc7c421,2025-02-05T16:29:21.300000 +CVE-2023-7264,0,0,741b4a65e6dc6b15f54fc03e73a9eb3513694445d12502d5b5c020625bc7c421,2025-02-05T16:29:21.300000 CVE-2023-7265,0,0,c24118f188412f71957951e5a194c8feaa5aa2870f8d4bad1cae66392f13b12f,2024-09-06T16:38:04.533000 CVE-2023-7266,0,0,747c05f24a13b4f02e6fa3179fa6e81dbafd40c7bda44e4a6d968ba0d7b0112a,2025-01-13T20:48:22.750000 CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a18e,2024-11-21T08:45:38.200000 @@ -242791,7 +242791,7 @@ CVE-2024-0374,0,0,8a8885831ece676186f8806efeec3a4eb9c300cbed5e4e0d0e9da25264b198 CVE-2024-0376,0,0,e519b0b3ccb0380dc644ca1c0a0d806c3aa99c34eb8019def3cd5d2de9305e23,2025-01-09T15:13:53.520000 CVE-2024-0377,0,0,1001b99d652c06b45db83e42000af461e59f7775816ec87aadced06e45b73b5a,2025-01-23T19:50:08.837000 CVE-2024-0378,0,0,6327e42d183029a8d5af62628ec61e961d0148256785c05c3ae05fdc51bde6b0,2025-01-16T18:30:44.367000 -CVE-2024-0379,0,0,7f2a5e29717edae18ab4f87ffdcc74cd55d78d960b0bb83761954261632040c0,2024-11-21T08:46:27.353000 +CVE-2024-0379,0,1,655129da83bf7b78f99b2d842cc93a793c4b9dead86fb37c1ebfba25f8a6af6d,2025-02-05T18:10:45.403000 CVE-2024-0380,0,0,b13ba26b2c93293898a30471c8b142088e326e5cfea22174ba924ab8efd84293,2024-11-21T08:46:27.490000 CVE-2024-0381,0,0,4408f366f53a4f9f027eb35f7cc148cd5099ad6f453db0955bde4e51626db08a,2024-11-21T08:46:27.643000 CVE-2024-0382,0,0,89dea95cfa60010212418517f6858b68d57b6774bff452bfccc38c701002fb49,2024-11-21T08:46:27.790000 @@ -243083,7 +243083,7 @@ CVE-2024-0685,0,0,820940c6f5e950a8bb00a1b68f4aff647e2b8f8fd886bf1804f89b56b82623 CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd24172830,2024-03-04T15:15:07.050000 CVE-2024-0687,0,0,d93998c18d64bf210c2a399ddf1aafa937567f61265f0453c37e7cb6ae0fcbfb,2024-11-21T08:47:08.990000 CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000 -CVE-2024-0689,0,0,f6eb3eb2e29fe7f683bb7540f0e85632c4df022fb0391601d5707221e43a0076,2024-11-21T08:47:09.223000 +CVE-2024-0689,0,1,51815c77ca446acfd6f183f7f81fd9dc1c1522df0d3ed6185cbb6bbfeda66522,2025-02-05T18:11:53.127000 CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 CVE-2024-0691,0,0,a50f23db7013613682b7784287817142b53493a2be1ac349b95c9f4a363c01f3,2024-11-21T08:47:09.507000 CVE-2024-0692,0,0,fa4ac64c8cd0d9df43d4b06606e1398c0ed72cb84fb7d22c57cfb64176b925cb,2025-01-21T19:07:42.827000 @@ -243284,7 +243284,7 @@ CVE-2024-0899,0,0,a110e9f41ce990bfe1a198af240cb876084cc0ba17fbf9b582555362d79d98 CVE-2024-0900,0,0,8202c920d6c43ef0b5a2c52aa397318230bfae8c49053d10854949a25e693c69,2024-11-21T08:47:39.290000 CVE-2024-0901,0,0,2210b93f65eb90421a29d4729ea1ab6abfd7f7109fce840b55b9802048721199,2024-11-21T08:47:39.493000 CVE-2024-0902,0,0,49e47e1b290f01536bee40dfe524469e638cdd27b89e1835d385196b22bfb8bb,2024-11-21T08:47:39.947000 -CVE-2024-0903,0,0,d0e66d38f66010732f1706e2606e02cece21110cf65386633a0e46043fe9898a,2024-11-21T08:47:40.100000 +CVE-2024-0903,0,1,5bd10efc0a81076e6dcfdb52608d45c3ac855afff6ca0448ee1a48050ad1a1bd,2025-02-05T17:42:03.150000 CVE-2024-0904,0,0,45daa3dbc580b949bca4e58eb311d6c298c2232cb68c307457b71e82318860c0,2024-11-21T08:47:40.290000 CVE-2024-0905,0,0,60c2a3fa899fcc1baf7ef2a8fb1eb0ba21e33e967f759165b74dea3036464f8e,2024-11-21T08:47:40.503000 CVE-2024-0906,0,0,5e3cb332b14cfefaecb2499aa9598919c158f9b33acb502b31738cfcea5395a4,2024-11-21T08:47:40.780000 @@ -243521,7 +243521,7 @@ CVE-2024-10170,0,0,1356f83740ae8a6b842f89faccd5b08cdf5bb9d3266b833c7877be7913fea CVE-2024-10171,0,0,358799a28f996ca96d19cae236dd61da0f16f8620871e46ed96696510a95d9ea,2024-10-21T21:33:26.937000 CVE-2024-10172,0,0,089f9b9154e259551fe25026dec57a853d4e043a13ae25fa28683b26f855fd61,2024-11-21T13:57:24.187000 CVE-2024-10173,0,0,ba7256b2664aff3408bf23ca077fec1fdf4dbc324dfd4cbe6d785b36ae646242,2024-10-22T17:05:13.483000 -CVE-2024-10174,0,1,ac6027030246f07910222b1c799a2d10453990e0f685176dc66152b5997d2800,2025-02-05T16:48:14.820000 +CVE-2024-10174,0,0,ac6027030246f07910222b1c799a2d10453990e0f685176dc66152b5997d2800,2025-02-05T16:48:14.820000 CVE-2024-10175,0,0,9d6bfea3124cbe12dc8beb6acba51208007e696098af51abe0ae1ca1472cefb0,2024-11-27T07:15:07.020000 CVE-2024-10176,0,0,1de5b7d5d65c843af328510cd44a4854ad1f122b5f1e61c8537a88d779b02fab,2024-10-25T12:56:07.750000 CVE-2024-10177,0,0,5e7ad13ce4bc9b20ada91706797a1ac84252114dfb41c003c452005f96c1bccb,2024-11-21T13:57:24.187000 @@ -243642,7 +243642,7 @@ CVE-2024-10318,0,0,bb7ee1547db7509ffde7ebdf9a352a1b73dcda716ac26150d44206d2a71e3 CVE-2024-10319,0,0,68d02b703a0a786e535b0c06357fe7c6d9a4d92b566f67658115227be405d0f3,2024-11-08T15:25:16.317000 CVE-2024-1032,0,0,c6d8d12d638c10dd834e783d36f86ba17d33a36b799d5e13aadbdfedd22b0728,2024-11-21T08:49:38.587000 CVE-2024-10320,0,0,727a463e6d691153e4adf6d21dfba57d62d85f0e63e6347b0c5272cff36a9bf2,2024-12-06T09:15:04.710000 -CVE-2024-10323,0,0,781894ff71cd07af43d7b18b6e4bb8d52454b1a7052ea864498633c25d9c7b61,2024-11-12T13:55:21.227000 +CVE-2024-10323,0,1,74c01ce4124a9449f0a3de143c2d6269eaaed2dcc05dfdfdac09c2b033a02614,2025-02-05T17:18:49.550000 CVE-2024-10324,0,0,cfaeca60a4f0aa309330a37a66e2005b2fce423bc7c33f12b5f1c3188e784a63,2025-02-04T19:41:41.250000 CVE-2024-10325,0,0,50164109bc79e97836e82121f62c8560adaed8b05d99b6cbe7e736c6f6cb196a,2024-11-13T20:01:05.097000 CVE-2024-10327,0,0,617a4d395486d23ce50d5a586c94c2ff3daf8827139e812231380168dcff8e94,2024-10-25T12:56:07.750000 @@ -243708,13 +243708,13 @@ CVE-2024-10399,0,0,095406f8d5039a96c9b15f66c9c6aae69fc16e07792e432307aaf1afc72e7 CVE-2024-1040,0,0,0cf971725042aa5f584fe060b54c880b9831934b517dc5a41c0a4db005bb079c,2024-11-21T08:49:39.783000 CVE-2024-10400,0,0,d10eac0c14c2aab70360c507793101d484e08be5c30dd80a0293df79fcc3c93a,2025-01-23T17:01:14.073000 CVE-2024-10401,0,0,98699d6fa898cdfb3f15470619245cee1d067345348d71b83edf212f320fd87d,2025-01-16T02:15:26.770000 -CVE-2024-10402,0,1,707aa51bfb00542fa09e86114646bc6794da9070602c556284ae04ba6ce3467b,2025-02-05T15:02:16.723000 +CVE-2024-10402,0,0,707aa51bfb00542fa09e86114646bc6794da9070602c556284ae04ba6ce3467b,2025-02-05T15:02:16.723000 CVE-2024-10403,0,0,a7572191e8102ed6d59e64918362af5517a9fa6fa7640d8839b0f51d80dd26d0,2025-02-04T15:28:04.053000 CVE-2024-10406,0,0,3ea80fa9309bbe01bfc18fc28a58ebc2cd4384a2976470d5a0c7d74740e10fea,2024-10-29T20:48:36.967000 CVE-2024-10407,0,0,c0767597cc1c9f2445774d0945d82cd1deb05bfba27e932afc95a08efb60df7c,2024-10-29T20:47:53.667000 CVE-2024-10408,0,0,bdf278858219e19c5b454fd4cbba3d2031672da6a8bc18e5cf1bab48edd4d3ed,2024-10-29T20:44:07.630000 CVE-2024-10409,0,0,b346bd3908f1b72aa0685e765f5d92666d48544c9a399e8585f63d3c84dd136f,2024-10-29T20:42:02.603000 -CVE-2024-1041,0,0,e391a7c29371e8891d25bcfb48325273671bac00443bf65004022bb622fe09c1,2024-11-21T08:49:39.917000 +CVE-2024-1041,0,1,09b95d67f9e0539358befce6ed0dd9ffa09a64d468d7f836a9c6b3a3458818c3,2025-02-05T17:16:58.007000 CVE-2024-10410,0,0,3217ebd06bd8084a84c8908f50a466645b4fa506aeb9234268fb26fa53262c56,2024-10-29T20:41:20.520000 CVE-2024-10411,0,0,b1754848ce53b05f91f0cd9f9b46b73d64ac9c97278a99d3dc9cc6df68384bdf,2024-10-29T20:28:25.267000 CVE-2024-10412,0,0,f4e1e578f20c719c2013265108b723e768ea2991341d2da43c64f097382b558a,2024-10-29T20:40:13.753000 @@ -243820,7 +243820,7 @@ CVE-2024-10517,0,0,ec874f706d612987436415b14947527e0ec4826e3f1f3a52572b8d2041a7e CVE-2024-10518,0,0,9b672e9ec0f2ce289c42bf794385cc1499fe101df107e5b1e23b7eac5052f943,2024-12-12T16:15:10.890000 CVE-2024-10519,0,0,0f4b4a1e9d73c1dc5e7d90ae91171b7454c700ee85af6548970583aa8f68f73b,2024-11-23T10:15:03.600000 CVE-2024-1052,0,0,f9f471171db3127e337c7e7b487431751b54669175502f925317b3d80dbe42a7,2024-11-21T08:49:41.313000 -CVE-2024-10520,0,1,386d4a707205691aa7c18000d10d01ef790e0d155553598cc8ba9e672fac1121,2025-02-05T16:51:57.997000 +CVE-2024-10520,0,0,386d4a707205691aa7c18000d10d01ef790e0d155553598cc8ba9e672fac1121,2025-02-05T16:51:57.997000 CVE-2024-10521,0,0,f7bfdcf48e9bf7480e023febd093f90408a44bab6aec43e2cc338ab0d3f56055,2024-11-27T11:15:16.377000 CVE-2024-10522,0,0,1e8d26a1978fe59d2c13acd7d1429d6305d44d553647bab9c6da717f248808f0,2024-11-21T13:57:24.187000 CVE-2024-10523,0,0,7cc4719be638488b8b84233b435754a6a5dcc357f333b40290bb3e99a0f909ef,2024-11-08T15:14:30.070000 @@ -243841,7 +243841,7 @@ CVE-2024-10536,0,0,a823233131559d6dd2b341d836be9135c9879264a324c21b5db4b4eee461a CVE-2024-10537,0,0,245f407c71543e9ed1f1e8091a091327bb8b8bb7a6ad44fab60dad856af50407,2024-11-23T04:15:07.663000 CVE-2024-10538,0,0,61014a490bb67ac6333227cbe080cbc3323afad1485db0781083c911c48fb77e,2024-11-14T13:27:00.400000 CVE-2024-10539,0,0,0089a09b07d871a4db2a934565dffebf3d935a2f4638c664a18fa5c91d8a5744,2025-01-23T14:15:25.097000 -CVE-2024-1054,0,1,8b7c40906182f2d575c25db8e7534b8bc55ffc3f9db48b9352269a3dfb6ebc0a,2025-02-05T16:41:16.807000 +CVE-2024-1054,0,0,8b7c40906182f2d575c25db8e7534b8bc55ffc3f9db48b9352269a3dfb6ebc0a,2025-02-05T16:41:16.807000 CVE-2024-10540,0,0,45dc62d2a6882ed78eb940dad2c8292ca30098100a55bb2bb2d5e31ef03fa351,2024-11-04T13:18:27.017000 CVE-2024-10541,0,0,17e645860588c5290ea1de09ebbe30e3ee704356357c444bb1176f1b7d6de69a,2025-01-07T21:15:11.490000 CVE-2024-10542,0,0,b3e07484251514e52f0e88e2f4715863b15a20a77b62be04e1c46b181791456c,2024-11-26T06:15:07.683000 @@ -243849,7 +243849,7 @@ CVE-2024-10543,0,0,90ed84dfbad8ca67e321375858c5c3c79d5c97a1d4224d37fe3ff44d9ef23 CVE-2024-10544,0,0,1bdfbd43adcd8874b1d0e0fced36513ba83ecb83c2ae7fcf0e84ae50dc2443f2,2024-11-01T12:57:03.417000 CVE-2024-10546,0,0,da273d2725c5edbc48bbe9ef599b463228a9d7ad08d3340d718ab8aaecc71e73,2024-11-21T08:48:43.797000 CVE-2024-10547,0,0,b023c976bb6d488185fa01d9371074d053ec54a35f2b498daa31d6bb098844a6,2024-11-12T13:56:24.513000 -CVE-2024-10548,0,1,2eeddee777f021917813f3bb86cf6b8c0bc71575777a9f2edfb7d21af2614d3b,2025-02-05T16:49:13.003000 +CVE-2024-10548,0,0,2eeddee777f021917813f3bb86cf6b8c0bc71575777a9f2edfb7d21af2614d3b,2025-02-05T16:49:13.003000 CVE-2024-1055,0,0,399a6bc3324e5a5ab60feee10ef9f668300825e29ef0f6a3f63048abb22d1f67,2024-11-21T08:49:41.683000 CVE-2024-10551,0,0,399c3b50116ab12fecb385939dfbc291c08c34ee1143fded03cc056aa8d168fc,2024-12-06T16:15:20.160000 CVE-2024-10552,0,0,647ba090e2e2ec77098229b8a8f97893626a50f8fb8b7a1f30af03c5398dbda4,2025-01-25T07:15:07.380000 @@ -244190,7 +244190,7 @@ CVE-2024-1093,0,0,ac60ea90a5bdbcab92bbb148d0d6ccb636fae604fade2bd9337658c1f74748 CVE-2024-10932,0,0,28109702b795f9356a11af2c3727eebea623b98c280555fa2778753a6b0d3d2f,2025-01-04T08:15:05.713000 CVE-2024-10933,0,0,04454997e745a68880991c602cc8325b99e3c53905740538bda66aba85b8cef1,2024-12-05T20:15:21.417000 CVE-2024-10934,0,0,6dae70f2d9b047711f71d589675cbcb98ce87c40154b32c6e0f536ad5d783b6a,2024-11-18T17:11:56.587000 -CVE-2024-10936,0,0,5de9014562750929bcf1bff80900666b665f40260cb77934203c78872f04157b,2025-01-21T09:15:06.850000 +CVE-2024-10936,0,1,8259f99ea27b488cb58d53b9271cc52d72eaba4980db6dcd32bf3125a4b88cc5,2025-02-05T19:16:15.393000 CVE-2024-10937,0,0,f3549007a000819e9c2b92d84627c6a8f0950225e9fa8a067012e5b6f0eb9781,2024-12-05T09:15:04.377000 CVE-2024-10939,0,0,51b8ed7e89cb6cce38a6a9e5f66ac395ad176f1b332ff5472d247565035a8f52,2024-12-16T19:15:06.400000 CVE-2024-1094,0,0,4f6b2c2580413352eb02acf345a730d51f35d7640cec3afbef03e4f7e048ad8b,2024-11-21T08:49:46.967000 @@ -244660,8 +244660,8 @@ CVE-2024-11463,0,0,ad17f3fab6bfb40a789d68c4383c6c0e1f14efa77f86cc521d310c195559f CVE-2024-11464,0,0,5828db9c008addcaa10da0b57e51f0230f10838dab3e51e60f8d2fcb9d133719,2024-12-07T12:15:19.567000 CVE-2024-11465,0,0,0028662c24c58537e31fc6c5ac2f25bde09edc01df058369957c93345fce2c39,2025-01-07T05:15:13.287000 CVE-2024-11466,0,0,36ba29a0e83960f183cdc1bb8910604befb538a9ed8bdd074a88ef8b7f706e46,2024-12-04T08:15:06.523000 -CVE-2024-11467,0,1,83b08db9b2f1f266f29aefda15b57aad08c9952f0e565befddd81f8194442a5f,2025-02-05T15:15:20.253000 -CVE-2024-11468,0,1,2320632028a676281fbf947f03d27f7456a172809aee9ed4bc05c7a60368d65e,2025-02-05T16:15:40.103000 +CVE-2024-11467,0,0,83b08db9b2f1f266f29aefda15b57aad08c9952f0e565befddd81f8194442a5f,2025-02-05T15:15:20.253000 +CVE-2024-11468,0,0,2320632028a676281fbf947f03d27f7456a172809aee9ed4bc05c7a60368d65e,2025-02-05T16:15:40.103000 CVE-2024-1147,0,0,7c585dad4e071b38d649d847ff37c79a25a5d07f7a32720dda50f90a08541bc4,2024-11-21T08:49:54.360000 CVE-2024-11477,0,0,3e8ae99590c1aecc53c52bff36b8f44bed9b32563a126fb58a5303ed844daede,2024-12-11T19:23:36.800000 CVE-2024-11479,0,0,e45a25bfdd55a73dd4f84ed406864a56b4c33194e1807e98971c4aae47176800,2024-12-04T01:15:04.650000 @@ -244895,9 +244895,9 @@ CVE-2024-11707,0,0,c14d0723c12588788ccbd8bb2e9951ac0d18f4bf2138ffa0507ec2dce1fcd CVE-2024-11708,0,0,46bf8dcd9e0a994fe6b91558c4bac72ea601d2749b0be7bd469a9ad7ee077e45,2024-11-27T15:15:24.747000 CVE-2024-11709,0,0,c7d4cd410df5a04f3cf8d9ea3dda9b5544a86774d871c2cb08cc1e1a83cccda9,2024-12-12T05:15:08.900000 CVE-2024-1171,0,0,ecbdcf43f5b983dd6d5e3901a4f79f545f1f5986a89a0bc7c9ca53a4bbe921fc,2025-01-08T19:07:55.783000 -CVE-2024-11710,0,1,bfd1e5c32dce0918e1d3e307f709b2d7d8ea65d4cb991eb82b0d7ae028220e09,2025-02-05T15:21:02.823000 -CVE-2024-11711,0,1,756edf763cdd44f479ce754d8ac611a710a6c71eac3d65dd8e652c367029fdc0,2025-02-05T15:30:28.690000 -CVE-2024-11712,0,1,0c1286bf421e6a686d47b012ecca7ebee70cdf7ddf16850a153debcbd5225913,2025-02-05T15:17:40.330000 +CVE-2024-11710,0,0,bfd1e5c32dce0918e1d3e307f709b2d7d8ea65d4cb991eb82b0d7ae028220e09,2025-02-05T15:21:02.823000 +CVE-2024-11711,0,0,756edf763cdd44f479ce754d8ac611a710a6c71eac3d65dd8e652c367029fdc0,2025-02-05T15:30:28.690000 +CVE-2024-11712,0,0,0c1286bf421e6a686d47b012ecca7ebee70cdf7ddf16850a153debcbd5225913,2025-02-05T15:17:40.330000 CVE-2024-11713,0,0,4178482b5df99c0291e215f2545743c50197edb7179b5b0fd0118c8ead9b975f,2024-12-14T07:15:06.540000 CVE-2024-11714,0,0,c6471527e19f0ca60843e70cf630e8e5f2ae6981854a480677e1b01b2ada84f8,2024-12-14T07:15:06.713000 CVE-2024-11715,0,0,0815aaace33685f035482241a4ccb0b0e0d773cd3b4b8723c5ec1e7d7b552602,2024-12-14T07:15:06.880000 @@ -245202,7 +245202,7 @@ CVE-2024-1204,0,0,52c83c0f4289636bc1afd18cb37875b782729e90167239cc1a53f532e5633e CVE-2024-12040,0,0,82ff661fdb988bbdc555297e0b0d4a5a42a6c3fde3cb51373bdf40b4e4dd0633,2024-12-12T06:15:22.947000 CVE-2024-12041,0,0,47082ba9778a8e8f387e97794ecc83e5026dfc63a3058e5ad0a6682c315b44f2,2025-02-01T06:15:29.527000 CVE-2024-12042,0,0,b4111492e93c9126d488ebee36a5b9ed9603a0917a66407440ec106154a8d6d8,2024-12-13T09:15:07.370000 -CVE-2024-12043,0,0,8dc317b6d611bb8c472c7c0709ba034ed66cec5b467ec1dbf0f04d35957a17ee,2025-01-23T11:15:09.147000 +CVE-2024-12043,0,1,0b4fdcede937ae84ff81a2ab905da8f11d94e67d0f40a0aefefaaf9cf7c57c04,2025-02-05T18:52:58.717000 CVE-2024-12045,0,0,129733e1a8172f1173193ada9167ebfa92abcbaf9c1c22ab7b433d2b7a56ea29,2025-01-08T08:15:24.683000 CVE-2024-12046,0,0,e7ff56205e3c5070f85bdbd7cae59fdf29223a19ad24ad75866231852f951e92,2025-02-04T08:15:28.583000 CVE-2024-12047,0,0,8440f971596bd55cff74a4ca413c1e3de197b2701820ea36a0544bdffdfe4e47,2025-01-04T08:15:06.157000 @@ -245271,11 +245271,11 @@ CVE-2024-12124,0,0,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae947869789 CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000 CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000 CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000 -CVE-2024-12129,0,0,6fa6f9b5508d93cd63d1aeb13f5c24ee10e674f58a1f2ca4733defe87c469754,2025-01-30T14:15:31.530000 +CVE-2024-12129,0,1,d4c5dbe8f6de09dad1d055188d324149335e6508fef07ba4f4f89a344b78060e,2025-02-05T17:51:37.247000 CVE-2024-1213,0,0,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31c5,2025-01-29T16:25:21.947000 CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000 -CVE-2024-12131,0,0,13f02a71aaa32136e25257b1d5a02357f3bae8da21875c47830a0a64cb341eb0,2025-01-07T13:15:06.440000 -CVE-2024-12132,0,0,80a7c8d496b1886913eb9109e260df5ae2c0aa6f78d2c4d5ff0aee7f1f0cf7f0,2025-01-03T09:15:05.983000 +CVE-2024-12131,0,1,dbf0aa17931777a7d2a18f8d74d983fb90b7cc72d860577b6997f11baa1caf8d,2025-02-05T19:34:09.820000 +CVE-2024-12132,0,1,b06e93c25499732ca815413e2d46627c97d1199e136eda86bfe61d37a4878c0b,2025-02-05T19:37:43.237000 CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 CVE-2024-1214,0,0,382730d768a688205ca8799a488dd078c9ebf42deffdb7914279459963207788,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 @@ -245325,7 +245325,7 @@ CVE-2024-12191,0,0,8e4c9688c4afa8c8e699046272dd7813d23d4a76cda0d71a835349f9ee3ce CVE-2024-12192,0,0,3707462bbc4f63dedff6cd83fd55d432759cdd23d859eff2e810493ee7dc68c7,2025-01-29T17:15:27.367000 CVE-2024-12193,0,0,755861384343cacf5f17a24d3b505cbf97b18d223c68733490bfae75148f40e2,2025-01-29T17:15:27.473000 CVE-2024-12194,0,0,69feab87364cc89565f3dd964ae57489f5b3238977846a656dc7e5c80491236f,2025-01-29T17:15:27.590000 -CVE-2024-12195,0,1,42de4954f88d78277d068242b43ff46a49abd4e0966e9a8a6c1cda915a565bb3,2025-02-05T16:50:05.270000 +CVE-2024-12195,0,0,42de4954f88d78277d068242b43ff46a49abd4e0966e9a8a6c1cda915a565bb3,2025-02-05T16:50:05.270000 CVE-2024-12196,0,0,9fa580adf43e9cbf06e25fc8b96bbf2ae78be5e0921b9598efca40b2ec0f8630,2024-12-04T21:15:21.090000 CVE-2024-12197,0,0,16b9db8319053ab248691820ed8f843f022a34fc3e3a7507673c26ba37c5db52,2025-01-29T17:15:27.693000 CVE-2024-12198,0,0,fc5d780d3f7564a151d7522910b01fa11fe000c8b9d080ea627327fb52afb772,2025-01-29T17:15:27.803000 @@ -245478,7 +245478,7 @@ CVE-2024-12362,0,0,3d126c7d5b2c7c892f0afca83b7e5d0a3fdd9f8568569cdb62c20aebeb726 CVE-2024-12363,0,0,8bf95d170f6881f24ef42d227f38a0cf0a0a8682e2906a9aa2aaa1e3f316a356,2024-12-11T10:15:07.260000 CVE-2024-12365,0,0,e44342e05a0b6e2262a493fac9edc68519495d51c0acf8bc24f40ad738356cb8,2025-01-16T21:31:22.633000 CVE-2024-12369,0,0,fcd74b43ea72489fd8099497c673c3afa2054b03bb7ec4819b8a995ebe30e685,2024-12-09T21:15:08.203000 -CVE-2024-1237,0,0,7608b762d209f55f10a23dbde634d086adad1d6240344714ec7de5c458d836b6,2024-11-21T08:50:07.910000 +CVE-2024-1237,0,1,73d890f90445a3f466d07e44bf460923510366d9a99dc79ba53fedc006c8a010,2025-02-05T18:13:17.037000 CVE-2024-12370,0,0,4ba82d78bb18570ed3a92b4268f3e2259421a7f6bdb0562fe53314b2628c8bd6,2025-01-17T09:15:07.810000 CVE-2024-12371,0,0,ad8806dfee353fdb9887f497d244b3ccfcec0ca669e819f5ec6c72aa1dddd27b,2024-12-18T20:15:21.193000 CVE-2024-12372,0,0,61d0814cd7351773a7f17ecab5c027fade58fdedeaf091e4269b15064d9c21b9,2024-12-18T20:15:22.167000 @@ -245585,7 +245585,7 @@ CVE-2024-12490,0,0,1555e4125b1bbd18e44ad154504a390e80c730aff0638a2c04280c85da66d CVE-2024-12491,0,0,d9590e8254ca45b54a5272db38ba7d701c7bc7244fa53f0252652da7575fb348,2025-01-09T11:15:13.520000 CVE-2024-12492,0,0,d916ae3db37806ef5451c78588e17d1a804f7c9a228c6c5f62bb3eeb89f366ac,2024-12-13T17:12:51.283000 CVE-2024-12493,0,0,6a46a6d759741902a525239333dcb837d21dd46b0a90d6c339d060007873320f,2025-01-09T11:15:13.727000 -CVE-2024-12494,0,0,71c9760d70f31dee0a23e6b084f0b7274c24776b0e64b0cbf5a2e9c4f8a756e8,2025-01-24T10:15:07.457000 +CVE-2024-12494,0,1,203cf884147e060aad3aa22f9903f4932f22c88bd2af60aa05e2f8ef11d65ccf,2025-02-05T17:09:07.820000 CVE-2024-12495,0,0,14e632d2f81b312f37c9f019da64618a5fbe236ebe3efc373365c304ad48e27e,2025-01-07T07:15:27.370000 CVE-2024-12496,0,0,de7fd0f09c73ed509f4dfab83295b7a82e4ffb5b6ab1606f0959c5f84e1f552c,2025-01-09T11:15:13.937000 CVE-2024-12497,0,0,2fa5c57c56d5261d14e7efca34ea444e21df46aee84c2eede506aff4e7856847,2024-12-13T17:13:18.457000 @@ -245804,7 +245804,7 @@ CVE-2024-12786,0,0,ed02c83a2054ebe0fc174790a6aaacbe309558015f322491db719158a6f37 CVE-2024-12787,0,0,14279a2f9574063a61ceb8ce2e1da7c6476af83dc7a21c055ac41cd47de3b19b,2025-01-10T21:27:13.777000 CVE-2024-12788,0,0,e5b23c8d19a7a1106a3c70ec6e222009af52dadc4f4a8ee9b1597c00d1ebc18e,2025-01-10T21:25:42.317000 CVE-2024-12789,0,0,8cc3fd907634072e855557d7614296827afc8435bc47d635336cc8e8e8d4c6f9,2025-01-10T21:42:42.847000 -CVE-2024-1279,0,0,61dff6f92ba57cc8ea1f514904df9d370c151e2c63a152fa3167fdcc4aa0ca69,2024-11-21T08:50:13.410000 +CVE-2024-1279,0,1,ef8c7091f9efcda83f2d59c9476e682508ebf14d49bd13b894d2fd95f06a8c4e,2025-02-05T20:54:36.817000 CVE-2024-12790,0,0,3ab6d6fd8704afa118edf15528f1756bc2e775d9f0c2c7d3659c9da7eb84d83e,2024-12-19T17:15:08.650000 CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7ae26,2025-01-06T16:42:09.837000 CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 @@ -246294,8 +246294,8 @@ CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef CVE-2024-13368,0,0,dbbfa255c3d339e91eb07214cc7014e309e9bdb61391ed3e68917c31e101db69,2025-02-04T19:39:27.553000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 CVE-2024-13370,0,0,6c3d5d3b19e588eca43d0624f2d920a1fb872d4b883b63a2898ed54009994a1b,2025-02-04T19:38:23.390000 -CVE-2024-13371,0,1,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 -CVE-2024-13372,0,1,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 +CVE-2024-13371,0,0,b33252fa1aed7179836637ba006b2c21a7f2a8eddb64462e7f01328a3a0fc612,2025-02-05T16:16:22.397000 +CVE-2024-13372,0,0,015d2d808909d66f440a14d43df20bdac81e725da4ef18a7b74b1dc0c8861ac1,2025-02-05T16:11:08.283000 CVE-2024-13375,0,0,509bfd3a7c3f76e008f9bf54ba53750a8708a5d8eaf24ea17a33be3c80dc44d0,2025-01-18T09:15:07.120000 CVE-2024-13377,0,0,a25050bd2bbff023d447f5d602b24decf0d9fe3f99412e4f96b0e55aac73332f,2025-01-17T10:15:07.240000 CVE-2024-13378,0,0,7ea1d4cbb0f87859cae348c2da93d49f3902e773337fd492c684caf29392972d,2025-01-17T10:15:07.457000 @@ -246327,10 +246327,10 @@ CVE-2024-13415,0,0,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000 CVE-2024-13424,0,0,60791b2caef2c4384bda44bc4634febeec12d84f3bded4fd1a0d6202fd13ad5f,2025-01-31T06:15:29.443000 -CVE-2024-13425,0,1,237ea5cb491f715b975686bb5ff57420b8d04b440f81d846e123cb2cd3c6bc41,2025-02-05T16:08:25.610000 +CVE-2024-13425,0,0,237ea5cb491f715b975686bb5ff57420b8d04b440f81d846e123cb2cd3c6bc41,2025-02-05T16:08:25.610000 CVE-2024-13426,0,0,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000 -CVE-2024-13428,0,1,c41a9f907932f79019115b7479ffe4980e2192237da057226c31e0fb257ee9e4,2025-02-05T16:05:55.617000 -CVE-2024-13429,0,1,a2073ddcc0f5ffb5f28db25fcec46d547788a503d2d1e004a4ef24e1dfb126c3,2025-02-05T16:05:10.947000 +CVE-2024-13428,0,0,c41a9f907932f79019115b7479ffe4980e2192237da057226c31e0fb257ee9e4,2025-02-05T16:05:55.617000 +CVE-2024-13429,0,0,a2073ddcc0f5ffb5f28db25fcec46d547788a503d2d1e004a4ef24e1dfb126c3,2025-02-05T16:05:10.947000 CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000 CVE-2024-13432,0,0,2420e31f27384cf3a3b972e6593316283200b18cb659242a854ce1e6ee4aeb4a,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,2a9d89514e9ca62330f67417cbd4f0a14554f70d781af736185219d7398dc564,2025-01-18T07:15:09.160000 @@ -246369,7 +246369,7 @@ CVE-2024-13505,0,0,895d0e00033b2fc93f737f0101cc08804d47354317cd9b6a35dce5b9b4d90 CVE-2024-13509,0,0,4616681e9925b5001099930aae74cd3c34870295df83ba209474cc01f26318f5,2025-01-30T17:56:17.080000 CVE-2024-1351,0,0,0ee767ddd9bd942759d1902d3186de90141de07710cd1c9cc0aaf86395d89b28,2024-11-21T08:50:23.450000 CVE-2024-13510,0,0,ed57162c0551b27d45230eea4350da35bac3b732d95dbfdae697ca639504acb3,2025-02-04T10:15:08.167000 -CVE-2024-13511,0,0,b02305965489bce71acb0a7a938d412546f139d1adc27d90d538d4ecd7183b41,2025-01-23T10:15:07.253000 +CVE-2024-13511,0,1,8b315badaeb5a615c739271a3e79d1cb9a54c1aaf05d6bc1436615af32fdbe24,2025-02-05T18:22:40.217000 CVE-2024-13512,0,0,15b524ef140c14d839848665047eaf39bfa9911689193bf2e25f735ef0c619c4,2025-01-31T18:08:22.743000 CVE-2024-13514,0,0,03526436161440ac301399cbc307440d99717485aec47f63d5d3cc842dabc4f6,2025-02-04T08:15:28.777000 CVE-2024-13515,0,0,aca8f7e0638fd7d821357389659621eb450217319a62bd2c5a959e9c0aea1b39,2025-01-18T06:15:26.410000 @@ -246386,13 +246386,13 @@ CVE-2024-13530,0,0,a32dca6d75c33e81a9c9eaf2b59e70f20fcbfe169ec3d31442792a7d94733 CVE-2024-13536,0,0,fa522d36319a484a2e2b9f8b9829d55d017393f4354bdc4c1030d71e4db73c91,2025-01-21T05:15:07.490000 CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f01668b,2024-11-21T08:50:23.843000 CVE-2024-13542,0,0,20f9c26c58c33c18bfa9db172ebf7a3744023b74b8c8426c5f8aa545e507fbb6,2025-02-05T01:35:33.207000 -CVE-2024-13545,0,0,c419b260e5a66c4272590c9c114312d98eb46bbf6a795d5e8b27dcfd0cbd5983,2025-01-24T09:15:22.797000 +CVE-2024-13545,0,1,87a0f57604fe27d4ee9df650772826f7d7900467d357a9ad3aa561d00273e2a6,2025-02-05T17:12:11.700000 CVE-2024-13547,0,0,849d60eb07b94b7aa81e2128c4cccb0dc411bc9ac2be92bb4bc290f57219516d,2025-02-01T04:15:30.857000 CVE-2024-13548,0,0,ce678384d6879b1518296d0bd59d7e5e9b3276f2861356166fcc86ea2354903e,2025-02-04T19:27:08.967000 CVE-2024-13549,0,0,bcedd6d4c0f25a57faa8365d40ac3a95b68e2d0adaafc3f3f6fa713e56e46afc,2025-01-31T18:10:28.800000 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 CVE-2024-13550,0,0,a4fead6d03b6144abe5ac40b03d52a1da2858d08b4f2df68e9fe9b57926c0bff,2025-02-04T19:25:13.807000 -CVE-2024-13551,0,1,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 +CVE-2024-13551,0,0,f33e7c8a852a6d083a09098b1d843f7d8ea7b10d57054b5491904a28cbe42e06,2025-02-05T16:28:42.900000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-13561,0,0,719ad5f42c168a91e69745d9f00b297089a3701fa296893125c967739287289d,2025-01-29T12:15:27.617000 CVE-2024-13562,0,0,b51ff5c1214904c48acd8185520c69905fbad554f23d67d52a0c555fc11349f1,2025-02-04T20:26:53.560000 @@ -246406,7 +246406,7 @@ CVE-2024-13586,0,0,031371a39e86dab11794d85bebc5761cfd2812bcdc21ab474a79e1589e567 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 CVE-2024-13590,0,0,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 CVE-2024-13593,0,0,fa3fece164aaf9e5bdce4149920be38daaf35514256e02e0d8ee1f95b69ca49c,2025-02-04T21:08:45.723000 -CVE-2024-13594,0,0,9febd445ebfdc8fdc88c1c63440d82478079fd79b1f84076d709815d4f682c3a,2025-01-24T11:15:09.667000 +CVE-2024-13594,0,1,e40694f60357c551d50cfd64c32b62fc5a068d57b870210e0ac9e99e736df254,2025-02-05T17:01:24.577000 CVE-2024-13596,0,0,2b347cb4a79836e676774e7c831f562b3de9868f3b716c19ca500dd58b6901ef,2025-01-31T18:16:35.347000 CVE-2024-13599,0,0,03405f2c3d79b505fbb84b1ff3dea79fdc81e050ef9a41f4a5537eddbfaf081d,2025-02-04T18:13:20.930000 CVE-2024-1360,0,0,da9ce5c1b0ffd132b1deac5c52879519508dab9da39cb4ccaafd03c98d8a3d6f,2024-11-21T08:50:24.707000 @@ -246422,7 +246422,7 @@ CVE-2024-13646,0,0,df579ebc80f166383afd2bf72cceedaa012995a592dad78c8758f9a4e2dd6 CVE-2024-1365,0,0,0f6156fbf2b7d3a217bf5d4ee39b3ca345099663b38e102dcb249b872d4e92ab,2024-11-21T08:50:25.350000 CVE-2024-13651,0,0,259fa33c63aeec7e7f52f40e196384b2b9057cbf4d09539ce04d35ea66e756ff,2025-02-01T04:15:30.997000 CVE-2024-13652,0,0,ed8d8236d1a3115f336400cbdd4ac56e250a414778c3b1c32835210395f1f04d,2025-01-31T18:21:53.167000 -CVE-2024-13659,0,0,3c3b26c3bb5be2f74ecf545ed8e086a445b115ae0713781b8146f71e6b71cf05,2025-01-24T06:15:26.557000 +CVE-2024-13659,0,1,dbe630e285c8f72dabbec8cebaf54bef8da7c792e6b5f98321e2c39fc417940f,2025-02-05T17:40:49.037000 CVE-2024-1366,0,0,41f2af73acb5e76ac7c2022807fff2e016bc9ca7fb30dc8ea18cd52e10cae6bb,2025-01-07T18:21:27.007000 CVE-2024-13661,0,0,3be24e05b81fe01b8fbf6ee3a938c303c059e6983fd80a8d451cf6089d020b33,2025-01-31T18:08:05.420000 CVE-2024-13662,0,0,2e47d5d6434ba9e48620c1cb21fb497f2df897f038415e75983a41a7ac7b2571,2025-01-31T16:15:33.593000 @@ -246431,13 +246431,13 @@ CVE-2024-1367,0,0,3f60d63c26ab9e28e6dceb27e57632b2e7fb2cc7ac1eb4673458558449b3c5 CVE-2024-13670,0,0,690ebcbb95d3f98eab9f8ee4f1517c6db5063e5d1de1041c36e188175dd1fa04,2025-01-31T17:56:17.183000 CVE-2024-13671,0,0,ae3f820669c60d968ca7475f09981b5aa31ebc6a060e50869f9d2043fe693b44,2025-01-31T17:50:24.757000 CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223f0,2024-11-21T08:50:25.737000 -CVE-2024-13680,0,0,be87eb6c61fd37fafb0d37c3f827fcedcd687e4ac5742fc78f3ae194a499e8f3,2025-01-24T07:15:06.930000 -CVE-2024-13683,0,0,b4c0399cd1b18b9bf6c95dcf36f8f3c7b312481f3204c470c0eb644113dc18f7,2025-01-24T07:15:08.523000 +CVE-2024-13680,0,1,74b46f50e9e8190b451f914492933fe4a5d6196724bd1fb0611ec5e03b0be866,2025-02-05T17:37:37.827000 +CVE-2024-13683,0,1,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 CVE-2024-13694,0,0,f76307657ffe1cf961458e88374ab5be6334165284f8bcf86e9ac130fdc702fd,2025-02-04T18:47:41.800000 CVE-2024-13696,0,0,907b8ab3ba012bf859122d0e684422f6614f2b08adc0bed327048c6d108c2e19,2025-01-29T08:15:19.677000 CVE-2024-13698,0,0,f47c146713a30dbaf3109d49a8189423713fed8a48570f78f3e95ed414a0fd9e,2025-01-24T16:15:34.597000 -CVE-2024-13699,0,0,b1c1df4527ad1aa6ec97619b608ddd6ab21a99c918ed2b77f43efebaf3bac4a7,2025-02-04T13:15:07.953000 +CVE-2024-13699,0,1,6c179d99e1e68d225e4cf32bfc134108fb7e1de353e5a047f158d68ed9ec8ab3,2025-02-05T18:33:09.660000 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-13700,0,0,9ce20ac3b11103f5abdc5f2758b97ef5dcc76de719f13fdbcb103d53e58691eb,2025-01-31T16:49:24.477000 CVE-2024-13705,0,0,5ec6ac499cda9ee218cf1587251a6725974948adf52db55dc1b1fdc60e1d5cc2,2025-01-31T18:17:10.220000 @@ -246487,7 +246487,7 @@ CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c4 CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000 CVE-2024-1398,0,0,7f10f6a1be1871472979dfa3e08ce990ab03c4b0b1b77b6b442adf652486984a,2025-01-08T18:39:21.643000 CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000 -CVE-2024-1400,0,0,0b9f577a46a1a3fcd46ea85e11e275ccee345bc2c1e6b2f734cc9454a636beb2,2024-11-21T08:50:30.200000 +CVE-2024-1400,0,1,bcf94319046a2baac7f1dfc452191e96f3b460855e6ccd31321cea921f511c0d,2025-02-05T20:56:20.887000 CVE-2024-1401,0,0,aacd439a69914554cbcd89a76778f88178b8f02575b95bb844c89b14ab015b63,2024-11-21T08:50:30.317000 CVE-2024-1402,0,0,c16a2bb5e28338a9b7a8e909fd1180bd46f3314048e1fd4a395f2a2357ace438,2024-11-21T08:50:30.447000 CVE-2024-1403,0,0,1223a155bc2b0b18ea1cc50606869346a4a36515ddf5edc887de58b206c628c6,2024-11-21T08:50:30.643000 @@ -246506,7 +246506,7 @@ CVE-2024-1415,0,0,c14b0840efea8f222abfc94f2ec3b47ebc1c7f10e81408ec1d19d42586f2f5 CVE-2024-1416,0,0,1f6256aadfbb3fb6d3f83dc5062b04bb636d70f017b2f2dff3679e0bc331a44a,2024-11-21T08:50:32.460000 CVE-2024-1417,0,0,80c71b6f5eccf4d89c847cf92ad69321e88152cd31952527e9649572b5abaf45,2024-11-21T08:50:32.593000 CVE-2024-1418,0,0,22561da6c61f825effad6710d5e038f72164164027714334fbeb98ec73fee765,2024-11-21T08:50:32.733000 -CVE-2024-1419,0,0,c806b39ab52f2cac617215f7b4ca10d634b1f03d43de49a7264dd29eeccfba37,2024-11-21T08:50:32.870000 +CVE-2024-1419,0,1,b351df0e359918d81a3d86c63de1a33bc110ab7e41e517890d14359841a60b5c,2025-02-05T20:50:31.510000 CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52bd,2024-02-12T15:15:07.733000 CVE-2024-1421,0,0,fce1981b75bfc198cf465137dc2c270b1d9fba91a6f00b707f307cdaadc63f73,2025-01-22T17:41:50.340000 CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000 @@ -246553,7 +246553,7 @@ CVE-2024-1464,0,0,5381513a296e0115ec061d8021538ebcb7a85f8770f33c8709fe5ce514f2b3 CVE-2024-1465,0,0,6e2482f9a41a51ae12b482537f83a337bec29ff5e6cdb76e1e42ee95e1d60318,2025-01-17T18:20:39.593000 CVE-2024-1466,0,0,ef5de606e2e46fcb26dde0caa55e23d6925b71e697e3ab161535e56eebcdfe9e,2025-01-17T18:18:00.443000 CVE-2024-1467,0,0,1f882f0f6bca034c0e2abac7852d5d20e478c1a87fa772a1d3cbda19557d6883,2024-11-21T08:50:38.847000 -CVE-2024-1468,0,0,85909a6551afb5c9ed643a3adcc66d39fbe3b663e240971373eb4ce702b3469c,2024-11-21T08:50:38.970000 +CVE-2024-1468,0,1,1a6087b1a8165e54c53a2dc7362f46b2d8ce53c1621b4eb211a7e9dc375a85dc,2025-02-05T18:12:24.317000 CVE-2024-1469,0,0,590671307a558ec03a593a57d055ca4159f61cbf1591b1c2a815f487ae5ee472,2024-06-17T15:15:50.463000 CVE-2024-1470,0,0,7fbc3997b14889f04a413aad381b5ee840f81f028dc4b1f9ac7d928721b7d32d,2024-11-21T08:50:39.117000 CVE-2024-1471,0,0,777aec2b62d8d0522847f5c8ad1ffb32c1bdfef2816c32249a594f8d812bf3ca,2024-11-21T08:50:39.250000 @@ -246753,7 +246753,7 @@ CVE-2024-1686,0,0,866a1c96d4aa74389c113d68789c3e80de4a865bdcf2d542b10935f5e4dd3e CVE-2024-1687,0,0,f94a175ab610da669115dea438e96471ace865defa8948ff13486d462acaee7a,2025-01-15T19:53:11.960000 CVE-2024-1688,0,0,d444d817db036efaac5f0bcc589b1371cb8edcdc3232d167d45921b644e59486,2024-11-21T08:51:05.417000 CVE-2024-1689,0,0,7b4924415f013ed776a662a888a67f638609a0d7f17fe4fa93b6bee7be9adbcb,2024-11-21T08:51:05.540000 -CVE-2024-1690,0,1,8472172ce4aa66dd2d86f977df5b5dca354d75d9fe0f03b70f7fb94c3a4b5a8d,2025-02-05T15:08:02.967000 +CVE-2024-1690,0,0,8472172ce4aa66dd2d86f977df5b5dca354d75d9fe0f03b70f7fb94c3a4b5a8d,2025-02-05T15:08:02.967000 CVE-2024-1691,0,0,cc7d7a21890ff730d8a3c8ca717bd684032b21b45b1b73c112567b73fea7b751,2025-01-23T19:51:46.943000 CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7acd9,2024-11-21T08:51:05.923000 CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000 @@ -246792,7 +246792,7 @@ CVE-2024-1726,0,0,5f254584205b82d10fa82259cc018f6a7e67209450947674089aa2a53b6163 CVE-2024-1727,0,0,835ea1a8de83b3427eca53b821927695e2fbfdeed0970e648bc2bbc24acad5f8,2024-11-21T08:51:10.560000 CVE-2024-1728,0,0,65ac5027c66230a900a5259c3b3bb10c527fa4ddae212a665be9e3b619bf334f,2024-11-21T08:51:10.707000 CVE-2024-1729,0,0,603fe17ef908698c8fdfdf59f37a45c2855c2ff5669409f8c7c472a39c67fc29,2024-11-21T08:51:10.860000 -CVE-2024-1730,0,1,bbc427af44b56be64c1246ddb668fa3816a504284f09c9e92c0afaf4180c001b,2025-02-05T15:50:22.220000 +CVE-2024-1730,0,0,bbc427af44b56be64c1246ddb668fa3816a504284f09c9e92c0afaf4180c001b,2025-02-05T15:50:22.220000 CVE-2024-1731,0,0,a902f14cc2968b1ad9f7e1b8f948b77dbad988dd6d596e43ac9225ce87d9cbcf,2025-01-08T17:02:59.463000 CVE-2024-1732,0,0,f0faf98c61d7814db4d39f791e5545925e8accb9aa6c5efc9a70509edc7894fc,2024-11-21T08:51:11.253000 CVE-2024-1733,0,0,6508d2b5fb32c2573644403b0a9c315289a80afcfecac1317ebb718d1a2bbd70,2024-11-21T08:51:11.377000 @@ -246949,7 +246949,7 @@ CVE-2024-1889,0,0,bbec90f94e410af96ec1a71c20825f6011a10d67397b8e33b7d0ea3552f523 CVE-2024-1890,0,0,c5f46dc2a333094435e2b609540134b0c26e8e3f3e7e75cc9ac13010af4ec50b,2024-11-21T08:51:32.120000 CVE-2024-1891,0,0,dcda7dbd0536cad9a123f74188eb37534068ccd38871f23683261bf2dbf9ff5c,2024-11-21T08:51:32.257000 CVE-2024-1892,0,0,7bf07694f57218e5cc93fa30b51bcec6621f09f9ba13357f3993185914d5961c,2025-01-10T14:49:33.690000 -CVE-2024-1893,0,1,c500190c2d4b6ea6ac643286348bf8935c7a3979ee34c7c6a34fff7b109891e0,2025-02-05T15:47:12.477000 +CVE-2024-1893,0,0,c500190c2d4b6ea6ac643286348bf8935c7a3979ee34c7c6a34fff7b109891e0,2025-02-05T15:47:12.477000 CVE-2024-1894,0,0,5f7debca258de63a030f43b257eea3885330ce9bec9f619efd4d0e0a45be4e24,2024-11-21T08:51:32.663000 CVE-2024-1895,0,0,26e84ec6e5546710286d3b9f9721406f4ace26cc5a95ff4541082e7035836dba,2024-11-21T08:51:32.783000 CVE-2024-1896,0,0,8af444bce22399cef0b2866c9e5156b5e29038809da87baf205b4cbcccca1ea3,2024-11-21T08:51:32.917000 @@ -247035,7 +247035,7 @@ CVE-2024-1981,0,0,cffe2c737efb8789ba097f31f0d9c0625560e844705711832217b8456fb6a3 CVE-2024-1982,0,0,2c3b991abfb1cc6b904427c7ec7611215da28588e140d0bf73ea79d1842c6579,2025-01-16T18:57:54.527000 CVE-2024-1983,0,0,d9c72e827fe08e23ba8309cdc8a75a80cb26ff8e98e26a622c2a30cd23478f17,2024-11-21T08:51:43.910000 CVE-2024-1984,0,0,920a1bc7dc8c1d74f9ff491089d69f3f520c921e97285bdabccea7eeadcef6ee,2024-11-21T08:51:44.100000 -CVE-2024-1985,0,1,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000 +CVE-2024-1985,0,0,4057968660f4629a99234942fb0c77f034584df8c8d7585d728187ed350ba8f2,2025-02-05T16:43:56.660000 CVE-2024-1986,0,0,9a8f0eee78ceace023fbaae1731849068919c7cb8b85b99d980679ab3b4a946f,2024-11-21T08:51:44.357000 CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000 CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 @@ -249357,7 +249357,7 @@ CVE-2024-2266,0,0,149e5cbf8240d257640179c28ee36c419b37e8ddb8178d9ecfb532d67af9f6 CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000 CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000 CVE-2024-22663,0,0,6782a4082917ca38ebefef21e6f884aa140361fc8b102266ad8603a42c670e55,2024-11-21T08:56:33.187000 -CVE-2024-22667,0,0,35c64983a2404484851ec1ce3c15f35fafa54d77cc11db890e2840c740b005b6,2024-11-21T08:56:33.347000 +CVE-2024-22667,0,1,edadec3a89e6c904804bef3249f22b6ef314bb09dc1b9905e67b22ac9563e6a1,2025-02-05T17:29:53.050000 CVE-2024-2267,0,0,b0cf1527dec8e0daf9b4fcb54d90684de4aa09c8c3089d675830b60a2d36868a,2024-11-21T09:09:23.303000 CVE-2024-2268,0,0,6d4e388d01cad7696055cb5384a116da443134cd3dd3539603ce459631f4aee3,2024-11-21T09:09:23.440000 CVE-2024-22682,0,0,5a340c1b31b6e259c63ff9afdb9ddfaa7ba2e6d870ae0776db25aa39ef718055,2024-07-19T19:15:08.093000 @@ -249430,7 +249430,7 @@ CVE-2024-22855,0,0,d29135531631efe1165ff599ccdfec61c2e020be99cdb0edd3139920aa999 CVE-2024-22856,0,0,9a3cf692fedd9d9c8905932bdbe01e2cd16484b2fd2cc1c9bb5fe3c312adf181,2024-11-22T15:15:05.737000 CVE-2024-22857,0,0,a12fdd07f0c62b1402c95279eb5c6f9cddfad6e24bc4df1eca6a355ef86efbca,2024-11-21T08:56:42.987000 CVE-2024-22859,0,0,7df1dfcb40c8eee73afdbdf9f1b8df67f9fe516acd950ca1101b99bd892cc7c0,2024-11-21T08:56:43.220000 -CVE-2024-2286,0,1,a7c65d62c7163c7051f4f892d6d5418624ff9e80493fa2ed44303e4ffffa80a7,2025-02-05T15:46:51.567000 +CVE-2024-2286,0,0,a7c65d62c7163c7051f4f892d6d5418624ff9e80493fa2ed44303e4ffffa80a7,2025-02-05T15:46:51.567000 CVE-2024-22860,0,0,c47eaa0272bb88edcadb181090e61bcd32d27d98b0d5197e858d04f8aeab14ea,2024-11-21T08:56:43.380000 CVE-2024-22861,0,0,7383253856fe1904e459646987bfd0c0194f4519532cfe898c97a3d6d5f22f10,2024-11-21T08:56:43.550000 CVE-2024-22862,0,0,2591cd8c2cdc2b45e89b0dfb9be9b8c6bd501c140a65a300a4787cbf21b1c17c,2024-11-21T08:56:43.717000 @@ -249527,7 +249527,7 @@ CVE-2024-23106,0,0,d51ac06138d4ccfdeff4b33582414b9ca25395b3be6a1786623211eeef757 CVE-2024-23107,0,0,fb9f269ff9a1721dc70633ce33277322f1dbc0036fc8172640447e4431712b1e,2024-12-17T16:51:35.250000 CVE-2024-23108,0,0,9d659a0c56266d107dd050234c8418f99361db23121c8ca000992c1044ae9639,2024-11-21T08:56:56.783000 CVE-2024-23109,0,0,c8b681856326059919d7eca87f263b10c76f30a97cdf3c7093cdd3ba11934f09,2024-11-21T08:56:56.940000 -CVE-2024-2311,0,1,0cf909d0a913e2d7ac997bc2e07f3e005f9d8fd2b3a102fbb52a595db6df8e8a,2025-02-05T15:48:59.017000 +CVE-2024-2311,0,0,0cf909d0a913e2d7ac997bc2e07f3e005f9d8fd2b3a102fbb52a595db6df8e8a,2025-02-05T15:48:59.017000 CVE-2024-23110,0,0,d99920e798f18e3e88354c49c1cdfc0fd45bd95b37b5163c1317663d13886c6e,2024-11-21T08:56:57.093000 CVE-2024-23111,0,0,7ef2f2a8efe239ccd2ecd0d791a41756b1288ad7b72cfce97cba3527eb828fcf,2024-11-21T08:56:57.250000 CVE-2024-23112,0,0,0de7d6a1e760f1e960a50533c0b8527a6f105b8dfbada4bfd3838a8035f269ce,2024-11-21T08:56:57.390000 @@ -249862,7 +249862,7 @@ CVE-2024-23436,0,0,9d9890cc0e8eeed8d7dd79c449db082fdc01a1f3d4ea5ad8de13ee326f8db CVE-2024-23437,0,0,ee59c2e2cfc2b4d6eacc2bf7304883418405daaab31f4e25a07db9ec41632f27,2025-01-01T00:15:41.123000 CVE-2024-23438,0,0,50f99bb945243dd3c3cd80675c0b4365c294d8ebe7ea659e8646fea5bb3cf596,2025-01-01T00:15:41.193000 CVE-2024-23439,0,0,12968241395f8c73c9a4599762d2ea068ebcf9c238e4c0c3dc52111a494628b8,2024-11-21T08:57:42.570000 -CVE-2024-2344,0,1,4f4244d272b64051dfc03423710b3236e83d2253b04bc5de318d9cd1c5703ddb,2025-02-05T15:49:42.697000 +CVE-2024-2344,0,0,4f4244d272b64051dfc03423710b3236e83d2253b04bc5de318d9cd1c5703ddb,2025-02-05T15:49:42.697000 CVE-2024-23440,0,0,c1247ebedbe63be2da6e8eb2d9998e0c3b32e6d26a94360aa7e651f4c01afead,2024-11-21T08:57:42.717000 CVE-2024-23441,0,0,5fbfae92029097d4fc891359f80283dcab2b38733988c2bba5734ba6888ded2a,2024-11-21T08:57:42.840000 CVE-2024-23442,0,0,85a9a2957fc08ee9b474618a1da6b8d0a607c36f5bd40b243be47bb63ce225c4,2024-11-21T08:57:42.983000 @@ -250535,7 +250535,7 @@ CVE-2024-24337,0,0,84cd61a14c577874a9be59e052b4ac055008e3a4ca3fa3b8c3dcce74398ea CVE-2024-2434,0,0,b1d92e7e412cb108270aabeddb76c0b907d7e681eb6101fbf581bcecc1bcf28e,2024-12-12T17:54:50.840000 CVE-2024-2435,0,0,13946b56c488dfc70f76fc7b5d012cb8792a179c2afed5608a2fab6658f7c7eb,2024-11-21T09:09:45.060000 CVE-2024-24350,0,0,3fa9787a170971836fe375501d454363e08819a985bc007c689b66061ab513d4,2024-11-21T08:59:12.883000 -CVE-2024-2436,0,0,131f4de16549a73314edd1dad91c27981a3ce2efc80c0ef6337f5c3ea4e2795e,2024-11-21T09:09:45.180000 +CVE-2024-2436,0,1,0af4ba5f3f68ece59cc1db434eaca4682374e0b2cb576f634aaa4fc4658ba905,2025-02-05T18:36:33.517000 CVE-2024-2437,0,0,f8847cfc571efb0748e80dddf49606f1b1d23e67cbe423ea421c492b33132db0,2024-03-14T09:15:47.690000 CVE-2024-24375,0,0,34d73ce3493bec77e696d6be4fb5a14a049a948cac9cef98fca00cf31d6e550e,2024-11-21T08:59:13.040000 CVE-2024-24377,0,0,c3571d591fdd08eb6fe4c53e100023da606530fd66732a886bbbbe622f3d1b3b,2025-01-13T15:14:32.837000 @@ -251032,7 +251032,7 @@ CVE-2024-25062,0,0,33d5a68ef3b936424a736429c0cf52857e2954c9e23e61044543b96f4ce8f CVE-2024-25063,0,0,66e3d9769be4a072b3ce672f9896271f84fc3a46faea832786d65ef1b0821cb5,2024-11-21T09:00:10.580000 CVE-2024-25064,0,0,630189d4352af193613c5caf500a30b1ea966acedabfdb6b6c44c8c9c90ff2da,2024-11-21T09:00:10.703000 CVE-2024-25065,0,0,c5ef63fb6393927feecb336280085310f77486331818bfb882d778f1fac88811,2024-11-21T09:00:10.830000 -CVE-2024-2507,0,0,f838d066c1051019c66563697ac782cce07bd79683ee893272e3ab92adef0586,2024-11-21T09:09:54.333000 +CVE-2024-2507,0,1,d2bd12e43cb16137b76052767012daeeb5681b81f827ee8546e5b590614b4a24,2025-02-05T17:28:13.613000 CVE-2024-25073,0,0,b773096cbe22b7b2359c05c5b9b8c5d77df4ed93f4aca2b5ee2c4c6254770bbe,2024-12-04T21:15:22.230000 CVE-2024-25074,0,0,ceec7e26506d1c51c0a15b70554b53358fa1555c187d8abcdb06a9354ef81f73,2024-11-21T09:00:11.107000 CVE-2024-25075,0,0,970d01edf3738574e2fa429d2b8057d7604306337e0cb37fd58648c21569ef9b,2024-11-21T17:15:11.540000 @@ -251240,7 +251240,7 @@ CVE-2024-2537,0,0,245581af9cb0004fabdffbfca72e0fda0e6cf99c56b5dfae5408c1dd2468d6 CVE-2024-25371,0,0,02370958f1fcb5a2b09fff3d567983d7c7d1e4ab210b6dca6193d9dd108edb58,2025-01-14T15:15:14.490000 CVE-2024-25373,0,0,d4bb0f33d1aeb2a5a53c5ed2764be7945bf1d210aae7d091cb88bf312c0ab5f9,2024-11-21T09:00:41.553000 CVE-2024-25376,0,0,b9162f08a32a4213913d51b909fda1191d4711871cec0062f7a25dc6ad917cb9,2024-11-21T09:00:41.780000 -CVE-2024-2538,0,0,18ba10814d39428e8d5577752d8b03a64068541821e5f9329f304872357fbfde,2024-11-21T09:09:58.220000 +CVE-2024-2538,0,1,b85aea9765c05329fd4e9b8025754899d55685165e7227e89329268047059847,2025-02-05T18:15:22.620000 CVE-2024-25381,0,0,41718fab1364a06f6dcb130d239d6764dc030d3199b449114ae1d63e5d3a6ef8,2024-11-21T09:00:42 CVE-2024-25385,0,0,59ac22d49f2fad863547dec5a90c0c7a9b9f0475e0a1175434939147054bace5,2024-11-21T09:00:42.210000 CVE-2024-25386,0,0,56406e6fb98d0483e199e75526abcdd166cb1bbc8af5cb6a4a3846bb8e4462df,2024-11-21T09:00:42.437000 @@ -251273,7 +251273,7 @@ CVE-2024-25421,0,0,4aaa4c906586deeb67dc43ed5331c3d0f3499a1d45ec23efb878770db6ed6 CVE-2024-25422,0,0,e3740fb5e91423d06a19fce95d6ccae7afb58a956fb9e14250311d7e8ef9fa23,2024-11-21T09:00:47.423000 CVE-2024-25423,0,0,94ea816a321c84c96a2ebe547c547d669f3866b10bc313b7f77b960fe74089b8,2024-11-21T09:00:47.563000 CVE-2024-25428,0,0,22a547278095b4eb8bf134210b7be8d293871bec4b1bd2f6683fc4f7d51a5b7a,2024-11-21T09:00:47.787000 -CVE-2024-2543,0,0,558817e2338b45eb79d19337a526c6451eb8d21a6db08856499491a42017b191,2024-11-21T09:09:58.753000 +CVE-2024-2543,0,1,ccf6eabe332a490974ff591a3e766c8f7df32a51f19058b6ddbefb9a5c069197,2025-02-05T17:11:54.403000 CVE-2024-25431,0,0,a8f01c9a37ff069c7fe24fb46f974e9aa02888ea78827e75d08c3ba0b43d9f70,2024-11-14T20:42:47.297000 CVE-2024-25434,0,0,f6e4f2fadc8ceca96061be4132e7b90e015d2912a1fcf0291427a1223fb2e0f5,2024-11-21T09:00:48.197000 CVE-2024-25435,0,0,b1ac5db3774769c8dcad2d7cb31ed1823fce3cb4a9c2dc98c92811050617ebda,2024-11-21T09:00:48.427000 @@ -252650,13 +252650,13 @@ CVE-2024-27084,0,0,338f54f6691d2c6f86b17bf560fce22137a7c3f7f032f3603eb755d855416 CVE-2024-27085,0,0,7a91f42e83883eebf7dd79388750166b8b0238d867e5bd66c97606b795c57c1c,2024-11-21T09:03:49.710000 CVE-2024-27086,0,0,31b4ebe2efce4a28ab0b8bcfc7f002678828a55ea41b5b1acf463da459be833a,2024-11-21T09:03:49.830000 CVE-2024-27087,0,0,cc4f44d5158441803a17a794aacfbc4914f18711058d4d238e9a570fec7d2a9b,2024-12-31T15:34:15.493000 -CVE-2024-27088,0,1,907e27b8bff2757b34eee6b833731460fa78c11dd5452b32318f6e1eb4a01f84,2025-02-05T16:18:38.840000 +CVE-2024-27088,0,0,907e27b8bff2757b34eee6b833731460fa78c11dd5452b32318f6e1eb4a01f84,2025-02-05T16:18:38.840000 CVE-2024-27089,0,0,32c5f647bd4542a63d3920acbc84f8120e07a411286d59ab2a36ed9130fb3505,2024-02-26T20:19:06.073000 CVE-2024-2709,0,0,297c40d248d51ec740c7403fb26c5d03674e102d285a860c91e917ac0e61ced7,2024-12-12T17:29:29.930000 CVE-2024-27090,0,0,a07ae4769ace53fba27721c91f1199a3fffd8db8c63ab88a362dc2b06bf48566,2024-11-21T09:03:50.243000 CVE-2024-27091,0,0,5d15379a0e25de57c218506fc2ada5af1788849b633652680370f5e888110431,2024-11-21T09:03:50.373000 CVE-2024-27092,0,0,afa4e43095cbffa177f697098968588091dc7ed01a4e70f2f191cb6d7fcfc14f,2024-11-21T09:03:50.500000 -CVE-2024-27093,0,1,ca9401053b43ed5f615e399e288dc7e2850c2fa523cc7a4474512d388f7d9f67,2025-02-05T16:37:05.137000 +CVE-2024-27093,0,0,ca9401053b43ed5f615e399e288dc7e2850c2fa523cc7a4474512d388f7d9f67,2025-02-05T16:37:05.137000 CVE-2024-27094,0,0,574201530a99a0d9932b44c50c32630975cca1ba28f4581b17fbb77dec7e452a,2024-11-21T09:03:50.780000 CVE-2024-27095,0,0,78a1555294ea358b8152550a2082da91e49d92b932991be797dbd3c604913e80,2024-11-21T09:03:50.910000 CVE-2024-27096,0,0,ff3b6eeb112a372181ce06d11a8e55e4a7fd78dae9c02ff45f77b3fada3d7dd8,2025-01-02T15:54:08.883000 @@ -253474,10 +253474,10 @@ CVE-2024-28090,0,0,fd1c5d24517e6f980a9802838d46bbe8c34473d65c6fd3784544457108b42 CVE-2024-28091,0,0,6d437357532a241eacd48681e70df0baddbd3f183f071dd46dfe1a0bbc59d67c,2024-11-21T09:05:47.357000 CVE-2024-28092,0,0,cbf028d1faddf3ef1b866110027ae43478de109a8a0136d4ba9574a1c6bfd80a,2024-11-21T09:05:47.583000 CVE-2024-28093,0,0,8a16644aa7d17832260ebe5aa55ff02c0eb1f498df1d6c0fc0eaa9bfea66cdc5,2024-11-21T09:05:47.803000 -CVE-2024-28094,0,0,e65989a468ce7112ff14a5b6de487cd35f7abbd47747bf6c735d7568c9d9ee8d,2024-11-21T09:05:48.043000 -CVE-2024-28095,0,0,1f7d8fe8a6c56dc8dd69a3e4a3303f7c94c39f3ce605ea90cdf64f6129ed7de5,2024-11-21T09:05:48.183000 -CVE-2024-28096,0,0,a0a1b2d48a132a8f67f7924055e0d93805996700281fe9467707cabf2e784f75,2024-11-21T09:05:48.310000 -CVE-2024-28097,0,0,d328615318f60f00491ec7904bbd032058d8e0158a6c16297acf359751fa44f7,2024-11-21T09:05:48.423000 +CVE-2024-28094,0,1,25f8288f604bc508b49368e31c5412d3972479fa57e9041ebfa5b28df5617473,2025-02-05T17:15:25.047000 +CVE-2024-28095,0,1,40550da908067b760599f1c3ca7ac97fd171033ef8de7a6022eee87a4c66348b,2025-02-05T17:22:23.773000 +CVE-2024-28096,0,1,8dc4b63bd0c2617fa98f85d6b064993172a649ea90e59ff1cdb9c557bb34eac0,2025-02-05T17:22:49.233000 +CVE-2024-28097,0,1,a8c0cbbe9f8be5c568fd70eff71f986cdd45b684d8732538d72ba4db79e30797,2025-02-05T17:23:01.313000 CVE-2024-28098,0,0,9d40261cec447217dcbe8b865b335c2de4beaae87e7806bacec890457d4d35ff,2025-01-19T03:01:40.317000 CVE-2024-28099,0,0,67074bfe8335b5e423677837dbafff99c4030ec6685c157c0f1ee9942960739f,2024-11-21T09:05:48.693000 CVE-2024-2810,0,0,f152fec8b4da4dd39d7c0040313b2d0236f2aef6a1dcaa287e4d60d1c0e11e68,2024-11-21T09:10:34.653000 @@ -253868,7 +253868,7 @@ CVE-2024-28771,0,0,a3cb89cf1d05e7d0895f3078021fd2c446b38342b5818b282cfdc86fc3e9f CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 -CVE-2024-2878,0,0,1c9a7d852476a085d71da40ef71fe47fa8c96ebdf60727d79ae9588079fe096a,2025-02-05T13:15:22.523000 +CVE-2024-2878,0,1,593effab0a0a066bc3f058b2cd4d1bef240da86ea16ce642ebbcdc2d0e9d8183,2025-02-05T20:15:44.637000 CVE-2024-28781,0,0,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 @@ -254153,7 +254153,7 @@ CVE-2024-29089,0,0,30aa9ca77c70df19d13f418cb49ccc92807a86af53902c3476abc26c74f9f CVE-2024-2909,0,0,212d6092864ea8ef0ce591560bd67457e3ce8a4501b23e595c5fa210644143e5,2024-11-21T09:10:48.840000 CVE-2024-29090,0,0,18da630c8fc560cb81e09348c0a6780804b346aca614de229d3765c560012f5b,2024-11-21T09:07:31.940000 CVE-2024-29091,0,0,001d79447f1fd937da20fef3e5028a795193f99a6f4e8301650bafcff28f24ac,2024-11-21T09:07:32.063000 -CVE-2024-29092,0,1,7e8075edbc6a21626b4fe890cc5301fb6c236b319bc968a3aa29d39dc25c2aad,2025-02-05T15:38:53.443000 +CVE-2024-29092,0,0,7e8075edbc6a21626b4fe890cc5301fb6c236b319bc968a3aa29d39dc25c2aad,2025-02-05T15:38:53.443000 CVE-2024-29093,0,0,5e85ebe8afa5c7bbdc30ad2504cebdc2a8ad5bf8cc4008892cc1938c37a3dd06,2024-11-21T09:07:32.320000 CVE-2024-29094,0,0,26c86cb4c883aaf683350c57ec772a68f156b984cfa3ea960a25bf5f6f4c9a7f,2024-11-21T09:07:32.460000 CVE-2024-29095,0,0,bc68d7d511c064daeca312e23d9fa85cc3b1af81e10c43ec8c37fbebd13ddbff,2024-11-21T09:07:32.593000 @@ -254187,7 +254187,7 @@ CVE-2024-2912,0,0,37e835e5c308fa0aa260f2c273bc0161a037279353c9b0757bd2ac89753893 CVE-2024-29120,0,0,ab60e4c7de9f562c8954e202b26c792aba2953174251a3b9b65ce9c03da9cdf4,2024-11-21T09:07:35.950000 CVE-2024-29121,0,0,101921ebe4c875a72801cb923d534b8ff19aafec813823a066256e49b8d26d71,2024-11-21T09:07:36.147000 CVE-2024-29122,0,0,8710d97047b304a25458d0ab664e6cb0e257fb51739e2823de15a75c47327e01,2024-11-21T09:07:36.283000 -CVE-2024-29123,0,1,54ee05eccc59cfeabfe16ca536d017e4d29e9b88c542e6dcef31079ca5cc5912,2025-02-05T15:38:24.847000 +CVE-2024-29123,0,0,54ee05eccc59cfeabfe16ca536d017e4d29e9b88c542e6dcef31079ca5cc5912,2025-02-05T15:38:24.847000 CVE-2024-29124,0,0,434c0bf19aeb54ab832948977c5c2ef563f396c419fd18df8528a851b7966f0d,2024-11-21T09:07:36.537000 CVE-2024-29125,0,0,7689e22e88613c4397974a0cea7f1ab3b1b6cf1c69ade865576f7ba8b9493f28,2024-11-21T09:07:36.660000 CVE-2024-29126,0,0,f1add0c484e17b0d8750215465498a50e794bfedde92c9ce2e40aac39643c679,2024-11-21T09:07:36.787000 @@ -254493,7 +254493,7 @@ CVE-2024-29757,0,0,bd7783b6715cff85d146b7f3bcffcb931e226d2a557937fa75537c3d9b443 CVE-2024-29758,0,0,6ea6f820d39944c9f593511e726a4e557f489b72484f2be43d28f1260dec212a,2024-11-21T09:08:15.927000 CVE-2024-29759,0,0,dbf65f6307d1a88ff3bf5c846fdc8605dfedd83e634a2f8bf0fa6afff967dae9,2024-11-21T09:08:16.050000 CVE-2024-2976,0,0,be906ae6792b8669cd4d4b057f3766fd4a8c9c37d055d1b85958a80dc6b656bd,2025-01-15T18:15:32.177000 -CVE-2024-29760,0,1,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000 +CVE-2024-29760,0,0,b6b4a1298fc92b00b03e641bbbad2c77a5d04ee4c0cc356527f4971362ab1ed2,2025-02-05T15:41:03.623000 CVE-2024-29761,0,0,768c3eca5f21654a3a2565d24ad5040669ec8be99a6791320fd6dff74c94e8c9,2024-11-21T09:08:16.287000 CVE-2024-29762,0,0,c27a800dbb174c1babee78adb8afb77016b4c238a5b56aff46b53838c8024717,2024-11-21T09:08:16.403000 CVE-2024-29763,0,0,4bd5f2974671bcfdb69381b43db1dd39bdbf8d307368c8b7d5f1d5d817576c17,2024-11-21T09:08:16.533000 @@ -254511,7 +254511,7 @@ CVE-2024-29773,0,0,3a4135e82da5b1b5c317ee5a57a4fb632eadd9fc142214ffb19ce8a1b2425 CVE-2024-29774,0,0,f3d1348767c8fb36eb9759f92ec78d125206058dbe9c670327e80db2a072e764,2024-11-21T09:08:17.887000 CVE-2024-29775,0,0,8a32d6ead85c3d0385149f4c1e948b755d934ea1153906d6f461377664eae18a,2024-11-21T09:08:18.030000 CVE-2024-29776,0,0,2e120c49ed65bcfed6afb334fbde2e379057011e9a9231fe131a7f336c27e8a2,2024-12-06T21:15:07.013000 -CVE-2024-29777,0,1,96c3bea8cd0c596ccb503cca01d64317828a3a70ede5d81d9e50be91afd9929a,2025-02-05T15:40:21.993000 +CVE-2024-29777,0,0,96c3bea8cd0c596ccb503cca01d64317828a3a70ede5d81d9e50be91afd9929a,2025-02-05T15:40:21.993000 CVE-2024-29778,0,0,a64acaec49ead6061f622abf73bb41615d3534ee842b41a8b4d2bdd8baa9659e,2024-11-21T09:08:18.393000 CVE-2024-29779,0,0,9fb0d36c535b802266f277a0f09be1e9d2b06c018fcc0e42395195d80ab47df8,2024-09-18T13:52:59.357000 CVE-2024-2978,0,0,0d9e18107b4019ab4603abe89d6d147ac198ea723a2583b18a6fa90de4b5b948,2025-01-15T18:20:16.187000 @@ -254528,7 +254528,7 @@ CVE-2024-29789,0,0,53b9d4b60eb4b1eb02c57558d68216dd308f7846648c7a0e568a4c1b62755 CVE-2024-2979,0,0,169364e1b852ff19eb4d89578c5260ea1664b46f15655b4e30fc73711f61d607,2025-01-15T18:20:29.413000 CVE-2024-29790,0,0,4ffc45027b2f086e430b392874a445504ac1e7739db800cb2ffc6c260cdab45e,2024-11-21T09:08:20.387000 CVE-2024-29791,0,0,85a4d58c4a829257279f8d65f2f235a00f3ee6099db60d44f44693f14d788eea,2024-11-21T09:08:20.517000 -CVE-2024-29792,0,1,34e590205d2f418692ebf9014a875d8e00e620d9fce1b035a6741819f3890f75,2025-02-05T15:40:41.777000 +CVE-2024-29792,0,0,34e590205d2f418692ebf9014a875d8e00e620d9fce1b035a6741819f3890f75,2025-02-05T15:40:41.777000 CVE-2024-29793,0,0,b83bf35d70ed5fefa81aa917a86052a2cab25d1fd31eb4ba1db86890386b59d2,2024-11-21T09:08:20.773000 CVE-2024-29794,0,0,70800983f55d41173548f798a538d577c2723effa998974108d8c11c876be532,2024-11-21T09:08:20.910000 CVE-2024-29795,0,0,7cde9d85141c898a41540349f913ce42b8abc1f9285faa500037755a789a809f,2024-11-21T09:08:21.040000 @@ -254676,7 +254676,7 @@ CVE-2024-29931,0,0,6fccd9107f6977a7e480a8db9325400b201ad1de4d523d1cc5ce0cd34cc66 CVE-2024-29932,0,0,7abbd11a1807f3ba065186e10bf56d3f92729647a5b01457179461f7d82288bd,2024-11-21T09:08:38.790000 CVE-2024-29933,0,0,7dece04b0d250730bb6c8f5d1ee2f214de430141eb9a6cbcb49346ae6a9985fc,2024-11-21T09:08:38.917000 CVE-2024-29934,0,0,b297fa27d74f1971b9c10285a66c0488aa6ad5ec882afa30cbf2c2b6be6540cf,2024-11-21T09:08:39.063000 -CVE-2024-29935,0,1,d8f8dd640102425c5140becffd8fb6166f281d4721890fd59d5b0e2d6c5227ae,2025-02-05T15:39:57.193000 +CVE-2024-29935,0,0,d8f8dd640102425c5140becffd8fb6166f281d4721890fd59d5b0e2d6c5227ae,2025-02-05T15:39:57.193000 CVE-2024-29936,0,0,229c6e3849b68d022ecbfb6d64cc56a947023bd19f892731295bcdd1c05b1cb0,2024-11-21T09:08:39.350000 CVE-2024-29937,0,0,15215f65d14e4b7931bf8579202600b8b833eca105a91b11489f1259f3d3c8ef,2024-11-21T09:08:39.487000 CVE-2024-2994,0,0,dbf42e6d4777dffa15a59ebda143f1826c94e89b28436a3141830d0aae5f37a6,2025-01-15T18:21:33.690000 @@ -255154,7 +255154,7 @@ CVE-2024-30419,0,0,4ce0d791ec8405789a5547d96555f558222fea0d6abb07ca21579b1a05f2e CVE-2024-3042,0,0,1035f79872360bc59d8efaa2fba122980688369c23f92dd365edadbcbff99c50,2024-11-21T09:28:44.810000 CVE-2024-30420,0,0,403a0bdc356df9601fc5ecf185347c2ed0664384c1bbee678bcce76af9aa6137,2024-11-21T09:11:53.143000 CVE-2024-30421,0,0,7afd28cf0a598ceb77ce8100ff766dd125654c211246f23a4b533003549add26,2024-11-21T09:11:53.343000 -CVE-2024-30422,0,1,f01c0a64f32f26d00ebfc1ca76e0b1a2419fd37cf4fbbeb43bb30f715e41b580,2025-02-05T15:44:01.870000 +CVE-2024-30422,0,0,f01c0a64f32f26d00ebfc1ca76e0b1a2419fd37cf4fbbeb43bb30f715e41b580,2025-02-05T15:44:01.870000 CVE-2024-30423,0,0,5b1517d395b5f8158dfe3dfb9c31f1c8a0fee969a59141fbef55b4ecb5784516,2024-11-21T09:11:53.597000 CVE-2024-30424,0,0,48524e69984a1ed7696a166e148f60ba365f7f7962129b44ff4524ebe85c89bb,2024-11-25T15:07:22.740000 CVE-2024-30425,0,0,d68c222db45dd584e58dce13133847ff4ad6b955db2902ac4a600d2a9429d974,2025-01-31T19:59:44.457000 @@ -256582,7 +256582,7 @@ CVE-2024-32452,0,0,aac4cde9be434a15a3c8880e6d658feca99b75b72025c37dbb742996431a4 CVE-2024-32453,0,0,d7e51740cba5d3aaf7befa619810912cd5a08a036267f224348b62924e4c44bd,2024-11-21T09:14:56.703000 CVE-2024-32454,0,0,db0580d0252a59a4de3c328df3d7785d9cb57a822a4df93204ff3923c398c6bf,2024-11-21T09:14:56.830000 CVE-2024-32455,0,0,a98d40c259453ce7aa373c9f145b45669fa03965bf34d34e1ba446c201a17ecb,2024-11-21T09:14:56.937000 -CVE-2024-32456,0,1,d71c46bda867331a69970d5d3c33fda5d78fc66388f1e67dbc033a3417b9f201,2025-02-05T15:44:23.340000 +CVE-2024-32456,0,0,d71c46bda867331a69970d5d3c33fda5d78fc66388f1e67dbc033a3417b9f201,2025-02-05T15:44:23.340000 CVE-2024-32457,0,0,dfbc0b4255e6ec474bd744efdf599e0d27ab926a0d114b556f9191667bdd1775,2024-11-21T09:14:57.177000 CVE-2024-32458,0,0,5f70a9dc0b375c196ce2fcf6a5de1ac433d11d6afd901b982b8ca14214e3496c,2025-02-04T17:57:21.363000 CVE-2024-32459,0,0,cfbee1562ad855f25e24ef22ebdcd0e4f0aa9334905362afbd3e3cc93f28b4ac,2025-02-04T17:57:52.777000 @@ -256703,7 +256703,7 @@ CVE-2024-32571,0,0,37503fe930b0dfa4cac2afb62cf84dc36d904c374111c980e59bf7c368a09 CVE-2024-32572,0,0,266236ee22a315278f481eefaaa93e215c7b9354450f4916d7a1eb9d7fa62de9,2025-01-21T19:41:11.030000 CVE-2024-32573,0,0,c4ada09449978ac5ef71753fe53b95c37ffe6879877b5e9dc86a461e1e2e1838,2024-11-21T09:15:12.630000 CVE-2024-32574,0,0,a89670989500cfd40178f80a09a009fb32c147beb8969ca4c49a42decaf90458,2024-11-21T09:15:12.760000 -CVE-2024-32575,0,1,a8bdade79839921d06b06781cd842ffb8d80698bcc05ba62c83fd0e2bfe4e7c6,2025-02-05T15:44:54.393000 +CVE-2024-32575,0,0,a8bdade79839921d06b06781cd842ffb8d80698bcc05ba62c83fd0e2bfe4e7c6,2025-02-05T15:44:54.393000 CVE-2024-32576,0,0,d926863b95cd6fd7e294900c6c8ad6a7513f5bd75dc7eee94b7cd1476bdf387a,2024-11-21T09:15:13.060000 CVE-2024-32577,0,0,d4cf9274f36efdf9a934f2419d22ac1d14bbabb2233baf7486d9b15702d3fa74,2024-11-21T09:15:13.190000 CVE-2024-32578,0,0,dd56dba86414bf2e360c901c9bf8041517f40b03a068e9f541feeaa3a91d5fef,2024-11-21T09:15:13.360000 @@ -256713,7 +256713,7 @@ CVE-2024-32580,0,0,b4e3f6b6496cc625cf77f5b050381f56a7e1c34b1f08ed81b31fb6b20f950 CVE-2024-32581,0,0,e80522a118298483830242753847ceef7c7bbc962e7cf9d3ddfa998313dfec76,2024-11-21T09:15:13.787000 CVE-2024-32582,0,0,a6084d9b53060aea950cfd3272b979a362bf912dc30a7a48c463ae5c089c04b7,2024-11-21T09:15:13.933000 CVE-2024-32583,0,0,24da453d9ee27d812a2e4adbade5a7ee4eb2971588f5c0f2f64d8bed39cf34cb,2024-11-21T09:15:14.077000 -CVE-2024-32584,0,1,c983708392498545dea5e27cf127ca84e5b54e448421f7cf6922b8454aa37db7,2025-02-05T15:04:03.760000 +CVE-2024-32584,0,0,c983708392498545dea5e27cf127ca84e5b54e448421f7cf6922b8454aa37db7,2025-02-05T15:04:03.760000 CVE-2024-32585,0,0,7a32c25ba62b7843c34a892783d46e5a60915dc8c33e023613a205524ac3e78b,2024-11-21T09:15:14.377000 CVE-2024-32586,0,0,320ce37cbc41d52b25d2dad2ca04a73065c0e9196d7ad2be5dea0edbb699bcdd,2024-11-21T09:15:14.513000 CVE-2024-32587,0,0,59b4e4f3d49c8038d4093c37f3d494fcc7326b6f9ac822af5a1e5e27989705f4,2024-11-21T09:15:14.643000 @@ -256928,7 +256928,7 @@ CVE-2024-32795,0,0,fdfe798dbd74407bc911a1475ae57f4d59eec3d8f83eeb0bf9cfdc097931c CVE-2024-32796,0,0,3c13d57420299f06b0c04faec16c8cc0dcf69d3a31f7429ad926f51ca4392368,2024-11-21T09:15:44.413000 CVE-2024-32797,0,0,a034c0aeac18f60b3720fcd260799e2d6973e2274f86c902b1d05567f350442e,2024-11-21T09:15:44.547000 CVE-2024-32798,0,0,fd677522ff83a6f90530746ab4382ce62e5c659841174fa2108437299db7bfc0,2024-11-21T09:15:44.677000 -CVE-2024-32799,0,1,0ef0ab74c2f31678f262df7b5cce347cf68cc763efec35c6403af59fcc1972f5,2025-02-05T15:03:44.487000 +CVE-2024-32799,0,0,0ef0ab74c2f31678f262df7b5cce347cf68cc763efec35c6403af59fcc1972f5,2025-02-05T15:03:44.487000 CVE-2024-3280,0,0,6e35daa9ab4783a451c513b377c3ea250a926e300ed8e7ee1f43baa19736273c,2024-11-21T09:29:18.580000 CVE-2024-32800,0,0,7529f457d7236cd992ddd813b5b2aeeb60d94c841e8240a9d20c3c50bd23745b,2024-11-21T09:15:44.940000 CVE-2024-32801,0,0,cbd4e0a11ed2d4f0aa701a0dabe8188a805539a3e5746a6d3807774e1ae3c0ac,2024-11-21T09:15:45.080000 @@ -259734,7 +259734,7 @@ CVE-2024-36432,0,0,6a7358dc536428baac65bc114a629bf40b09f83f677725d29598b39ca496d CVE-2024-36433,0,0,3897f68c5994c1d63413d0d21c5a6799a6f93846dce90f2cfc330f9fe939765a,2024-11-21T09:22:10.140000 CVE-2024-36434,0,0,57187fcad587e669672363bd32525872d1142b4a7edc426ca491fb68d227e59c,2024-11-21T09:22:10.290000 CVE-2024-36435,0,0,7fefd797baa5c99dcf3194f778a025fe9ca294d7685cc52fbd3c6f4aad33d2c7,2024-11-21T09:22:10.433000 -CVE-2024-36437,0,0,bbb5bbc3386e2d903ec3514151fa7bd78e15d7663a8c0c8b9eb85c0f8a88be92,2025-02-03T18:15:33.733000 +CVE-2024-36437,0,1,dab7ca621d2139888f47d9ab4a0e0b26bc79214c32679ae4d634ef32f8e2231b,2025-02-05T17:15:21.337000 CVE-2024-36438,0,0,c5afb68071bde05204adb9cc67143f2fc41afd2f84d6664b93d56d55a0f9eecc,2024-11-21T09:22:10.607000 CVE-2024-36439,0,0,a9b33055eec26c6a192b4535e8ee036d004c72f54a3b3264db3776c9c5556456,2024-11-21T09:22:10.823000 CVE-2024-3644,0,0,69160e99a2bc62f95b52f41f5ba390b019267a03cf2cef5dd6e14cbb4c298e07,2024-11-21T09:30:04.140000 @@ -260401,7 +260401,7 @@ CVE-2024-37296,0,0,8fc71dbfcf4f454c1548ad2a5b9cea08d7dbcb8a49e052f7e54f7a035f666 CVE-2024-37297,0,0,af9e1bda027731be4de1bbaee36759b58c27b2270b6d832e9228e38c0e0e4c62,2024-11-21T09:23:33.513000 CVE-2024-37298,0,0,41e8ff4c216b6813a6f6b741bfb714ff4496cef805aa5b18e54991599b1b2d37,2024-11-21T09:23:33.653000 CVE-2024-37299,0,0,755123dcf526d1594ee13a574a47b37804d8fdcbaf352ba8ec3363d2869a9bfa,2024-11-21T09:23:33.790000 -CVE-2024-3730,0,1,9f58ec3251b8fd9371c5de1cb2cd85fba0bacc2ae57730f819200cf6383e7302,2025-02-05T16:44:24.537000 +CVE-2024-3730,0,0,9f58ec3251b8fd9371c5de1cb2cd85fba0bacc2ae57730f819200cf6383e7302,2025-02-05T16:44:24.537000 CVE-2024-37300,0,0,327306843054c8676d2221408dc33a83d57267f6b3e21abd64dd1422e5bcb99b,2024-11-21T09:23:33.933000 CVE-2024-37301,0,0,f7b550a52b9088823cc96ab21ef977078535db28b80093a45d29cd3cd05b569c,2024-11-21T09:23:34.073000 CVE-2024-37302,0,0,7b2a9eb27ea19c8915f2b0cb797d35b46de3b12ff5c79f98a96f7d24add90a25,2024-12-03T17:15:10.733000 @@ -260843,7 +260843,7 @@ CVE-2024-37895,0,0,49f7277cde0a74ca705949355de498f7514e529633eb4ae1a1a5698e7ad51 CVE-2024-37896,0,0,7496bcb94686c1b20265c78118e271a3d1b71c6703352d6058c170f115cca1f2,2024-11-21T09:24:29.490000 CVE-2024-37897,0,0,395eb6e878dc08633c01647412c82e7154278b39adc62052dc129918deb2443f,2024-11-21T09:24:29.623000 CVE-2024-37898,0,0,ceb51e6817d849296a71d497367f9c03102417b6b660ee927a2bb10bd7f1cc00,2024-09-06T21:16:55.600000 -CVE-2024-37899,0,1,8bcfbbbf28d6009c77956811f7c492e4be3248bfb507997d02b4550add2d9bfd,2025-02-05T16:01:02.763000 +CVE-2024-37899,0,0,8bcfbbbf28d6009c77956811f7c492e4be3248bfb507997d02b4550add2d9bfd,2025-02-05T16:01:02.763000 CVE-2024-3790,0,0,1683f69dce5f099820935ed3e085f418d40c3062d6a224e08a8b5ce3f61d7945,2024-11-21T09:30:24.420000 CVE-2024-37900,0,0,71db7ce42b670bcfc80f61eb84d259055a053561c3204238aa43a0ced619d3ae,2025-01-10T16:54:03.820000 CVE-2024-37901,0,0,878c4a6a346bdf9361411abb10af3cf8a835e99c7a497cde963a683f3319ac14,2024-09-06T20:54:20.857000 @@ -261626,7 +261626,7 @@ CVE-2024-38702,0,0,3c4ba50317487924492ca168213a6ee8861658b1d8d73d68f67a1a5b824fd CVE-2024-38703,0,0,9f71f0f66667eee4520111e7a817856cbe4d6451b74cfba72f2fc8a8035bfc74,2024-11-21T09:26:39.793000 CVE-2024-38704,0,0,6d591c3940acd82eb3086f3502463b71238833bc6dbf15a99e173863eacb12f6,2024-11-21T09:26:39.920000 CVE-2024-38705,0,0,2e6fa924bb5a44b6a89df1e9f147b9f7b1bcdfec97187c47f022b257e9fc1d3a,2024-11-21T09:26:40.053000 -CVE-2024-38706,0,1,c793ed8b05a090829196219a03d730391cc7aba0d3d23364466dd55abd11ba86,2025-02-05T15:19:38.287000 +CVE-2024-38706,0,0,c793ed8b05a090829196219a03d730391cc7aba0d3d23364466dd55abd11ba86,2025-02-05T15:19:38.287000 CVE-2024-38707,0,0,d25d2c2c7d62aacc0617f006ea134a5267f10e5cde18b065e9091e448d5d2e62,2024-11-01T20:24:53.730000 CVE-2024-38708,0,0,83a10221309c2fcddbeb73d8601ccc5f941fc01f69e9577d48e2e4f826bcf18e,2024-11-21T09:26:40.387000 CVE-2024-38709,0,0,33a6fc98e6947af2b483793bca7b57aaa9450a55cba6fa9fc4d7c20af3741a83,2024-11-21T09:26:40.523000 @@ -262237,7 +262237,7 @@ CVE-2024-39560,0,0,88eafacaed1840d39a37f33beb4e76b0e883f299a72f71f2957d33fda68a2 CVE-2024-39561,0,0,129105f153bb211354d859daf2f1ec70e81851adc189be0ea8b99636fc1c328c,2024-11-21T09:28:01.113000 CVE-2024-39562,0,0,7068ae34827959a16457271ad801297df2606b6987a0f5b11af1739cf1dc029f,2024-11-21T09:28:01.273000 CVE-2024-39563,0,0,e4017fb4c173cbef6fa8e4a9d945f6c438b962727d3cee4871551dc266a31030,2024-10-15T12:58:51.050000 -CVE-2024-39564,1,1,a290ef74bc04a95cdf4e0b0cb91fe96e8000b3bfb70cf686430fef28f9c60f01,2025-02-05T16:15:40.270000 +CVE-2024-39564,0,0,a290ef74bc04a95cdf4e0b0cb91fe96e8000b3bfb70cf686430fef28f9c60f01,2025-02-05T16:15:40.270000 CVE-2024-39565,0,0,a43a2fa18dee435a7afd7aa616f891db93192eeeee36531ec4da585ba34ece95,2024-11-21T09:28:01.577000 CVE-2024-39567,0,0,71539119d2ce1198f19acd4e87a68c7cabdd0a3662eecc27368e9a62e07c5a54,2024-11-21T09:28:01.753000 CVE-2024-39568,0,0,7a4a8537e7aed931a024eab8deb65d1bfefb3706ef563f723bfc76d0f28bdaaf,2024-11-21T09:28:01.897000 @@ -262428,7 +262428,7 @@ CVE-2024-39755,0,0,c89983064fbb3672e96d95936bac6d3850b3b1cd085c9bdec08e8d8a80f60 CVE-2024-39756,0,0,10ea94389121a31c4ad5704d9d41b2d815ca27a65d291dd42d05234b1c6df1a2,2025-01-14T16:15:32.090000 CVE-2024-39757,0,0,bbffe30d38694551e04e11303255d7ab5ea0236256ee220b4a6990792b47defe,2025-01-14T16:15:32.197000 CVE-2024-39759,0,0,ebffca9cd95163f774063fc7fdc49a900b70132b12ffd2a9e61778e3dc71c363,2025-01-14T15:15:21.057000 -CVE-2024-3976,0,0,3ee6ed041577ad8efc19cfdfb03f2856763799f4685417f60311963fda295816,2025-02-05T12:15:27.627000 +CVE-2024-3976,0,1,578e0018fe32dc1d5c8f6775d770195a8bdee5459af5422e166e5a4b9786fb93,2025-02-05T20:15:44.750000 CVE-2024-39760,0,0,4850d0213ec10332b3444f4b371ec4a26720c1891607b32b2dcf97fb4a47dbde,2025-01-14T15:15:21.213000 CVE-2024-39761,0,0,9e9befd3f760889dd9407cae8625e94e60480751e0a84c9926e7130c0e12d076,2025-01-14T15:15:21.363000 CVE-2024-39762,0,0,491e6d275828bad868000496c94368ca66a463268dcc0b64e081b5f6fe0db9a6,2025-01-14T15:15:21.513000 @@ -263247,7 +263247,7 @@ CVE-2024-41068,0,0,71a545f1538a49640b8865e51cb48e0d92047a0765689dc67d14fc89a41dc CVE-2024-41069,0,0,875ab21a452fabf829875d53ad1df7f095d217e0d51fb50751908481d813d734,2024-11-21T09:32:10.957000 CVE-2024-4107,0,0,d5cc50b748901715783c2002ef642226bb938877420b00e04da12b66f93136d2,2024-11-21T09:42:12.340000 CVE-2024-41070,0,0,5a62777970c53cf7c79cac7a09111592d814a2c1903e58385dbc09e35932a895,2024-11-21T09:32:11.070000 -CVE-2024-41071,0,0,369011303e7586b02f68640c4cff1948796b143866749dc112db4200710aa0c7,2024-11-21T09:32:11.200000 +CVE-2024-41071,0,1,01f22f135aff4a88d924d0ff99b47200a092cdc52e658401f51f8575a7b02e33,2025-02-05T19:15:22.200000 CVE-2024-41072,0,0,27957d84863a55cf2bbf428ab09edc26aa9bf3d85001a28502d4ef3c53fe779e,2024-11-21T09:32:11.320000 CVE-2024-41073,0,0,e67d2ca9616bf763f9810e3ffe4d30e846a87d0614d4b5a2e1116d09a9f9901d,2024-11-21T09:32:11.433000 CVE-2024-41074,0,0,cf45bf633362e2d5e576e9e13e4e268dccab6725f740ce7dea4cdc3f55048421,2024-11-21T09:32:11.560000 @@ -264063,7 +264063,7 @@ CVE-2024-42194,0,0,af3a202d05f65dc11d1d1e7b62226f11c65e5914cb08b7ffa3083b3f3386e CVE-2024-42195,0,0,25be1bbcfe19ccb6d2a3ee91045d9ea1242797e882b8752f28a38a75bd1e17af,2024-12-05T05:15:06.923000 CVE-2024-42196,0,0,74165ceca6e8e10016e2eeb4a033a572e7a1426e3140b48f5bdc3f16162b9281,2024-12-06T15:15:08.550000 CVE-2024-4220,0,0,c10e6b612d929680611c4be467944f24a66f27a0712499a1f349b6953213d81a,2024-11-21T09:42:24.913000 -CVE-2024-42207,1,1,825fd6d4b6b7bf27d1cb0341fe14a75d50f015e6b5bc5c0d30f30b6970449298,2025-02-05T16:15:40.447000 +CVE-2024-42207,0,0,825fd6d4b6b7bf27d1cb0341fe14a75d50f015e6b5bc5c0d30f30b6970449298,2025-02-05T16:15:40.447000 CVE-2024-42218,0,0,3bca921601eaa25faf0015687ed4f595ccacf0ae5ca15099cde7ba2db042877a,2024-08-12T18:27:54.660000 CVE-2024-42219,0,0,a97969401a201997f2184a96905a9ffb0133ef1ebb5bd9c9a8f1fdcbd582f6f4,2024-08-12T18:30:21.627000 CVE-2024-4222,0,0,78ad3754433d9edd7ad7b04b2e437643c27bc5a8227a6a311a1fd475543e40e7,2025-01-22T18:23:01.487000 @@ -264826,7 +264826,7 @@ CVE-2024-43262,0,0,67fd045b085087002ab7b4b6a32e66f6e2bb9ae51bd9fd89f56145b1e9ac3 CVE-2024-43263,0,0,5ebc2c077d9ff96ee499a25f898bd1d1e9035e3afbfb16235793ec0f9c505fff,2024-08-19T12:59:59.177000 CVE-2024-43264,0,0,3dac78d6515ef7c20a17bdfa5c07ead27528da72285237b0efba6a05aa3c75fe,2024-09-12T16:50:07 CVE-2024-43265,0,0,18e23282884e1170d9b69ce211c8b45ca32acf5b986da7463d11003af7891e36,2024-09-12T21:17:31.657000 -CVE-2024-43266,0,1,3a2f026b7d897b2667a9d77c82ce5378053bd2e35677568fedaacd53f8fa9afb,2025-02-05T15:27:51.897000 +CVE-2024-43266,0,0,3a2f026b7d897b2667a9d77c82ce5378053bd2e35677568fedaacd53f8fa9afb,2025-02-05T15:27:51.897000 CVE-2024-43267,0,0,f4973d31cae3258d4436e342dbf4c4ffe293f57e3769e40e860bdfe23feaa1b5,2024-08-19T12:59:59.177000 CVE-2024-43268,0,0,bc95090c28cf4ede52504aaae646a2b9b93170d0b066bdaf5b8c449b3fdb7ec5,2024-11-01T20:24:53.730000 CVE-2024-43269,0,0,ddbe2b67a0e2c55f04f37140d73c9d10d051a94707a5d6133dc7d690a1d324f4,2024-09-12T21:18:17.913000 @@ -265379,7 +265379,7 @@ CVE-2024-43826,0,0,19b9e65dcef3547ac09f1e3335abc85678bc165e6f805e49f1110dd703b3f CVE-2024-43827,0,0,33cca79e1a9ccad21cf215346a113b98918c6d72493b76357e42a50fa105813f,2024-09-30T12:51:34.970000 CVE-2024-43828,0,0,e90c5433124546116dc3e9f75f5c7884d3d27b48e8177ae62314ddc13f4c5469,2024-08-22T15:41:50.870000 CVE-2024-43829,0,0,b3570bf52008bab63e7962193f16c54b9541e2181413f2a063062e4e03ed805e,2024-09-30T12:51:56.770000 -CVE-2024-4383,0,1,ac2b50acc313faa9389c552e101314429f915ea3eb9021842120b9ade903a464,2025-02-05T16:46:17.507000 +CVE-2024-4383,0,0,ac2b50acc313faa9389c552e101314429f915ea3eb9021842120b9ade903a464,2025-02-05T16:46:17.507000 CVE-2024-43830,0,0,0c202a646bcfaaaa39d2cb27400c7552b5186a7ed520c033e84fbd5365796f5a,2024-08-19T12:59:59.177000 CVE-2024-43831,0,0,d2d2b5793f8c890b4b992408f65959bbc46269161bd855b4336fdc8262090039,2024-08-19T12:59:59.177000 CVE-2024-43832,0,0,15442ca051ab0155fadf84dac6604a0024bcf8cf7f43b8779d15dbd2c77cba17,2024-08-19T12:59:59.177000 @@ -265722,7 +265722,7 @@ CVE-2024-44169,0,0,8e659cce58d9a53d0497d3730dec7575b8a3d2351d4de051efdd53f958a4e CVE-2024-4417,0,0,4e3d6204cd6966eb0d27497c2863f9921840677a5ed28df1c16d852d537c8a4f,2024-11-21T09:42:47.380000 CVE-2024-44170,0,0,4d2a800695872f7abc00b41c3e1d9ae1548d65569627bdeeb9ef0e31c2a1724b,2024-09-30T19:48:51.767000 CVE-2024-44171,0,0,61d23c156cb013a8a8af9a10b8da0c4d43b13a26cab640993f3b36fb5e09e5ab,2024-09-24T16:22:38.880000 -CVE-2024-44172,0,1,ad86e54f40018162f4a33be43f5104aefdfc21d2f3ab0a59b6fab28379acd0d0,2025-02-05T16:15:40.623000 +CVE-2024-44172,0,0,ad86e54f40018162f4a33be43f5104aefdfc21d2f3ab0a59b6fab28379acd0d0,2025-02-05T16:15:40.623000 CVE-2024-44174,0,0,9fef131a05569228953753a69bb54c67406d2be203d34e38f490d828de204009,2024-10-30T16:35:20.507000 CVE-2024-44175,0,0,21fd54203e8a328aa6ddadf60d944e0a0983b6a3a07be2abcb838cb48b12daa4,2024-10-30T17:14:55.127000 CVE-2024-44176,0,0,02c607cc196a1e33eb632f0de9814806e6dc69c4ca8e95ed9cdb360698290492,2024-09-25T13:27:13.333000 @@ -266605,11 +266605,11 @@ CVE-2024-45560,0,0,4b22478e3fca89aa8495d5c29dc23610e45bc67eeaf93199211683c696d87 CVE-2024-45561,0,0,f1171f087739e22315e4e8e57804e4e65c92bdc5e05f954832779165fd19107e,2025-02-05T13:55:59.953000 CVE-2024-45569,0,0,adb4530b9afc0ac1cb7f85c53e5bfae7be83804aa630b6a80b0ed3e0111d6e71,2025-02-05T13:55:49.460000 CVE-2024-4557,0,0,f03788c64b01fc0f9d9c6cb18548e7bc0f50cbdbc649d65a3f2f5d0fd687df83,2024-11-21T09:43:06.003000 -CVE-2024-45571,0,1,c7f0d89973a00808e2faef19f5c20c56647cadbd6769b20ffdcbb83a50343c42,2025-02-05T16:01:46.163000 -CVE-2024-45573,0,1,9a59c58b652198dcc2bdac9416fb5756a5d9c1df6029d3282d02eb5461aa2816,2025-02-05T16:01:49.620000 +CVE-2024-45571,0,0,c7f0d89973a00808e2faef19f5c20c56647cadbd6769b20ffdcbb83a50343c42,2025-02-05T16:01:46.163000 +CVE-2024-45573,0,0,9a59c58b652198dcc2bdac9416fb5756a5d9c1df6029d3282d02eb5461aa2816,2025-02-05T16:01:49.620000 CVE-2024-4558,0,0,3406f02edd918cc96dd602fdb16b4d4e12ad3abf909753504b463aebc8840fcf,2024-12-20T17:18:09.597000 -CVE-2024-45582,0,1,00793631d633ec24d1a40beef713f9d423a97e799b35bd6ffc13cd157f29be0d,2025-02-05T16:01:56.140000 -CVE-2024-45584,0,1,f0e0d36031c24782c73f581d2df414b44393105ea3cd6d5d26cfa9e14b2899fe,2025-02-05T16:01:23.100000 +CVE-2024-45582,0,0,00793631d633ec24d1a40beef713f9d423a97e799b35bd6ffc13cd157f29be0d,2025-02-05T16:01:56.140000 +CVE-2024-45584,0,0,f0e0d36031c24782c73f581d2df414b44393105ea3cd6d5d26cfa9e14b2899fe,2025-02-05T16:01:23.100000 CVE-2024-45586,0,0,c5742d0b574ab22b2df0aff8f44af2d16b298829271ece1a5c24a5de23ca2b0a,2024-09-04T12:15:05.320000 CVE-2024-45587,0,0,676b2002aac47e9967f7d32f0f4cca8f2986385214e3c17fc6693869db40c1a7,2024-09-04T12:15:05.530000 CVE-2024-45588,0,0,e602a5b67a431535ce7343d20bd27a01a8e11f9a6a3313f6b0f98fb929ec70a0,2024-09-04T12:15:05.673000 @@ -268623,7 +268623,7 @@ CVE-2024-48657,0,0,18cbce2a64471ea851cf63f59039293963cbba9258e0d2e6c68a3e0425784 CVE-2024-48659,0,0,a4994eec5cde2ff529af4c431e21090733a1ede66f6e8603b23cda70d71a876c,2024-10-23T15:12:34.673000 CVE-2024-4866,0,0,5804f9dd85942eb123fae31e9b136de08ead87cfbe5635e441421f6859244737,2025-02-03T15:19:33.037000 CVE-2024-48662,0,0,5e7e804fb91017f2c344490c3199a2f2983edb43783cebef02967a1b37c1fa96,2025-01-28T20:15:50.727000 -CVE-2024-4868,0,1,3a702d800934f1c705b4227281b3c66c8289f779d8e4537a1a3de6c882aba372,2025-02-05T15:22:38.637000 +CVE-2024-4868,0,0,3a702d800934f1c705b4227281b3c66c8289f779d8e4537a1a3de6c882aba372,2025-02-05T15:22:38.637000 CVE-2024-4869,0,0,a498392e92d4315a3c1a63f0751024c8b7def437eeab49123db178ff4b1bb7ed,2024-11-21T09:43:45.670000 CVE-2024-48694,0,0,faeae9ab327b97202e086aff921470e6b984670cc294f1289742129b482c0fbd,2024-11-21T17:15:20.110000 CVE-2024-4870,0,0,0ea27412573995f30563e69813626323b1c481b1ce23f80a057c978dadba8008,2024-11-21T09:43:45.780000 @@ -268881,7 +268881,7 @@ CVE-2024-49049,0,0,c510785dd30539d3724df912aa8da4b851ae582a28953b6446e9eb173c99b CVE-2024-4905,0,0,2b63ffdcb38fb304ee9705fa63cc828cd6e46febb41820e3a1c40a13d8aac8a0,2024-11-21T09:43:50.167000 CVE-2024-49050,0,0,1ca3aba40e7a6ba785e0e59d398d85984b6ad8076eb89bafbd8a62fb83eaedd2,2024-11-18T22:03:27.367000 CVE-2024-49051,0,0,7661cc84589a095bc9740e8c9d6010a12fed72232f528202af6ce5846e398c59,2024-11-18T22:23:46.893000 -CVE-2024-49052,0,0,562a3afb9529893213b3c3a54ea9afa75634dd6a87e1e537d239e6b014ada48e,2024-11-26T20:15:32.723000 +CVE-2024-49052,0,1,47b9bf9d12b99e1e0d6acdc7f436740159824e09c21b28378732907ef5a17657,2025-02-05T20:36:56.830000 CVE-2024-49053,0,0,7d3d935c2cf119f79891fe57d31ce5c3db6e001c0aac2858fe6266c8800373cd,2025-01-08T12:37:15.987000 CVE-2024-49054,0,0,345fb32aaa5c00291f6a6b41a864ac002d7c13672b74406763eb255607a78ebf,2025-01-21T21:04:23.760000 CVE-2024-49056,0,0,2bd2b2266d7b792cf7f1f9d1b8f0dc5da233dfb03d127cfa27eda6bdd0ad0933,2025-01-07T16:33:01.547000 @@ -269045,7 +269045,7 @@ CVE-2024-49267,0,0,9485f1f2869bc82ddc54e1fbc60aff78083e16a22de127bb41eb991e6260f CVE-2024-49268,0,0,fd34bb35f8cc8d572d494a4a8f26099a184981fe1a4b10035eee60bf4ba8cc28,2024-10-30T20:30:44.643000 CVE-2024-4927,0,0,af432294cbbe0c1c038a4a619d8b83a7c6813a252e8563a53df322407a9347fa,2024-12-09T22:41:44.593000 CVE-2024-49270,0,0,110017d7f49b75a8fbe9d3bde017e2fc302e8a1b687226b9566b0e222990ca24,2024-10-16T16:38:14.557000 -CVE-2024-49271,0,1,16358ce11415a9600f19820a57ac477cd454f6793d70896f98160e7ebd2cb446,2025-02-05T15:01:22.620000 +CVE-2024-49271,0,0,16358ce11415a9600f19820a57ac477cd454f6793d70896f98160e7ebd2cb446,2025-02-05T15:01:22.620000 CVE-2024-49272,0,0,8c90f093150446c27c7dc52e7539692057a82471373c7e291ca8c601d9b9eec0,2024-10-22T18:40:40.787000 CVE-2024-49273,0,0,d9913a98cdfd6b1dde1a5a56142d9c33243c52d88720724b489c0754cb71f418,2024-10-29T15:48:10.617000 CVE-2024-49274,0,0,ca3d4a7ceac2672a03fd49a99b957b5d2ba763dfe99e0565f0514c4f9ed1006c,2024-10-22T18:39:19.980000 @@ -269327,7 +269327,7 @@ CVE-2024-49645,0,0,225bbc01d1af09c9b0cd04013457b91bb7bf182d8b2faf2ed65f9008d687d CVE-2024-49646,0,0,5ae2cf77cf761a2408e25a9079b81f0c710751cca666465e6c546ad44f9d9669,2024-10-29T14:34:04.427000 CVE-2024-49647,0,0,728c1c9e03d4c2bc3debb0722129144c88b82a7f2fd74481d492b7a7939dcdda,2024-10-29T14:34:04.427000 CVE-2024-49648,0,0,2d0290252441f267498bcb004235c498b429b43c6ed6a20da0adf8a057fb4505,2024-10-29T14:34:04.427000 -CVE-2024-49649,0,1,7bc1de366b5a5147699fd0c7a0ad1af6ea9e6fbcf1c4a00588fc6a57f2c50353,2025-02-05T16:29:11.187000 +CVE-2024-49649,0,0,7bc1de366b5a5147699fd0c7a0ad1af6ea9e6fbcf1c4a00588fc6a57f2c50353,2025-02-05T16:29:11.187000 CVE-2024-4965,0,0,3e9f3a5683542d0f872185bb7cd9d74f67d4aad7a54eb5c75ee0939651d20c21,2024-11-21T09:43:57.867000 CVE-2024-49650,0,0,957bb63482c3b8d31b833ced44fc3b066a055f77165a90d58e6b148446915af5,2024-10-29T14:34:04.427000 CVE-2024-49651,0,0,eff1cce374eeb20a6db75a05fbc6ce94258af07964e7154f22db427d876203b3,2024-11-01T16:39:52.677000 @@ -269453,15 +269453,15 @@ CVE-2024-49819,0,0,18989ee02215782dbaa36dd11585d529ff7cb27112e595064942a9ff9397e CVE-2024-49820,0,0,fe904aab3b1423196226c288487d3e9f35952361c8f61f2d528fcf7833452731,2025-01-10T17:42:53.707000 CVE-2024-49824,0,0,4072c1a943cc33d63481a74407022b24878ec14cb5f9e9fc6f5cb6ba7f3e8966,2025-01-18T16:15:39.183000 CVE-2024-4983,0,0,b82ab4bc704d323c7d9f24e0a3641c93b0503dba6a5392acd5923000e9eef05a,2025-01-29T18:07:43.813000 -CVE-2024-49832,0,1,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 -CVE-2024-49833,0,1,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000 -CVE-2024-49834,0,1,b4f95628a52aac961e7bbe4a6f241fc7f4346fc4867395a783a39604f3de43eb,2025-02-05T16:02:02.183000 -CVE-2024-49837,0,1,44c0adc79a1133ef0cbafd5e3b95fe7c89090e533d5628dee2688fd57953cb25,2025-02-05T16:02:51.587000 -CVE-2024-49838,0,1,10eea15eb9bc1e1b66fb4d58e05a766814d469a560b08490c060ef06fde08f69,2025-02-05T16:02:40.720000 -CVE-2024-49839,0,1,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67568,2025-02-05T16:02:33.117000 +CVE-2024-49832,0,0,391e39e7c5b3e995146e5c9a1ef83712ccc04ea31043b019d156c859ce3b56e4,2025-02-05T16:01:09.627000 +CVE-2024-49833,0,0,329298065bd1bb3d724e94c1deac431743ff5a22858b998a02d9a56030763581,2025-02-05T16:01:01.780000 +CVE-2024-49834,0,0,b4f95628a52aac961e7bbe4a6f241fc7f4346fc4867395a783a39604f3de43eb,2025-02-05T16:02:02.183000 +CVE-2024-49837,0,0,44c0adc79a1133ef0cbafd5e3b95fe7c89090e533d5628dee2688fd57953cb25,2025-02-05T16:02:51.587000 +CVE-2024-49838,0,0,10eea15eb9bc1e1b66fb4d58e05a766814d469a560b08490c060ef06fde08f69,2025-02-05T16:02:40.720000 +CVE-2024-49839,0,0,e4adae2e6a6fd99d4a1ef07f5bb8c358f7fb67c7e6ba84888990afb4dab67568,2025-02-05T16:02:33.117000 CVE-2024-4984,0,0,40ebe34593a184b2b9329b2374e9578e3a0bebaa278e1231c45c34e446e4dc36,2024-11-21T09:44:00.193000 -CVE-2024-49840,0,1,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000 -CVE-2024-49843,0,1,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000 +CVE-2024-49840,0,0,052415f7244c1013f825344c4809807def2c067feeabb1b1cf5faec319fcef68,2025-02-05T16:02:18.927000 +CVE-2024-49843,0,0,9b68fa5c3475ce67325f4140b70e30137faf7f9305d06abaad2366991e2a645e,2025-02-05T16:02:11.837000 CVE-2024-49849,0,0,1a31752650e852a5b0633815bea11e2d50d7437494649b720c371e6c4b6f27d1,2024-12-10T14:30:44.780000 CVE-2024-4985,0,0,24ca642ab1af582069f35187f63584eb56ac0072c100febf0fdf2dec3b3c9587,2024-11-21T09:44:00.330000 CVE-2024-49850,0,0,b081475e1ca3af47ff915ab2d360bfee7d39229960d37f8c28496a17f22b8519,2024-10-22T16:12:14.193000 @@ -270296,10 +270296,10 @@ CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166 CVE-2024-5069,0,0,ad719aec2191fa4733004e376bcb495f235c4247fa2915a6912d571066c414e6,2024-11-21T09:46:53.973000 CVE-2024-50690,0,0,a1e4aaa91e6a0406a406f4b4f0b873d04e5babf6d3e42c6dbab61414b81919b5,2025-01-24T23:15:08.227000 CVE-2024-50692,0,0,3219a57f6cd418586622e8e305a9310f4d31b8967fba76b48787a4c6b89d758e,2025-01-24T23:15:08.893000 -CVE-2024-50694,0,1,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000 -CVE-2024-50695,0,1,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000 +CVE-2024-50694,0,0,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000 +CVE-2024-50695,0,0,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000 CVE-2024-50697,0,0,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 -CVE-2024-50698,0,1,6d0bafa41ec7a5b3fc381b0a13e0e4535aa28369bc46836a66f0b19857db9b1a,2025-02-05T15:15:20.790000 +CVE-2024-50698,0,0,6d0bafa41ec7a5b3fc381b0a13e0e4535aa28369bc46836a66f0b19857db9b1a,2025-02-05T15:15:20.790000 CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 CVE-2024-50702,0,0,364da4b19de28c5c7b507be40fbdae2c11e3df8d6828b6df401d4df157b3f54d,2024-12-30T16:15:11.550000 @@ -270705,7 +270705,7 @@ CVE-2024-51563,0,0,92c830aea9cc36746b8169d37dc695eacf2da6658783e5b3ef929aee9225b CVE-2024-51564,0,0,bdb9006ab15c4ee7c4fb25779283d79e92f062ab5f40cfc70788576ecb6baa25,2024-11-21T09:45:42.290000 CVE-2024-51565,0,0,a7ddfdb609c02584d7a89c3915e0de70c86be13e9f8ef270589ef24614c5ec64,2024-11-26T21:15:08.097000 CVE-2024-51566,0,0,1fd52d54ba2a2afa1bd706d74deb2afeee5b314d5e4c8525c97ce6b09c31f06c,2024-11-26T21:15:08.313000 -CVE-2024-51567,0,0,e135b2afea247b357916d2c5949d8acb21d3cf66e60447030697bcc04e96fd81,2024-11-08T21:14:28.807000 +CVE-2024-51567,0,1,aa90b9190eb5f66073947eea40130f5e69c2b5aaaad6aa8b7dfa48eca2df0838,2025-02-05T20:15:44.913000 CVE-2024-51568,0,0,c593ce3a074ec8aca16002f5375acf94a05fb6e9351e0ec984c43ad8651ac6ac,2024-11-01T12:57:03.417000 CVE-2024-51569,0,0,97749bc3cd1412bd3be900ea07d859b63213ae6788fb52624c50c42ebb16167b,2024-12-06T11:15:08.630000 CVE-2024-5157,0,0,d5e23997d2508437e196ba0b5edce2ac208bfc9db1ea6e9793cef6a795b9d207,2024-12-19T20:09:58.013000 @@ -271310,7 +271310,7 @@ CVE-2024-52384,0,0,fbb82f25aaa4aae30675182bd85859833f64b1365f6b4a49bc01512ac5b82 CVE-2024-52385,0,0,679074bda0793183e22b2edd0cc82a8a9a5b37e2fc1b06c97c74c1b19aabf28e,2024-12-09T14:15:11.590000 CVE-2024-52386,0,0,050a6ca0e40daaa1d5796015659bfe9b1cca7a3bc620faba1dcae9245cbda598,2024-11-18T17:11:17.393000 CVE-2024-52388,0,0,3e7020b931f7723bed5d8d7ceff458e11950c7e36411adecc13d14fecba8643d,2024-11-19T21:56:45.533000 -CVE-2024-52389,0,1,a4726fc250c5e3ea1fab6ed7b3d0f0e5f8f885792d232ec6b2aabff2f4355b4c,2025-02-05T15:28:15.587000 +CVE-2024-52389,0,0,a4726fc250c5e3ea1fab6ed7b3d0f0e5f8f885792d232ec6b2aabff2f4355b4c,2025-02-05T15:28:15.587000 CVE-2024-5239,0,0,baaa0659a749e35908fe270b25230601bf169a7fae8d9030c60889382780ceb9,2024-11-21T09:47:15.157000 CVE-2024-52390,0,0,d286733650509300a9b1c496741296c8d5ebe4568f1b8119b356d19db5a927a1,2024-11-19T21:57:32.967000 CVE-2024-52391,0,0,a76111c650ed729b31752b1e8addf3a337a06a9f5c3fe6ffbdbd85e534b47626,2024-12-09T14:15:11.740000 @@ -271815,7 +271815,7 @@ CVE-2024-53100,0,0,c9b76774e7fbb3d37345443f9fcb41fcc27f64217f335d86b9b5ba659a640 CVE-2024-53101,0,0,c425bb46b3515da57dc87974bd0976857d07567982d62109b13f805737e7ca08,2024-12-19T18:08:23.857000 CVE-2024-53102,0,0,d1c3ad92d75c37363246642f8e4ba479d5a4bde44aee221d715666c203805e79,2024-12-12T16:15:54.967000 CVE-2024-53103,0,0,77cafd307914e1a24f1ee1d35ab96ff6e827044224f7940ed86d3699c313884e,2025-01-07T16:25:33.233000 -CVE-2024-53104,0,0,063549a8c93277f1603e55e543da35e55c8ff1c1baaef95c67cc0358a7fba5da,2024-12-11T15:15:18.110000 +CVE-2024-53104,0,1,4f2c6d2619d17720e15bfbd575f153bb77feb0e9a9b626845fd1b781fb1100a6,2025-02-05T20:34:45.497000 CVE-2024-53105,0,0,20675f3b2d3d99600460dea0e4abb4193907124cdadd66352ebc6b7d7d157a85,2024-12-14T21:15:35.210000 CVE-2024-53106,0,0,30e3702644fc7a35784d9f94136dad383572937546c2f59633334350f5453e80,2024-12-02T14:15:11.420000 CVE-2024-53107,0,0,e19783b56e368fe49059554c75e6d69ab5506f47f17411e916820baa78ef7fdc,2024-12-12T15:51:35.503000 @@ -272197,7 +272197,7 @@ CVE-2024-53748,0,0,861cb2d84fada541c5723b77e9d8a71fc1357011e8d5406db4ae23a5bfc30 CVE-2024-53749,0,0,7f507f85b5d3ccf01d5bef5c20d495db44e2cc29eb3aa76745bdd085308fa079,2024-12-01T22:15:06.080000 CVE-2024-5375,0,0,b4a333c6f2606a535ebffa4bdc21f88a5a8ffb5c78232e9b1e6bef273262ae1f,2024-11-21T09:47:31.870000 CVE-2024-53750,0,0,f78e8c882be1e399a1be91c26d2155e5dab8442265e005b7e9ab268aab971de5,2024-12-01T22:15:06.217000 -CVE-2024-53751,0,1,2270df0feb112f26558fa845b802f7b6bbc2221bec12379fec1299230520e97e,2025-02-05T16:00:46.273000 +CVE-2024-53751,0,0,2270df0feb112f26558fa845b802f7b6bbc2221bec12379fec1299230520e97e,2025-02-05T16:00:46.273000 CVE-2024-53752,0,0,6a59f6056bf7692c4f946fa0f528c6b1abbbe5061838498ebb43b6bfb39502c8,2024-12-01T22:15:06.360000 CVE-2024-53753,0,0,dc08fc5c32f03a3bc5ff2ccc7366bd1c6a3900c74b36b0eb1e22322e316e4231,2024-12-02T14:15:17.007000 CVE-2024-53754,0,0,4e69d059f72a15e046291493c73d01fde2ba3485b5b984626a5dcbddc93df74b,2024-12-02T14:15:17.143000 @@ -272357,7 +272357,7 @@ CVE-2024-5394,0,0,04fdfaf576eb17b0d9b483c3599357ed4f0bd1d9cf3555eb1f4cda3cdac583 CVE-2024-53940,0,0,04215bb77d44b273e9849b212da1715e4a88663d0a04d658e8b426292d6b2d3d,2024-12-03T19:15:12.910000 CVE-2024-53941,0,0,958fbab1dcd158d91125ecb71056e34e403404760a1ce78a6e1b2e3ede2a0630,2024-12-03T19:15:13.113000 CVE-2024-53942,0,0,3a5df60be525140e1195cc88a619582f5d9e0db0f35f64edc49781e5a2f75879,2025-02-03T18:15:36.633000 -CVE-2024-53943,0,0,6fe464fa12d3d1ef9caf26ff4d91c8e3e0f1e40c9f6cc8a1053dbdb45f2ce472,2025-02-03T18:15:36.733000 +CVE-2024-53943,0,1,437d28c72b812c4593516003fc2aba4b613f671a694938fbad086ef025289004,2025-02-05T19:15:44.257000 CVE-2024-53947,0,0,b42db7838a4330c67a4fe62e48645e7bfb198c9a3c642c30c8c0bf4ba786d6fa,2024-12-09T14:15:12.267000 CVE-2024-53948,0,0,589d596ec1037b170a013fb9a9684519d93fddab1a0d95435f11b953389a4b4e,2024-12-09T18:15:23.893000 CVE-2024-53949,0,0,80c64f01ed1e717784a7e12e62d1542fa35c57ae831dd3df9e1a9467dad60834,2024-12-09T18:15:24.013000 @@ -272811,7 +272811,7 @@ CVE-2024-5448,0,0,fb51af8aa43452e6336e86308a3b6b8f94eaece6d7d51fb1e15ce1d675c555 CVE-2024-54484,0,0,6d8d44a97a2da2b3786c6a98b981454364bb44396885bb6b7514efbff5689d25,2024-12-13T19:15:09.227000 CVE-2024-54485,0,0,982a0baa0ac099695fc21f36de9b06236d26b846e1534a93622dae435e1fc457,2024-12-13T19:15:09.380000 CVE-2024-54486,0,0,5df005d0d8864aa5a133b3a90c1c09a871b54e236cb0257a1e40ecfc6e05f5a4,2024-12-20T19:15:07.897000 -CVE-2024-54488,0,1,a935e0ec25254475ae61e8c932289de3ab8602c341e482f3fe9fb642ec4e3bef,2025-02-05T16:15:40.983000 +CVE-2024-54488,0,0,a935e0ec25254475ae61e8c932289de3ab8602c341e482f3fe9fb642ec4e3bef,2025-02-05T16:15:40.983000 CVE-2024-54489,0,0,1ce8b5ab65a55735f38feb96fae54ecbe9c5aa5b683277170ac859678b8dcc0a,2024-12-13T19:15:09.570000 CVE-2024-5449,0,0,1d8d63580d1cb9064d797bded58f9169ad76c503e92c814880090cdd281d631c,2024-11-21T09:47:42.400000 CVE-2024-54490,0,0,2c61af9f099ad6e59b9a01082060a877b296ae3dacfdcd653badbfc16c369658,2024-12-19T15:27:32.170000 @@ -272865,7 +272865,7 @@ CVE-2024-54539,0,0,d443ac2c79222e082d02f106d93c7bfeec685245a030b828bd36881aee762 CVE-2024-54540,0,0,9f4df0a7b4384df86d380577ed349e05a61099c20d2e88a431caab43d2fcb14b,2025-01-16T15:15:13.697000 CVE-2024-54541,0,0,9eb31cc1d58cfd2315f407b93bc0d1327da0fa870162c87480c553f25ee2693e,2025-01-30T17:31:31.880000 CVE-2024-54542,0,0,5ad130ce9e277d22fc91c3233fe937da0da4adfd421c85dcbe10a8d46f3e6746,2025-01-28T15:15:12.477000 -CVE-2024-54543,0,1,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 +CVE-2024-54543,0,0,603876c5dd2c62a2a366bc570ded9afb84d36803ecff2c07cec2b1684773ae76,2025-02-05T16:15:41.137000 CVE-2024-54547,0,0,2ce7ebd8dc7ed2fc58eb2f77522780dacbba66c07b08536995b0bed9a41a2ed7,2025-01-28T16:15:39.603000 CVE-2024-54549,0,0,17fa8e8a740280ca6b3bfe83e25cd01c11c70fd2adb30c1c3ea7762350a07beb,2025-02-04T22:15:41.357000 CVE-2024-5455,0,0,bb7f0660a3d41dc609cc2469cc15470bc23e52876e20e5d8aaba4695f97fb58a,2024-11-21T09:47:43.050000 @@ -273034,7 +273034,7 @@ CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced7 CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000 CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000 CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000 -CVE-2024-55192,0,1,ef005b612101787a129c0741596fc66fbdeec6d5d1b4efa883471f0dfc68ff5b,2025-02-05T15:15:20.950000 +CVE-2024-55192,0,0,ef005b612101787a129c0741596fc66fbdeec6d5d1b4efa883471f0dfc68ff5b,2025-02-05T15:15:20.950000 CVE-2024-55193,0,0,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a7a5,2025-01-29T15:27:45.020000 CVE-2024-55194,0,0,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000 CVE-2024-55195,0,0,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000 @@ -273057,7 +273057,7 @@ CVE-2024-5525,0,0,85c272ad425dacde32e9f0580795bbb5b12316ff774e7fabc4e97fd793674b CVE-2024-5526,0,0,0c9c91db78cbdd3ff4ee3a189e439a311e3e6928df326db13557ea657472d9b7,2024-11-21T09:47:52.290000 CVE-2024-55268,0,0,5f3c37cf8158a1c44928734f909dc42c1030ecc39541485d8d944019f4ad558f,2024-12-11T17:15:20.920000 CVE-2024-5527,0,0,d332540fc72a82323997817d4e967456b7cfd92130ba717f37312bb67a51dc8a,2024-08-16T20:24:34.470000 -CVE-2024-5528,0,0,6f1438408d7a312c9ccdaa0e264aee2c21cf67f30a1f92238a15f4f46a07026d,2025-02-05T11:15:17.160000 +CVE-2024-5528,0,1,0d91ba8ca80b3ee943559b79f986fd247cd2076243708c69c2887bdb9082e179,2025-02-05T20:15:45.090000 CVE-2024-5529,0,0,163a9ebbb03299028cfce2ba2a1351447eb53d5a4fc9810f5fc56b6d374bb7d9,2024-11-21T09:47:52.530000 CVE-2024-5530,0,0,2d0b01cc83bfe8893d941d6bfdb13cbbc2a5c286addf6d9a79089f227ed325e3,2024-11-21T09:47:52.657000 CVE-2024-5531,0,0,866202d58b8a007888ee981e0536a62604559a6a86161db07d9686c5885862fa,2024-11-21T09:47:52.777000 @@ -273110,7 +273110,7 @@ CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b9167 CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 -CVE-2024-55511,0,0,e5cf972c53b714b1212e415e5e59dd0789d0dabf8efab478f610d722a110428e,2025-01-28T23:15:07.820000 +CVE-2024-55511,0,1,c1a0f60c8cf30fa3a634ddf27d49c50ded703e5bc63890525ea4097f2e42cfad,2025-02-05T17:15:21.570000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 CVE-2024-55514,0,0,1ab6d03dbd59f8b12772670ec93c7ec4ae46219483a32dbdb16b58811fc912d3,2024-12-18T16:15:14.900000 CVE-2024-55515,0,0,aa63dd224a4ced8fb9deb1eadd4b58815859b25e0d9ddafab8ac8045b9bd13ff,2024-12-18T16:15:15.090000 @@ -273263,7 +273263,7 @@ CVE-2024-55952,0,0,40f06e6cb54766cf7357654cb464e4bb21c58158c39af1ac076f236e96ec9 CVE-2024-55953,0,0,b8838dbbbaba7da3aab89f4fad26ee3c0ffb57f557fd7e9c1a84146519feab13,2024-12-18T19:15:12.067000 CVE-2024-55954,0,0,809e5572e293545af4228663dbdea98405c00ed8174fc27cfd28075595b51642,2025-01-16T20:15:32.890000 CVE-2024-55955,0,0,18cba96888915c0389c7defca71606c5156a68e05c936a654d308cd47645f10a,2024-12-31T17:15:09.270000 -CVE-2024-55956,0,0,8a3a8fd441b4aa1d48f534ccf7c90847b13a0644de401a73337d5c665ef64cb7,2024-12-20T15:21:39.287000 +CVE-2024-55956,0,1,afd479d00c2e9cbfbfc115bd207b298f6ba3f13c2d0edad18c92136a816df61d,2025-02-05T19:15:44.450000 CVE-2024-55957,0,0,72a544451795bf758a8b0c28c7d0801ad1b36af5dc3e09a89383d3ac1afc576c,2025-01-23T15:15:11.663000 CVE-2024-55958,0,0,805e9804f2e0f436a8b6462c6f5ea66eb72f3312c0b5dba8bff8785036cb57cd,2025-01-22T22:15:09.453000 CVE-2024-55959,0,0,1be9d85eb46493c77ed7db4321425d1d95d759742cf6d5fdd1afad68017b844f,2025-01-23T16:15:36.147000 @@ -273401,6 +273401,11 @@ CVE-2024-56116,0,0,5e9e1abf1b4a263f6e9c895ad87cdc1730c02159e6e176fd37997ee62e12a CVE-2024-5612,0,0,fa9f2c267dc0651754a7af098fdc2eb62147cefb9c269a544f85a4928011ea0a,2024-11-21T09:48:01.037000 CVE-2024-56128,0,0,e2cb76efd64d63d4c386db8a1315b19e05cdb3bf57b90430767a6b815ae92cb5,2024-12-18T17:15:15.003000 CVE-2024-5613,0,0,7adefd0ffa78c5730a0bdb9525773949feed9eb79c6b9e6014b5dbc5d6f802b4,2024-11-21T09:48:01.160000 +CVE-2024-56131,1,1,844144199adffd94888e2b49a9a525d3cd1aefb63bd8f33d908d85164f50d3d3,2025-02-05T18:15:28.507000 +CVE-2024-56132,1,1,469d9985ce4d2720f01a9e7d427c454749533656561e6c97e1fb81925409b7b6,2025-02-05T18:15:28.700000 +CVE-2024-56133,1,1,9cdb421fe1c1568efb041d3a506bc0f8cbc1cdbd0e2c407d2707c56be9792637,2025-02-05T18:15:28.880000 +CVE-2024-56134,1,1,ffef308f88d412a1a3bb31013af28194c8d2236b2b38aa6ff32f43868d49148a,2025-02-05T18:15:29.050000 +CVE-2024-56135,1,1,e509aea488cbc672c09fa8beff8a92798b7708ec7c2a39c47b11ec70473c16bb,2025-02-05T18:15:29.210000 CVE-2024-56136,0,0,3233f503c5171e4ba11df9e13150ae4049de7b6a390326df6fe239b64631c5e7,2025-01-16T20:15:33.047000 CVE-2024-56137,0,0,5dfe89d1ae5911eb9a89f977030c79ce761d66499f995b20161d28de051d48cd,2025-01-02T18:15:20.213000 CVE-2024-56138,0,0,56bd8032a118db50efc637f56ac5577457d98d6e38b449027a5f8c36cc988ac7,2025-01-13T22:15:14.313000 @@ -274036,7 +274041,7 @@ CVE-2024-57041,0,0,e9d5d6fed9694112063568252f730d4f4bf67fc11323125dff3066e4510cf CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 -CVE-2024-57095,0,0,34b0fe239993395502715f1a333962d78d9014d2bbef810d2b8502261121cb56,2025-01-24T20:15:33.473000 +CVE-2024-57095,0,1,feaabc133222d755bb64c81b7f48c86d504504845f631c6909ee10ad4152eadc,2025-02-05T17:15:21.720000 CVE-2024-57097,0,0,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000 CVE-2024-57098,0,0,c1da1aa7856c306e706557949d32b569f5d3943054f9e8eeafd409129124804e,2025-02-04T16:15:39.330000 CVE-2024-57099,0,0,de28c6ababfc0d2fa13f5e4af1299596e6a190a4861b027cf0431262825628e6,2025-02-04T16:15:39.477000 @@ -274080,7 +274085,7 @@ CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 -CVE-2024-57277,0,0,391fbe933f4b41bb7bb5051dbe33450321b459aa895227a659ba8420f4a874ff,2025-01-24T20:15:33.587000 +CVE-2024-57277,0,1,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 CVE-2024-5730,0,0,7c8f1898d38c08e8565f96fa000ade8830daf4e5695b898fe37d498e1b84f28b,2024-11-21T09:48:14.723000 @@ -274112,7 +274117,7 @@ CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 CVE-2024-57435,0,0,134ca1f67bc68a11fbb69f0a724e0c3096b5963737c85b95313876fa3bad9ab7,2025-02-03T21:15:14.747000 CVE-2024-57436,0,0,282eb6e7074212031e9dd5ef81b2445bf8af0720ec49623ad39893ccbcfafed8,2025-01-29T17:15:28.480000 -CVE-2024-57437,0,0,53c9041a084a44e480671d9200a4e0fe3bfef1699e2847a7342d00abb4f9ebf0,2025-01-29T15:15:17.183000 +CVE-2024-57437,0,1,55a481f741905a7b3529d8872203a5e96d5aa22ae442a522f6171609f0f649aa,2025-02-05T17:15:22.003000 CVE-2024-57438,0,0,a3f3379a583f056a3eceb0974a3a5c5f30e5dd1beddcfe86f2ad82efd2782a16,2025-01-29T15:15:17.283000 CVE-2024-57439,0,0,4cb58a3938fc882d4399a493b10fd8366d3d4345b283844490118a46a57a5249,2025-01-29T17:15:28.650000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 @@ -274137,7 +274142,7 @@ CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c CVE-2024-57510,0,0,05c43472b6cc9f12c734ec2d67ce047121a09b92b06280e273448f8c35d44c17,2025-02-03T19:15:13.310000 CVE-2024-57513,0,0,d9e89f7fd386462137067205c175126bd9ba80cb69a686ee45d8c4ed6a916b8c,2025-01-31T20:15:31.880000 CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000 -CVE-2024-57519,0,0,1a1af74905cce20abc5596e2722805c77bb23c1788056fac531228633dff1e0a,2025-01-29T15:15:17.483000 +CVE-2024-57519,0,1,f6dcaa2139e878d99c2f1ee25c0738631af5afa261e3598c7b8dd197ab7d57b0,2025-02-05T17:15:22.157000 CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 @@ -274156,7 +274161,7 @@ CVE-2024-57547,0,0,e0bcfd94b3e35f925b94f4f78018afb98350d60d5603a60126c5379b0e0d3 CVE-2024-57548,0,0,76ef611a00c00b4203aad331f4f65e9df8e791de53dae1afcd89cbc6055d96c2,2025-01-28T20:15:55.547000 CVE-2024-57549,0,0,22f56cee94a9d7d3fb0aebd13f98ef100c64232e553c3c370105ef1368685bd1,2025-01-28T20:15:55.810000 CVE-2024-5755,0,0,d9beb74b4cc757e5dafe2ce46b6f3c5c752c1749a1b4a2abdedbdd95bff1173d,2024-11-21T09:48:17.093000 -CVE-2024-57556,0,0,bb0c8b6daab6a4685a3c223d5c61804de336ccacfb88de2d986d4a4a234b5bc3,2025-01-24T21:15:10.680000 +CVE-2024-57556,0,1,e8fd8911a1905d71db68021bd5a772f45ebb1af2144cb7a20bd64489988a9c84,2025-02-05T17:44:31.293000 CVE-2024-5756,0,0,f306d50c688e90f1ac281dc052b52f0a73fe2794efab7031898c419d58649207,2024-11-21T09:48:17.217000 CVE-2024-5757,0,0,d27353d3a809fffc6956c99202ff019e529c86d532d278e7bed95c99f1ad6b65,2024-11-21T09:48:17.330000 CVE-2024-57575,0,0,10f9db09488c680e59179edd32f39ae852f953dfae5ffee53935cd40d92b886e,2025-02-03T20:15:34.597000 @@ -274602,7 +274607,7 @@ CVE-2024-6003,0,0,adb3112b68aa60fc319f3564467d2c4f7d8c9831c68441a431a933e87ad435 CVE-2024-6004,0,0,258c39032f92beea0e983412df12cc6591803e84d5bdedbab39737c02a0d5b1e,2024-08-19T13:00:23.117000 CVE-2024-6005,0,0,1699306c262156bd4b14bac7e2ef337c50c9b17dd77b065bdf89f8998bd042d6,2024-11-21T09:48:43.753000 CVE-2024-6006,0,0,6df30929a840cb558109666958ca27aa1b6920b4f18704e0a3847a8276765f8f,2024-11-21T09:48:43.890000 -CVE-2024-6007,0,1,f6cd9c14168b9de41b87e51847aaaf97fc4856eaaee0725b84109dcff7f3f822,2025-02-05T15:49:54.563000 +CVE-2024-6007,0,0,f6cd9c14168b9de41b87e51847aaaf97fc4856eaaee0725b84109dcff7f3f822,2025-02-05T15:49:54.563000 CVE-2024-6008,0,0,aa99b4e6a0c0a9657e301e4949343f52a77fe8ff3b1f466e3c1f6d3a5d87b0ad,2024-11-21T09:48:44.180000 CVE-2024-6009,0,0,e2c1f64b19bad56976ee52a35c77d28cf1b7bd56f6ab0c6786eaa8c4fe9834f1,2024-11-21T09:48:44.350000 CVE-2024-6010,0,0,75a333694660e682d488076c5149866d4dc33e9eb435cfa316c1111b04b56931,2024-10-23T16:15:10.483000 @@ -274807,7 +274812,7 @@ CVE-2024-6227,0,0,a7ea89dc0eaf11606799b812c0ce67508e339056cf2f1b2dd09bc1aa10c95a CVE-2024-6229,0,0,c8984b0e1608078abc90f99d19b11fea563993e21219310e678506a23e674ab9,2024-11-21T09:49:14.513000 CVE-2024-6230,0,0,4c35afa8b4499bd09be30936efdb19ccd1ae03bbfa2c6bb83ae96203002dda79,2024-11-21T09:49:14.640000 CVE-2024-6231,0,0,e0042db0af24bf00a170ca021a174378b41b303eec11c1206de1f1c60d2f4f4a,2024-11-21T09:49:14.733000 -CVE-2024-6232,0,0,5c32730952413dc7be3487545f4bcebd06e6fb45f3dfcf4301a18a9238368fa2,2025-01-31T20:15:32.030000 +CVE-2024-6232,0,1,c281e6af5fe662abee1eee259741239dec9bb3006b1929d6872898a51a87565b,2025-02-05T19:09:39.523000 CVE-2024-6233,0,0,4bbca18d3f336296f26771ea45741081bf89a79a8a0061f18ec10c1c6fe49357,2024-11-22T20:15:11.437000 CVE-2024-6235,0,0,b10ca467dba8a86a5a9398aeb4ed2cbbb11e36d29d2b0843b99071a24c7f05d8,2024-11-21T09:49:15.053000 CVE-2024-6236,0,0,3ade139941513a504442ccd5e69da310048cb615d1c9d76a654f2d2a6096700f,2024-11-21T09:49:15.173000 @@ -275251,7 +275256,7 @@ CVE-2024-6721,0,0,20bc3ac9fd25b0ef666ff8f606cfc8f742981337efa5a16bd2cfa701fac87a CVE-2024-6722,0,0,3dad6bd8c109d62ac4774d11574de8e9d793081ad7816e416889c8a10fe31f92,2024-10-07T15:41:37.663000 CVE-2024-6723,0,0,ac8e3d6a371d802a6af82045ce8c2334029357eb69f59f6bd0983d63fa287a5f,2024-09-27T18:50:00.913000 CVE-2024-6724,0,0,ba50a97caa1275a4580896cdb1585df6dc7614bdcfcd6ec10d64d28c18d67813,2024-08-13T15:35:30.033000 -CVE-2024-6725,0,1,f8463da74b448091931855ef05ebe9cdd82b4b9681372263619fd27516a8248a,2025-02-05T15:20:39.150000 +CVE-2024-6725,0,0,f8463da74b448091931855ef05ebe9cdd82b4b9681372263619fd27516a8248a,2025-02-05T15:20:39.150000 CVE-2024-6726,0,0,1f5a81ef49b6e274a7674ba366b60a544d2922b334307a0d032bcca3257126b0,2024-11-21T09:50:11.310000 CVE-2024-6727,0,0,d490f0d8e566f32f8b7fb483424fcd493bd68748afe2036af02b90d27ca45519,2024-11-21T09:50:11.443000 CVE-2024-6728,0,0,8986e160961ad8a951ffe3e1cad1c293afeca5aa74a563e0bd3ffdc609c5f99b,2024-11-21T09:50:11.560000 @@ -276018,6 +276023,8 @@ CVE-2024-7591,0,0,6acedbc9c4fc9143dc69c6763f675f903ea94c54c7b69e2e118e2d6e5e20e6 CVE-2024-7592,0,0,2073b826d7320ce64cce3772a89fa43c3453d9947b3621a1b88fbf6072fb8b1f,2025-01-31T20:15:32.370000 CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 +CVE-2024-7595,1,1,a0ef3bd251c7bf6af53f6aa3f2600bc355efd8f89be8a62f7626d10931215eb5,2025-02-05T18:15:29.360000 +CVE-2024-7596,1,1,020c4ef92026882e093ff0d947480d38fa073be4afae0085872d624b6c14b2c7,2025-02-05T18:15:29.470000 CVE-2024-7599,0,0,72cd50d41050beabf75c41eb70dc5180e8f76ad0927504bdf008f5b3f70870db,2024-09-26T16:45:58.507000 CVE-2024-7600,0,0,34b4914eedc647ff0a0d5a284f0b5d05eddd5cf8a511f0ca9df95820d310e297,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,3abc93709b908f4d7ee1f44c6b4ea7404a5a295ad0d93da10509fdc9a72448e0,2024-08-23T16:35:52.383000 @@ -277129,7 +277136,7 @@ CVE-2024-8909,0,0,fb8c7cc103ad0a4020bec1abca775241831a1e52b8f464def3241421ff1aa2 CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f274b,2024-10-03T17:34:27.913000 CVE-2024-8911,0,0,c75b9bd4dcd02262855fd49d843fb06a7771237fe1013ffc411c6dcd276819c4,2024-10-10T12:56:30.817000 CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000 -CVE-2024-8913,0,0,c808b3c5e5f5fef63135dee60dc42088eb10d0c982c699f7821fcd0e6adb96e4,2024-10-15T12:58:51.050000 +CVE-2024-8913,0,1,4b045cbaddd3ff3542b8aaebc92f6b2957acddca8518ca9571f8352022bee390,2025-02-05T17:18:08.830000 CVE-2024-8914,0,0,0af2c1789c961042785a2420c2c6af5784a31afab9b888e52784be47a313f5d3,2025-01-27T18:15:40.230000 CVE-2024-8915,0,0,8c38db8ff5e6b57ab89598d8dda541fe5184fffcec194910136b2a682fa86d7c,2024-10-15T12:57:46.880000 CVE-2024-8916,0,0,da34a5aed7d09ba222016e725c60a82b8e9b0f8ba94dbe0654f9075bc3c47c39,2024-10-29T14:37:42.877000 @@ -277332,7 +277339,7 @@ CVE-2024-9165,0,0,dc899508d72791e5c761f96fa2a1f7b8193367cfac67250d9f9f4a221602c3 CVE-2024-9166,0,0,20e211d71db857884475e7d9073aba90f0fadb0cc5a008b087eb56131cced1e2,2024-09-30T12:46:20.237000 CVE-2024-9167,0,0,4b4738bdab8e192846399c30b844741698a4faffb2baf51396eac5836744cab7,2024-11-04T15:15:24.557000 CVE-2024-9169,0,0,88a8fb9b88ba0d31fbc4bd59b5e73c5d2b5388247825110c319f7fc5da74c8cc,2024-09-26T13:32:02.803000 -CVE-2024-9170,0,1,fc0d2b28edb421bbb6825db66bb513b8e437f18c08e7c85641db282a049e16b9,2025-02-05T16:42:39.357000 +CVE-2024-9170,0,0,fc0d2b28edb421bbb6825db66bb513b8e437f18c08e7c85641db282a049e16b9,2025-02-05T16:42:39.357000 CVE-2024-9171,0,0,af15a4d4f57722dfce9c8f35af79ddfb4512cd4df5a539148a2f7d51c39f2ac2,2024-09-27T17:15:14.437000 CVE-2024-9172,0,0,b35aa31884976a5f72a9f64a6c4fb2bdf693241a033267ead8bf3a804c216cb3,2024-10-08T18:05:10.863000 CVE-2024-9173,0,0,61d7772356f925b0168ffe8ba49707e943ee610149453e61508264540d13a2cd,2024-10-01T14:12:41.293000 @@ -277381,7 +277388,7 @@ CVE-2024-9232,0,0,c437dd6828a2bb6c2fef4b80c8004716f23c3f046aa60d93e2c14ad1e09f2d CVE-2024-9234,0,0,c697ca46bb4a35f9e405ad10af95fb57a9d88346748e059f61a0140ee2b3f87b,2024-10-15T12:58:51.050000 CVE-2024-9235,0,0,812eb4adf89d42a09ba08a2fc4307058948d688385540b21888d041b29c2db51,2024-11-05T17:36:01.270000 CVE-2024-9237,0,0,7b64fa2d2cf4ac73ae3a04275da2345e9338b4fd91ba5f8466b6d718c699d333,2024-10-16T15:10:08.390000 -CVE-2024-9239,0,1,eaab0ef363faede446affbe5826cd522f401247b4b0f341be3fef03a25097523,2025-02-05T16:41:42.517000 +CVE-2024-9239,0,0,eaab0ef363faede446affbe5826cd522f401247b4b0f341be3fef03a25097523,2025-02-05T16:41:42.517000 CVE-2024-9240,0,0,47e822900e1098b8b4d4543d149e323c62cb10fdd8f533027b41740e8ecd27ae,2024-10-18T12:53:04.627000 CVE-2024-9241,0,0,eb8dae4df34d8944d28d50c4c48b20377ce8b1b0a67615cd68ec56c2ca3282cc,2024-10-07T18:51:20.950000 CVE-2024-9242,0,0,43a3f91080e8e814d7896d39c8e017fb3b05ec0135624af96c4cc63d46cd790e,2024-10-08T16:26:06.147000 @@ -277708,7 +277715,7 @@ CVE-2024-9627,0,0,bbd2150f084c7938e6b0ce316fceb9870286e9cb9ca4f5a3efb37d7b055e03 CVE-2024-9628,0,0,379a0ee64af50eb2e6716feea87eed622bba704469c3d96a0f120705cdd189d2,2025-01-23T21:17:43.533000 CVE-2024-9629,0,0,ccb2809be6fc0297c8318e4c1f923a6148830a550a06f81de03fb80d95b6e694,2024-10-29T14:34:50.257000 CVE-2024-9630,0,0,c5bfebdfc374c6829acf4f216485f47c7193dffe76ae06b5710261faf3a923c2,2025-01-24T14:07:11.977000 -CVE-2024-9631,0,0,29a0c454f7f8d410c352a5d0d75b9f70353187c413132d8201d212ffac17278c,2025-02-05T11:15:17.567000 +CVE-2024-9631,0,1,84c18ec6d0fc33421c81316b3fe75b296b99706b5b8e95c27985d4b1b6eb865b,2025-02-05T20:15:45.210000 CVE-2024-9632,0,0,239a4c189d3eed560921482fe12c18bb19732b61a1100ff2b6e56460beb86ea5,2024-11-21T19:15:14.210000 CVE-2024-9633,0,0,464719aabf82d4c51da737aba0ef58dd3d7e243c61253713abe304606828160b,2024-12-12T21:43:44.480000 CVE-2024-9634,0,0,7b5dabf15ae54de4daab48b64d2e27f430eb55d7ab2217a5e19376e8531d6f32,2024-10-16T16:38:14.557000 @@ -278161,8 +278168,8 @@ CVE-2025-0367,0,0,75f9e2269f2f885d5f829700300a5bde81c357886382b8a5fae99b82b976bf CVE-2025-0368,0,0,0e3205dcc31fab2bcfa264d8b9ca1f8bf509e02ae15315b9b42ebdcbf64b20a6,2025-02-04T19:15:32.070000 CVE-2025-0369,0,0,968f1c7b7fff7a404f2212aa81591bd64fc1ef313f079e18ed81ef90b8b12902,2025-01-18T07:15:09.720000 CVE-2025-0371,0,0,de30e603b077e64693a9f53a95b364cbc495f2694acb2d5aef6b2eb3aaaea9a8,2025-01-31T20:16:11.363000 -CVE-2025-0373,0,1,36f1a7cd51ea27b28814adc66257e2669b107adead4130dae0cbd33d0d87e37d,2025-02-05T16:15:41.290000 -CVE-2025-0374,0,1,6d12ae1947533250a01b7cb634c99fbb6006d8439921aaaf5bf4fbb1fec8d7bf,2025-02-05T16:15:41.450000 +CVE-2025-0373,0,0,36f1a7cd51ea27b28814adc66257e2669b107adead4130dae0cbd33d0d87e37d,2025-02-05T16:15:41.290000 +CVE-2025-0374,0,0,6d12ae1947533250a01b7cb634c99fbb6006d8439921aaaf5bf4fbb1fec8d7bf,2025-02-05T16:15:41.450000 CVE-2025-0377,0,0,1df5153b8a72b25478d0a1c4aa2347b3a7ff1e86a04300cb39dc18c1f91a367e,2025-01-21T16:15:14.290000 CVE-2025-0390,0,0,a9cacf0ddfe16d7ce6aba119743e725f69b4f5561bb60e372a0dcb6744d412ca,2025-01-11T08:15:26.527000 CVE-2025-0391,0,0,ab8f7905746a492810fe86765faefb1fff997fc4d75bb4be776d20c58a35599f,2025-01-11T09:15:05.937000 @@ -278320,7 +278327,7 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf CVE-2025-0651,0,0,e2215d27193b6db6cba4dbdda5349954e60373a439e45e60be4d39bd216d0a6b,2025-01-22T18:15:20.363000 CVE-2025-0659,0,0,0488616a11238372b8729e32ff707d4d37dbebbf231b22604e9cdc93136f63fe,2025-01-28T16:15:40.360000 CVE-2025-0662,0,0,4462508babe987f2f84fa35944538e28e0fed0fac8705aeb245236a9ee58e15f,2025-01-31T20:15:32.750000 -CVE-2025-0665,0,1,8fb4fbcadb06dba67e7b41bef8b212da8f18f2cf200356ebce97a6881a3634ca,2025-02-05T15:15:21.230000 +CVE-2025-0665,0,1,4891d17334ed173eb3e5a283717fccd34af1f4c417b1a0ea92d8bdc207f2adbd,2025-02-05T20:15:45.310000 CVE-2025-0680,0,0,c17cd4168808cc42b9a757a6b9727c3556a4d65c46b291b9097ca249e043918b,2025-01-30T19:15:14.147000 CVE-2025-0681,0,0,19b4714e3fa258a1b6b7005d2e6a940f14270f4c6cf4f2d8cf3d4cc63d014105,2025-01-30T19:15:14.300000 CVE-2025-0682,0,0,2d870fe9b5aea764bcd9998bfbf5dc6301c21f58cbc75e8670731f91c893bd7e,2025-01-25T06:15:28.740000 @@ -278345,7 +278352,7 @@ CVE-2025-0710,0,0,010c22bb91a250418d55abc4eaa70cc8949df634eef581adb3636c9db03dda CVE-2025-0720,0,0,1da4f3fb7977aa71d8d9a8e3f7a06c0c3c1ed142f923cc4868ac50fedaa97c0d,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,151152f411aa28e9121ab2a32ebc3ecb28fe5e8b508d6820387e16cbfda81f9c,2025-01-27T00:15:26.317000 CVE-2025-0722,0,0,c9258e96fea043e69bdeaa4cb3c7c089fa7706045bfdfb06a99b2cfbd46d8a8c,2025-01-27T00:15:26.517000 -CVE-2025-0725,0,1,ec55dcd777d4d59c22115d5c0c83fc1464735fd9aacd631d586bbb39f279fe0f,2025-02-05T15:15:21.383000 +CVE-2025-0725,0,0,ec55dcd777d4d59c22115d5c0c83fc1464735fd9aacd631d586bbb39f279fe0f,2025-02-05T15:15:21.383000 CVE-2025-0729,0,0,b3cd201258049c526a15c72f22bf765517f681dbe52f68677709aa8b21b9ec16,2025-01-27T17:15:16.917000 CVE-2025-0730,0,0,b0f8b58b424cc51685ec90ca8981a0ca40c34a5eeb1253b074c44fe87e601682,2025-01-27T17:15:17.133000 CVE-2025-0732,0,0,07b41495fd0afdf179fc98fe053710ec1b3fdc2df8bd25c7480598b82ff64b81,2025-01-27T18:15:40.550000 @@ -278401,7 +278408,7 @@ CVE-2025-0847,0,0,357f990478a3d7a8ac7a511b3154afa55f39759c26f4e404e4495abf6ec132 CVE-2025-0848,0,0,1be1cf225ad3e11696c8f9251d0da5fb412c25fa88c35ca58c2e9b025805269a,2025-01-30T02:15:25.597000 CVE-2025-0849,0,0,833f144c8aa23bc8c8df5da04fd7335d4895c3b610f7c0585df5dcb790ae97b4,2025-02-04T16:27:36.197000 CVE-2025-0851,0,0,a694ba8628252a8a49300531d1aeef2b68800ccc060b5012afd86c4edc73767a,2025-01-29T22:15:30.463000 -CVE-2025-0858,1,1,5ac45c4f57dc10833c2315afce9d379de3010872c9ecb173f5ea2ff3c2e6feeb,2025-02-05T15:15:21.580000 +CVE-2025-0858,0,0,5ac45c4f57dc10833c2315afce9d379de3010872c9ecb173f5ea2ff3c2e6feeb,2025-02-05T15:15:21.580000 CVE-2025-0860,0,0,6bc3a4cb803fdb6802c31892bf7a010fbd490ae44e336c4b861136d58d639e97,2025-01-31T20:42:08.143000 CVE-2025-0861,0,0,f7d18c923472db6cea06c2a90819cfa3d8e6d354711eaf47f13c55bfd3702f04,2025-01-31T20:43:33.270000 CVE-2025-0869,0,0,50607dad2f58913f406777444542a1b8f058c8cdea9b9aee68272482b88df37c,2025-01-30T13:15:10.273000 @@ -278436,32 +278443,37 @@ CVE-2025-0972,0,0,3993ac5cb544f96eddd4ea382f0cae390a0048486c03ea18bb36ab062e41c6 CVE-2025-0973,0,0,37f661449c5d41bc7d595495ef0c9ea92e0effb9bc1925009def0bc433286647,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,8c546eff83dbe5240d979de322859dbce3e0f40803afa459c807306a06c0fe25,2025-02-03T02:15:26.433000 CVE-2025-1003,0,0,28c07c3915c653630648b64a7cbd4a7c616ace8285e5d0c3a3c404659b6f5188,2025-02-04T00:15:33.940000 -CVE-2025-1009,0,0,057e48239e169f5c122c35983321285c81a42e300741bd775d740b302b9ccfb9,2025-02-04T14:15:31.653000 -CVE-2025-1010,0,0,fca9569fb8d93879c5dfa6ccf6d4519cc9975c31116e72a8c2473813e18aa884,2025-02-04T14:15:31.767000 -CVE-2025-1011,0,0,297e07de9abfd504a94223cff191d662176349a8a03f656d368cc065d6c534f2,2025-02-04T14:15:31.887000 -CVE-2025-1012,0,1,371f4c9e30444228e0bae55710cd824171d3e52dd3e463d62d64cdeb48f66b41,2025-02-05T16:15:41.677000 +CVE-2025-1009,0,1,2dfce1a6ef3a5258a1ead4cc70f7690cef7c227c3f80a57d2d9913ffcc23af3e,2025-02-05T19:15:44.887000 +CVE-2025-1010,0,1,03e8b449c171fa78173030080d8bb8a5a467a9a0474962b20870b954fbc5c75d,2025-02-05T19:15:45.040000 +CVE-2025-1011,0,1,9708bb6e610498c1fec9bb5b68d13c48eb7ab4520952ea47e80ee5e175241ef1,2025-02-05T19:15:45.200000 +CVE-2025-1012,0,0,371f4c9e30444228e0bae55710cd824171d3e52dd3e463d62d64cdeb48f66b41,2025-02-05T16:15:41.677000 CVE-2025-1013,0,0,7850c4d6d2e109643a59fb961c11cb0730ae6f20ae9c8d7c940078d1f0c9d295,2025-02-04T22:15:41.743000 CVE-2025-1014,0,0,544817131bc2a393c39ccd531718fe5c0dd3a6cd30b85cb9bf6937fb9e6d4be4,2025-02-04T14:15:32.237000 CVE-2025-1015,0,0,78f5fecd53c2aa86c7ca6d563228a76004114ac181528abd6a45351d728a1c0a,2025-02-04T14:15:32.363000 CVE-2025-1016,0,0,efa8db97120255b01241f5781d3dc7ba89f46e1536b94d5bcfc3c70208ef9d4a,2025-02-04T14:15:32.467000 CVE-2025-1017,0,0,f5f7b8b5a8afec6f64c593865fae0e1442488e21ca02614ca10f9acba9138165,2025-02-04T14:15:32.600000 -CVE-2025-1018,0,0,8996508fc60b15b22e7370d79020bd66f3818a3a8fbe2c227f5392a8d438c66f,2025-02-04T14:15:32.727000 -CVE-2025-1019,0,0,5e0591954bee495a00e8dabb1003ba7e5349e5489de6607472e2d61d55149324,2025-02-04T14:15:32.850000 +CVE-2025-1018,0,1,cd92a6e0b57368cc5388f0343ce69c3844e558f1d129d9bb2826871121b9c45d,2025-02-05T17:15:22.293000 +CVE-2025-1019,0,1,4c88bc6137c6891dce1140bc9fc08cfc596cdc5e87b30280a2fd0e0bac1e354b,2025-02-05T19:15:45.343000 CVE-2025-1020,0,0,eda0323a4c0776f4a73195a989cdd4cfe84003acb905d73dc0fc500a0b13bb10,2025-02-04T14:15:32.953000 -CVE-2025-1022,0,0,722d59937c8f36f6a079c9fc6449b22f2b2ec43d9a668444137f2b1bdb961688,2025-02-05T05:15:10.337000 -CVE-2025-1025,0,0,303040b7ce378f45216ff38fa79afbc785033dd69043f47229c61d1cadcb692a,2025-02-05T05:15:10.517000 +CVE-2025-1022,0,1,c6f927693382feefd3496fa1fab29d0d3220169dd409cf06d2e60bb8c3a871ef,2025-02-05T20:15:45.470000 +CVE-2025-1025,0,1,47807b8e82e17527c7201ea4708ddff28a865df6bf51354013b48cefc410618d,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,934680430568ee4f9133f3caf4202e9f856a4d1cce3fe9e6aa36c7f381dad077,2025-02-05T05:15:10.687000 CVE-2025-1028,0,0,e2d695e5f743c52691e2706279de4015f0c0e2d5f7e673aad15fe64754f22233,2025-02-05T04:15:06.543000 CVE-2025-20014,0,0,c7b03c8de0f1a02652afc1076707a5c9ed340500d3cc7fc3a1a2840db59d647f,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 +CVE-2025-20029,1,1,7beae6544fac5da36b705aa7bd201e5432df1e59d09b16381fbe97a847fc40ed,2025-02-05T18:15:29.573000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 +CVE-2025-20045,1,1,71f8130cb201580cbf6d1161e080994a646b9d85647121f0405851fb0f080c45,2025-02-05T18:15:29.760000 CVE-2025-20055,0,0,2d78db23287090ae5d3190213b75b348c3d1d689e77c9b32372b6d83b934f84d,2025-01-14T10:15:07.710000 +CVE-2025-20058,1,1,c64d3b41b970630c563a0e812f1f0a704c4dca71e8452a77ec808915a5ef1441,2025-02-05T18:15:29.943000 CVE-2025-20061,0,0,834f285e73a338e6577dfdda5a3f8b9c9aace2825b66dd5991ce9be19f90b7b3,2025-01-29T20:15:35.363000 CVE-2025-20072,0,0,b9e9cb3d894db8c29d56585c14d2cf06ce7800f36f472c346f2184b6fcf02e0f,2025-01-16T18:15:28.517000 CVE-2025-20086,0,0,c718ee138c5d706935ee7319c465eb1db60c32a8ee92f074be268892106cc0d1,2025-01-15T17:15:19.107000 CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb89e,2025-01-15T17:15:19.243000 CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 +CVE-2025-20124,1,1,68d7edf3054b065f6f5ece8ff81f3442e578e6dc89f6357f58ea7e8186069459,2025-02-05T17:15:22.457000 +CVE-2025-20125,1,1,dfb4fbe5b208d06ba51ba9ed9b78400f33a51b29c1bef61dac60a731b5fc253a,2025-02-05T17:15:22.610000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,e0ed39ad112da2f910d5adbfae9f1955d5d74cc055c3998d2431894e9861afe3,2025-01-22T17:15:12.583000 CVE-2025-20156,0,0,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 @@ -278469,6 +278481,22 @@ CVE-2025-20165,0,0,18c6fe385f145cafd300dd1a36f434744b5f6df59e9659f66de7b87c54137 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 CVE-2025-20168,0,0,24fc772dc3ea5c2e7c84ac7fd0e2daf2c33d11c28d47f590a8d9933ab82b49d9,2025-01-08T17:15:17.323000 +CVE-2025-20169,1,1,f6bbc3467898c3c40f11fd8542c19a8d0a82db171374992a3b51c7916bce1681,2025-02-05T17:15:22.777000 +CVE-2025-20170,1,1,6ccc08b7434e31bf5689f966e1db81cd78dff017f47ca41147547a58af16e758,2025-02-05T17:15:23.283000 +CVE-2025-20171,1,1,fba32b50cf05169ec813e7b0025a1bf157f8481e99970e5b589406792a787ae4,2025-02-05T17:15:23.753000 +CVE-2025-20172,1,1,3d77e1341dc9fd4433369c8351c69a0767081f23877e3e4135c3f3a6e1122808,2025-02-05T17:15:24.020000 +CVE-2025-20173,1,1,7e679cd08ede0ffeb6b784025a153c243719e21b72189dfb6a47e724a5824e8d,2025-02-05T17:15:24.263000 +CVE-2025-20174,1,1,13409f3109e44cf180261ce6e7903b2e7742cf9fd9b19e84f54551f6bc85c8df,2025-02-05T17:15:24.513000 +CVE-2025-20175,1,1,19aac6645c8261179cabcf5f7c17b73e7dd36dbe39457175790f03fceb667cfa,2025-02-05T17:15:24.720000 +CVE-2025-20176,1,1,5833e5bce0f2ce10ca0eaf671789119fe933eb329a501514e44815c6535b2624,2025-02-05T17:15:24.997000 +CVE-2025-20179,1,1,08aec0dc0be6559052ec3ef34303a5bb10c4e1ac2c7c6db79e1f331684141f3d,2025-02-05T17:15:25.210000 +CVE-2025-20180,1,1,d1f068f699b5aea3824570ff18c45e3db04aefedb38609873fdf917fa20be23f,2025-02-05T17:15:25.370000 +CVE-2025-20183,1,1,0444402bc3900e5e3e2944f2ac2097f338ce7aef0476c7a9998d31a160af1cf2,2025-02-05T17:15:25.527000 +CVE-2025-20184,1,1,67fe1e064cfb939508d5b4b825ea3be360e14634687d280ad5547f32bbf31c7c,2025-02-05T17:15:25.697000 +CVE-2025-20185,1,1,a0effe7c7f58870813ead01b6d5b37586f269a3b6ad2f64e6586132cd083b327,2025-02-05T17:15:25.883000 +CVE-2025-20204,1,1,60336f20ea14e2712a8e891dec1f1a6cc47d1b2bf2009af7f39d2a251f12ac58,2025-02-05T17:15:26.077000 +CVE-2025-20205,1,1,c1118730fee308e3f680c1a9b405f92b9e2565af65a8ff71409c7569c66ca848,2025-02-05T17:15:26.243000 +CVE-2025-20207,1,1,d017595e62f5e682c6d14bec2f17a680fa86b1d47530447f5af62376ab7bf4ae,2025-02-05T17:15:26.410000 CVE-2025-20617,0,0,5e5337fea3f32f18b26cd8ba8dd17d3809fb24229b1710efe951151848f1eb60,2025-01-22T06:15:14.170000 CVE-2025-20620,0,0,3537bfd354e2e5606a7442449870297aadd63b5c6f244c03eb513f3f9ee090eb,2025-01-14T10:15:07.860000 CVE-2025-20621,0,0,060306fc4f84916fe909badb69a5829b34e2103b61fada341bb3713a68cfaebc,2025-01-16T19:15:29.960000 @@ -278513,7 +278541,9 @@ CVE-2025-20905,0,0,98e42574bbc8877f11da1979a020bbe6270c5108c6af649bacf3553473342 CVE-2025-20906,0,0,d436092b7af54f2929e8c24b2fced68db5cd0220841fa96873756ed0de7bec17,2025-02-04T08:15:32.263000 CVE-2025-20907,0,0,08fbc69316245af44979117f75bfc85507f5538affecdc924c935ae1ce8c2fa4,2025-02-04T08:15:32.403000 CVE-2025-21083,0,0,b1f881e778d473a44d11cfcbd38b4988ccf3c0bae1e47d54950fb32a165015e0,2025-01-15T17:15:19.393000 +CVE-2025-21087,1,1,f80fedd0935c6d0880a413ef2777b2b6cc0d0fc937f7df2c084eb8ac7a72cd24,2025-02-05T18:15:30.430000 CVE-2025-21088,0,0,2fc6ecd1dae8270574ff01139ed8a42b63c05aa457c258a8d76906ce3a93ca54,2025-01-15T16:15:32.413000 +CVE-2025-21091,1,1,2e454e6e9e70fb3a1c3cd80f78092ad0c116e89c343600a1a5a16ec39ca281e3,2025-02-05T18:15:30.613000 CVE-2025-21101,0,0,0410baf8ce887e4bee4e642f5416b4c957a9c2a93d873e61b46c5aa6fe5ccada,2025-02-04T15:50:56.233000 CVE-2025-21102,0,0,933ca72a52260837d55d5545fa75f1f12ce9dc7f55e3f7d4f145fee0707ab4ba,2025-01-24T19:10:11.977000 CVE-2025-21107,0,0,a8bef9790437256d8a5036e86822b9dec5f8fcf588041208330c76eafa41979d,2025-01-30T10:15:09.100000 @@ -278533,14 +278563,14 @@ CVE-2025-21136,0,0,1471b8df9400bf2a614051a2204be217d0d5f426f818af5f4e13aa30b875a CVE-2025-21137,0,0,45139b02243d4b1da14a9edb94333c11b50a8560016fecd32028ca2a6372fd84,2025-01-21T17:49:47.150000 CVE-2025-21138,0,0,9175fd36c28710bcae9acb351f078e58c4e36962afaf9695ab07299ddfe97cfb,2025-01-21T17:49:57.513000 CVE-2025-21139,0,0,2997f9c80c926e4a0ccbf0529ea4d9ee2a8d2178744e4927ee6a077f342903ba,2025-01-21T17:50:10.023000 -CVE-2025-21171,0,0,3f8d7ae5d42bd6d67eda274e686a5af2c25d7ba110ed2a6c8e103fadc06ac522,2025-01-14T18:15:30.100000 -CVE-2025-21172,0,0,b09e8dc0d1f56fa9e1650f14e408a46b7b9e6906261f67ee8ffb652c46256113,2025-01-14T18:15:30.300000 -CVE-2025-21173,0,0,dc7d6f0b42c0720b3e28981e88923a9688fcc640d7ac05772788123756e1fc4c,2025-01-14T19:15:34.583000 -CVE-2025-21176,0,0,33388981de683b912075c8499d519ba09eca40daee370078a15e3066ba89f616,2025-01-14T18:15:30.650000 +CVE-2025-21171,0,1,3c9f6942085918a90e9231b06b07eff9b6bf5a4b6913504e83e61dbac7d978ef,2025-02-05T20:07:01.797000 +CVE-2025-21172,0,1,a16b5aa4bf1bed75762ad83041277b58c0e61aede3f38addb5adc297e17ded34,2025-02-05T20:03:33.053000 +CVE-2025-21173,0,1,ad7a0687adbbd12bea1660d0b0ef666d021874e57d663931aea070a6cab1470b,2025-02-05T18:56:08.103000 +CVE-2025-21176,0,1,45b47787b4d49daaded12395e3d448e8127b599195846900e9b1b348a614f6da,2025-02-05T19:12:24.030000 CVE-2025-21178,0,0,d71a896e79150386932074c64e9b8c5ec60fa5f01f13fe9fd459435a63d7fcd0,2025-01-27T18:42:39.560000 CVE-2025-21185,0,0,cb41c813b9325abbb01bf8ec1150f2d28aba165b47e2e45a6d0824ced24c6771,2025-01-17T20:15:30.227000 CVE-2025-21186,0,0,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000 -CVE-2025-21187,0,0,ed819aae6126a4c8f026d44994b6a7637660e67cd873b058d58320ecb1a9ae9a,2025-01-14T18:15:31.187000 +CVE-2025-21187,0,1,05994f278acb907e9de51acc1037aa859f6c5afa8dace166ad321c325a389481,2025-02-05T19:14:06.093000 CVE-2025-21189,0,0,ca648121d9e850804175588d9c4aac6da7ef3c2b6ae2300a8b63e1ea00030d07,2025-01-27T18:42:24.057000 CVE-2025-21193,0,0,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 CVE-2025-21202,0,0,ee1b8176efac6955bc73fc19b48d6a8059f8d2834d4bcfd8fa3504a8df2af357,2025-01-27T18:41:27.647000 @@ -278636,7 +278666,7 @@ CVE-2025-21309,0,0,43e88773ce79d3ac8425da5b30cafca156a5dbb4eddf0e3167581fbdb45e5 CVE-2025-21310,0,0,099e46304a735e30a828bfef6909dde2287720f5a5b8ca47538d7896500421bd,2025-01-24T21:50:53.527000 CVE-2025-21311,0,0,c1918edd35606730332735ebee7fb7970341bc3e23003b52c67502e783c288e5,2025-01-24T21:51:02.927000 CVE-2025-21312,0,0,47b42958fc99f7be1ed69c7cce535e211c2a133d312c9defde333ac23751e538,2025-01-24T21:51:19.847000 -CVE-2025-21313,0,0,665ce6cac7d0183a61e9c6dbcd90e1386f2822360c7382043362465d5adeedd7,2025-01-14T18:15:55.007000 +CVE-2025-21313,0,1,3ad9481144f1bfd2ff6f3a2ddfbebf49dc7d9f22bb11542182bdf8d5f3edef49,2025-02-05T19:40:54.683000 CVE-2025-21314,0,0,2d3c54245a684defe2bf2671f7f48b921455fea621695ec6c33006daf7b9626b,2025-01-27T18:34:32.613000 CVE-2025-21315,0,0,5a13d39751996d646bad2814d5d374399878c40170b6fad35ea2f1b021fad591,2025-01-22T14:40:33.967000 CVE-2025-21316,0,0,82452fd2c845ec85f7c6e5170cf3bd46a3abf2af010f9fecee630f5a318e9cab,2025-01-22T14:41:48.963000 @@ -278682,9 +278712,9 @@ CVE-2025-21370,0,0,4f2d9ad677d80f1448cc8df24916a78dc10d6e491dbdc144c8692d9ee5b64 CVE-2025-21372,0,0,3a043b222986f0210a248c5eb2603857944565822a2729da3fb2f989508cf536,2025-01-17T15:36:24.423000 CVE-2025-21374,0,0,ead24a7108d28044973c820d42729d55cfc82fef0521b5f1e42a7d4613cfef94,2025-01-17T15:39:11.143000 CVE-2025-21378,0,0,478c90ca0883d4700fd3d97e183ba78b4385e2b09147992cfc6855efafea8f56,2025-01-17T15:42:41.810000 -CVE-2025-21380,0,0,4c50921192674428f12ee9508d0865ca454638893a117ed6c41e0d9bb5aca2bc,2025-01-09T23:15:08.340000 +CVE-2025-21380,0,1,e643fd8c94c7b45625a0b2a2c6180cbad608f386b8797cac9a8273096b1f65ed,2025-02-05T19:29:52.457000 CVE-2025-21382,0,0,2e156c697ff05ca319e829bc026533c3a21bc0697174f02aeb4869c8c7c1dab5,2025-01-17T15:42:09.233000 -CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b589bd,2025-01-09T22:15:29.980000 +CVE-2025-21385,0,1,c5dfb6dedf6618efbe72c00af6d209776cac2aba423a27baae612ef93bb0373a,2025-02-05T19:32:55.867000 CVE-2025-21389,0,0,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35e59,2025-01-17T15:44:04.177000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 @@ -278884,7 +278914,7 @@ CVE-2025-22151,0,0,21f9e4fddd90599ac45f0514a6d95c5510077d3d9b45eefd94598514744d8 CVE-2025-22152,0,0,089f04aace28abfa88265f6c9c2782b5476de8a0e353916617123187c142e722,2025-01-10T16:15:29.910000 CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc85bf,2025-01-23T18:15:33.267000 CVE-2025-22204,0,0,49ea900c4abe197bce181bfe4a44bc14a6884dd859034fa73b2f1042e6ec51a6,2025-02-04T18:15:35.247000 -CVE-2025-22205,0,0,07ac7f8a63905a316ed7661116685ba888a790a04ad75ff39009e21a6e11f041,2025-02-04T08:15:32.703000 +CVE-2025-22205,0,1,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000 CVE-2025-22206,0,0,c6ee0f38323613d58e72d0f5e1450f6cbd3ce545ddd7cd44e2b0e4f6f6d4be0e,2025-02-04T21:15:27.657000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 CVE-2025-22215,0,0,e26e39627ebf88fc4492196348e13c55563ef72a3b7150347ad788f5576b3be6,2025-01-08T15:15:21.927000 @@ -279235,7 +279265,9 @@ CVE-2025-22825,0,0,c21ca5713a1aa3bda508edf6d7ba0513358e0245a32198c391997dcabc4fd CVE-2025-22826,0,0,36b6e140cfbfa94ee1e1f9414c9bba12f6b84f8e81d4c4eb37d1cc60556b529d,2025-01-09T16:16:33.047000 CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8f98,2025-01-09T16:16:33.200000 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 +CVE-2025-22846,1,1,ee57cd54683e50c0c5c24a8ae084d7ddc148895112414cbbd702fe57e89ac3b8,2025-02-05T18:15:31 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 +CVE-2025-22891,1,1,fb75dbb6b742099414608ac1d0bf94bf5176258c88fc5ec7ea32c7f757b15007,2025-02-05T18:15:31.190000 CVE-2025-22904,0,0,3807d1b49b562c393e5518dc0bf4d49fb4416192083246d9de79c75349f8fe79,2025-01-17T18:15:31.870000 CVE-2025-22905,0,0,382cf7f3f8f5eadd5df6d2c876d6a159bbdf9a76601b3d1844a11a83da840be1,2025-01-16T15:15:15.180000 CVE-2025-22906,0,0,84179e13ef31a8a27c56f765914741b8d10c6e2d6fee9b4fe45e261f98203a95,2025-01-16T15:15:15.357000 @@ -279358,12 +279390,17 @@ CVE-2025-23221,0,0,66ab94f1e6d3ea457770d55c62f0e0360d1ef2f8abc298fcd5936362cd0cc CVE-2025-23222,0,0,72a8ea914a5b6e8d45d82e31c395b1bc47a872a89b39280ad7b98c4ef6a54485,2025-01-24T17:15:15.730000 CVE-2025-23227,0,0,f9f92843c2672f819b4e02923b915715941f2a484ada128843c5fed7ba6fe29c,2025-01-23T18:15:33.440000 CVE-2025-23237,0,0,c0ce202263a02631ffe1db2dee5ed008b2b4991928cf61026697f648aec08853,2025-01-22T06:15:14.480000 +CVE-2025-23239,1,1,7458abb97ae0bc2944d9f8c5b4a17afb944bb32a9b03fc475aaad0e2b431ba0b,2025-02-05T18:15:31.373000 CVE-2025-23362,0,0,4175dafde4dfbcc1702079871b115339d3ed0e0d40635e42424780234232a050,2025-01-29T02:15:27.910000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 CVE-2025-23367,0,0,b37625be58a41142a80178b9f15aff48b94d8729b5d12038cd7083791d551b52,2025-01-31T21:15:13.613000 -CVE-2025-23369,0,0,66187faf123cd1b620a69cca574fbe971b43952983c5e4f566d4fb3bc1049429,2025-01-21T19:15:12.147000 +CVE-2025-23369,0,1,3d547a50b40d16b552809387aa654ff4614f9ee138b9c9b23c533e36ce07a5a8,2025-02-05T19:15:45.747000 CVE-2025-23374,0,0,6e96680ee2bf37384f3c7895ad427a8c8ffff489e98560bb212dfdb350f5da7a,2025-01-30T05:15:10.787000 CVE-2025-23385,0,0,6606b6cabae4ea061623c9a08ade20af79a1819b135c8eb1df9b074f3755bf03,2025-01-28T16:15:41.377000 +CVE-2025-23412,1,1,d030d26a8cf6e63db028a9c5043a3f95e0e5202527884487fdcb3e2486604bfa,2025-02-05T18:15:31.580000 +CVE-2025-23413,1,1,78048e4778a047d1e6ccc7d7e61a8b0df23ed4b850eb3939f5641b49a39486e6,2025-02-05T18:15:31.930000 +CVE-2025-23415,1,1,6f4ad45535c2f3d98e2e704e58ff7e40da9367561620e2e750a9d914709ee649,2025-02-05T18:15:32.573000 +CVE-2025-23419,1,1,1594752ded707e8ecc85eefc806422aa67e8a6e5369ba7df38c3ee0f190e95e6,2025-02-05T20:15:45.717000 CVE-2025-23422,0,0,02fa1caf24a4eabe3a7a82363ae4ebce4a671b3054c1ebfa03694d43e05e5f21,2025-01-24T11:15:09.987000 CVE-2025-23423,0,0,9f2a3a8c7b19b98ddcb037c2f429da3cdced4a5dd5f2091389a187de7a6bb398,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,1257350394b4c232bb2fdb6b8eb342a15971b1159fa19176ca3462575142791d,2025-01-16T20:15:33.723000 @@ -279769,20 +279806,20 @@ CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 CVE-2025-24085,0,0,f7bcfbaa1ee9096d902e4f6dc6ef822d9cf28d4da7694ddbc06842049b1b433d,2025-01-30T02:00:02.057000 -CVE-2025-24086,0,1,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 -CVE-2025-24087,0,1,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 +CVE-2025-24086,0,0,7c644e120cc41a291828171399048534e1e04b082ef7ed82ac204947bf2fab49,2025-02-05T15:15:21.750000 +CVE-2025-24087,0,0,b6d09d2d8f9c9fb48f34374a1c228deecaf72eab2a92a63c6f3af02952b5c8f4,2025-02-05T15:15:21.923000 CVE-2025-24092,0,0,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65cbb0,2025-01-28T16:15:41.697000 CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000 CVE-2025-24094,0,0,86d262f71f2e67892faf4dbf8f0a50eff9cb9026771b88386373f113d46381a8,2025-02-04T21:15:28.227000 -CVE-2025-24096,0,1,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 +CVE-2025-24096,0,0,ac69c9566c3d48cc557b26bc2ed716878d8206500a277eb4956f75bd231dad30,2025-02-05T16:15:41.840000 CVE-2025-24099,0,0,31bd7bd82299770a8ac65368f7d32a0a4e3bf93b8195a30c2c40007a44a9476a,2025-01-30T22:15:10.160000 -CVE-2025-24100,0,1,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 +CVE-2025-24100,0,0,2eb1be595e647c553152fa6178e0b240d2a4c9e18148941d2c792cbf709c2b81,2025-02-05T15:15:22.070000 CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 CVE-2025-24103,0,0,b855906b195c4dc587795824d73768dd8eb50f59e5ebd39c191f21e7d50f830d,2025-01-28T16:15:41.990000 -CVE-2025-24104,0,1,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 +CVE-2025-24104,0,0,eaf2341118958cce67dbc21070a8e2f4a62ff3d770291a310ec877a84b56e1da,2025-02-05T15:15:22.223000 CVE-2025-24106,0,0,7c93b388567b51d6f143e70f744f5ae7544ea89bf54f3268ef6794b4a77e5c65,2025-01-28T15:15:13.450000 -CVE-2025-24107,0,1,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 +CVE-2025-24107,0,0,96402cf84c64acffc4d1662c29f8a3c8a0f854a65ff188084b5ba4a1a1ec5a35,2025-02-05T16:15:42.013000 CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000 CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000 CVE-2025-24112,0,0,00ac1ad70de7c95aa177469e4cbf1b6a59be3178c8668d42d9efaad7c292453f,2025-02-04T22:15:41.893000 @@ -279792,17 +279829,17 @@ CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb562 CVE-2025-24116,0,0,aa7cef2fc6e8a345ed4ea9323be2cbc80d7f94c26743a1007a2eda67ae73a859,2025-02-04T22:15:42.203000 CVE-2025-24117,0,0,33c92b99d6665d1cd4e31cf979ddcb83dff08f0221ebf8ab36bcd83194dfd5e1,2025-01-31T14:40:21.463000 CVE-2025-24118,0,0,c4c7cf0ccae327f1e2910a4df7950a5f148425468f8ed5cf85ce2f00e56e9e3f,2025-01-28T16:15:42.293000 -CVE-2025-24120,0,1,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 +CVE-2025-24120,0,0,4de34b7518b30f914f0a7dc6f0d2169fee2b922e39b5b8be4b38ceb1cb6aab96,2025-02-05T15:15:22.373000 CVE-2025-24121,0,0,727d0b449e1735b73e6c0fd4e75eac265ea0d2ba3dd19ef8c37af20d3260a32c,2025-01-28T15:15:13.600000 CVE-2025-24122,0,0,6ed5b273993a7b3b4299bccb505e9bef2efda8af378ad8c8de2092e788d49a9a,2025-01-28T16:15:42.447000 CVE-2025-24123,0,0,e83298a045ddc8c277bf247a5ae4429adb4e3443f8590ed105db055f85a1fa12,2025-01-28T16:15:42.590000 CVE-2025-24124,0,0,b35b4f4a6ad5026922ac33029fc25ada57ed2d60ab63b693c216ab6474dabd26,2025-01-28T17:15:26.753000 CVE-2025-24126,0,0,c32206f3165722bc91a067de07475d8db8a95d2b871ddebbac4703ed5b0f16fb,2025-01-28T15:15:13.743000 -CVE-2025-24127,0,1,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 +CVE-2025-24127,0,0,1d2b043a0b9d762748f03a2275d3e997d6427b918bf46a124cf4e281353abd3f,2025-02-05T16:15:42.163000 CVE-2025-24128,0,0,b692dd6c3705d2f67ed46ab7eedb7af0c180ec823dc1f4569da7249148d6fcf7,2025-01-31T22:15:13.607000 CVE-2025-24129,0,0,f1e90fe08a69d64c55e11da92a9b3bc28db0dd31ae84f052c11f85bf5bf81c15,2025-01-31T22:15:13.773000 CVE-2025-24130,0,0,2353be8fa558560d4d339540a6553b90072d4dd0bb9db553de46ea9799aed0a6,2025-01-28T15:15:13.890000 -CVE-2025-24131,0,1,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 +CVE-2025-24131,0,0,f5265dbc1bdd5800bab16b0ab9c1cc4d098fa33c0562961926c50521af2412fb,2025-02-05T16:15:42.357000 CVE-2025-24134,0,0,27238626902f107163f836767722de11324242b7de9766f8bb0b3cd4757025b5,2025-01-28T16:15:42.780000 CVE-2025-24135,0,0,37ac14929adcc1c58b3cc68046a7e240d0be8c2e4cf8312f9a3c0faefe0605bc,2025-01-28T16:15:42.930000 CVE-2025-24136,0,0,99cbf9af0701a5c7d99024811eeebb1ea5477be0a4beb1c13eeebd005ca7fe71,2025-02-04T22:15:42.370000 @@ -279815,7 +279852,7 @@ CVE-2025-24143,0,0,d6b0dc9e7b05ff53033a444fff93575e464a6a2b7f6b588a53bde953edb8e CVE-2025-24145,0,0,b130f3a7f34dacbf8f60160fa62ed4f9e3a7c741eee662787d15d39ded800009,2025-02-04T22:15:42.877000 CVE-2025-24146,0,0,dd8207ffc2b4fe69547e7d8344749ffd8d34e24e17e6fd990a937da22c8b9841,2025-01-28T15:15:14.013000 CVE-2025-24149,0,0,aa29ef9b810d73b06e462f0857765899c7d31a5944821a5da36d073befeecc11,2025-01-28T16:15:43.387000 -CVE-2025-24150,0,1,b57965dad8218b33eb0f705e2c70a2d88ee1011a034996083539ca2cb700960b,2025-02-05T16:15:42.517000 +CVE-2025-24150,0,0,b57965dad8218b33eb0f705e2c70a2d88ee1011a034996083539ca2cb700960b,2025-02-05T16:15:42.517000 CVE-2025-24151,0,0,3b90ee302fbacfd0127254bdfe696d59abb92aacf4dcc8e99b49cae621366e49,2025-01-28T15:15:14.150000 CVE-2025-24152,0,0,94cf03b83e0d0bbf2e2519ab1fb41ecec660385e6e18386a8bccf1cff0fd2172,2025-01-31T22:15:13.947000 CVE-2025-24153,0,0,a962e00376d57b532ea670dc465405ba54e446d5423d2019e225758957981f83,2025-02-04T21:15:28.390000 @@ -279832,6 +279869,10 @@ CVE-2025-24169,0,0,dc7fdf5a34ca171f91b452ca483098d6852ee04a0c9927ea185bfbd0220db CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,79a71d65a51a9b6afaebd476d0d597d4ed4eaba333259a9c33b9b13f1b1bef2f,2025-02-04T22:15:43.237000 +CVE-2025-24312,1,1,c5e5e31bb644d5a5413e65280f03878637760eaa8419c39ce39804db41bde416,2025-02-05T18:15:34.060000 +CVE-2025-24319,1,1,f51bebad9b6c883bbe271f3282c8556147bd4a480beeebd9c56ee5140985e63d,2025-02-05T18:15:34.557000 +CVE-2025-24320,1,1,41e4ff88295ac46161ac26ba0d868cc7cffead09b73119480a0dd7c5ecf23097,2025-02-05T18:15:34.960000 +CVE-2025-24326,1,1,4ad5290ebf60ac26d4e32a8f5a3fa4a83965902b001dee2718c29245c0d8a04a,2025-02-05T18:15:35.420000 CVE-2025-24336,0,0,1aa8b22c952431e7547e9cae53c4b88dde35cd11b44cdaca2c824f85347f12ef,2025-01-31T00:15:20.607000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 @@ -279851,6 +279892,7 @@ CVE-2025-24368,0,0,af7736525efcb0b21a0f340be92a27528f7606ab1a8aa5d024adf94625d20 CVE-2025-24369,0,0,bd128e317bd832b1c0c172effe6c4cdf1c234909a3b318ba06ac52eb192b686c,2025-01-27T23:15:11.310000 CVE-2025-24370,0,0,83743ece71a996b0e21ce17e6c65dea563fc24a45ce8b656cba6b2e14f1a3850,2025-02-03T21:15:15.547000 CVE-2025-24371,0,0,57bc93d515be16c430d092f8c15eb1e2e39f52bd4569d7d2e9ca4ba87102e539,2025-02-03T22:15:28.460000 +CVE-2025-24372,1,1,59a5b09e9ceb7426577ee4e24ce6e9653c597af00b4bfef546dfe060311bc376,2025-02-05T19:15:46.010000 CVE-2025-24373,0,0,c0e20bfe924bb8c8531c4a64fe73b51c5f63032e1ddc3a47d1ab0b6b3669a541,2025-02-04T19:15:33.680000 CVE-2025-24374,0,0,9371a32ae864472b5b2206b647349dfc1f97f02d4f3badf9a98913dbf627626c,2025-01-29T16:15:44.090000 CVE-2025-24376,0,0,734e2f759167b0a0d3f1cd79dd5b39bd42aea80444fe016a65b89320499a50ba,2025-01-30T16:15:31.630000 @@ -279874,6 +279916,7 @@ CVE-2025-24479,0,0,1ea917568a8ca93a1099fbec3955912bb9ab4205f9bcd5657b4dc5bb632eb CVE-2025-24480,0,0,ea2e27d316be81e6ae00eda68055b4ba692e1edf35b3386cf429856d77d8385d,2025-01-28T19:15:15.033000 CVE-2025-24481,0,0,a70a29c66bf7baf5dea08bd94e349ff901a131679984dd4552fbd5a0c436b91b,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,75e40aa3e2ef72206b6456310da88a42db499244e4c3785eeb178f721916e97a,2025-01-28T21:15:18.687000 +CVE-2025-24497,1,1,7d741c21085ad1f37433ddba2cf33e084167745087db6b79e3f6df65d9a201a8,2025-02-05T18:15:35.613000 CVE-2025-24500,0,0,fdbdf2f14d536afe020d6ff1d8fac6ffbf21a657fef4dcee4ece37016132aa52,2025-02-05T05:15:11.067000 CVE-2025-24501,0,0,0557529ddb29206e4e04e9fa3f9634328e04d422d7ce7dd8b05257955e166f58,2025-02-05T05:15:11.197000 CVE-2025-24502,0,0,bb2f663e201d5533539ec3e6966f60216f067393fa49cbfaab34227e3e6a8ab9,2025-02-05T05:15:11.300000 @@ -280081,6 +280124,9 @@ CVE-2025-24794,0,0,8d4a6a3a651b5ffb22f337f1ce4766624a31afd069ad515efbd5b46787471 CVE-2025-24795,0,0,bf5d8c2b2d9b23970c57fcd8c8f081c97b36f673c2881f7faa5a7164a63ee6a9,2025-01-29T21:15:21.533000 CVE-2025-24800,0,0,a5bc3a0b8847be7d3cecfd7fa612d47b4069d8ec81db067196b444f5dea701a4,2025-01-28T16:15:45.063000 CVE-2025-24802,0,0,4445fb0e0b65774ec40d5cd9a7c37e875e6dfd482e5a0f46141336b66b7fec10,2025-01-30T20:15:51.010000 +CVE-2025-24803,1,1,de7717b1bc14ce6f1b3f038b39f2e47b9865c8602f8c41659dc7eda4ca79e4aa,2025-02-05T19:15:46.207000 +CVE-2025-24804,1,1,269ac8beebedeaf1af53ec49a1f4504e9b9c57cfaa6da251d77286e8e57c4204,2025-02-05T19:15:46.350000 +CVE-2025-24805,1,1,5e14d248959d02784bc55a6ef4112f51ba0993abe851f9d7013d793d736d3305,2025-02-05T19:15:46.487000 CVE-2025-24810,0,0,5dc96a04891b646d8f099d1fa627e0a60065bb9f47866c74211a0f5415867e23,2025-01-28T05:15:11.413000 CVE-2025-24814,0,0,dc7a899175c7c222b0b0fc0e97c1cb1a7c86d17c215b0e24a1499040bacd572d,2025-01-27T09:15:14.947000 CVE-2025-24826,0,0,f083cf3b22a371b3b312cdd4d91f8ea577aaa86377c783f40f19f65978454748,2025-01-28T21:15:18.817000