From 3169f3c801d9bce2b5c7de3a612e7dfd5baa1ca1 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Thu, 6 Feb 2025 21:04:00 +0000 Subject: [PATCH] Auto-Update: 2025-02-06T21:00:32.189105+00:00 --- CVE-2017/CVE-2017-158xx/CVE-2017-15812.json | 6 +- CVE-2019/CVE-2019-181xx/CVE-2019-18187.json | 32 +- CVE-2019/CVE-2019-74xx/CVE-2019-7481.json | 22 +- CVE-2019/CVE-2019-74xx/CVE-2019-7483.json | 22 +- CVE-2020/CVE-2020-245xx/CVE-2020-24557.json | 22 +- CVE-2020/CVE-2020-51xx/CVE-2020-5135.json | 22 +- CVE-2020/CVE-2020-84xx/CVE-2020-8467.json | 22 +- CVE-2020/CVE-2020-84xx/CVE-2020-8468.json | 32 +- CVE-2020/CVE-2020-85xx/CVE-2020-8599.json | 22 +- CVE-2021/CVE-2021-08xx/CVE-2021-0878.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0879.json | 32 +- CVE-2021/CVE-2021-08xx/CVE-2021-0880.json | 32 +- CVE-2021/CVE-2021-200xx/CVE-2021-20016.json | 22 +- CVE-2021/CVE-2021-200xx/CVE-2021-20021.json | 22 +- CVE-2021/CVE-2021-200xx/CVE-2021-20022.json | 34 +- CVE-2021/CVE-2021-200xx/CVE-2021-20023.json | 22 +- CVE-2021/CVE-2021-222xx/CVE-2021-22204.json | 12 +- CVE-2021/CVE-2021-222xx/CVE-2021-22205.json | 12 +- CVE-2021/CVE-2021-278xx/CVE-2021-27852.json | 12 +- CVE-2021/CVE-2021-362xx/CVE-2021-36260.json | 32 +- CVE-2021/CVE-2021-367xx/CVE-2021-36742.json | 32 +- CVE-2022/CVE-2022-283xx/CVE-2022-28353.json | 32 +- CVE-2022/CVE-2022-300xx/CVE-2022-30076.json | 32 +- CVE-2022/CVE-2022-341xx/CVE-2022-34125.json | 39 +- CVE-2022/CVE-2022-341xx/CVE-2022-34126.json | 39 +- CVE-2022/CVE-2022-341xx/CVE-2022-34127.json | 39 +- CVE-2022/CVE-2022-341xx/CVE-2022-34128.json | 39 +- CVE-2022/CVE-2022-364xx/CVE-2022-36424.json | 6 +- CVE-2022/CVE-2022-371xx/CVE-2022-37186.json | 32 +- CVE-2022/CVE-2022-372xx/CVE-2022-37255.json | 32 +- CVE-2022/CVE-2022-436xx/CVE-2022-43699.json | 32 +- CVE-2022/CVE-2022-46xx/CVE-2022-4668.json | 6 +- CVE-2023/CVE-2023-280xx/CVE-2023-28085.json | 22 +- CVE-2023/CVE-2023-280xx/CVE-2023-28091.json | 22 +- CVE-2023/CVE-2023-385xx/CVE-2023-38511.json | 102 ++- CVE-2023/CVE-2023-437xx/CVE-2023-43790.json | 73 +- CVE-2023/CVE-2023-443xx/CVE-2023-44396.json | 96 ++- CVE-2023/CVE-2023-458xx/CVE-2023-45808.json | 96 ++- CVE-2023/CVE-2023-471xx/CVE-2023-47123.json | 73 +- CVE-2024/CVE-2024-134xx/CVE-2024-13416.json | 56 ++ CVE-2024/CVE-2024-134xx/CVE-2024-13417.json | 56 ++ CVE-2024/CVE-2024-271xx/CVE-2024-27137.json | 33 +- CVE-2024/CVE-2024-278xx/CVE-2024-27898.json | 61 +- CVE-2024/CVE-2024-303xx/CVE-2024-30382.json | 463 ++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30384.json | 354 +++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30386.json | 848 +++++++++++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30387.json | 459 ++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30389.json | 198 ++++- CVE-2024/CVE-2024-303xx/CVE-2024-30390.json | 222 ++++- CVE-2024/CVE-2024-303xx/CVE-2024-30397.json | 459 ++++++++++- CVE-2024/CVE-2024-303xx/CVE-2024-30398.json | 398 ++++++++- CVE-2024/CVE-2024-304xx/CVE-2024-30402.json | 738 ++++++++++++++++- CVE-2024/CVE-2024-304xx/CVE-2024-30403.json | 56 +- CVE-2024/CVE-2024-34xx/CVE-2024-3457.json | 85 +- CVE-2024/CVE-2024-34xx/CVE-2024-3458.json | 85 +- CVE-2024/CVE-2024-392xx/CVE-2024-39272.json | 10 +- CVE-2024/CVE-2024-437xx/CVE-2024-43779.json | 10 +- CVE-2024/CVE-2024-472xx/CVE-2024-47256.json | 56 ++ CVE-2024/CVE-2024-472xx/CVE-2024-47258.json | 56 ++ CVE-2024/CVE-2024-528xx/CVE-2024-52892.json | 56 ++ CVE-2024/CVE-2024-574xx/CVE-2024-57426.json | 25 + CVE-2024/CVE-2024-575xx/CVE-2024-57523.json | 64 ++ CVE-2024/CVE-2024-576xx/CVE-2024-57668.json | 25 + CVE-2024/CVE-2024-576xx/CVE-2024-57672.json | 21 + CVE-2024/CVE-2024-576xx/CVE-2024-57673.json | 21 + CVE-2025/CVE-2025-05xx/CVE-2025-0510.json | 86 +- CVE-2025/CVE-2025-07xx/CVE-2025-0725.json | 6 +- CVE-2025/CVE-2025-10xx/CVE-2025-1009.json | 109 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1010.json | 109 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1011.json | 96 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1012.json | 108 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1014.json | 108 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1015.json | 74 +- CVE-2025/CVE-2025-10xx/CVE-2025-1016.json | 120 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1017.json | 108 ++- CVE-2025/CVE-2025-10xx/CVE-2025-1018.json | 74 +- CVE-2025/CVE-2025-10xx/CVE-2025-1019.json | 74 +- CVE-2025/CVE-2025-10xx/CVE-2025-1020.json | 85 +- CVE-2025/CVE-2025-229xx/CVE-2025-22936.json | 25 + CVE-2025/CVE-2025-229xx/CVE-2025-22992.json | 21 + CVE-2025/CVE-2025-230xx/CVE-2025-23093.json | 21 + CVE-2025/CVE-2025-247xx/CVE-2025-24786.json | 72 ++ CVE-2025/CVE-2025-247xx/CVE-2025-24787.json | 64 ++ CVE-2025/CVE-2025-248xx/CVE-2025-24860.json | 35 +- CVE-2025/CVE-2025-250xx/CVE-2025-25064.json | 4 +- README.md | 98 ++- _state.csv | 423 +++++----- 87 files changed, 7623 insertions(+), 522 deletions(-) create mode 100644 CVE-2024/CVE-2024-134xx/CVE-2024-13416.json create mode 100644 CVE-2024/CVE-2024-134xx/CVE-2024-13417.json create mode 100644 CVE-2024/CVE-2024-472xx/CVE-2024-47256.json create mode 100644 CVE-2024/CVE-2024-472xx/CVE-2024-47258.json create mode 100644 CVE-2024/CVE-2024-528xx/CVE-2024-52892.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57426.json create mode 100644 CVE-2024/CVE-2024-575xx/CVE-2024-57523.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57668.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57672.json create mode 100644 CVE-2024/CVE-2024-576xx/CVE-2024-57673.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22936.json create mode 100644 CVE-2025/CVE-2025-229xx/CVE-2025-22992.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23093.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24786.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24787.json diff --git a/CVE-2017/CVE-2017-158xx/CVE-2017-15812.json b/CVE-2017/CVE-2017-158xx/CVE-2017-15812.json index 013afd4a23b..d5a4b0e21fb 100644 --- a/CVE-2017/CVE-2017-158xx/CVE-2017-15812.json +++ b/CVE-2017/CVE-2017-158xx/CVE-2017-15812.json @@ -2,7 +2,7 @@ "id": "CVE-2017-15812", "sourceIdentifier": "cve@mitre.org", "published": "2017-10-23T17:29:00.863", - "lastModified": "2024-11-21T03:15:16.790", + "lastModified": "2025-02-06T19:03:15.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -85,9 +85,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_appointments_project:easy_appointments:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:easy-appointments:easy_appointments:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "1.11.7", - "matchCriteriaId": "9C1ED0DB-EB25-4355-A44C-34FC1F206683" + "matchCriteriaId": "EDC2C505-E82D-4E0F-B00F-CE70469FDC40" } ] } diff --git a/CVE-2019/CVE-2019-181xx/CVE-2019-18187.json b/CVE-2019/CVE-2019-181xx/CVE-2019-18187.json index b98ce209044..f95af0fd6d8 100644 --- a/CVE-2019/CVE-2019-181xx/CVE-2019-18187.json +++ b/CVE-2019/CVE-2019-181xx/CVE-2019-18187.json @@ -2,7 +2,7 @@ "id": "CVE-2019-18187", "sourceIdentifier": "security@trendmicro.com", "published": "2019-10-28T20:15:11.003", - "lastModified": "2024-11-21T04:32:47.440", + "lastModified": "2025-02-06T20:15:32.560", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json b/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json index 3c0dcc593f6..2cf5bc601ab 100644 --- a/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json +++ b/CVE-2019/CVE-2019-74xx/CVE-2019-7481.json @@ -2,7 +2,7 @@ "id": "CVE-2019-7481", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2019-12-17T23:15:14.923", - "lastModified": "2024-11-21T04:48:15.823", + "lastModified": "2025-02-06T20:15:33.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json b/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json index a854f533348..21aed23a09a 100644 --- a/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json +++ b/CVE-2019/CVE-2019-74xx/CVE-2019-7483.json @@ -2,7 +2,7 @@ "id": "CVE-2019-7483", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2019-12-19T01:15:10.803", - "lastModified": "2024-11-21T04:48:16.053", + "lastModified": "2025-02-06T20:15:33.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-245xx/CVE-2020-24557.json b/CVE-2020/CVE-2020-245xx/CVE-2020-24557.json index b396c55f625..d0c5fb4e0fb 100644 --- a/CVE-2020/CVE-2020-245xx/CVE-2020-24557.json +++ b/CVE-2020/CVE-2020-245xx/CVE-2020-24557.json @@ -2,7 +2,7 @@ "id": "CVE-2020-24557", "sourceIdentifier": "security@trendmicro.com", "published": "2020-09-01T19:15:11.870", - "lastModified": "2024-11-21T05:14:59.217", + "lastModified": "2025-02-06T20:15:33.953", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-51xx/CVE-2020-5135.json b/CVE-2020/CVE-2020-51xx/CVE-2020-5135.json index 7bf574c5bfe..4ee78afa235 100644 --- a/CVE-2020/CVE-2020-51xx/CVE-2020-5135.json +++ b/CVE-2020/CVE-2020-51xx/CVE-2020-5135.json @@ -2,7 +2,7 @@ "id": "CVE-2020-5135", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2020-10-12T11:15:12.747", - "lastModified": "2024-11-21T05:33:36.540", + "lastModified": "2025-02-06T20:15:34.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-84xx/CVE-2020-8467.json b/CVE-2020/CVE-2020-84xx/CVE-2020-8467.json index 6c719b61780..57b26a9e1d7 100644 --- a/CVE-2020/CVE-2020-84xx/CVE-2020-8467.json +++ b/CVE-2020/CVE-2020-84xx/CVE-2020-8467.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8467", "sourceIdentifier": "security@trendmicro.com", "published": "2020-03-18T01:15:11.927", - "lastModified": "2024-11-21T05:38:53.787", + "lastModified": "2025-02-06T20:15:34.380", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2020/CVE-2020-84xx/CVE-2020-8468.json b/CVE-2020/CVE-2020-84xx/CVE-2020-8468.json index f93bd613d68..5a5b94469b7 100644 --- a/CVE-2020/CVE-2020-84xx/CVE-2020-8468.json +++ b/CVE-2020/CVE-2020-84xx/CVE-2020-8468.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8468", "sourceIdentifier": "security@trendmicro.com", "published": "2020-03-18T01:15:12.003", - "lastModified": "2024-11-21T05:38:53.890", + "lastModified": "2025-02-06T20:15:34.587", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-85xx/CVE-2020-8599.json b/CVE-2020/CVE-2020-85xx/CVE-2020-8599.json index c818d767094..b9b11af71a8 100644 --- a/CVE-2020/CVE-2020-85xx/CVE-2020-8599.json +++ b/CVE-2020/CVE-2020-85xx/CVE-2020-8599.json @@ -2,7 +2,7 @@ "id": "CVE-2020-8599", "sourceIdentifier": "security@trendmicro.com", "published": "2020-03-18T01:15:12.223", - "lastModified": "2024-11-21T05:39:06.250", + "lastModified": "2025-02-06T20:15:34.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0878.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0878.json index ac426b65e60..e2f4ec639f4 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0878.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0878.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0878", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.500", - "lastModified": "2024-11-21T05:43:12.513", + "lastModified": "2025-02-06T20:15:34.983", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0879.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0879.json index 179b5f26750..30046e18815 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0879.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0879.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0879", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.550", - "lastModified": "2024-11-21T05:43:12.610", + "lastModified": "2025-02-06T20:15:35.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0880.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0880.json index 2851ba63ebc..ea04e0ba188 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0880.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0880.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0880", "sourceIdentifier": "security@android.com", "published": "2023-04-19T20:15:10.597", - "lastModified": "2024-11-21T05:43:12.703", + "lastModified": "2025-02-06T20:15:35.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20016.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20016.json index 4b8c7b5efaa..1c8d4113953 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20016.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20016.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20016", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-02-04T06:15:13.817", - "lastModified": "2024-11-21T05:45:47.220", + "lastModified": "2025-02-06T20:15:35.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20021.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20021.json index 81c0b90b58f..544cec7250b 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20021.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20021.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20021", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-04-09T18:15:13.380", - "lastModified": "2024-11-21T05:45:47.847", + "lastModified": "2025-02-06T20:15:35.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json index 401c90253d0..1c7b73ddfac 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20022.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20022", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-04-09T18:15:13.460", - "lastModified": "2024-11-21T05:45:47.977", + "lastModified": "2025-02-06T20:15:35.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -71,7 +91,7 @@ "weaknesses": [ { "source": "PSIRT@sonicwall.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -81,6 +101,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2021/CVE-2021-200xx/CVE-2021-20023.json b/CVE-2021/CVE-2021-200xx/CVE-2021-20023.json index 89e3213e07a..29eddb8a095 100644 --- a/CVE-2021/CVE-2021-200xx/CVE-2021-20023.json +++ b/CVE-2021/CVE-2021-200xx/CVE-2021-20023.json @@ -2,7 +2,7 @@ "id": "CVE-2021-20023", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2021-04-20T12:15:12.587", - "lastModified": "2024-11-21T05:45:48.097", + "lastModified": "2025-02-06T20:15:36.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ], "cvssMetricV2": [ diff --git a/CVE-2021/CVE-2021-222xx/CVE-2021-22204.json b/CVE-2021/CVE-2021-222xx/CVE-2021-22204.json index 86c8d09234a..c5096141bbb 100644 --- a/CVE-2021/CVE-2021-222xx/CVE-2021-22204.json +++ b/CVE-2021/CVE-2021-222xx/CVE-2021-22204.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22204", "sourceIdentifier": "cve@gitlab.com", "published": "2021-04-23T18:15:08.127", - "lastModified": "2024-11-21T05:49:42.237", + "lastModified": "2025-02-06T20:15:36.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-222xx/CVE-2021-22205.json b/CVE-2021/CVE-2021-222xx/CVE-2021-22205.json index b097c659d69..efbb85eaea7 100644 --- a/CVE-2021/CVE-2021-222xx/CVE-2021-22205.json +++ b/CVE-2021/CVE-2021-222xx/CVE-2021-22205.json @@ -2,7 +2,7 @@ "id": "CVE-2021-22205", "sourceIdentifier": "cve@gitlab.com", "published": "2021-04-23T18:15:08.167", - "lastModified": "2024-11-21T05:49:42.403", + "lastModified": "2025-02-06T20:15:36.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-278xx/CVE-2021-27852.json b/CVE-2021/CVE-2021-278xx/CVE-2021-27852.json index 0bb8cd96d19..e885a66aad4 100644 --- a/CVE-2021/CVE-2021-278xx/CVE-2021-27852.json +++ b/CVE-2021/CVE-2021-278xx/CVE-2021-27852.json @@ -2,7 +2,7 @@ "id": "CVE-2021-27852", "sourceIdentifier": "cret@cert.org", "published": "2021-05-27T21:15:20.567", - "lastModified": "2024-11-21T05:58:38.250", + "lastModified": "2025-02-06T20:15:36.810", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -98,6 +98,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-362xx/CVE-2021-36260.json b/CVE-2021/CVE-2021-362xx/CVE-2021-36260.json index 5edd11111d8..5841453b6ec 100644 --- a/CVE-2021/CVE-2021-362xx/CVE-2021-36260.json +++ b/CVE-2021/CVE-2021-362xx/CVE-2021-36260.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36260", "sourceIdentifier": "hsrc@hikvision.com", "published": "2021-09-22T13:15:07.690", - "lastModified": "2024-11-21T06:13:22.027", + "lastModified": "2025-02-06T20:15:37.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-367xx/CVE-2021-36742.json b/CVE-2021/CVE-2021-367xx/CVE-2021-36742.json index 1b39b705d8b..d6abab20ff9 100644 --- a/CVE-2021/CVE-2021-367xx/CVE-2021-36742.json +++ b/CVE-2021/CVE-2021-367xx/CVE-2021-36742.json @@ -2,7 +2,7 @@ "id": "CVE-2021-36742", "sourceIdentifier": "security@trendmicro.com", "published": "2021-07-29T20:15:07.650", - "lastModified": "2024-11-21T06:13:59.983", + "lastModified": "2025-02-06T20:15:37.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -78,6 +98,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-283xx/CVE-2022-28353.json b/CVE-2022/CVE-2022-283xx/CVE-2022-28353.json index 7c92888eb39..9028739c237 100644 --- a/CVE-2022/CVE-2022-283xx/CVE-2022-28353.json +++ b/CVE-2022/CVE-2022-283xx/CVE-2022-28353.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28353", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.123", - "lastModified": "2024-11-21T06:57:11.947", + "lastModified": "2025-02-06T20:15:37.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-300xx/CVE-2022-30076.json b/CVE-2022/CVE-2022-300xx/CVE-2022-30076.json index 82e5b5b1e05..6a65e028d23 100644 --- a/CVE-2022/CVE-2022-300xx/CVE-2022-30076.json +++ b/CVE-2022/CVE-2022-300xx/CVE-2022-30076.json @@ -2,7 +2,7 @@ "id": "CVE-2022-30076", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.230", - "lastModified": "2024-11-21T07:02:10.157", + "lastModified": "2025-02-06T19:15:17.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34125.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34125.json index e0105a0d9f5..f355fcf8af7 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34125.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34125.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34125", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.280", - "lastModified": "2024-11-21T07:08:54.647", + "lastModified": "2025-02-06T19:15:17.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ @@ -107,6 +137,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34126.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34126.json index fe6bcb43fe9..709f650997f 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34126.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34126.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34126", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.330", - "lastModified": "2024-11-21T07:08:54.803", + "lastModified": "2025-02-06T19:15:18.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ @@ -107,6 +137,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34127.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34127.json index a2890b7bbdc..0e34c99b894 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34127.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34127.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34127", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.370", - "lastModified": "2024-11-21T07:08:54.950", + "lastModified": "2025-02-06T19:15:18.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ @@ -107,6 +137,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-341xx/CVE-2022-34128.json b/CVE-2022/CVE-2022-341xx/CVE-2022-34128.json index 43a1d87f0c2..e5b1e2613a3 100644 --- a/CVE-2022/CVE-2022-341xx/CVE-2022-34128.json +++ b/CVE-2022/CVE-2022-341xx/CVE-2022-34128.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34128", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T03:15:07.410", - "lastModified": "2024-11-21T07:08:55.100", + "lastModified": "2025-02-06T19:15:18.327", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ @@ -107,6 +137,13 @@ "tags": [ "Third Party Advisory" ] + }, + { + "url": "https://pentest.blog/advisory-glpi-service-management-software-sql-injection-remote-code-execution-and-local-file-inclusion/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-364xx/CVE-2022-36424.json b/CVE-2022/CVE-2022-364xx/CVE-2022-36424.json index 742fe0b6219..b0ea128f3ac 100644 --- a/CVE-2022/CVE-2022-364xx/CVE-2022-36424.json +++ b/CVE-2022/CVE-2022-364xx/CVE-2022-36424.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36424", "sourceIdentifier": "audit@patchstack.com", "published": "2023-07-17T16:15:09.583", - "lastModified": "2024-11-21T07:12:58.977", + "lastModified": "2025-02-06T19:03:15.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -76,9 +76,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_appointments_project:easy_appointments:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:easy-appointments:easy_appointments:*:*:*:*:*:wordpress:*:*", "versionEndIncluding": "3.11.9", - "matchCriteriaId": "6C1BF2EB-FC96-4F73-99FD-62964E49E895" + "matchCriteriaId": "0EECF8BA-E337-44E5-AC45-429DD996AE50" } ] } diff --git a/CVE-2022/CVE-2022-371xx/CVE-2022-37186.json b/CVE-2022/CVE-2022-371xx/CVE-2022-37186.json index 44dafc9734e..a9d74e69934 100644 --- a/CVE-2022/CVE-2022-371xx/CVE-2022-37186.json +++ b/CVE-2022/CVE-2022-371xx/CVE-2022-37186.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37186", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:07.660", - "lastModified": "2024-11-21T07:14:35.093", + "lastModified": "2025-02-06T19:15:18.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-613" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-372xx/CVE-2022-37255.json b/CVE-2022/CVE-2022-372xx/CVE-2022-37255.json index 0655123a6fe..09aea4c0128 100644 --- a/CVE-2022/CVE-2022-372xx/CVE-2022-37255.json +++ b/CVE-2022/CVE-2022-372xx/CVE-2022-37255.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37255", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-16T02:15:08.033", - "lastModified": "2024-11-21T07:14:40.493", + "lastModified": "2025-02-06T19:15:18.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-436xx/CVE-2022-43699.json b/CVE-2022/CVE-2022-436xx/CVE-2022-43699.json index fa7b02a0087..f051f14bec3 100644 --- a/CVE-2022/CVE-2022-436xx/CVE-2022-43699.json +++ b/CVE-2022/CVE-2022-436xx/CVE-2022-43699.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43699", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-15T02:15:07.217", - "lastModified": "2024-11-21T07:27:04.750", + "lastModified": "2025-02-06T20:15:38.100", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-46xx/CVE-2022-4668.json b/CVE-2022/CVE-2022-46xx/CVE-2022-4668.json index 0f16395734f..5c603db0bb9 100644 --- a/CVE-2022/CVE-2022-46xx/CVE-2022-4668.json +++ b/CVE-2022/CVE-2022-46xx/CVE-2022-4668.json @@ -2,7 +2,7 @@ "id": "CVE-2022-4668", "sourceIdentifier": "contact@wpscan.com", "published": "2023-01-23T15:15:15.910", - "lastModified": "2024-11-21T07:35:42.093", + "lastModified": "2025-02-06T19:03:15.920", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -48,9 +48,9 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:easy_appointments_project:easy_appointments:*:*:*:*:*:wordpress:*:*", + "criteria": "cpe:2.3:a:easy-appointments:easy_appointments:*:*:*:*:*:wordpress:*:*", "versionEndExcluding": "3.11.2", - "matchCriteriaId": "52A8881A-883E-4284-AFE7-68378F0B6B27" + "matchCriteriaId": "C433DF5B-0C54-418B-B0FA-E1930176748C" } ] } diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28085.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28085.json index c54a1af8878..ae31d14927a 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28085.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28085.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28085", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-04-14T15:15:07.523", - "lastModified": "2024-11-21T07:54:22.287", + "lastModified": "2025-02-06T20:15:38.483", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json b/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json index 184cdda6858..f9b056aea05 100644 --- a/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json +++ b/CVE-2023/CVE-2023-280xx/CVE-2023-28091.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28091", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-04-14T15:15:07.563", - "lastModified": "2024-11-21T07:54:23.033", + "lastModified": "2025-02-06T20:15:38.647", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-385xx/CVE-2023-38511.json b/CVE-2023/CVE-2023-385xx/CVE-2023-38511.json index 560cc156dd9..31dafa24e9d 100644 --- a/CVE-2023/CVE-2023-385xx/CVE-2023-38511.json +++ b/CVE-2023/CVE-2023-385xx/CVE-2023-38511.json @@ -2,8 +2,8 @@ "id": "CVE-2023-38511", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T17:15:06.893", - "lastModified": "2024-11-21T08:13:43.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:55:41.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,40 +69,102 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "F42542C8-DEF2-45E2-983B-B161F76C8FDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "E46BEA8B-6ECB-44B7-9509-99E2CBB569EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synacktiv.com/advisories/file-read-in-itop", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/Combodo/iTop/commit/343e87a8d4fc8253fd81aeaf0dcc424b9dc4eda7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/89145593ef2e077529a6f7ee7cde712db637e1ab", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-323r-chx5-m9gm", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.synacktiv.com/advisories/file-read-in-itop", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-437xx/CVE-2023-43790.json b/CVE-2023/CVE-2023-437xx/CVE-2023-43790.json index 65676a8929c..2b4026b1aac 100644 --- a/CVE-2023/CVE-2023-437xx/CVE-2023-43790.json +++ b/CVE-2023/CVE-2023-437xx/CVE-2023-43790.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43790", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T17:15:07.103", - "lastModified": "2024-11-21T08:24:47.323", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:56:06.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -53,24 +73,65 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "E46BEA8B-6ECB-44B7-9509-99E2CBB569EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Combodo/iTop/commit/03c9ffc0334fd44f3f0e82477264087064e1c732", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-96xm-p83r-hm97", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-443xx/CVE-2023-44396.json b/CVE-2023/CVE-2023-443xx/CVE-2023-44396.json index 4a079b7caf7..7ecee95c605 100644 --- a/CVE-2023/CVE-2023-443xx/CVE-2023-44396.json +++ b/CVE-2023/CVE-2023-443xx/CVE-2023-44396.json @@ -2,8 +2,8 @@ "id": "CVE-2023-44396", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T18:15:07.940", - "lastModified": "2024-11-21T08:25:49.063", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:56:16.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -53,32 +73,92 @@ "value": "CWE-80" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "C771A6AC-CD9B-4F48-8A78-1C3685E2E408" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "F42542C8-DEF2-45E2-983B-B161F76C8FDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "E46BEA8B-6ECB-44B7-9509-99E2CBB569EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Combodo/iTop/commit/9df92665e08c4bf5d4d8a5a9fe21fd3fb26fb273", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/c72cb7e70ebf469ce0ec01f5f9b524e39afe6c7f", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-gqqj-jgh6-3x35", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-458xx/CVE-2023-45808.json b/CVE-2023/CVE-2023-458xx/CVE-2023-45808.json index 0ac8d2434de..7b759cb00de 100644 --- a/CVE-2023/CVE-2023-458xx/CVE-2023-45808.json +++ b/CVE-2023/CVE-2023-458xx/CVE-2023-45808.json @@ -2,8 +2,8 @@ "id": "CVE-2023-45808", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T18:15:08.143", - "lastModified": "2024-11-21T08:27:23.783", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:58:02.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,32 +69,92 @@ "value": "CWE-639" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.7.10", + "matchCriteriaId": "0C4E3E7A-6775-47E8-8878-6D33E8231551" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.0.0", + "versionEndExcluding": "3.0.4", + "matchCriteriaId": "F42542C8-DEF2-45E2-983B-B161F76C8FDA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "E46BEA8B-6ECB-44B7-9509-99E2CBB569EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Combodo/iTop/commit/5a434486443a2cf8b8a288475aada54d0a068ca7", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/commit/8f61c02cbe17badff87bff9b8ada85e783c47385", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-245j-66p9-pwmh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47123.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47123.json index 82827acf6af..356116047db 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47123.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47123.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47123", "sourceIdentifier": "security-advisories@github.com", "published": "2024-04-15T18:15:08.327", - "lastModified": "2024-11-21T08:29:49.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:59:58.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,24 +69,65 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:combodo:itop:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.1.0", + "versionEndExcluding": "3.1.1", + "matchCriteriaId": "E46BEA8B-6ECB-44B7-9509-99E2CBB569EC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/Combodo/iTop/commit/34ba4fa0ce99534f751d9f170fe0eda103e20c72", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/Combodo/iTop/security/advisories/GHSA-mx8x-693w-9hjp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json new file mode 100644 index 00000000000..90fb8c83dc4 --- /dev/null +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13416.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13416", + "sourceIdentifier": "product-security@axis.com", + "published": "2025-02-06T19:15:19.220", + "lastModified": "2025-02-06T19:15:19.220", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Using API in the 2N OS device, authorized user can enable logging, which discloses valid authentication tokens in system log." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://www.2n.com/en-GB/download/cve_2024_1341x_2nos_2_46_v1pdf", + "source": "product-security@axis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json new file mode 100644 index 00000000000..12e13729386 --- /dev/null +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13417.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-13417", + "sourceIdentifier": "product-security@axis.com", + "published": "2025-02-06T20:15:39.273", + "lastModified": "2025-02-06T20:15:39.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Specifically crafted payloads sent to the RFID reader could cause DoS of RFID reader. After the device is restarted, it gets back to fully working state." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-248" + } + ] + } + ], + "references": [ + { + "url": "https://www.2n.com/en-GB/download/cve_2024_1341x_2nos_2_46_v1pdf", + "source": "product-security@axis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-271xx/CVE-2024-27137.json b/CVE-2024/CVE-2024-271xx/CVE-2024-27137.json index 8c3711fc699..4a52a17cffe 100644 --- a/CVE-2024/CVE-2024-271xx/CVE-2024-27137.json +++ b/CVE-2024/CVE-2024-271xx/CVE-2024-27137.json @@ -2,16 +2,43 @@ "id": "CVE-2024-27137", "sourceIdentifier": "security@apache.org", "published": "2025-02-04T11:15:08.220", - "lastModified": "2025-02-04T11:15:08.220", - "vulnStatus": "Received", + "lastModified": "2025-02-06T20:15:39.397", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Apache Cassandra it is possible for a local attacker without access\n to the Apache Cassandra process or configuration files to manipulate \nthe RMI registry to perform a man-in-the-middle attack and capture user \nnames and passwords used to access the JMX interface. The attacker can \nthen use these credentials to access the JMX interface and perform \nunauthorized operations.\n\n\nThis is same vulnerability that CVE-2020-13946 was issued for, but the Java option was changed in JDK10.\n\n\nThis issue affects Apache Cassandra from 4.0.2 through 5.0.2 running Java 11.\n\n\nOperators are recommended to upgrade to a release equal to or later than 4.0.15, 4.1.8, or 5.0.3 which fixes the issue." + }, + { + "lang": "es", + "value": "En Apache Cassandra, es posible que un atacante local sin acceso al proceso de Apache Cassandra o a los archivos de configuraci\u00f3n manipule el registro RMI para realizar un ataque de intermediario y capturar los nombres de usuario y las contrase\u00f1as utilizadas para acceder a la interfaz JMX. El atacante puede utilizar estas credenciales para acceder a la interfaz JMX y realizar operaciones no autorizadas. Esta es la misma vulnerabilidad para la que se emiti\u00f3 CVE-2020-13946, pero la opci\u00f3n Java se cambi\u00f3 en JDK10. Este problema afecta a Apache Cassandra desde la versi\u00f3n 4.0.2 hasta la 5.0.2 que ejecuta Java 11. Se recomienda a los operadores que actualicen a una versi\u00f3n igual o posterior a la 4.0.15, 4.1.8 o 5.0.3, que soluciona el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.4 + } + ] + }, "references": [ { "url": "https://lists.apache.org/thread/jsk87d9yv8r204mgqpz1qxtp5wcrpysm", diff --git a/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json index ff0a72ba3c7..aa29a8c469b 100644 --- a/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json +++ b/CVE-2024/CVE-2024-278xx/CVE-2024-27898.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27898", "sourceIdentifier": "cna@sap.com", "published": "2024-04-09T01:15:48.583", - "lastModified": "2024-11-21T09:05:22.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:01:07.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,22 +71,51 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sap:netweaver:7.5:*:*:*:*:*:*:*", + "matchCriteriaId": "74F7C92A-48F7-456A-BDFF-91A482DE8546" + } + ] + } + ] + } + ], "references": [ { "url": "https://me.sap.com/notes/3425188", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", - "source": "cna@sap.com" + "source": "cna@sap.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://me.sap.com/notes/3425188", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news.html?anchorId=section_370125364", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json index a8dace88115..389babaaaff 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30382.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30382", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:37.207", - "lastModified": "2024-11-21T09:11:48.950", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:37:07.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,475 @@ "value": "CWE-755" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-755" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*", + "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "35E0BB39-18AE-4FAD-A528-FDFF6222DDE5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.2", + "matchCriteriaId": "9C14B5A6-597A-4181-8C42-392A2E4605BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "6D5DC04F-18DE-403B-BE93-2251F3332C1C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "909FC378-EBFE-4BA9-8393-0C8301438020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79174", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79174", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json index f9154469df7..8a4a87258fb 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30384.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30384", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:37.440", - "lastModified": "2024-11-21T09:11:49.083", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:36:55.430", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,366 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*", + "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA79186", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://supportportal.juniper.net/JSA79186", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json index 63cb6c26e62..42aa061a24e 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30386.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30386", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:37.650", - "lastModified": "2024-11-21T09:11:49.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:36:32.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,860 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "0F41A7DF-2B27-4E2E-ABFC-E0510A028199" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "247FB9DF-7EC0-4298-B27C-3235D141C1D6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "C9C8866D-162F-4C9B-8167-2FBA25410368" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F85E5BC7-8607-4330-AA72-2273D32F8604" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "878C81C9-A418-4A21-8FDB-2116A992679C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "7451A671-A3CC-4904-8D45-947B1D3783C9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "0108AD20-EAE6-41D1-AE48-254C46B5388A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "44FBCA6F-EB05-4EE4-85FD-944BDAF7D81B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r2-s3:*:*:*:*:*:*", + "matchCriteriaId": "E554FD12-FE69-44D1-B2C9-4382F8CA4456" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "E0C1D53E-70BE-4246-89ED-1074C8C70747" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "B39DDCF8-BB68-49F4-8AAF-AE25C9C13AC1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "B38A90A9-B739-49BE-8845-9ABF846CCC5D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AAE56A7C-BA26-405F-A640-C43AF78B0A3B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "683D8EED-9F26-41E7-B69C-FE198225A8F2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "8979C85C-87DD-42B1-9CCC-BC3F7007C600" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "5BDD5111-1BC2-456B-8A31-F2D252DF613C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "89B9BF7C-525C-4819-B80D-9B5F240F9878" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "620B0CDD-5566-472E-B96A-31D2C12E3120" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "3EA3DC63-B290-4D15-BEF9-21DEF36CA2EA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "7E1E57AF-979B-4022-8AD6-B3558E06B718" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "144730FB-7622-4B3D-9C47-D1B7A7FB7EB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "7BA246F0-154E-4F44-A97B-690D22FA73DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "25D6C07C-F96E-4523-BB54-7FEABFE1D1ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2B70C784-534B-4FAA-A5ED-3709656E2B97" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "60448FFB-568E-4280-9261-ADD65244F31A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "2B770C52-7E3E-4B92-9138-85DEC56F3B22" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "E88AC378-461C-4EFA-A04B-5786FF21FE03" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "3B0AFB30-81DC-465C-9F63-D1B15EA4809A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "2035F0AC-29E7-478A-A9D0-BAA3A88B3413" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C34ABD4B-B045-4046-9641-66E3B2082A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "4EC38173-44AB-43D5-8C27-CB43AD5E0B2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "5A4DD04A-DE52-46BE-8C34-8DB47F7500F0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "FEE0E145-8E1C-446E-90ED-237E3B9CAF47" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "0F26369D-21B2-4C6A-98C1-492692A61283" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "24003819-1A6B-4BDF-B3DF-34751C137788" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "BF8D332E-9133-45B9-BB07-B33C790F737A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "3E2A4377-D044-4E43-B6CC-B753D7F6ABD4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8DAEC4F4-5748-4D36-A72B-4C62A0A30E38" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "C76DA7A5-9320-4E21-96A2-ACE70803A1CA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "703C73EB-2D63-4D4F-8129-239AE1E96B2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "8F67CE3C-3A06-487C-90DE-D5B3B1EC08A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA79184", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://supportportal.juniper.net/JSA79184", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json index b6460cc4cac..04c0e157f69 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30387.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30387", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:37.867", - "lastModified": "2024-11-21T09:11:49.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:36:42.403", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,471 @@ "value": "CWE-820" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-662" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:-:*:*:*:*:*:*", + "matchCriteriaId": "2E7D597D-F6B6-44C3-9EBC-4FA0686ACB5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "CC78A4CB-D617-43FC-BB51-287D2D0C44ED" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "30FF67F8-1E3C-47A8-8859-709B3614BA6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "0C7C507E-C85E-4BC6-A3B0-549516BAB524" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "6514CDE8-35DC-469F-89A3-078684D18F7A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4624565D-8F59-44A8-B7A8-01AD579745E7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BF8CD82-C338-4D9A-8C98-FCB3CEAA9227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "57E08E70-1AF3-4BA5-9A09-06DFE9663ADE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "255B6F20-D32F-42C1-829C-AE9C7923558A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "90AE30DB-C448-4FE9-AC11-FF0F27CDA227" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "93F324AE-65D3-4CFC-AEAB-898CE1BD05CD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.3:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3CCBB2F4-F05B-4CC5-9B1B-ECCB798D0483" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:acx5448:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2EB7B849-D1D4-46F3-B502-5D84C5E7C3B0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:acx710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC3484A2-C7E4-43D1-9D47-08C531185C67" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA79187", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://supportportal.juniper.net/JSA79187", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json index 2eaa97cc586..7db9cae79be 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30389", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:38.317", - "lastModified": "2024-11-21T09:11:49.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T20:36:23.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,210 @@ "value": "CWE-696" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E594D6DC-87F6-40D2-8268-ED6021462168" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BEA4BC3-093F-4DE6-BED1-2C7D2FC2C8A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "592377CC-4044-4FDD-A3DF-CBF25754EE4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D12E8275-EF6B-44F9-A7D8-A769CDB5EED5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-24t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3E63215-246E-49F3-A537-8A90D512DAB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD1A5E69-928A-41A0-8B9B-91F307D99854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2B71953D-016D-4E72-B598-55667A507681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-32f-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CABBC37B-EB93-424D-A1E7-4686039C0955" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp:-:*:*:*:*:*:*:*", + "matchCriteriaId": "24526B69-E3E3-4249-80A4-A886BED5C07E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48mp-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2209605-65B6-44B3-9700-9EC543BF2408" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3C348CF-65C1-4A53-8F4F-99B5A4113679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48p-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60CB5F91-DC40-4D09-BB93-4539B8581877" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADE8EB69-95DD-44E9-80A6-F2B5E34BBD5B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEEDB14F-E74A-4C48-A969-1D22D7F7C7C8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBE3866E-109E-479F-9FFE-3F6E81C0DE7C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-dc-afi:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A17D793-5F01-4818-956D-D6BC5A6C4CEE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:ex4300-48t-s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF4C3E8E-C8B4-42A5-8DB6-7E8114FCC030" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA79185", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://supportportal.juniper.net/JSA79185", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json index d4ce00badaf..f0a47d0f7f7 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30390.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30390", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:38.540", - "lastModified": "2024-11-21T09:11:49.743", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:36:12.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,234 @@ "value": "CWE-307" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-307" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.4", + "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + } + ] + } + ] } ], "references": [ { "url": "http://supportportal.juniper.net/JSA79183", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "http://supportportal.juniper.net/JSA79183", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json index ec8c42cd776..c8cbbeab724 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30397.json @@ -2,13 +2,13 @@ "id": "CVE-2024-30397", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:39.267", - "lastModified": "2024-11-21T09:11:50.447", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:36:00.690", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the the\u00a0Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).\n\nThe pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail.\n\nThis CPU utilization of pkid can be checked using this command: \n\u00a0 root@srx> show system processes extensive | match pkid\n\u00a0 xxxxx \u2003root \u2003103\u2003 0 \u2003846M \u2003136M \u2003CPU1 \u20031\u00a0569:00 100.00% pkid\n\nThis issue affects:\nJuniper Networks Junos OS\n * All\u00a0versions prior to 20.4R3-S10;\n * 21.2 versions prior to 21.2R3-S7;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to\u00a022.2R3-S3;\n * 22.3 versions prior to\u00a022.3R3-S1;\n * 22.4 versions prior to\u00a022.4R3;\n * 23.2 versions prior to\u00a023.2R1-S2, 23.2R2." + "value": "An Improper Check for Unusual or Exceptional Conditions vulnerability in the the\u00a0Public Key Infrastructure daemon (pkid) of Juniper Networks Junos OS allows an unauthenticated networked attacker to cause Denial of Service (DoS).\n\nThe pkid is responsible for the certificate verification. Upon a failed verification, the pkid uses all CPU resources and becomes unresponsive to future verification attempts. This means that all subsequent VPN negotiations depending on certificate verification will fail.\n\nThis CPU utilization of pkid can be checked using this command: \n\u00a0 root@srx> show system processes extensive | match pkid\n\u00a0 xxxxx ?root ?103? 0 ?846M ?136M ?CPU1 ?1\u00a0569:00 100.00% pkid\n\nThis issue affects:\nJuniper Networks Junos OS\n * All\u00a0versions prior to 20.4R3-S10;\n * 21.2 versions prior to 21.2R3-S7;\n * 21.4 versions prior to 21.4R3-S5;\n * 22.1 versions prior to 22.1R3-S4;\n * 22.2 versions prior to\u00a022.2R3-S3;\n * 22.3 versions prior to\u00a022.3R3-S1;\n * 22.4 versions prior to\u00a022.4R3;\n * 23.2 versions prior to\u00a023.2R1-S2, 23.2R2." }, { "lang": "es", @@ -93,24 +93,469 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*", + "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79179", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79179", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json index c759b484656..090ff62829f 100644 --- a/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json +++ b/CVE-2024/CVE-2024-303xx/CVE-2024-30398.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30398", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:39.497", - "lastModified": "2024-11-21T09:11:50.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:35:49.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,410 @@ "value": "CWE-119" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "C470FB4E-A927-4AF3-ACB0-AD1E264218B7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "DE69E9E3-00FC-41BF-9109-617668CF9A0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "8BCDE58C-80CC-4C5A-9667-8A4468D8D76C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:juniper:srx4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56BA6B86-D3F4-4496-AE46-AC513C6560FA" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79176", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79176", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json index 38153db5945..114d4600052 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30402.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30402", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:39.930", - "lastModified": "2024-11-21T09:11:50.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:35:36.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -80,6 +80,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -93,24 +113,730 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "20.4", + "matchCriteriaId": "E3A96966-5060-4139-A124-D4E2C879FD6C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:-:*:*:*:*:*:*", + "matchCriteriaId": "3D361B23-A3C2-444B-BEB8-E231DA950567" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "20DDC6B7-BFC4-4F0B-8E68-442C23765BF2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "037BA01C-3F5C-4503-A633-71765E9EF774" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "C54B047C-4B38-40C0-9855-067DCF7E48BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "38984199-E332-4A9C-A4C0-78083D052E15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "AA6526FB-2941-4D18-9B2E-472AD5A62A53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "09876787-A40A-4340-9C12-8628C325353B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "41615104-C17E-44DA-AB0D-6E2053BD4EF4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1981DE38-36B5-469D-917E-92717EE3ED53" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "AFA68ACD-AAE5-4577-B734-23AAF77BC85A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "65948ABC-22BB-46D5-8545-0806EDB4B86E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "283E41CB-9A90-4521-96DC-F31AA592CFD8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "14EEA504-CBC5-4F6F-889A-D505EC4BB5B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s7:*:*:*:*:*:*", + "matchCriteriaId": "977DEF80-0DB5-4828-97AC-09BB3111D585" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s8:*:*:*:*:*:*", + "matchCriteriaId": "C445622E-8E57-4990-A71A-E1993BFCB91A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:20.4:r3-s9:*:*:*:*:*:*", + "matchCriteriaId": "0CED6FFE-1854-4BB0-8DB5-D2D756E68CAC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:-:*:*:*:*:*:*", + "matchCriteriaId": "216E7DDE-453D-481F-92E2-9F8466CDDA3F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "A52AF794-B36B-43A6-82E9-628658624B0A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "3998DC76-F72F-4452-9150-652140B113EB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "36ED4552-2420-45F9-B6E4-6DA2B2B12870" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "C28A14E7-7EA0-4757-9764-E39A27CFDFA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "4A43752D-A4AF-4B4E-B95B-192E42883A5B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "42986538-E9D0-4C2E-B1C4-A763A4EE451B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "DE22CA01-EA7E-4EE5-B59F-EE100688C1DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "E596ABD9-6ECD-48DC-B770-87B7E62EA345" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "71745D02-D226-44DC-91AD-678C85F5E6FC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "39E44B09-7310-428C-8144-AE9DB0484D1F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "53938295-8999-4316-9DED-88E24D037852" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s5:*:*:*:*:*:*", + "matchCriteriaId": "2307BF56-640F-49A8-B060-6ACB0F653A61" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.2:r3-s6:*:*:*:*:*:*", + "matchCriteriaId": "737DDF96-7B1D-44E2-AD0F-E2F50858B2A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "79ED3CE8-CC57-43AB-9A26-BBC87816062D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "4310D2D9-A8A6-48F8-9384-0A0692A1E1C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "9962B01C-C57C-4359-9532-676AB81CE8B0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "62178549-B679-4902-BFDB-2993803B7FCE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "9AD697DF-9738-4276-94ED-7B9380CD09F5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "09FF5818-0803-4646-A386-D7C645EE58A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "2229FA59-EB24-49A2-85CE-F529A8DE6BA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "0CB280D8-C5D8-4B51-A879-496ACCDE4538" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "5F3F54F1-75B3-400D-A735-2C27C8CEBE79" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "476A49E7-37E9-40F9-BF2D-9BBFFAA1DFFC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "0A5B196A-2AF1-4AE5-9148-A75A572807BC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "3B457616-2D91-4913-9A7D-038BBF8F1F66" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "9D157211-535E-4B2D-B2FE-F697FAFDF65C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "3F96EBE9-2532-4E35-ABA5-CA68830476A4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "B4D936AE-FD74-4823-A824-2D9F24C25BFB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "E117E493-F4E1-4568-88E3-F243C74A2662" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "01E3E308-FD9C-4686-8C35-8472A0E99F0D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "3683A8F5-EE0E-4936-A005-DF7F6B75DED3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "1B615DBA-8C53-41D4-B264-D3EED8578471" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "B3124DD0-9E42-4896-9060-CB7DD07FC342" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "44F6FD6C-03AF-4D2C-B411-A753DE12A2DA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "D49FFB60-BA71-4902-9404-E67162919ADC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "EFF72FCA-C440-4D43-9BDB-F712DB413717" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "06156CD6-09D3-4A05-9C5E-BC64A70640F9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "E949B21B-AD62-4022-9088-06313277479E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "8D862E6F-0D01-4B25-8340-888C30F75A2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "2F28F73E-8563-41B9-A313-BBAAD5B57A67" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "E37D4694-C80B-475E-AB5B-BB431F59C5E1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "5EC0D2D2-4922-4675-8A2C-57A08D7BE334" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "9EC91F9D-DEDA-46B4-A39F-59A2CDB86C2E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "591AA3E6-62A2-4A1A-A04C-E808F71D8B6E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "786F993E-32CB-492A-A7CC-A7E4F48EA8B9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "60CEA89D-BAC4-41CD-A1D1-AA5EDDEBD54A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "CEB98E3F-B0A9-488F-ACFC-56B9485E7C9E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "19519212-51DD-4448-B115-8A20A40192CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "5CC9909E-AE9F-414D-99B1-83AA04D5297B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "FDE9E767-4713-4EA2-8D00-1382975A4A15" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "59DDA54E-6845-47EB-AE3C-5EC6BD33DFA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "574730B0-56C8-4A03-867B-1737148ED9B1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "20EBC676-1B26-4A71-8326-0F892124290A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "FB4C0FBF-8813-44E5-B71A-22CBAA603E2F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "1379EF30-AF04-4F98-8328-52A631F24737" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "28E42A41-7965-456B-B0AF-9D3229CE4D4C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CB1A77D6-D3AD-481B-979C-8F778530B175" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "3A064B6B-A99B-4D8D-A62D-B00C7870BC30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "40813417-A938-4F74-A419-8C5188A35486" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "7FC1BA1A-DF0E-4B15-86BA-24C60E546732" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "EBB967BF-3495-476D-839A-9DBFCBE69F91" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "1A78CC80-E8B1-4CDA-BB35-A61833657FA7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "4B3B2FE1-C228-46BE-AC76-70C2687050AE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "F1B16FF0-900F-4AEE-B670-A537139F6909" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:*:*:*:*:*:*:*:*", + "versionEndExcluding": "21.4", + "matchCriteriaId": "A51696D6-8503-4CBD-AD19-861E5BE94ED4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:-:*:*:*:*:*:*", + "matchCriteriaId": "2E907193-075E-45BC-9257-9607DB790D71" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "8B73A41D-3FF5-4E53-83FF-74DF58E0D6C3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "CEDF46A8-FC3A-4779-B695-2CA11D045AEB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "39809219-9F87-4583-9DAD-9415DD320B36" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "DB299492-A919-4EBA-A62A-B3CF02FC0A95" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "74ED0939-D5F8-4334-9838-40F29DE3597F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "C6937069-8C19-4B01-8415-ED7E9EAE2CE2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3:*:*:*:*:*:*", + "matchCriteriaId": "97DB6DD5-F5DD-4AE1-AF2F-8DB9E18FF882" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "21DF05B8-EF7E-422F-8831-06904160714C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "492FCE45-68A1-4378-85D4-C4034FE0D836" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "522114CC-1505-4205-B4B8-797DE1BD833B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:21.4:r3-s4:*:*:*:*:*:*", + "matchCriteriaId": "C9D664AB-0FA7-49C7-B6E1-69C77652FBEF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:-:*:*:*:*:*:*", + "matchCriteriaId": "C16434C0-21A7-4CE5-92E1-7D60A35EF5D1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1:*:*:*:*:*:*", + "matchCriteriaId": "750FE748-82E7-4419-A061-2DEA26E35309" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "236E23E5-8B04-4081-9D97-7300DF284000" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "5FC96EA7-90A7-4838-B95D-60DBC88C7BC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2:*:*:*:*:*:*", + "matchCriteriaId": "97541867-C52F-40BB-9AAE-7E87ED23D789" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "85CF6664-E35A-4E9B-95C0-CDC91F7F331A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3:*:*:*:*:*:*", + "matchCriteriaId": "E048A05D-882F-4B1C-BA32-3BBA3FEA31A3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "47E8D51D-1424-4B07-B036-E3E195F21AC2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "6F3C82ED-5728-406F-ACF6-D7411B0AB6C0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.1:r3-s3:*:*:*:*:*:*", + "matchCriteriaId": "1475A58F-1515-4492-B5A3-BE40C30E5B14" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:-:*:*:*:*:*:*", + "matchCriteriaId": "A3CA3365-F9AF-40DF-8700-30AD4BC58E27" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "D77A072D-350A-42F2-8324-7D3AC1711BF9" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "83AE395C-A651-4568-88E3-3600544BF799" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "C7FEFD0A-A969-4F53-8668-1231FD675D6F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2:*:*:*:*:*:*", + "matchCriteriaId": "B3BE1FD4-DAD9-4357-A2E9-20E5826B0D5C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "81CC3480-4B65-4588-8D46-FA80A8F6D143" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "F7E76F5F-DB37-4B7F-9247-3CEB4EBD7696" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3:*:*:*:*:*:*", + "matchCriteriaId": "C63DBEE5-B0C2-498F-A672-B6596C89B0A2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s1:*:*:*:*:*:*", + "matchCriteriaId": "9370C46D-3AA1-4562-B67F-DF6EA10F209B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.2:r3-s2:*:*:*:*:*:*", + "matchCriteriaId": "1FD8C240-A7FE-4FD5-ADCC-289C1BC461BF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:-:*:*:*:*:*:*", + "matchCriteriaId": "BE2EF84D-55A9-41DC-A324-69E1DC426D0B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1:*:*:*:*:*:*", + "matchCriteriaId": "433631CA-3AC4-4D66-9B46-AEA4209347F1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "6E4CD8AD-277A-4FC5-A102-3E151060C216" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "4BC09BAC-83E7-48CE-B571-ED49277B2987" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2:*:*:*:*:*:*", + "matchCriteriaId": "FA4481D2-F693-48A5-8DBC-E86430987A25" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "136CA584-2475-4A14-9771-F367180201D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "4546776C-A657-42E3-9A36-47F9F59A88AD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.3:r3:*:*:*:*:*:*", + "matchCriteriaId": "156DD8ED-CE6E-48C0-9E67-16B04767D62E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:-:*:*:*:*:*:*", + "matchCriteriaId": "0A33C425-921F-4795-B834-608C8F1597E0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1:*:*:*:*:*:*", + "matchCriteriaId": "93887799-F62C-4A4A-BCF5-004D0B4D4154" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "62C473D2-2612-4480-82D8-8A24D0687BBD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "7FB4C5CA-A709-4B13-A9E0-372098A72AD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2:*:*:*:*:*:*", + "matchCriteriaId": "04CE952D-E3C1-4B34-9E65-EC52BFE887AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s1:*:*:*:*:*:*", + "matchCriteriaId": "8AE9D1A7-4721-4E1D-B965-FDC38126B1DD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:22.4:r2-s2:*:*:*:*:*:*", + "matchCriteriaId": "A8643AA3-29EF-48A7-B033-CB60988E214B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s1:*:*:*:*:*:*", + "matchCriteriaId": "558D234D-BC50-415F-86D6-8E19D6C3ACE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1-s2:*:*:*:*:*:*", + "matchCriteriaId": "33F4EEEE-77E9-4973-A770-99E7BA2F05F5" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79180", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79180", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json index d04ae62ac74..54e25a95a53 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30403.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30403", "sourceIdentifier": "sirt@juniper.net", "published": "2024-04-12T16:15:40.123", - "lastModified": "2024-11-21T09:11:51.013", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T20:35:23.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -93,24 +93,68 @@ "value": "CWE-476" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:-:*:*:*:*:*:*", + "matchCriteriaId": "6DEAA7FD-385F-4221-907E-65ABC16BE4BE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:juniper:junos_os_evolved:23.2:r1:*:*:*:*:*:*", + "matchCriteriaId": "DDEC008A-3137-48D1-8ABC-6DB0EFC40E50" + } + ] + } + ] } ], "references": [ { "url": "https://supportportal.juniper.net/JSA79181", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "sirt@juniper.net" + "source": "sirt@juniper.net", + "tags": [ + "Issue Tracking" + ] }, { "url": "https://supportportal.juniper.net/JSA79181", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:L", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3457.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3457.json index 24d21dc3854..9b83a4dd6e6 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3457.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3457.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3457", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T18:15:08.623", - "lastModified": "2024-11-21T09:29:38.343", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T19:06:55.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-nconfig_ISCGroupNoCache.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259713", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259713", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312184", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/flyyue2001/cve/blob/main/NS-ASG-sql-nconfig_ISCGroupNoCache.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259713", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259713", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312184", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3458.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3458.json index 5089e947562..1b38d0117c9 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3458.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3458.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3458", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-08T18:15:08.857", - "lastModified": "2024-11-21T09:29:38.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-06T19:06:02.007", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:netentsec:application_security_gateway:6.3:*:*:*:*:*:*:*", + "matchCriteriaId": "7A708923-EF5F-4F53-86F3-DF0366E6FB58" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-add_ikev2.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259714", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259714", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312186", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/hundanchen69/cve/blob/main/NS-ASG-sql-add_ikev2.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259714", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.259714", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.312186", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json index b3e0cb6ff3d..b82672e9327 100644 --- a/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json +++ b/CVE-2024/CVE-2024-392xx/CVE-2024-39272.json @@ -2,7 +2,7 @@ "id": "CVE-2024-39272", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-02-06T17:15:18.647", - "lastModified": "2025-02-06T17:15:18.647", + "lastModified": "2025-02-06T19:15:19.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2110", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2110", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json index 38ab139789e..a9a77a3d432 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43779.json @@ -2,7 +2,7 @@ "id": "CVE-2024-43779", "sourceIdentifier": "talos-cna@cisco.com", "published": "2025-02-06T17:15:19.160", - "lastModified": "2025-02-06T17:15:19.160", + "lastModified": "2025-02-06T19:15:19.447", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", @@ -38,7 +38,7 @@ "weaknesses": [ { "source": "talos-cna@cisco.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -51,6 +51,10 @@ { "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2112", "source": "talos-cna@cisco.com" + }, + { + "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2112", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json new file mode 100644 index 00000000000..7163956bb0f --- /dev/null +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47256.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47256", + "sourceIdentifier": "product-security@axis.com", + "published": "2025-02-06T20:15:39.533", + "lastModified": "2025-02-06T20:15:39.533", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Successful exploitation of this vulnerability could allow an attacker (who needs to have Admin access privileges) to read hardcoded AES passphrase, which may be used for decryption of certain data within backup files of 2N Access Commander version 1.14 and older." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://www.2n.com/en-GB/download/cve_2024_47256_acom_3_3_v1pdf", + "source": "product-security@axis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json b/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json new file mode 100644 index 00000000000..9d0d9c6e771 --- /dev/null +++ b/CVE-2024/CVE-2024-472xx/CVE-2024-47258.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-47258", + "sourceIdentifier": "product-security@axis.com", + "published": "2025-02-06T20:15:39.643", + "lastModified": "2025-02-06T20:15:39.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "2N Access Commander version 2.1 and prior is vulnerable in default settings to Man In The Middle attack due to not verifying certificates of 2N edge devices." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "product-security@axis.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-300" + } + ] + } + ], + "references": [ + { + "url": "https://www.2n.com/en-GB/download/cve_2024_47258_acom_3_3_v1pdf", + "source": "product-security@axis.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json new file mode 100644 index 00000000000..f633493b902 --- /dev/null +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52892.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-52892", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-02-06T20:15:39.763", + "lastModified": "2025-02-06T20:15:39.763", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Jazz for Service Management 1.1.3 through 1.1.3.23 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7182508", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57426.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57426.json new file mode 100644 index 00000000000..84e52d6053f --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57426.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57426", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T20:15:39.923", + "lastModified": "2025-02-06T20:15:39.923", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "NetMod VPN Client 5.3.1 is vulnerable to DLL injection, allowing an attacker to execute arbitrary code by placing a malicious DLL in a directory where the application loads dependencies. This vulnerability arises due to the improper validation of dynamically loaded libraries." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/iamsinghmanish/My-CVEs/tree/main/CVE-2024-57426", + "source": "cve@mitre.org" + }, + { + "url": "https://sourceforge.net/projects/netmodhttp/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json new file mode 100644 index 00000000000..4a8c021fb61 --- /dev/null +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57523.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-57523", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T19:15:19.547", + "lastModified": "2025-02-06T20:15:40.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross Site Request Forgery (CSRF) in Users.php in SourceCodester Packers and Movers Management System 1.0 allows attackers to create unauthorized admin accounts via crafted requests sent to an authenticated admin user." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "http://sourcecodester.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HackWidMaddy/CVE-2024-57523.", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/HackWidMaddy/CVE-2024-57523.", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json new file mode 100644 index 00000000000..e40a62bf3a3 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57668.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57668", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T19:15:19.643", + "lastModified": "2025-02-06T19:15:19.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Code-projects Shopping Portal v1.0, the insert-product.php page has an arbitrary file upload vulnerability." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://code-projects.org/shopping-portal-using-php-source-code/", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/passevery/vul/issues/1", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json new file mode 100644 index 00000000000..ed2c47af3e9 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57672.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57672", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T20:15:40.227", + "lastModified": "2025-02-06T20:15:40.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module, Topologylnstance module, Routing module." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/floodlight/floodlight/issues/871", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json b/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json new file mode 100644 index 00000000000..24b9dc94e72 --- /dev/null +++ b/CVE-2024/CVE-2024-576xx/CVE-2024-57673.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57673", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T20:15:40.347", + "lastModified": "2025-02-06T20:15:40.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in floodlight v1.2 allows a local attacker to cause a denial of service via the Topology Manager module and Linkdiscovery module" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/floodlight/floodlight/issues/872", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0510.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0510.json index 3cd01d17b1b..80384f88bd7 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0510.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0510.json @@ -2,28 +2,102 @@ "id": "CVE-2025-0510", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.550", - "lastModified": "2025-02-04T14:15:31.550", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:27:13.273", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Thunderbird displayed an incorrect sender address if the From field of an email used the invalid group name syntax that is described in CVE-2024-49040. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Thunderbird mostraba una direcci\u00f3n de remitente incorrecta si el campo De de un correo electr\u00f3nico utilizaba la sintaxis de nombre de grupo no v\u00e1lida que se describe en CVE-2024-49040. Esta vulnerabilidad afecta a Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940570", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json index c27dac1d4ad..d2a0e6dccf1 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0725.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0725", "sourceIdentifier": "2499f714-1537-4658-8207-48ae4bb9eae9", "published": "2025-02-05T10:15:22.980", - "lastModified": "2025-02-06T11:15:09.683", + "lastModified": "2025-02-06T19:15:19.733", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,6 +59,10 @@ { "url": "http://www.openwall.com/lists/oss-security/2025/02/06/2", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2025/02/06/4", + "source": "af854a3a-2127-422b-91ae-364da2661108" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json index dbf7026787b..5fb817f3541 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1009.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1009", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.653", - "lastModified": "2025-02-05T19:15:44.887", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:28:52.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.20.0", + "matchCriteriaId": "9D052B41-C615-4037-B188-59F57CDEFBF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.1.0", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B58365E6-5BBF-44CA-97A6-502D35489964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936613", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-08/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json index e31f93f4cc1..986fd523787 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1010.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1010", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.767", - "lastModified": "2025-02-05T19:15:45.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:30:13.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,93 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.20.0", + "matchCriteriaId": "9D052B41-C615-4037-B188-59F57CDEFBF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.1.0", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B58365E6-5BBF-44CA-97A6-502D35489964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936982", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-08/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json index d9883c3fb9a..5c954f105ce 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1011.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1011", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:31.887", - "lastModified": "2025-02-05T19:15:45.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:31:38.610", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,26 +81,78 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "F8E84F18-A04E-4E18-8AB6-16EB629F7C84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1936454", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1012.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1012.json index 2056932c67a..fa25517a8af 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1012.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1012.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1012", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.000", - "lastModified": "2025-02-05T16:15:41.677", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:33:46.407", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,30 +81,92 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.20.0", + "matchCriteriaId": "9D052B41-C615-4037-B188-59F57CDEFBF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.1.0", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B58365E6-5BBF-44CA-97A6-502D35489964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "F8E84F18-A04E-4E18-8AB6-16EB629F7C84" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1939710", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-08/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1014.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1014.json index 41000ca3802..0943163a8a1 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1014.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1014.json @@ -2,36 +2,128 @@ "id": "CVE-2025-1014", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.237", - "lastModified": "2025-02-04T14:15:32.237", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:35:57.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "La longitud del certificado no se comprobaba correctamente al a\u00f1adirlo a un almac\u00e9n de certificados. En la pr\u00e1ctica, solo se procesaban los datos de confianza. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-295" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940804", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json index f2e15aa66f3..415947c5123 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1015.json @@ -2,24 +2,88 @@ "id": "CVE-2025-1015", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.363", - "lastModified": "2025-02-04T14:15:32.363", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:36:43.867", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the \u201cOther\u201d field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7." + }, + { + "lang": "es", + "value": "Los campos URI de la libreta de direcciones de Thunderbird conten\u00edan enlaces no desinfectada. Un atacante podr\u00eda utilizar esto para crear y exportar una libreta de direcciones que contuviera un payload malicioso en un campo. Por ejemplo, en el campo \u201cOtros\u201d de la secci\u00f3n de mensajer\u00eda instant\u00e1nea. Si otro usuario importaba la libreta de direcciones, al hacer clic en el enlace se pod\u00eda abrir una p\u00e1gina web dentro de Thunderbird y esa p\u00e1gina pod\u00eda ejecutar JavaScript (sin privilegios). Esta vulnerabilidad afecta a Thunderbird < 128.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1939458", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1016.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1016.json index 4b80516a88d..75522a79deb 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1016.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1016.json @@ -2,40 +2,142 @@ "id": "CVE-2025-1016", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.467", - "lastModified": "2025-02-04T14:15:32.467", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:38:42.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19 y Thunderbird 128.6. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "115.20.0", + "matchCriteriaId": "9D052B41-C615-4037-B188-59F57CDEFBF8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.1.0", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B58365E6-5BBF-44CA-97A6-502D35489964" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1936601%2C1936844%2C1937694%2C1938469%2C1939583%2C1940994", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-08/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1017.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1017.json index 9f4bc5d47f5..350bced1a87 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1017.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1017.json @@ -2,36 +2,128 @@ "id": "CVE-2025-1017", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.600", - "lastModified": "2025-02-04T14:15:32.600", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:39:03.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Se han detectado errores de seguridad de memoria en Firefox 134, Thunderbird 134, Firefox ESR 128.6 y Thunderbird 128.6. Algunos de estos errores mostraban evidencia de corrupci\u00f3n de memoria y suponemos que, con el suficiente esfuerzo, algunos de ellos podr\u00edan haberse aprovechado para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "B1B11C09-3033-44F5-ACC7-591196075CB1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*", + "versionStartIncluding": "128.0.1", + "versionEndExcluding": "128.7.0", + "matchCriteriaId": "0504330C-A82A-4E1E-9774-38CCB3DF8D92" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-09/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-10/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json index e6e0ad8d159..14c855c5da5 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1018.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1018", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.727", - "lastModified": "2025-02-05T17:15:22.293", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:40:01.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1910818", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json index a82577f35c8..ce9b4769392 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1019.json @@ -2,8 +2,8 @@ "id": "CVE-2025-1019", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.850", - "lastModified": "2025-02-05T19:15:45.343", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-06T19:40:29.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-1021" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,18 +81,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1940162", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Permissions Required" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-10xx/CVE-2025-1020.json b/CVE-2025/CVE-2025-10xx/CVE-2025-1020.json index d629286102a..11a984a1e19 100644 --- a/CVE-2025/CVE-2025-10xx/CVE-2025-1020.json +++ b/CVE-2025/CVE-2025-10xx/CVE-2025-1020.json @@ -2,28 +2,101 @@ "id": "CVE-2025-1020", "sourceIdentifier": "security@mozilla.org", "published": "2025-02-04T14:15:32.953", - "lastModified": "2025-02-04T14:15:32.953", - "vulnStatus": "Received", + "lastModified": "2025-02-06T19:40:45.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135 and Thunderbird < 135." + }, + { + "lang": "es", + "value": "Errores de seguridad de memoria presentes en Firefox 134 y Thunderbird 134. Algunos de estos errores mostraron evidencia de corrupci\u00f3n de memoria y suponemos que con suficiente esfuerzo algunos de ellos podr\u00edan haber sido explotados para ejecutar c\u00f3digo arbitrario. Esta vulnerabilidad afecta a Firefox < 135 y Thunderbird < 135." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*", + "versionEndExcluding": "135.0", + "matchCriteriaId": "C08017D5-BBC7-4E01-92D2-CE2E2ED9453A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*", + "versionStartIncluding": "131.0", + "versionEndExcluding": "135.0", + "matchCriteriaId": "B5DC3260-2056-4C30-BCBA-AD45537FF0F5" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1939063%2C1942169", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Broken Link" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-07/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mozilla.org/security/advisories/mfsa2025-11/", - "source": "security@mozilla.org" + "source": "security@mozilla.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22936.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22936.json new file mode 100644 index 00000000000..5eb1c0fdfb0 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22936.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2025-22936", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T20:15:40.460", + "lastModified": "2025-02-06T20:15:40.460", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in Smartcom Bulgaria AD Smartcom Ralink CPE/WiFi router SAM-4G1G-TT-W-VC, SAM-4F1F-TT-W-A1 allows a remote attacker to obtain sensitive information via the Weak default WiFi password generation algorithm in WiFi routers." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://smartcom.com", + "source": "cve@mitre.org" + }, + { + "url": "https://sec.stanev.org/advisories/Smartcom_default_WPA_password.txt", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json new file mode 100644 index 00000000000..13747d39e70 --- /dev/null +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22992.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-22992", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T19:15:19.970", + "lastModified": "2025-02-06T19:15:19.970", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A SQL Injection vulnerability exists in the /feed/insert.json endpoint of the Emoncms project >= 11.6.9. The vulnerability is caused by improper handling of user-supplied input in the data query parameter, allowing attackers to execute arbitrary SQL commands under specific conditions." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/emoncms/emoncms/issues/1916", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json new file mode 100644 index 00000000000..69b1f3d1f4d --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23093.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2025-23093", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-06T20:15:40.587", + "lastModified": "2025-02-06T20:15:40.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Platform component of Mitel OpenScape 4000 and OpenScape 4000 Manager through V10 R1.54.1 and V11 through R0.22.1 could allow an authenticated attacker to conduct a privilege escalation attack due to the execution of a resource with unnecessary privileges. A successful exploit could allow an attacker to execute arbitrary commands with elevated privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-misa-2025-0001", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json new file mode 100644 index 00000000000..af56b1835c0 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24786.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2025-24786", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-06T19:15:20.067", + "lastModified": "2025-02-06T20:15:40.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WhoDB is an open source database management tool. While the application only displays Sqlite3 databases present in the directory `/db`, there is no path traversal prevention in place. This allows an unauthenticated attacker to open any Sqlite3 database present on the host machine that the application is running on. Affected versions of WhoDB allow users to connect to Sqlite3 databases. By default, the databases must be present in `/db/` (or alternatively `./tmp/` if development mode is enabled). If no databases are present in the default directory, the UI indicates that the user is unable to open any databases. The database file is an user-controlled value. This value is used in `.Join()` with the default directory, in order to get the full path of the database file to open. No checks are performed whether the database file that is eventually opened actually resides in the default directory `/db`. This allows an attacker to use path traversal (`../../`) in order to open any Sqlite3 database present on the system. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.8 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-35" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L14-L20", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/clidey/whodb/blob/ba6eb81d0ca40baead74bca58b2567166999d6a6/core/src/plugins/sqlite3/db.go#L26", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-9r4c-jwx3-3j76", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-9r4c-jwx3-3j76", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json new file mode 100644 index 00000000000..0105eb74fcc --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24787.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-24787", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-02-06T19:15:20.213", + "lastModified": "2025-02-06T20:15:40.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WhoDB is an open source database management tool. In affected versions the application is vulnerable to parameter injection in database connection strings, which allows an attacker to read local files on the machine the application is running on. The application uses string concatenation to build database connection URIs which are then passed to corresponding libraries responsible for setting up the database connections. This string concatenation is done unsafely and without escaping or encoding the user input. This allows an user, in many cases, to inject arbitrary parameters into the URI string. These parameters can be potentially dangerous depending on the libraries used. One of these dangerous parameters is `allowAllFiles` in the library `github.com/go-sql-driver/mysql`. Should this be set to `true`, the library enables running the `LOAD DATA LOCAL INFILE` query on any file on the host machine (in this case, the machine that WhoDB is running on). By injecting `&allowAllFiles=true` into the connection URI and connecting to any MySQL server (such as an attacker-controlled one), the attacker is able to read local files. This issue has been addressed in version 0.45.0 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-943" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/go-sql-driver/mysql/blob/7403860363ca112af503b4612568c3096fecb466/infile.go#L128", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/clidey/whodb/security/advisories/GHSA-c7w4-9wv8-7x7c", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json index 34de2f75fe5..a4d36dbb45b 100644 --- a/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json +++ b/CVE-2025/CVE-2025-248xx/CVE-2025-24860.json @@ -2,20 +2,47 @@ "id": "CVE-2025-24860", "sourceIdentifier": "security@apache.org", "published": "2025-02-04T11:15:09.107", - "lastModified": "2025-02-04T11:15:09.107", - "vulnStatus": "Received", + "lastModified": "2025-02-06T20:15:41.030", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incorrect Authorization vulnerability in Apache Cassandra allowing users to access a datacenter or IP/CIDR groups they should not be able to when using CassandraNetworkAuthorizer or CassandraCIDRAuthorizer.\n\nUsers with restricted data center access can update their own permissions via data control language (DCL) statements on affected versions.\n\n\n\n\nThis issue affects Apache Cassandra: from 4.0.0 through 4.0.15 and from 4.1.0 through 4.1.7 for CassandraNetworkAuthorizer, and from 5.0.0 through 5.0.2 for both CassandraNetworkAuthorizer and CassandraCIDRAuthorizer.\n\n\n\n\nOperators using\u00a0CassandraNetworkAuthorizer or\u00a0CassandraCIDRAuthorizer on affected versions should review data access rules for potential breaches. Users are recommended to upgrade to versions 4.0.16, 4.1.8, 5.0.3, which fixes the issue." + }, + { + "lang": "es", + "value": "Vulnerabilidad de autorizaci\u00f3n incorrecta en Apache Cassandra que permite a los usuarios acceder a un centro de datos o grupos de IP/CIDR a los que no deber\u00edan poder acceder cuando utilizan CassandraNetworkAuthorizer o CassandraCIDRAuthorizer. Los usuarios con acceso restringido al centro de datos pueden actualizar sus propios permisos a trav\u00e9s de instrucciones de lenguaje de control de datos (DCL) en las versiones afectadas. Este problema afecta a Apache Cassandra: de 4.0.0 a 4.0.15 y de 4.1.0 a 4.1.7 para CassandraNetworkAuthorizer, y de 5.0.0 a 5.0.2 para CassandraNetworkAuthorizer y CassandraCIDRAuthorizer. Los operadores que utilicen CassandraNetworkAuthorizer o CassandraCIDRAuthorizer en las versiones afectadas deben revisar las reglas de acceso a los datos para detectar posibles infracciones. Se recomienda a los usuarios que actualicen a las versiones 4.0.16, 4.1.8, 5.0.3, que solucionan el problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json index 47a0992397e..5c54051f6e9 100644 --- a/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json +++ b/CVE-2025/CVE-2025-250xx/CVE-2025-25064.json @@ -2,13 +2,13 @@ "id": "CVE-2025-25064", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-03T20:15:37.257", - "lastModified": "2025-02-04T16:15:43.670", + "lastModified": "2025-02-06T20:15:41.190", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "SQL injection vulnerability in the ZimbraSyncService SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4." + "value": "SQL injection vulnerability in the ZimbraSync Service SOAP endpoint in Zimbra Collaboration 10.0.x before 10.0.12 and 10.1.x before 10.1.4 due to insufficient sanitization of a user-supplied parameter. Authenticated attackers can exploit this vulnerability by manipulating a specific parameter in the request, allowing them to inject arbitrary SQL queries that could retrieve email metadata." }, { "lang": "es", diff --git a/README.md b/README.md index 784d0da4c36..be50f1372e1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-06T19:00:22.645610+00:00 +2025-02-06T21:00:32.189105+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-06T18:59:06.710000+00:00 +2025-02-06T20:59:58.567000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,59 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -280271 +280286 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `15` -- [CVE-2022-40490](CVE-2022/CVE-2022-404xx/CVE-2022-40490.json) (`2025-02-06T17:15:13.640`) -- [CVE-2022-40916](CVE-2022/CVE-2022-409xx/CVE-2022-40916.json) (`2025-02-06T17:15:13.757`) -- [CVE-2024-13614](CVE-2024/CVE-2024-136xx/CVE-2024-13614.json) (`2025-02-06T17:15:18.080`) -- [CVE-2024-36553](CVE-2024/CVE-2024-365xx/CVE-2024-36553.json) (`2025-02-06T18:15:31.100`) -- [CVE-2024-36554](CVE-2024/CVE-2024-365xx/CVE-2024-36554.json) (`2025-02-06T18:15:31.273`) -- [CVE-2024-36555](CVE-2024/CVE-2024-365xx/CVE-2024-36555.json) (`2025-02-06T18:15:31.423`) -- [CVE-2024-36556](CVE-2024/CVE-2024-365xx/CVE-2024-36556.json) (`2025-02-06T18:15:31.580`) -- [CVE-2024-36557](CVE-2024/CVE-2024-365xx/CVE-2024-36557.json) (`2025-02-06T18:15:31.750`) -- [CVE-2024-36558](CVE-2024/CVE-2024-365xx/CVE-2024-36558.json) (`2025-02-06T18:15:31.903`) -- [CVE-2024-39033](CVE-2024/CVE-2024-390xx/CVE-2024-39033.json) (`2025-02-06T17:15:18.553`) -- [CVE-2024-39272](CVE-2024/CVE-2024-392xx/CVE-2024-39272.json) (`2025-02-06T17:15:18.647`) -- [CVE-2024-43779](CVE-2024/CVE-2024-437xx/CVE-2024-43779.json) (`2025-02-06T17:15:19.160`) -- [CVE-2024-57427](CVE-2024/CVE-2024-574xx/CVE-2024-57427.json) (`2025-02-06T17:15:20.357`) -- [CVE-2024-57428](CVE-2024/CVE-2024-574xx/CVE-2024-57428.json) (`2025-02-06T17:15:20.527`) -- [CVE-2024-57429](CVE-2024/CVE-2024-574xx/CVE-2024-57429.json) (`2025-02-06T17:15:20.627`) -- [CVE-2024-57430](CVE-2024/CVE-2024-574xx/CVE-2024-57430.json) (`2025-02-06T17:15:20.717`) -- [CVE-2024-57599](CVE-2024/CVE-2024-575xx/CVE-2024-57599.json) (`2025-02-06T17:15:20.820`) -- [CVE-2024-57610](CVE-2024/CVE-2024-576xx/CVE-2024-57610.json) (`2025-02-06T18:15:32.133`) -- [CVE-2025-1078](CVE-2025/CVE-2025-10xx/CVE-2025-1078.json) (`2025-02-06T17:15:21.040`) -- [CVE-2025-22866](CVE-2025/CVE-2025-228xx/CVE-2025-22866.json) (`2025-02-06T17:15:21.410`) -- [CVE-2025-22867](CVE-2025/CVE-2025-228xx/CVE-2025-22867.json) (`2025-02-06T18:15:32.543`) -- [CVE-2025-23217](CVE-2025/CVE-2025-232xx/CVE-2025-23217.json) (`2025-02-06T18:15:32.667`) -- [CVE-2025-24981](CVE-2025/CVE-2025-249xx/CVE-2025-24981.json) (`2025-02-06T18:15:32.847`) +- [CVE-2024-13416](CVE-2024/CVE-2024-134xx/CVE-2024-13416.json) (`2025-02-06T19:15:19.220`) +- [CVE-2024-13417](CVE-2024/CVE-2024-134xx/CVE-2024-13417.json) (`2025-02-06T20:15:39.273`) +- [CVE-2024-47256](CVE-2024/CVE-2024-472xx/CVE-2024-47256.json) (`2025-02-06T20:15:39.533`) +- [CVE-2024-47258](CVE-2024/CVE-2024-472xx/CVE-2024-47258.json) (`2025-02-06T20:15:39.643`) +- [CVE-2024-52892](CVE-2024/CVE-2024-528xx/CVE-2024-52892.json) (`2025-02-06T20:15:39.763`) +- [CVE-2024-57426](CVE-2024/CVE-2024-574xx/CVE-2024-57426.json) (`2025-02-06T20:15:39.923`) +- [CVE-2024-57523](CVE-2024/CVE-2024-575xx/CVE-2024-57523.json) (`2025-02-06T19:15:19.547`) +- [CVE-2024-57668](CVE-2024/CVE-2024-576xx/CVE-2024-57668.json) (`2025-02-06T19:15:19.643`) +- [CVE-2024-57672](CVE-2024/CVE-2024-576xx/CVE-2024-57672.json) (`2025-02-06T20:15:40.227`) +- [CVE-2024-57673](CVE-2024/CVE-2024-576xx/CVE-2024-57673.json) (`2025-02-06T20:15:40.347`) +- [CVE-2025-22936](CVE-2025/CVE-2025-229xx/CVE-2025-22936.json) (`2025-02-06T20:15:40.460`) +- [CVE-2025-22992](CVE-2025/CVE-2025-229xx/CVE-2025-22992.json) (`2025-02-06T19:15:19.970`) +- [CVE-2025-23093](CVE-2025/CVE-2025-230xx/CVE-2025-23093.json) (`2025-02-06T20:15:40.587`) +- [CVE-2025-24786](CVE-2025/CVE-2025-247xx/CVE-2025-24786.json) (`2025-02-06T19:15:20.067`) +- [CVE-2025-24787](CVE-2025/CVE-2025-247xx/CVE-2025-24787.json) (`2025-02-06T19:15:20.213`) ### CVEs modified in the last Commit -Recently modified CVEs: `113` +Recently modified CVEs: `70` -- [CVE-2024-34387](CVE-2024/CVE-2024-343xx/CVE-2024-34387.json) (`2025-02-06T18:00:25.190`) -- [CVE-2024-4157](CVE-2024/CVE-2024-41xx/CVE-2024-4157.json) (`2025-02-06T18:36:20.893`) -- [CVE-2024-4159](CVE-2024/CVE-2024-41xx/CVE-2024-4159.json) (`2025-02-06T17:49:55.727`) -- [CVE-2024-4161](CVE-2024/CVE-2024-41xx/CVE-2024-4161.json) (`2025-02-06T17:50:45.147`) -- [CVE-2024-4173](CVE-2024/CVE-2024-41xx/CVE-2024-4173.json) (`2025-02-06T17:53:25.287`) -- [CVE-2024-4536](CVE-2024/CVE-2024-45xx/CVE-2024-4536.json) (`2025-02-06T17:32:48.777`) -- [CVE-2024-4709](CVE-2024/CVE-2024-47xx/CVE-2024-4709.json) (`2025-02-06T18:37:12.683`) -- [CVE-2024-49532](CVE-2024/CVE-2024-495xx/CVE-2024-49532.json) (`2025-02-06T18:28:13.123`) -- [CVE-2024-49533](CVE-2024/CVE-2024-495xx/CVE-2024-49533.json) (`2025-02-06T18:28:01.443`) -- [CVE-2024-49534](CVE-2024/CVE-2024-495xx/CVE-2024-49534.json) (`2025-02-06T18:27:41.457`) -- [CVE-2024-50692](CVE-2024/CVE-2024-506xx/CVE-2024-50692.json) (`2025-02-06T17:15:19.313`) -- [CVE-2024-52012](CVE-2024/CVE-2024-520xx/CVE-2024-52012.json) (`2025-02-06T17:15:19.480`) -- [CVE-2024-57069](CVE-2024/CVE-2024-570xx/CVE-2024-57069.json) (`2025-02-06T17:15:19.647`) -- [CVE-2024-57071](CVE-2024/CVE-2024-570xx/CVE-2024-57071.json) (`2025-02-06T17:15:19.793`) -- [CVE-2024-57080](CVE-2024/CVE-2024-570xx/CVE-2024-57080.json) (`2025-02-06T17:15:19.933`) -- [CVE-2024-57086](CVE-2024/CVE-2024-570xx/CVE-2024-57086.json) (`2025-02-06T17:15:20.073`) -- [CVE-2024-57373](CVE-2024/CVE-2024-573xx/CVE-2024-57373.json) (`2025-02-06T17:15:20.213`) -- [CVE-2024-57968](CVE-2024/CVE-2024-579xx/CVE-2024-57968.json) (`2025-02-06T18:15:32.287`) -- [CVE-2024-6627](CVE-2024/CVE-2024-66xx/CVE-2024-6627.json) (`2025-02-06T17:40:50.280`) -- [CVE-2024-7100](CVE-2024/CVE-2024-71xx/CVE-2024-7100.json) (`2025-02-06T17:45:05.493`) -- [CVE-2024-7595](CVE-2024/CVE-2024-75xx/CVE-2024-7595.json) (`2025-02-06T18:14:41.017`) -- [CVE-2024-7596](CVE-2024/CVE-2024-75xx/CVE-2024-7596.json) (`2025-02-06T18:14:55.137`) -- [CVE-2024-9528](CVE-2024/CVE-2024-95xx/CVE-2024-9528.json) (`2025-02-06T18:35:28.637`) -- [CVE-2025-0994](CVE-2025/CVE-2025-09xx/CVE-2025-0994.json) (`2025-02-06T17:15:20.917`) -- [CVE-2025-25181](CVE-2025/CVE-2025-251xx/CVE-2025-25181.json) (`2025-02-06T18:15:33.030`) +- [CVE-2024-30389](CVE-2024/CVE-2024-303xx/CVE-2024-30389.json) (`2025-02-06T20:36:23.717`) +- [CVE-2024-30390](CVE-2024/CVE-2024-303xx/CVE-2024-30390.json) (`2025-02-06T20:36:12.843`) +- [CVE-2024-30397](CVE-2024/CVE-2024-303xx/CVE-2024-30397.json) (`2025-02-06T20:36:00.690`) +- [CVE-2024-30398](CVE-2024/CVE-2024-303xx/CVE-2024-30398.json) (`2025-02-06T20:35:49.817`) +- [CVE-2024-30402](CVE-2024/CVE-2024-304xx/CVE-2024-30402.json) (`2025-02-06T20:35:36.530`) +- [CVE-2024-30403](CVE-2024/CVE-2024-304xx/CVE-2024-30403.json) (`2025-02-06T20:35:23.557`) +- [CVE-2024-3457](CVE-2024/CVE-2024-34xx/CVE-2024-3457.json) (`2025-02-06T19:06:55.503`) +- [CVE-2024-3458](CVE-2024/CVE-2024-34xx/CVE-2024-3458.json) (`2025-02-06T19:06:02.007`) +- [CVE-2024-39272](CVE-2024/CVE-2024-392xx/CVE-2024-39272.json) (`2025-02-06T19:15:19.357`) +- [CVE-2024-43779](CVE-2024/CVE-2024-437xx/CVE-2024-43779.json) (`2025-02-06T19:15:19.447`) +- [CVE-2025-0510](CVE-2025/CVE-2025-05xx/CVE-2025-0510.json) (`2025-02-06T19:27:13.273`) +- [CVE-2025-0725](CVE-2025/CVE-2025-07xx/CVE-2025-0725.json) (`2025-02-06T19:15:19.733`) +- [CVE-2025-1009](CVE-2025/CVE-2025-10xx/CVE-2025-1009.json) (`2025-02-06T19:28:52.820`) +- [CVE-2025-1010](CVE-2025/CVE-2025-10xx/CVE-2025-1010.json) (`2025-02-06T19:30:13.637`) +- [CVE-2025-1011](CVE-2025/CVE-2025-10xx/CVE-2025-1011.json) (`2025-02-06T19:31:38.610`) +- [CVE-2025-1012](CVE-2025/CVE-2025-10xx/CVE-2025-1012.json) (`2025-02-06T19:33:46.407`) +- [CVE-2025-1014](CVE-2025/CVE-2025-10xx/CVE-2025-1014.json) (`2025-02-06T19:35:57.283`) +- [CVE-2025-1015](CVE-2025/CVE-2025-10xx/CVE-2025-1015.json) (`2025-02-06T19:36:43.867`) +- [CVE-2025-1016](CVE-2025/CVE-2025-10xx/CVE-2025-1016.json) (`2025-02-06T19:38:42.147`) +- [CVE-2025-1017](CVE-2025/CVE-2025-10xx/CVE-2025-1017.json) (`2025-02-06T19:39:03.230`) +- [CVE-2025-1018](CVE-2025/CVE-2025-10xx/CVE-2025-1018.json) (`2025-02-06T19:40:01.263`) +- [CVE-2025-1019](CVE-2025/CVE-2025-10xx/CVE-2025-1019.json) (`2025-02-06T19:40:29.267`) +- [CVE-2025-1020](CVE-2025/CVE-2025-10xx/CVE-2025-1020.json) (`2025-02-06T19:40:45.937`) +- [CVE-2025-24860](CVE-2025/CVE-2025-248xx/CVE-2025-24860.json) (`2025-02-06T20:15:41.030`) +- [CVE-2025-25064](CVE-2025/CVE-2025-250xx/CVE-2025-25064.json) (`2025-02-06T20:15:41.190`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 7555e20d2ef..c8c2b311e24 100644 --- a/_state.csv +++ b/_state.csv @@ -99227,7 +99227,7 @@ CVE-2017-15808,0,0,7685ea470b019d438b093ce93eaa8047e3f143e40cc78b8e175bb921bfbfa CVE-2017-15809,0,0,e5700cec5b356d3a1250621337067cd06c6c926e07568832264205138ce393ef,2024-11-21T03:15:16.400000 CVE-2017-15810,0,0,ff9206a33ec78804bfd4fc01b68d804c80cbad4391f2c4d4e9e5d77072d4bfe7,2024-11-21T03:15:16.530000 CVE-2017-15811,0,0,0eb62b1f57355c802cb565d3f3f02feed177d07e898b1b6e72af3c74d964b240,2024-11-21T03:15:16.660000 -CVE-2017-15812,0,0,fe5519e3117977a80bb5e867d3ebe63e991c24320fd07d93c33fd638c85bb804,2024-11-21T03:15:16.790000 +CVE-2017-15812,0,1,cfa23cdce4e1ee4574b38e0edfb0882e74d7671c550f5015cfd78e2319170a03,2025-02-06T19:03:15.920000 CVE-2017-15813,0,0,289b8cdc711982c185f8c3a4c2460090bcd57f371008307ac69a9d2fa6feff8f,2024-11-21T03:15:16.920000 CVE-2017-15814,0,0,52b1f1949e1ca10527705c8b63fef0f7533a7003c21b8dae96f1d55203b080bb,2024-11-21T03:15:17.013000 CVE-2017-15815,0,0,c5d2931c1aab791bfb56e20ee242045e93c1aa9a17a88a43586e1704c1277291,2024-11-21T03:15:17.110000 @@ -117725,7 +117725,7 @@ CVE-2018-17532,0,0,c9afb14dd1c6d8af962a4d23b419b4686c42cb5e0f0035864c196f5e7c6e8 CVE-2018-17533,0,0,0c940fe821b040c752aaa2211c41c4ecfd8dbfe03a8fcb8db544dee9a58c16ca,2024-11-21T03:54:33.783000 CVE-2018-17534,0,0,3e3fdf7a6e200d4c8f4a722529530c4e463c91cc6443907523bf28e3ffb70783,2024-11-21T03:54:33.980000 CVE-2018-17536,0,0,f92b29073e099fec39cd1716172a5e06450952d3437f87a81d2842fa4b3efa65,2024-11-21T03:54:34.167000 -CVE-2018-17537,0,1,338fdd039744640b9461887e44ee2e7057a821056f3c49151982b33c321f8f5e,2025-02-06T17:15:09.467000 +CVE-2018-17537,0,0,338fdd039744640b9461887e44ee2e7057a821056f3c49151982b33c321f8f5e,2025-02-06T17:15:09.467000 CVE-2018-17538,0,0,a27f6dc8f83a2af5c5ecf3db8eeb87b0378390cffc97938e0510cf48a37ae2f7,2024-11-21T03:54:34.473000 CVE-2018-17539,0,0,0717e37bc886f6f3d9fe5d39d7443a56d73a3c3a737c65451bff53ff50130991,2024-11-21T03:54:34.660000 CVE-2018-17540,0,0,bd8d27ce369b1f95b2b5156db14c7514041dc80ced075144e162bf9ebf046037,2024-11-21T03:54:34.850000 @@ -117982,7 +117982,7 @@ CVE-2018-1788,0,0,c6d129a6d99d0c1d784da2b0250dbdf4eb2da862fd7ee1346fc0af8997d1b3 CVE-2018-17880,0,0,ac3bfc5bcaa8267f0cf5d77a8e1ab048e82354ecbde444fb4381450add2cf26f,2024-11-21T03:55:07.747000 CVE-2018-17881,0,0,e21c84d38103f08e61d62f90551302258b922bb01e1348b3a28fbfacfccbafd1,2024-11-21T03:55:07.907000 CVE-2018-17882,0,0,21f4106d6cf4a13cc8c9c4ce911c05e8a055edd1935ed4f2029ed9e3e4eb99e0,2024-11-21T03:55:08.053000 -CVE-2018-17883,0,1,ac93cfae6d86920381594ffb14956b49accea3a5569dabff0f56980422ba0ca2,2025-02-06T17:15:10.617000 +CVE-2018-17883,0,0,ac93cfae6d86920381594ffb14956b49accea3a5569dabff0f56980422ba0ca2,2025-02-06T17:15:10.617000 CVE-2018-17884,0,0,f3d48fb69177bbba0d55cb968ba4458cd67158dd2e66d75ddfa6f11e33319a88,2024-11-21T03:55:08.347000 CVE-2018-17886,0,0,5ddc7701cc54999549efbc6d30393a328d9b2f6655a7064302bc0db9f667de4c,2024-11-21T03:55:08.493000 CVE-2018-17888,0,0,c38c31ca469a218004e53ce699e5642deba237516cb41c3d3276f731063827ab,2024-11-21T03:55:08.650000 @@ -132962,9 +132962,9 @@ CVE-2019-14939,0,0,5a27052306daf9bb909b1870c72084ba0175f9542fd5f4cb3ad6bd8b8dc04 CVE-2019-1494,0,0,dc120233e3383c4c5f05e973cb1dec2213dc6943c95f3326f6c6baf587df434d,2023-11-07T03:08:12.050000 CVE-2019-14940,0,0,f266f4c3f4875b54520877e27ed27e074228ba5c9ec69b2089b8807b7ecb4183,2024-11-21T04:27:43.750000 CVE-2019-14941,0,0,6d5859b8bd61f2d5404db50ca245662b67a280f3e700436a738416d8a143bc3a,2024-11-21T04:27:43.893000 -CVE-2019-14942,0,1,24093187d7253ca27c111788f311b937ff04c69a1723fa5d8b2a68ee6c1878e4,2025-02-06T17:15:10.857000 +CVE-2019-14942,0,0,24093187d7253ca27c111788f311b937ff04c69a1723fa5d8b2a68ee6c1878e4,2025-02-06T17:15:10.857000 CVE-2019-14943,0,0,a8551755be9bca519735a5a32205ca0870f2d43807bccb20ae6df20ad92c3f4b,2024-11-21T04:27:44.217000 -CVE-2019-14944,0,1,4db4a92f8f3f5fb81b92ce5428e0158da24817bc6956b9d8c15898e13ba85244,2025-02-06T17:15:11.077000 +CVE-2019-14944,0,0,4db4a92f8f3f5fb81b92ce5428e0158da24817bc6956b9d8c15898e13ba85244,2025-02-06T17:15:11.077000 CVE-2019-14945,0,0,10e1ac1435236cce0779f51c23042f93fe22eaad36f5173e3ecd4436f0156db6,2024-11-21T04:27:44.520000 CVE-2019-14946,0,0,c51950404c51dbfbcce080e4eae5689ce933641e4b1a8b1b5607cee385f00aad,2024-11-21T04:27:44.663000 CVE-2019-14947,0,0,4251f217a5c23a961ebab9acece0190bc74a6c7a56ee02fe5aa13ef84bcef6c9,2024-11-21T04:27:44.800000 @@ -135478,7 +135478,7 @@ CVE-2019-18181,0,0,1656454c0d2687493ac76aa070298449a5da6d4b40f2ae5444253bd22e14a CVE-2019-18182,0,0,04250e5a887b634592ba1352e15d2c548963c2241206493229b867a445e4219e,2024-11-21T04:32:47.003000 CVE-2019-18183,0,0,18512348379b57dde5c02901c5fd2a320ca6cbbfdfa44d383d23e710f8266797,2024-11-21T04:32:47.153000 CVE-2019-18184,0,0,5d859ad092521d26c338f6609490ceeebe37f7c18beed00dbeab79cfa93f9ea6,2024-11-21T04:32:47.297000 -CVE-2019-18187,0,0,e7712a3fbebf888bd692502c0b21013633e2e66f9080eb3d209b2094f9ad3692,2024-11-21T04:32:47.440000 +CVE-2019-18187,0,1,d3b4ac9ec1a6543ac9e2ed31ed770d88e49c1818431c90ffb6356f8373f32647,2025-02-06T20:15:32.560000 CVE-2019-18188,0,0,f6271eee764dee49e854ca8eded1cc3fd6f73a0c6120b5c66d0caca59d262d4a,2024-11-21T04:32:47.540000 CVE-2019-18189,0,0,794fb25f653b440af7195bd2a42eebf2de7fa3d595035bce07155902c2f8886a,2024-11-21T04:32:47.640000 CVE-2019-1819,0,0,6d5e6840e0b1ba9cef4b125b4cd10078d08be2060c74e294d223abdc0835ba44,2024-11-21T04:37:27.780000 @@ -142193,9 +142193,9 @@ CVE-2019-7476,0,0,5de83e782c05182a1d8ce0089444e16799f6635a3da03c8cb60c046b554fb6 CVE-2019-7477,0,0,6ce02f38e0cf97d4d9ef2a83ac5a827c596013af233a32cb39446952f8cff819,2024-11-21T04:48:15.470000 CVE-2019-7478,0,0,5ee4b9782b987af812ca190c6a17611061b337f7f62d87d7bcc119a52c568b0f,2024-11-21T04:48:15.587000 CVE-2019-7479,0,0,7dadc717545b824d9cc1575ff272b2af482999ff8135838122148ba3cc6fe637,2024-11-21T04:48:15.703000 -CVE-2019-7481,0,0,436c63e1162959e8439335e926a9db69562674a6d28f1f0ab927ac53fdc562b8,2024-11-21T04:48:15.823000 +CVE-2019-7481,0,1,45a86d0c3675f43e47bb11b4dd3712c319c8dcc0c7bf5b2ed3212d661ec62c2d,2025-02-06T20:15:33.540000 CVE-2019-7482,0,0,f362faf36acf0534a3ddd6ab6abc5c302e830095ac7140a06c69d43e47b32df2,2024-11-21T04:48:15.943000 -CVE-2019-7483,0,0,eea78ee0d5d3f9a061a825f2d72627d5da165fa35fb093d4f964094b68189317,2024-11-21T04:48:16.053000 +CVE-2019-7483,0,1,84b74275afffefd8aa62348d202845c564ba489661eeff691d12df14ea08f096,2025-02-06T20:15:33.757000 CVE-2019-7484,0,0,088a2ed84077a90b95d47feea6d1d7b2a37f5c386a37ea91293747a6dc8424e1,2024-11-21T04:48:16.173000 CVE-2019-7485,0,0,e195d5b6b958bf03a8a2601ef451141f72ff32ebe6912657c9e3d56fa0c26e43,2024-11-21T04:48:16.297000 CVE-2019-7486,0,0,7bd108c967b2c70bb11ec2b5c98739597e83962a9140eb21308d98390b9222c6,2024-11-21T04:48:16.423000 @@ -149997,7 +149997,7 @@ CVE-2020-15062,0,0,5c385a3a44ca8de1e0c143fbf2ce766a19f90cfb656c168c0911033bc404b CVE-2020-15063,0,0,913b1ad8986f8df05401174586311b4c46ed40f9b1a93ba7d26df80e4f8e9d83,2024-11-21T05:04:44.050000 CVE-2020-15064,0,0,095a122450ff437689be0455fc081c68e1627ab8c9ad772fc071c1068e42123b,2024-11-21T05:04:44.223000 CVE-2020-15065,0,0,03ccc5c2abf6f175273b6f26b3cc9eb3ff15b50236bcc7af4580b8a975468dce,2024-11-21T05:04:44.480000 -CVE-2020-15069,0,1,aaf77ad6e3295dca763f52bc077891035c82478f7b4b5ad5296ecd1d6f4a7425,2025-02-06T18:15:26.113000 +CVE-2020-15069,0,0,aaf77ad6e3295dca763f52bc077891035c82478f7b4b5ad5296ecd1d6f4a7425,2025-02-06T18:15:26.113000 CVE-2020-1507,0,0,624d8c4553151f742df71a2aeaed021c1f7711b5765f097d27b46cbc5c21055d,2024-11-21T05:10:42.710000 CVE-2020-15070,0,0,a5565daa92dd1679a782780372c72b84dfd98cb47c5ed8664b0c9571da753873,2024-11-21T05:04:44.783000 CVE-2020-15071,0,0,5a88416ab79b833cf5490582541da675ff8853e89dd24d31521059cede24b771,2024-11-21T05:04:44.923000 @@ -151790,7 +151790,7 @@ CVE-2020-1734,0,0,7a237cef54a71a0bebabc1fe39721f3a72fea699a49486fde35d94972732f3 CVE-2020-1735,0,0,fc752cb285088498878cc188aeeeac7458e4ff3dc66a51ca8b91da2816ce67a3,2024-11-21T05:11:16.333000 CVE-2020-17352,0,0,39f44ec183d67eaa27ae0f3daadfd9628eb8a6ee59c08b74d58b2d4a154a4175,2024-11-21T05:07:55.860000 CVE-2020-17353,0,0,86d7004f438bd6446fab6228dd4f5aca8a966fa066b24f90c072a9c6d9168814,2024-11-21T05:07:56.013000 -CVE-2020-17354,0,1,250572b11a3ad55e698eaa0ced004f4c0f98c18e2a1cb6e39743292f60e99fe1,2025-02-06T17:15:11.330000 +CVE-2020-17354,0,0,250572b11a3ad55e698eaa0ced004f4c0f98c18e2a1cb6e39743292f60e99fe1,2025-02-06T17:15:11.330000 CVE-2020-17355,0,0,075aa21146fb621812835e1e3cc9937972d9232fc9384e07218cfa876540e541,2024-11-21T05:07:56.367000 CVE-2020-1736,0,0,524185cb0882c4cc22da018cb08ec75ad5a4c674f04d6906a243aa70ff299018,2024-11-21T05:11:16.493000 CVE-2020-17360,0,0,57cfab606c9e8b7442d0d2085033991490a0c9bf7a73454f7aae5e7426e72322,2024-11-21T05:07:56.510000 @@ -154340,7 +154340,7 @@ CVE-2020-24552,0,0,1974aa5798b97d5af3005bead2d65863378d448eb2930536119619a840fba CVE-2020-24553,0,0,794507510c1b8fbf022c2aa66ef5674d489bc5b8fd5dd42a31083e76a010d268,2024-11-21T05:14:58.743000 CVE-2020-24554,0,0,81e5da161e1601529273be24ce04aac9f313fdfa435d5c16ded4dbf1cef6dc3d,2024-11-21T05:14:58.953000 CVE-2020-24556,0,0,2dcc0a4846d9d454bb26f5d615b79c696fd873ffb0b08462988e6f680628abd7,2024-11-21T05:14:59.090000 -CVE-2020-24557,0,0,7f5d899f5fbfe112e0adb654e320e9620591386ee3c4d174b1543d427b3136c1,2024-11-21T05:14:59.217000 +CVE-2020-24557,0,1,1b38e072b0f203ee9343be5ad2f8747bc10f68f3ab987fe52819304f4a1ae960,2025-02-06T20:15:33.953000 CVE-2020-24558,0,0,4acb630873dd14cec59fff6c2989351c2737c1cedb8395139186cc2ea869c05a,2024-11-21T05:14:59.333000 CVE-2020-24559,0,0,0ff8ca064554cac5615429c2baa8b35abaa51793dbb0eb9b4a6d3974c923ba96,2024-11-21T05:14:59.447000 CVE-2020-24560,0,0,6f2d207aad3d827b98b7b978ff5ffc5d367f5fde5edd5b352292c1ecd4b0c462,2024-11-21T05:14:59.570000 @@ -156401,7 +156401,7 @@ CVE-2020-27541,0,0,75ff7408c2d3584d5610fe38436f4cbb116b8bb9d5efafd6f52ee6f910f88 CVE-2020-27542,0,0,a4ec15ce548ff6c6ee20842c971c0d78693553bc342fb84e31f2ca8be1c6946a,2024-11-21T05:21:20.550000 CVE-2020-27543,0,0,8e7b2747bc99bbc8e16c891d21b7dbe56bd38f94eef5937591b67db70ef4a5a0,2024-11-21T05:21:21.457000 CVE-2020-27544,0,0,cefda2dd31ec5cd0bc96934aa32722403d797d75102a0fd0d1229c2eb4dc7cd2,2024-11-21T05:21:21.697000 -CVE-2020-27545,0,1,cd168afa1cffb868413593f37faa14eab514f614d73fd13fb768c1801fe26719,2025-02-06T17:15:11.610000 +CVE-2020-27545,0,0,cd168afa1cffb868413593f37faa14eab514f614d73fd13fb768c1801fe26719,2025-02-06T17:15:11.610000 CVE-2020-2755,0,0,1221accd094bdd18cf480cdda4ed188fae7125acf2d78df4c06ca83b7111762c,2024-11-21T05:26:10.627000 CVE-2020-27553,0,0,486a3800e74a70aa2807f7be144b1646df74eb7bfbce71ba445b20f59b30f107,2024-11-21T05:21:22.150000 CVE-2020-27554,0,0,3860a639e76c15e2cba587d262fd034e637f296dd1ab67690f6943d668a0dfa8,2024-11-21T05:21:22.333000 @@ -156887,7 +156887,7 @@ CVE-2020-28149,0,0,d309eaf6a64e3cf3ced67fe5f936af59079a91b7ce4d68cca41c25c1576c8 CVE-2020-2815,0,0,3bd849821a49ca5c43928253d38441d349f4ec4dcd3f4d9c7466d9f779433787,2024-11-21T05:26:21.047000 CVE-2020-28150,0,0,5402778a6b777d1d1a0cbe49f0402236c0c9a98c2e270a06ae5ee906693f6d70,2024-11-21T05:22:25.160000 CVE-2020-2816,0,0,ccbc1e2cd6bf2a14a46755436c9aab154417b1227f8cb4f86229ee1669b5c88c,2024-11-21T05:26:21.210000 -CVE-2020-28163,0,1,00a008aaab32aeae5c326dfa10660e3b656d909c6ed3c9ca6e70c09eac6a26ba,2025-02-06T17:15:11.807000 +CVE-2020-28163,0,0,00a008aaab32aeae5c326dfa10660e3b656d909c6ed3c9ca6e70c09eac6a26ba,2025-02-06T17:15:11.807000 CVE-2020-28165,0,0,f2b9bb8858e25355c174608c510772ba8bcc4caf6f4662926cc00acbd223bc62,2024-11-21T05:22:25.437000 CVE-2020-28168,0,0,403199973f8a41c9434eda6c4c31ff460a34bed7104442863839bbd880c353df,2024-11-21T05:22:25.573000 CVE-2020-28169,0,0,192f2f504fb4337d30df9f5f29a9afe27c65a1fd4936d971afde1d4bebead6c3,2024-11-21T05:22:25.723000 @@ -157421,7 +157421,7 @@ CVE-2020-29003,0,0,fe6b7c2746e25af8b5ee1e0880df7c25228fbdeb183cfa6685eb8cbe7a0ff CVE-2020-29004,0,0,fdc3b9d149d56931282f83c27a94953928b32b88ac2a8e9d14f2848094e50606,2024-11-21T05:23:28.663000 CVE-2020-29005,0,0,4384c3631214d269aacf79a3e86f6c8377581bda5e016af03d5c4d000db518f5,2024-11-21T05:23:28.833000 CVE-2020-29006,0,0,a1eada1af14088aa47b18cfd0cd32accb4e1430290b5d6124463e288eefbdce2,2024-11-21T05:23:29.027000 -CVE-2020-29007,0,1,38423e2017ec37ff5dc84a3d59d7edd5ef57069d01e93c88df502c0c5e4142a4,2025-02-06T17:15:12.007000 +CVE-2020-29007,0,0,38423e2017ec37ff5dc84a3d59d7edd5ef57069d01e93c88df502c0c5e4142a4,2025-02-06T17:15:12.007000 CVE-2020-2901,0,0,0ae88d0e1bd825c44287334593753f0c8904a32f5681a5bf25d6dfeb866922df,2024-11-21T05:26:35.197000 CVE-2020-29011,0,0,93dfcca0e4592d4b53a9c1101459de2f73391ad05b892ac375c05ff854fc117e,2024-11-21T05:23:29.530000 CVE-2020-29012,0,0,6a75f1e03c3cce4f34c7b0bc85a1f81368af8e34915196ecaa70ac419304e38e,2024-11-21T05:23:29.747000 @@ -157733,7 +157733,7 @@ CVE-2020-29570,0,0,9f83e19bc998b3d2d7973d177eeae85bb3a3bf03c16e2dc329176ae767cd3 CVE-2020-29571,0,0,c17945383d2b3f3cd9a0a225cda10dda22876bb9f0c239f07558ba7f18ed7eb3,2024-11-21T05:24:13.790000 CVE-2020-29572,0,0,bbaa3cf10ab5f531b866a830631dc1df48bdcd325c60720a6733bb90830c024c,2024-11-21T05:24:13.957000 CVE-2020-29573,0,0,d24f0d59b817cb2d53a10b995433be4274c40c09d2f10ca57aa901857f1dc527,2024-11-21T05:24:14.110000 -CVE-2020-29574,0,1,c172334155513181c2c16e18a11087c8c8ef45c76b4463959f615fe71032171c,2025-02-06T18:15:27.600000 +CVE-2020-29574,0,0,c172334155513181c2c16e18a11087c8c8ef45c76b4463959f615fe71032171c,2025-02-06T18:15:27.600000 CVE-2020-29575,0,0,849fe2d3c9ed4e8870c1e9cf1ad705da07fd53a0c6a8ca65ab77a3eef78ebb1b,2024-11-21T05:24:14.430000 CVE-2020-29576,0,0,9c888d6e7a845bb6f95fad0e6ec4e891a47d26871edde5dec6bcfb12ebddb9d3,2024-11-21T05:24:14.587000 CVE-2020-29577,0,0,63fed6641591fe1aa7c3a6f8354217e32b5b9c582ff04af6b9a411b01f25a338,2024-11-21T05:24:14.733000 @@ -158255,7 +158255,7 @@ CVE-2020-35161,0,0,6504e0bd9bd5d152581f6189adb48c709dd7e64a367272ef78d28faee17f9 CVE-2020-35162,0,0,8f14cb97d78ee221f1db3fd364291b1bdd84b8ac5d3ca9f06b3a70a609a37f64,2024-06-21T00:15:09.957000 CVE-2020-35163,0,0,7fe79604c5856d0bf9168c5018263df9d11d9da689f9a79d85f3e63040cf98fd,2024-11-21T05:26:52.773000 CVE-2020-35164,0,0,300a513627fc296f390ba1367cd588e3609e0b71d0bad2b53b9ea0a5ea4deb88,2024-11-21T05:26:52.947000 -CVE-2020-35165,0,1,1f29c1fd75a3ac3ab692844c0344ff3f710217c92e3ea8c9d9644f0ea888c994,2025-02-06T18:59:06.710000 +CVE-2020-35165,0,0,1f29c1fd75a3ac3ab692844c0344ff3f710217c92e3ea8c9d9644f0ea888c994,2025-02-06T18:59:06.710000 CVE-2020-35166,0,0,bd9a621628f2c379ef3f4f1cc298df92e2b845e0de10649318652cc6be6ab614,2024-11-21T05:26:53.217000 CVE-2020-35167,0,0,97e5364ca49f12826b359a6c08db7e6f616f5fc57f4e1ef604cd1c42f098afbc,2024-11-21T05:26:53.370000 CVE-2020-35168,0,0,b9b29d41f74df6f64f0822f2becb8264f25d40d6e5aa235b4cec29885eae6b28,2024-11-21T05:26:53.520000 @@ -160703,7 +160703,7 @@ CVE-2020-5131,0,0,3ebeeb3406b4ebb3f398c86e120a8ea7584987ff4a83af70216906f6cf4c94 CVE-2020-5132,0,0,aac580d570e85ec8b70e6b8bb55444992ebcc2b12fb38b805ea2b4317ab4539f,2024-11-21T05:33:36.207000 CVE-2020-5133,0,0,3c81374d762098c532a5ce0afea8dfd215c8992142de95d2ebc826d4cceec2d3,2024-11-21T05:33:36.317000 CVE-2020-5134,0,0,06535f3e80c65dbdd841b34c6f27778a8ef21ceac4c6c32ac4e565e9b080a486,2024-11-21T05:33:36.430000 -CVE-2020-5135,0,0,31786a29dc4a66b04b018763cdd6e642d05097d5a4b113b55fa3d15abcb0b18b,2024-11-21T05:33:36.540000 +CVE-2020-5135,0,1,eaa6483223ccf216a04906578f5cd1c794db5625ab8d8bae6f1ef68380fd847e,2025-02-06T20:15:34.183000 CVE-2020-5136,0,0,6c20befac0d71734abdc922f4b0d51626e430d3c35ea2e711ecd77f08f2f2933,2024-11-21T05:33:36.643000 CVE-2020-5137,0,0,de89764e628ecb820e2141b131df1501231bc23532de6e21c2513e58a61727f4,2024-11-21T05:33:36.740000 CVE-2020-5138,0,0,124854274fb476d2113ab590457bc0ce7515fe590d9f83587e91d27d624bb9ac,2024-11-21T05:33:36.847000 @@ -163563,8 +163563,8 @@ CVE-2020-8463,0,0,cbe1bf94ab4074a799cfda6c596c5a806cd9d0cdd16638d6dc2e23ee2501e5 CVE-2020-8464,0,0,cde99c1fc97741bce52d94c4feb16ffb048b50869383304390b8d92336435ac3,2024-11-21T05:38:53.463000 CVE-2020-8465,0,0,7351106c577b021182fcdae4cbf8c32cd85778c733278671a297b620666e24d8,2024-11-21T05:38:53.570000 CVE-2020-8466,0,0,dc48662204f51e4360e95b33604e7a509ba98c62100571ad4c466fc4aeed4c92,2024-11-21T05:38:53.680000 -CVE-2020-8467,0,0,b3dbceb3d3f37af1570c8724ff14e85ab6a5c8a37694aea1e7fd4139bbb22ca5,2024-11-21T05:38:53.787000 -CVE-2020-8468,0,0,9b2195a65b4f9619248943f81fdabce4667681fe7d95932e7fd80c8114b7703e,2024-11-21T05:38:53.890000 +CVE-2020-8467,0,1,99fc35ec40e61806a8e6bb66d53aaf79f2485006a455d8ea730dc0bfc4d60f23,2025-02-06T20:15:34.380000 +CVE-2020-8468,0,1,21b87e5d8a99f7eaa27f56914e2f7aa98cfbccf39af0b2ed695739115f61ab61,2025-02-06T20:15:34.587000 CVE-2020-8469,0,0,4c711e420af63f972cd1320af857c808855086c533d1abb91a0f9112be4def0c,2024-11-21T05:38:54.027000 CVE-2020-8470,0,0,fe2bf0b46476cf81b036789ceca34e3737e912bc6ee74038979e38be2662ebbe,2024-11-21T05:38:54.130000 CVE-2020-8471,0,0,3e4e8c6a62e3cfd24c8790f0420125da6e9f2589aa476edd5d8301e245f73830,2024-11-21T05:38:54.237000 @@ -163665,7 +163665,7 @@ CVE-2020-8595,0,0,fd192ca939a41d67f3acd87be2300bc3bd41f44c0fbdbe14a249497e90b888 CVE-2020-8596,0,0,2966462342572daaf4fe90a6e987c0229db37f6fd8ce8ecc867bfc88266b8d83,2024-11-21T05:39:05.823000 CVE-2020-8597,0,0,7d20d0e8f5d2a1db9dc54fe1c599a83bcd73e7eac9e119823ba6469498c11ff2,2024-11-21T05:39:05.957000 CVE-2020-8598,0,0,395b36dc49342d805f95eb9dd642f07259761b66b9011aec0d6f87c2a2c8b72c,2024-11-21T05:39:06.147000 -CVE-2020-8599,0,0,cbd3a2a20d42db2475785e6b31717d01aada1c37948710cda68ccfe93798bf28,2024-11-21T05:39:06.250000 +CVE-2020-8599,0,1,563987a4a0255b504014eacd78645887aabc15f24f9a49ef3573133cf88a061e,2025-02-06T20:15:34.810000 CVE-2020-8600,0,0,e5e4a9bc6f84e53a55323bc0ba218fa79d05073e4086c2bcb6e00d024302fccb,2024-11-21T05:39:06.347000 CVE-2020-8601,0,0,92af00ee6a6667cef6b62495af2ca9a2103499b72397754a1721914f64a2ac10,2024-11-21T05:39:06.447000 CVE-2020-8602,0,0,37b92b6764cb2dac41bac07fa80c6f268abaa326227e38cee1e0b3c5173c278c,2024-11-21T05:39:06.543000 @@ -165558,9 +165558,9 @@ CVE-2021-0874,0,0,af16d205023f0ea912b21d75370825a8922453dc866200e1befa49fa3433e3 CVE-2021-0875,0,0,57c4627d34f2d716c4f256465290ede3143e801ef2323750c27ce0fca957a333,2025-02-05T21:15:13.183000 CVE-2021-0876,0,0,4b0adab7fa27b0148aac3f0ec6cd052881d3966598dd9f0f3b07059c7a100ae4,2025-02-05T21:15:13.353000 CVE-2021-0877,0,0,c2e5cd30d0c477a2e68bc1e7d07537fb61bd5004c669d9456ede730fc557548b,2025-01-24T17:15:08.107000 -CVE-2021-0878,0,0,74054f38cbbca55331fda5f8dd7583715f509e18eeeced7decaee7dd72ee0770,2024-11-21T05:43:12.513000 -CVE-2021-0879,0,0,b6d6a2c57e18595dc6074214481ede8a1a3a28cc41d86bfe2d6f3e905f1d0032,2024-11-21T05:43:12.610000 -CVE-2021-0880,0,0,4612a9a40bedad3fd32283245ba201e18cb9e0bcf74c0ab05ea53f65dc15f628,2024-11-21T05:43:12.703000 +CVE-2021-0878,0,1,2d819680c8f9c8b3c9b8592de03816914904bfcc5c05df9cbf78fc9720edeb3a,2025-02-06T20:15:34.983000 +CVE-2021-0879,0,1,a943ef469f254f2caca27816033d43c297d2c70e0d26b9ae1ead605f1287e59f,2025-02-06T20:15:35.150000 +CVE-2021-0880,0,1,ecb3875c37d37e4e49264d2078917f4e64b1cbfcf33bdcc41f3da3582122bd3f,2025-02-06T20:15:35.310000 CVE-2021-0881,0,0,535003c42fa4b18cd1e39520b67377ac5238f8afbf2d45cf4cf50b742480b97a,2025-02-05T17:15:11.423000 CVE-2021-0882,0,0,017614272e7ed61aa1ca48c84e9e66177a4472d360390b44947b277a1a9f3f3b,2025-02-05T17:15:11.620000 CVE-2021-0883,0,0,75f26bb2c3e8749d2f4f27ed434db706260ffb3906ad27bbc4fe7ebb1413550b,2025-02-05T17:15:11.790000 @@ -166631,15 +166631,15 @@ CVE-2021-20012,0,0,2c494ce5b5685456b87de8de0f286fe552736ac645524b8231c68a9ae8b5d CVE-2021-20013,0,0,bb351dce71914875c9cdbfba6e79d7defcd08b12ed29f32e0df33a93ec050879,2023-11-07T03:28:56.413000 CVE-2021-20014,0,0,f5de9dc06fa1af55b01d30ee84e3251cc6774ed70054abd63e357f612286529f,2023-11-07T03:28:56.913000 CVE-2021-20015,0,0,76e502d19fc3ddc6ee6e1ba0f490e7364cf44c3606ea9e56570965e9207deb0f,2023-11-07T03:28:57.197000 -CVE-2021-20016,0,0,e6a63d82fd526292f4d4251365ece64e4de28ae2253c34f595837b2cf304d5e6,2024-11-21T05:45:47.220000 +CVE-2021-20016,0,1,2c676e2b6766a176253111478a22f94acbe27df97f06999c64fed62a9c58eeaf,2025-02-06T20:15:35.463000 CVE-2021-20017,0,0,906e97e57442ddce997d3929ce1923eca591146fedef2938b5bed1374e4bec35,2024-11-21T05:45:47.343000 CVE-2021-20018,0,0,d0bbfa5a404bcd376b168a5a44fd585c3821223dfd8ef054682c1200cc04f684,2024-11-21T05:45:47.470000 CVE-2021-20019,0,0,4a1ee3e78cc6ec55376aaa3539fc9e69e05f7279eda40958a7fd5be74754de53,2024-11-21T05:45:47.597000 CVE-2021-2002,0,0,f81d4e198ed607669e35b2fcf34388c7cbea1317b5509943dbd156c60a15ebd6,2024-11-21T06:02:09.217000 CVE-2021-20020,0,0,06b8d82ae838202570441cb019399630ef1f11daf63d0d7606763ab84cfbddee,2024-11-21T05:45:47.723000 -CVE-2021-20021,0,0,f0e78bba50aab50a8c8eded30bda480708dddd6972284bd7ce24c64634f5dd50,2024-11-21T05:45:47.847000 -CVE-2021-20022,0,0,f2c308a00db3cb9710083e5403722665ccdf014ac79f50d04fcdef63513307fa,2024-11-21T05:45:47.977000 -CVE-2021-20023,0,0,308731da3475c294b1c5ba66784f928853f8c8b9133553a4361c9ea31ef67bdf,2024-11-21T05:45:48.097000 +CVE-2021-20021,0,1,041e263104830138b6348a6d3f0a573339db1ea05111abbeedff42ce16a54894,2025-02-06T20:15:35.687000 +CVE-2021-20022,0,1,a9c6e71e8cfdaaf74bfe11e2c2670eb11d5af71f791af79cb7f9f6de1dec52b9,2025-02-06T20:15:35.883000 +CVE-2021-20023,0,1,09e40af955bccc6544f314677ac122a089eca12edb73db3bbb6990256df05696,2025-02-06T20:15:36.067000 CVE-2021-20024,0,0,ed3768e12e4f14c754a691b9f1a8d63c0ba5d9e615ceab7a5079097a78da5889,2024-11-21T05:45:48.230000 CVE-2021-20025,0,0,a557c524f3d0620495311f58e53d5b6d2a34e4771a645ab67df4e0312ad32324,2024-11-21T05:45:48.370000 CVE-2021-20026,0,0,cafa6aa3457f63a66d981234d7b8cc409a1192e2cdbdbe23e971556fd89fd7b2,2024-11-21T05:45:48.497000 @@ -168710,8 +168710,8 @@ CVE-2021-22200,0,0,4714d27055585b56457cc3fabd75a4b7b72bc463887ce3600fb778ed6b1ac CVE-2021-22201,0,0,3553a8d6deb9d970150f5497ada5c8a6dc1ffeb4d09f569a00713d74a90f49d2,2024-11-21T05:49:41.890000 CVE-2021-22202,0,0,d43444d60aa5db131196c8f8e157302e37180c591d9b969268f03005ec6c680d,2024-11-21T05:49:42.003000 CVE-2021-22203,0,0,1c1a75d073c8b6dfcfdad75f14edadd56026203f86f8a4cdcf990e84d053a04a,2024-11-21T05:49:42.117000 -CVE-2021-22204,0,0,9a11b96fba50fcf373039a03e63ca5a14752d6287dc5e97505384fcfee2cf4ae,2024-11-21T05:49:42.237000 -CVE-2021-22205,0,0,a0c45c192607064ce26e62db7dde63e87123bd47a9d0184523a24a5e393a8844,2024-11-21T05:49:42.403000 +CVE-2021-22204,0,1,09b034cd07dbf45ee8b6f73498ba5625e798efab4e9edd45e8b21338d64e4df9,2025-02-06T20:15:36.427000 +CVE-2021-22205,0,1,c0efa84d2eaf52c9d1994f73ac83070d976f8fea25ae2a7941be25314d1b922d,2025-02-06T20:15:36.650000 CVE-2021-22206,0,0,cf7ff294ef6fb65d60ee35b08d7aecee62915865afb983d22fdb5ac29b277188,2024-11-21T05:49:42.533000 CVE-2021-22207,0,0,129cea919d10ac0b455ce555a5ac981bc49428b06e2c06dc147475f84a4c90a1,2024-11-21T05:49:42.637000 CVE-2021-22208,0,0,9b0b9b08d63a7e55a8658f075fba1192bf08556ff5290155b0e493698a9c2111,2024-11-21T05:49:42.780000 @@ -173128,7 +173128,7 @@ CVE-2021-27845,0,0,01cc11b74d91a23210ca700cbf7af7fcffc0b757920370e2355218c5d2dbc CVE-2021-27847,0,0,d73dd32911a9420e06bab1ccd0bd6979d9864d076ac74be581aa1f8ad2ab6973,2024-11-21T05:58:37.867000 CVE-2021-27850,0,0,479fa7afc5c923133ccf799b26b11e7736e6ed124f9dda10f48eed426abb761d,2024-11-21T05:58:38.010000 CVE-2021-27851,0,0,6c5b29ff988e9029718e843f6f018543e5608b93aeeb1f3d414c298cfb95ee0d,2024-11-21T05:58:38.123000 -CVE-2021-27852,0,0,b705729ff2fc73dcb469a01347c659b1335188ac8c790410902de09153229ba0,2024-11-21T05:58:38.250000 +CVE-2021-27852,0,1,a5cc9b9852300ae36869546a3946cc345259b1bc8aaa03d5c0e2de89ad983fc7,2025-02-06T20:15:36.810000 CVE-2021-27853,0,0,f3063fc8474b10bc4f53fb2a5e888bede0bd4fbd15089a364bb18fb4f3c13320,2024-11-21T05:58:38.377000 CVE-2021-27854,0,0,e958ac7f8ffe683c3ed177377b2c90d73e194d0b91ee2238a7cc91bfc6ae2140,2024-11-21T05:58:38.640000 CVE-2021-27855,0,0,2c7f9bfe834654dc0eba8aed238e4f6d4952502f9afe25f6b1dbf2e18f32eb42,2024-11-21T05:58:38.793000 @@ -174635,7 +174635,7 @@ CVE-2021-30149,0,0,b4e1bbeb7c9e742ea8c54fe14acfe37444ffd44516325d1f413f07c0b0e85 CVE-2021-30150,0,0,5241ce228aca0bbecdd0b444b8bd4ca25e3179d54af6c2ff86aab3f5def1bb1e,2024-11-21T06:03:24.017000 CVE-2021-30151,0,0,0604809d6175e7a578b21935e01533dd11872ca56170ae76ce4a4fc4b811444c,2024-11-21T06:03:24.160000 CVE-2021-30152,0,0,d567c22a92e5f8121af0e3a919488904ac76cfe3551e8df071e34189b2750dc0,2024-11-21T06:03:24.310000 -CVE-2021-30153,0,1,32e8728205b7135bc9e864ccbe3f4c451ce50c37e301a64b1b33b7ae84bdc5eb,2025-02-06T17:15:12.217000 +CVE-2021-30153,0,0,32e8728205b7135bc9e864ccbe3f4c451ce50c37e301a64b1b33b7ae84bdc5eb,2025-02-06T17:15:12.217000 CVE-2021-30154,0,0,521a388cb5fe74e8f6992120d2fedd6a65bc3796fab84a34d8b82e4464cd68cd,2024-11-21T06:03:24.630000 CVE-2021-30155,0,0,45813e1088f1453f559b199d3c245ae9b8cf920cea8df186cb779f069ed22de4,2024-11-21T06:03:24.783000 CVE-2021-30156,0,0,f174c2a4ac09a9233db943c567201b9958b087282b6aa086cdf491c6e6794b09,2024-11-21T06:03:24.980000 @@ -177569,7 +177569,7 @@ CVE-2021-33793,0,0,994fdf7b2356bebe45191e4849c4d06e34fc0e6b66728568039538099b1d4 CVE-2021-33794,0,0,3050e8c94e9a8f3c22c71cf6772be515aabd7192271fd66cd6aadc694a2e792e,2024-11-21T06:09:35.793000 CVE-2021-33795,0,0,6a83f42121b2ada57b67166ce5fcca84d69f3536ddab69e28d5f7d7d28dcb5ec,2024-11-21T06:09:35.963000 CVE-2021-33796,0,0,ae7f3ce4604b56eb8fdfa252aa2155510acaab5b98ca2d662c8e54061bedc21f,2024-11-21T06:09:36.133000 -CVE-2021-33797,0,1,411f98ca83ffd34914673e5b7981c3590071f54d9a5186e6de1aacc180fb7d4d,2025-02-06T17:15:12.420000 +CVE-2021-33797,0,0,411f98ca83ffd34914673e5b7981c3590071f54d9a5186e6de1aacc180fb7d4d,2025-02-06T17:15:12.420000 CVE-2021-33798,0,0,f10bed80d348f0f0aa726942c8cd701eee31993186e56964707baf818a30a8b3,2024-11-21T06:09:36.463000 CVE-2021-3380,0,0,9ba2d16271608bb6619fd4db535ea4e28f4fd5a40eae8fe95528d32f02bae8a0,2024-11-21T06:21:23.367000 CVE-2021-33800,0,0,de7832d86e538c082359b1bf11783aa88dec56341e1b4941bf11dbb6a176f138,2024-11-21T06:09:36.600000 @@ -177757,7 +177757,7 @@ CVE-2021-34220,0,0,28b88977b14c466695ca6d360b7adc45375c75e8d4cf91987e0ce61f61533 CVE-2021-34223,0,0,70c40bacb76381740c1f87a616f624f4195aa3fdb6b6d3362857bd528a7bc057,2024-11-21T06:10:01.820000 CVE-2021-34228,0,0,ea4d3041b3fcbf94c580e5a0925c4b00b78290aef84a54a658f051c9adb49b81,2024-11-21T06:10:01.997000 CVE-2021-3423,0,0,87fdcf08b62eb8fd3e7a6d568b3147c2e81811e8eed586e32b5651db4c861103,2024-11-21T06:21:28.207000 -CVE-2021-34235,0,1,e40f2cb6e61b9ee85d9e4eb0236177b56956f4de75edd057dc6c4a3ff6d6d831,2025-02-06T17:42:48.187000 +CVE-2021-34235,0,0,e40f2cb6e61b9ee85d9e4eb0236177b56956f4de75edd057dc6c4a3ff6d6d831,2025-02-06T17:42:48.187000 CVE-2021-34236,0,0,f7bdd8ef92563ca52b5296a2062d91875a877eb936612f3b259d943c4aa71c47,2024-11-21T06:10:02.870000 CVE-2021-3424,0,0,954a8aa5fc6a2fbb1251d32bf08869cbe985f5d51cf8ab7fa91ce63a7f1cb784,2024-11-21T06:21:28.360000 CVE-2021-34243,0,0,f527c3b67db0ce9f8cc04405a55d73f59a4663bc1db1a269086545b1931e3ee7,2024-11-21T06:10:03.083000 @@ -177831,7 +177831,7 @@ CVE-2021-34332,0,0,ace45b937ee626a51de9410c8b59d5742a8ef25d37731d710a17d61a5e34c CVE-2021-34333,0,0,b474a423e46b7082dc07ea9bb1e1664c29715154e4f4412dbe76eb449dbd16eb,2024-11-21T06:10:11.217000 CVE-2021-34334,0,0,a7ee5b1f7ef4cd9fa880c39bd25fa8f0d03bd7aa19850961a9b848f27b7e5a52,2024-11-21T06:10:11.343000 CVE-2021-34335,0,0,8d560771a91730d5852bc1a079abbc514b59a128056a4c6043b1945c37ff447b,2024-11-21T06:10:11.470000 -CVE-2021-34337,0,1,d0c9a70473f5165500cdae21058ae8d672fbc577e1a3a9f85e632ea4093f35f6,2025-02-06T17:15:12.627000 +CVE-2021-34337,0,0,d0c9a70473f5165500cdae21058ae8d672fbc577e1a3a9f85e632ea4093f35f6,2025-02-06T17:15:12.627000 CVE-2021-34338,0,0,6e37d5fe9c1d5f2766ae128e8591088da26594c0fd061724163fd2283f73863e,2024-11-21T06:10:11.753000 CVE-2021-34339,0,0,b8391df5a59b6325adb10c01995b6110cc917b19717777aed1867a6f524d17ca,2024-11-21T06:10:11.877000 CVE-2021-3434,0,0,de12396fe0ff57d5174388b0b95ea3fdd47a95a09814bea1f98de6074c2bd73e,2024-11-21T06:21:30.013000 @@ -179295,7 +179295,7 @@ CVE-2021-36235,0,0,e94c71bb68b866b6938cf73ddc928288490a52b9ffb25b83515a94d14bddd CVE-2021-3624,0,0,663484eaedb825f6baa931adb7c91133197f34c7497199cf4e405e3ba3221b03,2024-11-21T06:22:00.580000 CVE-2021-3625,0,0,97b53cc69cb466c281f0a4067f7d3f6542c46ceaf815d95d3f28a4d7b56cb96b,2024-11-21T06:22:00.710000 CVE-2021-3626,0,0,ebb9ddea7e23b19204e1b4625fcd8e443c2ba3ed255cc38778a29c9b823abecc,2024-11-21T06:22:00.840000 -CVE-2021-36260,0,0,0251c0efd236bcd41cc9b3cf57b02ade8faab27c77662dfbda60c1e1f80c61a2,2024-11-21T06:13:22.027000 +CVE-2021-36260,0,1,17ca0b561e794a352ff19eab8bf3b273ba5d475fad57af0188f3194a3e26e5b4,2025-02-06T20:15:37.047000 CVE-2021-3627,0,0,d7cba306f2ef293bd540cf0c6bbde0523dab4e7b65f9274c71eecf6938ac7c3a,2023-11-07T03:38:10.143000 CVE-2021-36276,0,0,d4923bbc8be8a87d459b6a6aab8198e7eac4a287dae5841a0083ec2e377dff14,2024-11-21T06:13:24.430000 CVE-2021-36277,0,0,d4c3c0eaad59d64baec42b6a295b74fff8c319c57a534712bb26790d7c677e78,2024-11-21T06:13:24.563000 @@ -179461,7 +179461,7 @@ CVE-2021-3651,0,0,6636dfcd922e7cb1ef39bd90e7eade8747704a55870f78c2eecf0e14713ddd CVE-2021-36512,0,0,a45e34ee05cafbd879fa81b5bdb9012879ce1c3f301f4875f6c524bf39affa9e,2024-11-21T06:13:46.790000 CVE-2021-36513,0,0,9a82b10a0816874f8c1f2b77eebf4db16e7ec4c5f66caea9ee278740a466b33e,2024-11-21T06:13:46.943000 CVE-2021-3652,0,0,f345f1c788f6d42ecea80c57714f1ff61b594918e44b49548ef8dd25043f5fa8,2024-11-21T06:22:04.567000 -CVE-2021-36520,0,1,ebdced31ef133273707abe156dfae048d35c484de7af4f991237911afdf5155d,2025-02-06T17:15:12.820000 +CVE-2021-36520,0,0,ebdced31ef133273707abe156dfae048d35c484de7af4f991237911afdf5155d,2025-02-06T17:15:12.820000 CVE-2021-3653,0,0,42aabca48538a9437956e13309a56649d87b03129c787bb7bd4934a2d4f4fe33,2024-11-21T06:22:04.710000 CVE-2021-36530,0,0,6e876beae5b0da7572b5f4b012afc6ef11c0367a2f93ad15a311c968bf3a86c6,2024-11-21T06:13:47.260000 CVE-2021-36531,0,0,5ad84c54f1d7fb7957fc207837d24fcffc1a753924d3e464eee94843c5f8e76a,2024-11-21T06:13:47.457000 @@ -179571,7 +179571,7 @@ CVE-2021-36739,0,0,f26d0be0a721fbe6be03df43ffbc9b3042175c6173cfb23d10478df22eda2 CVE-2021-3674,0,0,a6ebe839edba8d8408e2ebc11b394ca63ccd563a6d74c07ce22a05a02c5340d4,2024-11-21T06:22:08.007000 CVE-2021-36740,0,0,54bc6cdf23940c08f7f28324a9e8120c825654c24d2b52459fcb9fe03320bbf6,2024-11-21T06:13:59.623000 CVE-2021-36741,0,0,db164cc586d3f4a30cd904c62c533bc134c0777d57ee50e51780a59361e45eef,2024-11-21T06:13:59.820000 -CVE-2021-36742,0,0,830f67e45caa342830a913937a0b699adf465df0fa3953ff350c73cfe0755405,2024-11-21T06:13:59.983000 +CVE-2021-36742,0,1,6c6d4b535bd2d5bb0cee20bbde95eb8c981b7e22d3f77dc9021e39a9c9cb2a55,2025-02-06T20:15:37.530000 CVE-2021-36744,0,0,d45285bc3db76c0d6dab50f059ca546f427f4488393c91f33c651825cfcee74a,2024-11-21T06:14:00.137000 CVE-2021-36745,0,0,1cce952eb8dd2370e5aefef31e1a86c4ba7f1e524f793d1e889818873e30880d,2024-11-21T06:14:00.293000 CVE-2021-36746,0,0,21132e96a64571a11d67dee583d5cbe254c9677a98c9b6f236f1ceaa252d79a2,2024-11-21T06:14:00.443000 @@ -193315,7 +193315,7 @@ CVE-2022-23744,0,0,a2ebd65c39528abca9283ad46d8bfd6d49ae5c18a6bf025a4f562f424489d CVE-2022-23745,0,0,453ea33812425fe4b8f24565e26d1911a52b7d4f61e5e4da7cd895e3d55225e1,2024-11-21T06:49:13.593000 CVE-2022-23746,0,0,9eeee461b71877b53dcf609958a8cd6693503b71bf2647c3cd27aeced1d79c82,2024-11-21T06:49:13.710000 CVE-2022-23747,0,0,a0881c90aac8272e7d82e497d0d70466fe33c6cea5dcab3d5fb6d0f61cf3e774,2024-11-21T06:49:13.857000 -CVE-2022-23748,0,1,bad2be436893f57aa88e0b2cba1852add794a5eb04413e2ff12e7646005131f6,2025-02-06T18:15:27.907000 +CVE-2022-23748,0,0,bad2be436893f57aa88e0b2cba1852add794a5eb04413e2ff12e7646005131f6,2025-02-06T18:15:27.907000 CVE-2022-2375,0,0,b665472ccd967b72e1975f37ea8ece177bf82a1796072289556fd815fa9e1b0d,2024-11-21T07:00:51.963000 CVE-2022-2376,0,0,ece3c8817f2a82834b32413cc7752c817d9b7275acbbea68d1a7ef331ddcb993,2024-11-21T07:00:52.090000 CVE-2022-23763,0,0,45d17b1c5381e6566f7a096605ebc994ef6630964c0d3db8b34cf1369e76219e,2024-11-21T06:49:14.107000 @@ -197118,7 +197118,7 @@ CVE-2022-28349,0,0,6ab43193115d13f0853029ebaa4e4e5aa829196fd7ac3dddceddbb75d3a09 CVE-2022-2835,0,0,b18ea3314b02c3a902e3e92dcd786a1395d4c51b6f9235e3e0a19538db1f25b7,2024-11-21T07:01:46.723000 CVE-2022-28350,0,0,76926441a098a741ec1a1909d1865ecf1667d2b6700f2a99dd1d60a43ea72988,2024-11-21T06:57:11.620000 CVE-2022-28352,0,0,0a99bcac8fa9af4d986102b58771dd51c31ef6ac3fe348bc4d8544976644554f,2024-11-21T06:57:11.787000 -CVE-2022-28353,0,0,bfb59d6451da81fb327731b7abe413883f373386a1488ed2c942e21c63af99c3,2024-11-21T06:57:11.947000 +CVE-2022-28353,0,1,bb9ec378b21ba877327c75107ce58944187af86181066a00441cdb098795a315,2025-02-06T20:15:37.860000 CVE-2022-28354,0,0,9b333a0acb99f7f2db503dfeff4138375e50bd763f9ebba5c44343d2d73be999,2025-02-04T17:15:09.390000 CVE-2022-28355,0,0,e50fb77c4dfcc32bc1ac7a4cd4fc544b5e0e1b7fb991c2b18979fc17b260da9e,2024-11-21T06:57:12.257000 CVE-2022-28356,0,0,d74909962ea9583acb35de56c4f18716f505b941f0ccd8da5b1627bfb6bc145b,2024-11-21T06:57:12.417000 @@ -198549,7 +198549,7 @@ CVE-2022-3007,0,0,cd9d5c010042185eca3670240c911a953b513fc642eb89c7fefe765ed8812f CVE-2022-30072,0,0,e5996e85111f410505ed7812ca09923c23d56dc6831a2d3620bc99c3b3ed9466,2024-11-21T07:02:09.710000 CVE-2022-30073,0,0,1cb6d138f1ce30d72a790294094f956e03e8862ac710ccf225b9e27f758865d1,2024-11-21T07:02:09.867000 CVE-2022-30075,0,0,3e9837d56f07957b39b316f6ab1b919a360c6c731c4089b5538def55bb7aaba6,2024-11-21T07:02:10.013000 -CVE-2022-30076,0,0,c4e72faa4512f6e3ed920f377eb7a60af121416dd47ebb8e3a6cbb5a28dc8238,2024-11-21T07:02:10.157000 +CVE-2022-30076,0,1,914d3a2b434db615d4c8510d4bfe659e89f1234e974cd30b39dec84c84071d77,2025-02-06T19:15:17.673000 CVE-2022-30078,0,0,25c780d65808617e430388ab07839a346dde5f941f8ae43fa7e16b521d0b3e68,2024-11-21T07:02:10.303000 CVE-2022-30079,0,0,94c80cc26162599b54a904bb5ab2452ee80e353a4b959b82f562ab481b3f9fbd,2024-11-21T07:02:10.470000 CVE-2022-3008,0,0,262ef8e7413773126b66ec2fa31ae51d0cf9ceef8e2f3699b49a5ed08a2eb14f,2024-11-21T07:18:37.753000 @@ -199996,7 +199996,7 @@ CVE-2022-31760,0,0,5c4a45123a4b9c8de5f1065df7d5ca3224e6479c10f99f0df19090440949e CVE-2022-31761,0,0,95e0181cfe82712600a912100baef04f4706de88030235b976f6fa84ce1100f0,2024-11-21T07:05:15.337000 CVE-2022-31762,0,0,bb6b22df7ef4fc53f49e054a15ce44c4fbc0012358e73c25e15dd603edf6e274,2024-11-21T07:05:15.463000 CVE-2022-31763,0,0,b43c22e16cee7f4d119cb5b8d655d9db9798a7b49f2bef758258ceb1c42c43c2,2024-11-21T07:05:15.613000 -CVE-2022-31764,0,1,d44e93399fe621098440ed2ae98f29a646725cbb61505d45e5aff35bd0b0d59b,2025-02-06T17:15:13.030000 +CVE-2022-31764,0,0,d44e93399fe621098440ed2ae98f29a646725cbb61505d45e5aff35bd0b0d59b,2025-02-06T17:15:13.030000 CVE-2022-31765,0,0,586417082fbde887bf1c9b1db7e79c13de1278309904ca5f31a0432f3684915a,2024-11-21T07:05:15.753000 CVE-2022-31766,0,0,cde50064d777ad363e132410e35440d6774e62e73df22e736e147e3629cd7229,2024-11-21T07:05:16.210000 CVE-2022-31767,0,0,b7ea3f47b3ba866b5369e56abd48c9381c68e37bfa533cc503ceda935346da2c,2024-11-21T07:05:16.410000 @@ -201709,10 +201709,10 @@ CVE-2022-34114,0,0,db5329f48c009a3b9333321d945817ea647b853776f409bb2441da5553436 CVE-2022-34115,0,0,0374eada9c3729baaf695edbac388f44314f70b2b16325329b8158995967d31f,2024-11-21T07:08:54.197000 CVE-2022-34120,0,0,ab2ffeb400e752639eadfb9d4b87ec5cefa2a16ca98085530563819d0413cd82,2024-11-21T07:08:54.340000 CVE-2022-34121,0,0,213598dbbf2efc8c81613339afc122956ce97485be29184a42af726e140a7908,2024-11-21T07:08:54.493000 -CVE-2022-34125,0,0,d5d849eb400a5d157b80cd304c2a1deefe73e735e475a2cb8f9f6d200bbfcf40,2024-11-21T07:08:54.647000 -CVE-2022-34126,0,0,e72e6c0cce49e5560fbbd40cdeb7faf98b5c3c726d364ca8df64a59bdb211085,2024-11-21T07:08:54.803000 -CVE-2022-34127,0,0,30c346194985bc544413189e4fd59fb92779b5dcf863a5f50f0d9750fe9da932,2024-11-21T07:08:54.950000 -CVE-2022-34128,0,0,eb9a16fa0965c69357cb2bef1e0897801ee0aca963050e8226f74115d1984388,2024-11-21T07:08:55.100000 +CVE-2022-34125,0,1,fa0384f48d3bfafad704209ea6417b25992887437e19f4c42a06736aaabbdb3d,2025-02-06T19:15:17.853000 +CVE-2022-34126,0,1,217899815f423623f47f855562ecc629516242da578b7e48fd12bb439891099e,2025-02-06T19:15:18.020000 +CVE-2022-34127,0,1,90b4603f44e4066f90573a2a596b6012e9c84d96c1c5f1e2468bf9f816ee98f4,2025-02-06T19:15:18.180000 +CVE-2022-34128,0,1,a31be4e7e4513ecf2ddeee1bd09f2cff7b75910c6fde88185b322d665718512b,2025-02-06T19:15:18.327000 CVE-2022-3413,0,0,b056c688a0c91f2e08f2496d0d51b1d1965f17388b095c6c9d4ef72e9e997daa,2024-11-21T07:19:27.887000 CVE-2022-34132,0,0,37005bed17649b96a07eec24e9f2bea87e50d3b11204f2cb812877a6fb64ac89,2024-11-21T07:08:55.253000 CVE-2022-34133,0,0,fc6351032270e0d8a9e478482756f7ad280a56b5d539a43d542d229aac4d1e3c,2024-11-21T07:08:55.403000 @@ -203732,7 +203732,7 @@ CVE-2022-36418,0,0,47b1844dc8892f53baaea861ade7d3594949ef51bba267c6099f01e8d1fc3 CVE-2022-3642,0,0,990ca5a52a2aa091246da9b52bd12da4d72fb36edb9ae43074d44f2ff1008ebe,2023-11-07T03:51:34.230000 CVE-2022-36422,0,0,79bcbe7c396099607f6670adda84fcd17bbb96267fc4d28a0cb786919cf20525,2024-11-21T07:12:58.720000 CVE-2022-36423,0,0,4672d903d9611278b456e0ac18a2b50f6c886b233d272d62377874c78881093a,2024-11-21T07:12:58.840000 -CVE-2022-36424,0,0,9f06994df0c071dff4a7f205a092df6677ae5e7a5319ca1848f8f9352c1de2fb,2024-11-21T07:12:58.977000 +CVE-2022-36424,0,1,f2ddd165e7b7923a55bdec7a6a9ce7fb817984832522055cd6f94b50013b5ba2,2025-02-06T19:03:15.920000 CVE-2022-36425,0,0,8f710f9467811859f94e473662bff2f82310306f20336b7602825d876930b8c5,2024-11-21T07:12:59.117000 CVE-2022-36427,0,0,288cf698cedeac8069f4865c26d20a3da64d3def2273e5d932bd8c18481c56b4,2024-11-21T07:12:59.250000 CVE-2022-36428,0,0,4f8fabc61ec2a85cbecb64d6f12c18af928e3acd0a40974c1639a62a6e79dfc6,2024-11-21T07:12:59.390000 @@ -204389,7 +204389,7 @@ CVE-2022-37181,0,0,912c6eb4e9d1509d7be0f613d691ead0cff2d00085bea8485f68f727dbe39 CVE-2022-37183,0,0,1c0c11154693783d3dfb58ac341f7a683e1f6984bcbf3a0f1330f95a3f45763a,2024-11-21T07:14:34.633000 CVE-2022-37184,0,0,4a78d3ccca9c07384733c7459c47309575939529747656df33b1e214cbe10fdc,2024-11-21T07:14:34.787000 CVE-2022-37185,0,0,279751d6864a6443618b74c2fc778a7d697cd242714b7cc50fc59bcf8c73197b,2024-11-21T07:14:34.937000 -CVE-2022-37186,0,0,8d214b7e1e97849f2c9a6b24b23b6acb53174628dcc28888d8f82d1186b96d46,2024-11-21T07:14:35.093000 +CVE-2022-37186,0,1,61711f2a468e2ad3396d0368272fc3eecbe0a2c731c122e2695a7d449983faed,2025-02-06T19:15:18.477000 CVE-2022-37189,0,0,be7e673bc39fd8c6493244b4afb6d3889d8c203b584f1a99e5b3894795c552fb,2024-11-21T07:14:35.263000 CVE-2022-3719,0,0,42e6448a5585f7f3086969e3bcee5ede404102dfd39562864133ae84a97dd03a,2023-11-07T03:51:44.147000 CVE-2022-37190,0,0,927dd52dd133503d064be5a5eb3e28db254d59991ff65c3bdded5fb521f13c5c,2024-11-21T07:14:35.447000 @@ -204431,7 +204431,7 @@ CVE-2022-37250,0,0,f1bf576feac50ef4cc0815ce34bcb55b237af70ecc44bc40730d9fee07bbe CVE-2022-37251,0,0,43a04c82a0e8ecdb5842441aeb6944cc0f9ba220f1a5d509e6218cc9f0e1eb54,2024-11-21T07:14:40.043000 CVE-2022-37253,0,0,7e4816e796ad701ac7ba2a5f66ef9d496fea3a8127d186080cbc57d371fbe1a9,2024-11-21T07:14:40.200000 CVE-2022-37254,0,0,a01a66fafff0ed419d86e1933dafc3e15dce1e1a98b0db7f42643577eaebb746,2024-11-21T07:14:40.350000 -CVE-2022-37255,0,0,3feb2f13c304106c373ee7c92d2d755f5eefa9fa7a5761f6126340225bafa4fa,2024-11-21T07:14:40.493000 +CVE-2022-37255,0,1,525e69551bbfc0847ae0c0baabfadfa88dc891489bd14d1ceab2a448ddaf733e,2025-02-06T19:15:18.633000 CVE-2022-37257,0,0,d9fc2cd61110f25043a462584955ae980a4a48f611b5c5fc02a9f262118ee99e,2024-11-21T07:14:40.643000 CVE-2022-37258,0,0,6ac1ec8f02fc7107359e654975c5f3bf2ae3927515439570e4c5a4107d846b99,2024-11-21T07:14:40.803000 CVE-2022-37259,0,0,5fbe8c59ff0f641a51b06215fd0edaa2b1b69be73be4bffba7ca2c687d759285,2024-11-21T07:14:40.963000 @@ -204454,7 +204454,7 @@ CVE-2022-37302,0,0,128628f6964167dc4fc058b493e30b72263b3e308582b0cadd6bc2d4888f1 CVE-2022-37303,0,0,394a1138eb8cd4597e63c32292d5a91afd61907453ed5f5373f376f45db8cf22,2023-11-07T03:49:45.503000 CVE-2022-37304,0,0,1aeb7ab2f32a8cce00783bda87e1cbc232d17f8628242843c3274f43439c8ad8,2023-11-07T03:49:45.793000 CVE-2022-37305,0,0,9cfa40f430b959845ff73051089acaa256b6769898037a9d2a19661e2e8bed82,2024-11-21T07:14:43.080000 -CVE-2022-37306,0,1,5893daaad7baca32dc7bd81e97fcd602dd52f0d1a8ea7bfc765d6c47902f95ee,2025-02-06T18:15:29.597000 +CVE-2022-37306,0,0,5893daaad7baca32dc7bd81e97fcd602dd52f0d1a8ea7bfc765d6c47902f95ee,2025-02-06T18:15:29.597000 CVE-2022-37307,0,0,65c4f06a1b68ef83151bd639dd168391bf3ff662764488664598d4773f19924d,2024-11-21T07:14:43.430000 CVE-2022-37308,0,0,52c5cfd626263d8055234a1e156afe0004db2e9456196a323c018912ee84e101,2024-11-21T07:14:43.603000 CVE-2022-37309,0,0,66cbbc842075d57bb070bd4670fdebc39bbe16faf87280b30e4e934a6e4bdff5,2024-11-21T07:14:43.780000 @@ -204649,7 +204649,7 @@ CVE-2022-3769,0,0,c4bf34e87f9ae2f42ed28397fd098e05c35c9f6843e9690bca79f799658840 CVE-2022-3770,0,0,056267d0dbc6d7110f2e71c1310d09e5ea740c482729425241ad1b06c3d3f156,2024-11-21T07:20:12.817000 CVE-2022-37700,0,0,f7b01506e331ff7bf29f91a017c4d6fb8e7444b7a067afb9e3bedcd9b55e6819,2024-11-21T07:15:04.807000 CVE-2022-37703,0,0,0bb1464f62e9d2b8293baf8a4f430c80898e274bb42ad3de2913a88b18041405,2024-11-21T07:15:04.973000 -CVE-2022-37704,0,1,689df3140e86238bf4f6ce643be66f5fc522da4b2ed6dc5314b9fabfddd2c427,2025-02-06T18:15:29.863000 +CVE-2022-37704,0,0,689df3140e86238bf4f6ce643be66f5fc522da4b2ed6dc5314b9fabfddd2c427,2025-02-06T18:15:29.863000 CVE-2022-37705,0,0,acd16612787f02d3f718d6d198087d88cd907ba03869599bcfc17e8b377ea3e0,2024-11-21T07:15:05.343000 CVE-2022-37706,0,0,fc078f45bb273fd3707bb7ddee90095b1068d19a6102858911d8dd8ad25410dc,2024-11-21T07:15:05.530000 CVE-2022-37708,0,0,8666c4b20e83578726c025b6fad489dc2c7e927d0fa6b0e109a75e90ff1e9cb6,2023-11-07T03:49:53.170000 @@ -205558,8 +205558,8 @@ CVE-2022-38831,0,0,59cee82c4f11ec45fb3cb4b5703165866b5ec6afbfcbae1d6e6b31e591987 CVE-2022-38832,0,0,84a2ed039ade8a00b6e1d04c8a1044a2ceec615671f1c5c09fe034fc24cf6dd8,2024-11-21T07:17:09.090000 CVE-2022-38833,0,0,7061cebc50e54b5fe48ef32e80692d61caeb6fae8a2210f366f4c3612264b296,2024-11-21T07:17:09.247000 CVE-2022-3884,0,0,279904a643aacef394203a88373c8c58b5d5c828f08daf4927949f83c701072f,2024-11-21T07:20:26.113000 -CVE-2022-38840,0,1,10a74b1480e693fcd2a0c7fe2335e6d74894b4e003b098a88cb48ffa7320f58c,2025-02-06T17:15:13.210000 -CVE-2022-38841,0,1,0b47108f0d719e63f22c98c774738d95a58c73ffb91c56c60cbf5dfc75ee51a8,2025-02-06T17:15:13.410000 +CVE-2022-38840,0,0,10a74b1480e693fcd2a0c7fe2335e6d74894b4e003b098a88cb48ffa7320f58c,2025-02-06T17:15:13.210000 +CVE-2022-38841,0,0,0b47108f0d719e63f22c98c774738d95a58c73ffb91c56c60cbf5dfc75ee51a8,2025-02-06T17:15:13.410000 CVE-2022-38843,0,0,917e3ed33f4c4f1225f3a3036951f64e18b9081054a14281bdb9f2d5335e202c,2024-11-21T07:17:09.703000 CVE-2022-38844,0,0,54a32aca4b899436d96e2012002b94ef53dd9c233a0228d7e7f6f962ae2b491d,2024-11-21T07:17:09.857000 CVE-2022-38845,0,0,403e4ad2f256cfe30388293eec202458d32e8871557ff7eb065a5a8ec5c24396,2024-11-21T07:17:10 @@ -206677,7 +206677,7 @@ CVE-2022-40487,0,0,3e3d775e7a40491c3fd4d116c3ae8f05738f2c0d5feb06cb1e31e35f3f01d CVE-2022-40488,0,0,3a8a60e130cf17ecdc391d08fa8819ea901ca1525bde3b2f0bba2c689d09f151,2024-11-21T07:21:27.667000 CVE-2022-40489,0,0,e743d656669d32e037781e2d73364c483b588e68b764611e48cdeec3098fcd14,2024-11-21T07:21:27.823000 CVE-2022-4049,0,0,f0a411220edc73602e7bcd0290ef45b973b7200946950e80279abfcb153b81f2,2024-11-21T07:34:30.693000 -CVE-2022-40490,1,1,1248f71647fa59a3a895fd4dc8fb8c7cd8650ddb56da537b3df8a64f7090500a,2025-02-06T17:15:13.640000 +CVE-2022-40490,0,0,1248f71647fa59a3a895fd4dc8fb8c7cd8650ddb56da537b3df8a64f7090500a,2025-02-06T17:15:13.640000 CVE-2022-40494,0,0,bc574e1a4388e8f99a5ee1ca01ffcadbe85a17cbcf626930aed7366ddb80107e,2024-11-21T07:21:27.980000 CVE-2022-40497,0,0,718b25a3e9ff61f82c28c3226d1972f3ae3dd1d71111e6da5c3dcfb3038a8996,2024-11-21T07:21:28.137000 CVE-2022-4050,0,0,8bef661e08e4a418d1cdaf389dc8b12f38ea24cd284f0e02a2d862de17600bc9,2024-11-21T07:34:30.787000 @@ -207042,7 +207042,7 @@ CVE-2022-4090,0,0,6635dd16c911029122ada3aff58c2fdd886219dfb991b1c32f2b95fbe86b07 CVE-2022-40903,0,0,5a716fd283dc9ccc412b02ef5152b5affed451b884f2914c51ac6763bac5d7d4,2024-11-21T07:22:14.360000 CVE-2022-4091,0,0,810b813da55e40407b6a58ab6089f3d2217d2e74b11372cc5db7ba4f20adfd85,2024-11-21T07:34:34.003000 CVE-2022-40912,0,0,a3b9d253bf559fe5033adde53eb07b854e38f5ca4ca171bd0d4dff541694c281,2024-11-21T07:22:14.523000 -CVE-2022-40916,1,1,51c6ced3ed0f18e0d749d62b6dafd34aa3ffd0f9c31699d25b25c0b2f96fb11b,2025-02-06T17:15:13.757000 +CVE-2022-40916,0,0,51c6ced3ed0f18e0d749d62b6dafd34aa3ffd0f9c31699d25b25c0b2f96fb11b,2025-02-06T17:15:13.757000 CVE-2022-40918,0,0,ada396d447a951b504689c3c6990d1b9529706bbbe7276067fca761169edd11b,2024-11-21T07:22:14.673000 CVE-2022-4092,0,0,1e9eb5c32102b73261130bb8f9fa4983c35ade5e48c301fa2e08178f4fbe1a4a,2024-11-21T07:34:34.127000 CVE-2022-40921,0,0,003a2c3520d6e4ef9557b2d019724c852b0133986327c1cb15e665a48ddf47a9,2024-11-21T07:22:14.830000 @@ -207064,7 +207064,7 @@ CVE-2022-40939,0,0,dba2f259d9a84251c72c01ff475b02b366f73cb4715aae9f4c47641771ba5 CVE-2022-40942,0,0,7b291ca016d3664acfaa687583c918329696f86856aba25a1c0c44b07bb6143a,2024-11-21T07:22:17.040000 CVE-2022-40943,0,0,97f304c0b30a77cbebe24818cabdb898cd4053d8b64255315a8291fb44898fb5,2024-11-21T07:22:17.197000 CVE-2022-40944,0,0,58a4ad43d0d10f01629a367e8a03c70dbdb401591c7e0a5c53db0edc4871deed,2024-11-21T07:22:17.360000 -CVE-2022-40946,0,1,657514247a23d4019514c4be4ea49ed31df545798b64fe3a2569aa4f52653132,2025-02-06T17:15:13.863000 +CVE-2022-40946,0,0,657514247a23d4019514c4be4ea49ed31df545798b64fe3a2569aa4f52653132,2025-02-06T17:15:13.863000 CVE-2022-4095,0,0,1455725e301b8433d4c12c68479ad797be2ad7e06d6cfe40aa08e47e9988947c,2024-11-21T07:34:34.383000 CVE-2022-40954,0,0,764a46138bb7f275703fa4d6701c38674d7256fcaa4284658649cb33f7d75f1e,2024-11-21T07:22:17.677000 CVE-2022-40955,0,0,7e3d3dd62b661fdec6fbf4e3e206895fa44954a434a7406ceade69536df380fb,2024-11-21T07:22:17.800000 @@ -209323,7 +209323,7 @@ CVE-2022-43695,0,0,293d53e20c59cab27ffb6472a0f3193409c1efc1243a6e9d93a007235f642 CVE-2022-43696,0,0,1c9318af86f3e9f799b8c0dc1d01215131459e618231a94eb59c856045ac23eb,2025-02-06T16:15:30.750000 CVE-2022-43697,0,0,eb3e8d9e228f06040151fea161a239c61c3a25c095ae4e5a2d2cec36008483c3,2024-11-21T07:27:04.417000 CVE-2022-43698,0,0,79ef976c373d7153c2390503b60ec1c4fc94088a00ed9bb1974b983fbe4e4b76,2024-11-21T07:27:04.587000 -CVE-2022-43699,0,0,2d7b9988e3415299a1d4c25b2157ca96a15a1d017060e5fa42981ef12151c24d,2024-11-21T07:27:04.750000 +CVE-2022-43699,0,1,c3a3955f6f55b7bd187ce6052f489e724fecc068155713391a15bb7ae00bf79d,2025-02-06T20:15:38.100000 CVE-2022-4370,0,0,ba2caa6acdfdba172db4c33674af1636695b5af2c4d163f106737ccecd73b6d3,2024-11-21T07:35:08.927000 CVE-2022-43701,0,0,3d2b59e4a46072d080ba8e951404c448c89a3b251eab091c2d42febd3c1a055e,2024-11-21T07:27:04.930000 CVE-2022-43702,0,0,8dddd18244ba788bd8edf38674de23df7653853c4ee884dda915b59e523b84c6,2024-11-21T07:27:05.167000 @@ -209857,16 +209857,16 @@ CVE-2022-44500,0,0,b21789a06c67e872d5d73daab04f115073f5faa5e6ec649e0d7f940af0d83 CVE-2022-44502,0,0,b5562c7b8267cf67bf0ad6ca70179251fa1596a66e437cdd39ac0d59e88570fa,2024-11-21T07:28:05.083000 CVE-2022-4451,0,0,71bd0c76cc1206fc647acf97e23ac3111e5623c6dfa8588b7cd098d39f11a0f8,2024-11-21T07:35:17.343000 CVE-2022-44510,0,0,25c4d0e9515b57632bcb3ae200f1085ef683d9e98b07dbc882d3305076a893b5,2024-11-21T07:28:05.197000 -CVE-2022-44512,0,1,43f4e241cc8b703ceac411c19cd4d7c842322086847b0281c360ef59d25eb6a8,2025-02-06T18:19:26.530000 -CVE-2022-44513,0,1,e3e2f49bfcd0b9b1436ecc66c933735e22e67eb9a4aa92e897c2b432b665c954,2025-02-06T18:19:01.817000 -CVE-2022-44514,0,1,a658d2d09616fd939578b51c7368336af3e7b0a30d7e0448683bc8bb60b51c43,2025-02-06T18:18:56.893000 +CVE-2022-44512,0,0,43f4e241cc8b703ceac411c19cd4d7c842322086847b0281c360ef59d25eb6a8,2025-02-06T18:19:26.530000 +CVE-2022-44513,0,0,e3e2f49bfcd0b9b1436ecc66c933735e22e67eb9a4aa92e897c2b432b665c954,2025-02-06T18:19:01.817000 +CVE-2022-44514,0,0,a658d2d09616fd939578b51c7368336af3e7b0a30d7e0448683bc8bb60b51c43,2025-02-06T18:18:56.893000 CVE-2022-44515,0,0,004c68ba228620c9bfa946f96d77bfedf1b633104b1152d1ad38820b1d6acee9,2025-01-10T21:45:05.453000 CVE-2022-44516,0,0,10cf8c6b3af1312eb7f3f4434d8e5f425aba720b7d2420da955195b77b8d3d44,2025-01-10T21:45:25.627000 CVE-2022-44517,0,0,ccc15602d38bddebac18cb5a9d44df501defa8447eae66a93833787eacaf8b98,2025-01-10T21:45:27.867000 -CVE-2022-44518,0,1,3c54c3361891defef02b1aa0736a87e2c252156a704df15c4d4aeb4185b3ba4e,2025-02-06T18:18:48.313000 -CVE-2022-44519,0,1,cc1ada6c39375fd2802c31d59270818d4447227a79131ab7cee4a29dd5843a61,2025-02-06T18:18:40.520000 +CVE-2022-44518,0,0,3c54c3361891defef02b1aa0736a87e2c252156a704df15c4d4aeb4185b3ba4e,2025-02-06T18:18:48.313000 +CVE-2022-44519,0,0,cc1ada6c39375fd2802c31d59270818d4447227a79131ab7cee4a29dd5843a61,2025-02-06T18:18:40.520000 CVE-2022-4452,0,0,e23ff09cf254521b138d2873c6b347ecad79392d4de44954995ce14268d350c9,2024-11-21T07:35:17.463000 -CVE-2022-44520,0,1,1e4ac3c72f3a3996de3162f75f660d0d6e9cf3bcef69a451dd4906eebe3b68f6,2025-02-06T18:18:29.747000 +CVE-2022-44520,0,0,1e4ac3c72f3a3996de3162f75f660d0d6e9cf3bcef69a451dd4906eebe3b68f6,2025-02-06T18:18:29.747000 CVE-2022-4453,0,0,9b00e366e9d0c0ef9c324b7b982b02b3dcac63ebb143aa7afbf887a477161fb4,2024-11-21T07:35:17.583000 CVE-2022-44532,0,0,4207f3e98f5233bb1738bdd6c69782a0cd2348956681f5d35417e00bb16bafe5,2024-11-21T07:28:05.340000 CVE-2022-44533,0,0,35103e589f79c98255b730dc3b424c6479616183eb90f9be40ddec7fdd1d6e6e,2024-11-21T07:28:05.460000 @@ -210029,7 +210029,7 @@ CVE-2022-44720,0,0,2978ccbe30cfbda91896f60a736487ad01b21b513e713e778a2a081311bef CVE-2022-44721,0,0,2e97be297496e44c127508c29458d8f33303250a874d5f326d4cccfed3156c62,2023-11-07T03:54:25.470000 CVE-2022-44724,0,0,a0eaf24c5c29bd813efd4d612a631475cbc4b4deda27fceea2d2c9a15aa2b006,2024-11-21T07:28:22.253000 CVE-2022-44725,0,0,9ea9382380fc7c89b2bf93af5ae18e31451294b8328bfabdb889ffbce68f671b,2024-11-21T07:28:22.413000 -CVE-2022-44726,0,1,5e01558008a2afd6ce8600ada999fc51b78d198aff1100f35245c2514e06c44c,2025-02-06T17:15:14.047000 +CVE-2022-44726,0,0,5e01558008a2afd6ce8600ada999fc51b78d198aff1100f35245c2514e06c44c,2025-02-06T17:15:14.047000 CVE-2022-44727,0,0,27b3bdc679176b56bc03aafc66aa522c681973495a21c0ece94a079dfb136a34,2024-11-21T07:28:22.710000 CVE-2022-44729,0,0,4719780fbbb3574036caed59238ad5e6115b457fd98b6bdf8991e092b37166c3,2024-11-21T07:28:22.877000 CVE-2022-4473,0,0,58e73416f5237009fea1380d431588d86e1d62533f0239df70f20398613a0bec,2024-11-21T07:35:20.013000 @@ -211348,7 +211348,7 @@ CVE-2022-46676,0,0,e38304fcbef4b32e2826f6bc190ff7755ffd6b9a24bc8575ae897a1d0936c CVE-2022-46677,0,0,65b4401f5ca7341a31013dae28b64616ced0a7443dba626730a4ee57b246cccb,2024-11-21T07:30:53.063000 CVE-2022-46678,0,0,78430349948728de8d669f38f53f8ddb34e478583f35501f8036ec797103c127,2024-11-21T07:30:53.193000 CVE-2022-46679,0,0,5fa7da53a45076247b5fc2ffd3b1160875905c295e63f0d911e66782a942104b,2024-11-21T07:30:53.320000 -CVE-2022-4668,0,0,6fc3672fca275db3d6893a06c90ef6198bdc34bb93d2ff048885c35615e045aa,2024-11-21T07:35:42.093000 +CVE-2022-4668,0,1,379e56e5d54d26752ee01026e45fd3a19e733f7b76a672b4c4712898db6c9c93,2025-02-06T19:03:15.920000 CVE-2022-46680,0,0,c98efc1285a21af55fd2d07f82a9ec46ede0d50b481cde1b56a7efab49ed6ead,2024-11-21T07:30:53.443000 CVE-2022-46681,0,0,fe3919a672e9690874203a4cf1059b2f2a755098884dd435a7e6be8b248d981f,2023-11-07T03:55:48.520000 CVE-2022-46682,0,0,a9428e0078693c8c6d0fadf0296aadafafd12f56ba5e658d26ed9a94686d993e,2024-11-21T07:30:53.593000 @@ -212389,9 +212389,9 @@ CVE-2022-48309,0,0,fa4e4dee6510653e70a2f6a4d8bfba631a754134015722275c8ac9c50fb65 CVE-2022-4831,0,0,f3a096c06597b8e18b75ac644035ee7a465b6ea70b28d2895528d5c3f7fcfd7c,2024-11-21T07:36:01.990000 CVE-2022-48310,0,0,c41b5ca698aa90c6a2c33f8bbebd566bc9f19e0a3c7a93e99d7cfb508fb03e8e,2024-11-21T07:33:08.327000 CVE-2022-48311,0,0,99eb94960d1d92fd799b3d32286c60d09595170e9d761d77ec69c490c43f1c77,2024-11-21T07:33:08.447000 -CVE-2022-48312,0,1,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000 -CVE-2022-48313,0,1,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000 -CVE-2022-48314,0,1,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000 +CVE-2022-48312,0,0,bec59e47dfb2e4094906ec17562aba4cdf6be4c4ce63944a8d9e3c8d7d7a58d8,2025-02-06T17:15:14.253000 +CVE-2022-48313,0,0,fe9586966c1ecaaeb40ddf7a3e5514f39dc3f74450e5264891e068a90268852f,2025-02-06T17:15:14.450000 +CVE-2022-48314,0,0,1b1df12682c8b2f13fcf1ebcbf7e95e664b833fc8341f50a69c9e95111e5ee19,2025-02-06T17:15:14.643000 CVE-2022-48317,0,0,6cc5d9ed01dd202ead21a0ca5b4046abc8fc403b434aa48870ba404628ada8ce,2024-11-21T07:33:08.940000 CVE-2022-48318,0,0,1ca6e7ea96cbcef96fe0b6a09ab5b59a1b8e7dcb477c03ca7a934646d77b6af3,2024-11-21T07:33:09.080000 CVE-2022-48319,0,0,8fd0acc25ca20d5b783035c6d4267f7fd4d68bee427f5f6719eb8712157fccfd,2024-11-21T07:33:09.233000 @@ -213533,7 +213533,7 @@ CVE-2023-0370,0,0,95ce5a3a45532cb2269c1ad171161c1d386ae478c6effc8d9e6ec0104b9c68 CVE-2023-0371,0,0,399b61b5d12d6fa2fd6237ec1963a8bb821231352b64e295416361b2545aedb3,2024-11-21T07:37:03.980000 CVE-2023-0372,0,0,9605cf8257987f4bfdb63a268f482adb7b387992e0c488953292d1b8f311bcf5,2024-11-21T07:37:04.087000 CVE-2023-0373,0,0,5a5a92f8255847fd3865041d0a10b38ad28f1c8dff9cb08ad63248a7a3d7dcb1,2024-11-21T07:37:04.190000 -CVE-2023-0374,0,1,633a9a294e814491e1a7ea13315bb20a5e78ff21f82e67f8bbeeaf697f886eca,2025-02-06T17:15:14.833000 +CVE-2023-0374,0,0,633a9a294e814491e1a7ea13315bb20a5e78ff21f82e67f8bbeeaf697f886eca,2025-02-06T17:15:14.833000 CVE-2023-0375,0,0,195d65f9fad90ae6a808974c6d5b12b1f0946ca8a2fc977b0fe46b1dba05b4ce,2024-11-21T07:37:04.400000 CVE-2023-0376,0,0,11e2e11d167ff3062ed2f2d79ae85117d0bc4108e9327c9b271722ebad76c116,2024-11-21T07:37:04.500000 CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000 @@ -213904,7 +213904,7 @@ CVE-2023-0760,0,0,67663c19a3664a892a40ec577e2b05f3f1c6cec24969bb50e47e11ea51cf6f CVE-2023-0761,0,0,1c12e966a31ab5fa981f27f6779c348b172a92660c02ef6161d5e68d0643b7a6,2025-01-24T22:15:32.350000 CVE-2023-0762,0,0,b352c77f507f218efecdfba3d0204deb48d60e35cf3d46c52cf2dd283cb2f84e,2025-01-24T21:15:09.020000 CVE-2023-0763,0,0,66b09a9c98c73290507e7116bff86b7079976cc6357472573cf9f15e006e8dde,2025-01-24T21:15:09.187000 -CVE-2023-0764,0,1,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000 +CVE-2023-0764,0,0,6e4c895cf7ad68ea0d1265c0e4b02d254b4471ca4792e14cb7c2361669d75843,2025-02-06T17:15:14.993000 CVE-2023-0765,0,0,f61c06c3f34d1e7d896bc0eee0c48f4f1a4d8c814a5af0365f04fa235d17dc70,2024-11-21T07:37:46.657000 CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000 CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000 @@ -214445,7 +214445,7 @@ CVE-2023-1327,0,0,8888004c214b15dcf53152f63b0da4d4942d8792b6258df09b6421cd30b67d CVE-2023-1328,0,0,6257f4ab3cba69262261c728a4d409d137b249b6455eadfa7867e07928cd0322,2024-11-21T07:38:55.987000 CVE-2023-1329,0,0,b2e4f3215159542e7296a14fbcf5e79cb24a4fa75367f2e3939929920f0d53cb,2024-12-31T20:15:24.907000 CVE-2023-1330,0,0,fb998c6d385739d0cc045d945db5b6cca250d4f0081b84310e4edeed4d48c72a,2024-11-21T07:38:58.333000 -CVE-2023-1331,0,1,36b5c87712eaba3344dc889bc56b8b5bc41125024364b7bd747ba9f6fc579fa0,2025-02-06T17:15:15.157000 +CVE-2023-1331,0,0,36b5c87712eaba3344dc889bc56b8b5bc41125024364b7bd747ba9f6fc579fa0,2025-02-06T17:15:15.157000 CVE-2023-1333,0,0,d4bafa576022a40fef05d50099c0360fe7172c3408ea7356a3dd933190cf0139,2024-11-21T07:38:58.590000 CVE-2023-1334,0,0,0a23b2e499766fa6ce028552a491e4f8fabba83e78938389658beff7b6f52b68,2024-11-21T07:38:58.720000 CVE-2023-1335,0,0,23ae28dc0a08d388432a6e0801498aec8f549d6330a715757df520febe19e687,2024-11-21T07:38:58.827000 @@ -214485,7 +214485,7 @@ CVE-2023-1369,0,0,d1ce8c77b9888e5df47d2dcad807b6c0260dd2b850245edad6480f9d0bf7ab CVE-2023-1370,0,0,a4713961541b9887cd277d3cbe7363c957356b840218abe29a3dd5eace59bad5,2024-11-21T07:39:03.060000 CVE-2023-1371,0,0,80383f30be94eb561635e8e0d3517dd3e07d53b3ed8784e59dfa50a9f5a8df22,2025-02-06T16:15:32.667000 CVE-2023-1372,0,0,9b596b67bceaa91e79c19cb55381c725afe28199038f335e0b651e4df1d405f8,2024-11-21T07:39:03.317000 -CVE-2023-1373,0,1,d977687b4a8e6474b0707b5d3c9f009533fa5c5abeb367db969f74d26a34fdee,2025-02-06T17:15:15.317000 +CVE-2023-1373,0,0,d977687b4a8e6474b0707b5d3c9f009533fa5c5abeb367db969f74d26a34fdee,2025-02-06T17:15:15.317000 CVE-2023-1374,0,0,e3793b7eef1e59c9a912d3bb73f8a774a14306cca3bb0ebffcea6d11009ab1e1,2024-11-21T07:39:03.550000 CVE-2023-1375,0,0,87d7e1e17d29f9114860bb7bb1c0750b49458d2482107cebd84fab96bd545242,2024-11-21T07:39:03.710000 CVE-2023-1377,0,0,82b36f32ab09f66addf6f9c0f88467da7ae411b2abfbb23f1572923beb1be960,2024-11-21T07:39:03.840000 @@ -216462,7 +216462,7 @@ CVE-2023-21582,0,0,4f5bb933cd17a5c1613aa364a41ce8982934e8b8f3eae19a30c441e8cd6b7 CVE-2023-21583,0,0,da3e056f56ad63f7eae14f2e8d9ffa08b78397274979a093ffb37a9e5e3ee287,2024-11-21T07:43:07.860000 CVE-2023-21584,0,0,9b4764fbfdd2b085572e653159d7e41bc33dae3d1026fdf2ef7488386e1ab612,2024-11-21T07:43:07.970000 CVE-2023-21585,0,0,cff3f3c1e359f7c3a70fbba0253fdce9609b428d2fe451cc230c57a04c06c5d6,2024-11-21T07:43:08.090000 -CVE-2023-21586,0,1,8591935372eb9510e7b478c6bd5aec97c918c26fdfa462ce4db40e192b8a4640,2025-02-06T18:16:08.080000 +CVE-2023-21586,0,0,8591935372eb9510e7b478c6bd5aec97c918c26fdfa462ce4db40e192b8a4640,2025-02-06T18:16:08.080000 CVE-2023-21587,0,0,529caf054840ca5e36185792609bc9be0ffc5215314f723e5c9028d34abee64c,2024-11-21T07:43:08.223000 CVE-2023-21588,0,0,baff138c9f76bdbd381c2c168eebd52f4b047936191139a0418408fd3b806d62,2024-11-21T07:43:08.360000 CVE-2023-21589,0,0,4b9a8c28267032bdbbeeb191175e5f1bfdffcc52264c17cc8c8f9227af3eddc6,2024-11-21T07:43:08.470000 @@ -218893,7 +218893,7 @@ CVE-2023-24498,0,0,e14661a95b82ba61b2d6ebf51f43c3ea526f2c51dd10e773ff4939b7ccf19 CVE-2023-24499,0,0,1ed655353b031a4dcfd6ed04ebef4d3c27e9fb33f6ec380a16eaa7b7e55059a8,2024-11-21T07:47:59.750000 CVE-2023-2450,0,0,99d87a24c6fcfa0ff70c88d30fcda82a024f99560a070914c8bb4299886f96ad,2024-11-21T07:58:38.407000 CVE-2023-24500,0,0,bc76a78e267d0eff6f57d320a2d6df1744d10d392a9214999e2568817c5caf04,2025-02-06T16:15:33.447000 -CVE-2023-24501,0,1,2a631b087835bd60e93f28f35df6aa1a0e09298487c41bfa6c1c3dcfa240a8d2,2025-02-06T17:15:15.583000 +CVE-2023-24501,0,0,2a631b087835bd60e93f28f35df6aa1a0e09298487c41bfa6c1c3dcfa240a8d2,2025-02-06T17:15:15.583000 CVE-2023-24502,0,0,e29f0158af755948beae7c393e50b64a663e255720dec489749995598637b1c0,2025-02-06T16:15:33.627000 CVE-2023-24503,0,0,c003e275f1a3f434623e01ca1a3795dd2cd49bba26041332f7b5107d75894619,2025-02-06T16:15:33.780000 CVE-2023-24504,0,0,8e96012d0421c27284c620915c823b17452b1699071bc5b9ae1532ee0e801c2c,2024-11-21T07:48:00.363000 @@ -221597,10 +221597,10 @@ CVE-2023-27902,0,0,5a7afa3bd09cb30d11e99cd3a7fc28e0609fc9be329ddd95f34a4a77cfee3 CVE-2023-27903,0,0,e46e5f40543432cc18c3b6e9bf1c927ce04a641d4fa05d71e34520ad1a9a2e72,2024-11-21T07:53:40.133000 CVE-2023-27904,0,0,6241dd57d127cc2d03349dfb0f3a19dace4df51e8dd9b7affe039a9ed5d7e8ee,2024-11-21T07:53:40.247000 CVE-2023-27905,0,0,74532d28f54c06cfde21f7f83bdd9076b93ab08f5f555eff743588e0ef9c0dde,2024-11-21T07:53:40.353000 -CVE-2023-27906,0,1,f84678a5c14a673f495d39cce279b3cafcb33503667872993215ce720672ccc3,2025-02-06T17:15:15.723000 -CVE-2023-27907,0,1,529fe9f7de350e05957a30f54fc992aa1ae328976234ed8cc58cc625af878bcb,2025-02-06T17:15:15.877000 +CVE-2023-27906,0,0,f84678a5c14a673f495d39cce279b3cafcb33503667872993215ce720672ccc3,2025-02-06T17:15:15.723000 +CVE-2023-27907,0,0,529fe9f7de350e05957a30f54fc992aa1ae328976234ed8cc58cc625af878bcb,2025-02-06T17:15:15.877000 CVE-2023-27908,0,0,e5b5aa6cccf644aed2de2858000e2e481e5a1e753a191644f6fd5a2875689fb6,2024-11-21T07:53:40.683000 -CVE-2023-27909,0,1,4519d182699505b4e8df24ac41a58d566fd3da2b711222d9a7009f6b09929789,2025-02-06T17:15:16.037000 +CVE-2023-27909,0,0,4519d182699505b4e8df24ac41a58d566fd3da2b711222d9a7009f6b09929789,2025-02-06T17:15:16.037000 CVE-2023-2791,0,0,c8ee51012392a88bd0879257640228475c635b0a71baa8e9fedfb8efce3b3135,2024-11-21T07:59:17.860000 CVE-2023-27910,0,0,5aa749f03e40b4091b1f1b3bf063292b84c8d80b371e8f82e3972b90ca1eeef3,2025-02-06T16:15:35.197000 CVE-2023-27911,0,0,37981897da4c7e23867bde8da742bd9ae416de2486e4912ba5c0ffca1b9bd695,2025-02-06T16:15:35.373000 @@ -221782,14 +221782,14 @@ CVE-2023-28080,0,0,bcaa89d83ba7747557ea8e703d9ee4bff4151a4ac3094ba10ac19d91c6066 CVE-2023-28081,0,0,7289654491c3d473b1b6c3413742dd8928cbec69593667b0d1d0f1c479da3150,2025-01-21T21:15:09.707000 CVE-2023-28083,0,0,ddf34e98ce02adf73f4c298d8667ca2338e71ade2cfd8a0784e7ca556070bb43,2024-11-21T07:54:22 CVE-2023-28084,0,0,9f79cb7a9ebf99ee66ae674a554cd30d51834e54a933e3a6b6a91cb92027a20b,2025-02-03T17:15:12.930000 -CVE-2023-28085,0,0,cd7cbddd0c1f8f24375b002cb372898569fc5b9bcacfb1a9b4880f261dcf26b2,2024-11-21T07:54:22.287000 +CVE-2023-28085,0,1,d6ad342ca4bd8786fc0bbde968da85325e486fa4a53687ef3c5b06a23adcaf9e,2025-02-06T20:15:38.483000 CVE-2023-28086,0,0,8cd805b9de56c4d83501632e7c1bf11a3c2a701a5525bb264d93e4d7457e8edf,2025-02-03T18:15:29.210000 CVE-2023-28087,0,0,e8d2a395ea90c3fca26b5c42f03ca9bfaec2c087691255f0e2042b6d232af628,2025-02-03T18:15:29.390000 CVE-2023-28088,0,0,3115db2774cf28e4f5677d996e019dff4cdd9782363caa31df05dd7ac8dd2d00,2025-02-03T17:15:13.147000 CVE-2023-28089,0,0,8038f737015b1cea5c80ff26d9b03c652f37096687c4ca8f5a19f7ac6bd74834,2025-02-03T17:15:13.320000 CVE-2023-2809,0,0,077393c58c8990f29f8e82ad241722cf36fab954ed97d4fc720fdd591c7e00b6,2024-11-21T07:59:19.990000 CVE-2023-28090,0,0,a87ffa52ba290df0e5b828881d9f1b9de04b7261b9f0f8fa0f61680a1944de79,2025-02-03T17:15:13.480000 -CVE-2023-28091,0,0,9658ff0f48112888e1757f6429b78baa896a59826de115ccf5e89ee600fbaf50,2024-11-21T07:54:23.033000 +CVE-2023-28091,0,1,2fac4128d71d5aa19399e259283fbb3256df459c3dcf0924fe4bd1a5e72e2344,2025-02-06T20:15:38.647000 CVE-2023-28092,0,0,fa9a6e25c46e37f1ee9a255bbf33cc96208208da5465dd635479cb57349ae6e6,2024-11-21T07:54:23.150000 CVE-2023-28093,0,0,259bdd06199123fa465d95db621eeb8ee389e1259607020367a23d832cd811c9,2024-11-21T07:54:23.293000 CVE-2023-28094,0,0,5bcd476b1754f5150cc1e276ae628754bb67341403844f64654a5132ee5d7d9f,2024-11-21T07:54:23.410000 @@ -223119,8 +223119,8 @@ CVE-2023-29503,0,0,6dadcb52cd64ab626bd2670a8ebb2bee2174174d745dfdb443523714a9eef CVE-2023-29504,0,0,3d53305a826d491cf08ebfe127410f07d3c8c0bc27d6f6e7e4e6f100a3146620,2024-11-21T07:57:11.420000 CVE-2023-29505,0,0,c5be9f26b1d09f6357b3f5fc00ed863fd7a07de779b95abeb03033ab7169f9cc,2024-11-21T07:57:11.540000 CVE-2023-29506,0,0,6d765693b8931e3de9eccb1df1cfc8db5e5e8da3e5c6663113c9684f4f6cc8be,2024-11-21T07:57:11.703000 -CVE-2023-29507,0,1,82be1bb718bc7351da0f1bbd46a4dda5e4b8cbcf27ab4560fef3376bbc2f292a,2025-02-06T17:15:16.757000 -CVE-2023-29508,0,1,83dc0f1c1640e09ae93f27ebe5151f9e0b2e781c1cd992df8984ca8e6b6c7110,2025-02-06T17:15:16.897000 +CVE-2023-29507,0,0,82be1bb718bc7351da0f1bbd46a4dda5e4b8cbcf27ab4560fef3376bbc2f292a,2025-02-06T17:15:16.757000 +CVE-2023-29508,0,0,83dc0f1c1640e09ae93f27ebe5151f9e0b2e781c1cd992df8984ca8e6b6c7110,2025-02-06T17:15:16.897000 CVE-2023-29509,0,0,59b9b25cb3313fd8f99bd3e50f7daf5a98dbfc8562af146ad03b42cb6d6c195e,2024-11-21T07:57:12.070000 CVE-2023-2951,0,0,754a5d9109a3f14930a634f818acf4807eb4a569014a410c897f211625a7d1f8,2024-11-21T07:59:38.030000 CVE-2023-29510,0,0,db75fd1d0a673bf309ce3df67ed5e91157eb8ef8f1105acfc4ca5266b7775bf7,2024-11-21T07:57:12.180000 @@ -223218,7 +223218,7 @@ CVE-2023-29643,0,0,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000 CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000 CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000 -CVE-2023-29665,0,1,67ffe746206b592be7422c2be60636b018b0d11ea9be1e6cd7bbf9d7b509d837,2025-02-06T17:15:17.080000 +CVE-2023-29665,0,0,67ffe746206b592be7422c2be60636b018b0d11ea9be1e6cd7bbf9d7b509d837,2025-02-06T17:15:17.080000 CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000 CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000 CVE-2023-29680,0,0,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000 @@ -229136,7 +229136,7 @@ CVE-2023-37576,0,0,fcd07926f2163c1d31f546297f0ea50216bf25b3a984eff0c6da2e31a22ad CVE-2023-37577,0,0,b0fd59cabf196c2dce306a3dfd18b0e7769f587e98763971c0f69d8f471204a6,2024-11-21T08:11:59.383000 CVE-2023-37578,0,0,db1d011239168d2f0753523137a605241d87dd361fa246b7536264b2cfd1972e,2024-11-21T08:11:59.510000 CVE-2023-37579,0,0,4619aa08d1ce28c3366bb44966075d308cc27715f020dfd6296b225d60c0dab2,2024-11-21T08:11:59.647000 -CVE-2023-3758,0,1,66dfa7da71c29fdd2b245f8df2204f07ac231a0eae8609ba676c08eb8a95ccab,2025-02-06T17:15:17.657000 +CVE-2023-3758,0,0,66dfa7da71c29fdd2b245f8df2204f07ac231a0eae8609ba676c08eb8a95ccab,2025-02-06T17:15:17.657000 CVE-2023-37580,0,0,8d275160b93ac9ce8ee9bc0d58aec68c130469746723ee6767d328399913bc21,2025-01-27T21:55:19.183000 CVE-2023-37581,0,0,093be304138d0cca6e8decef8cb1e83d94e4f8751f573ee26489914f63ec252d,2024-11-21T08:11:59.950000 CVE-2023-37582,0,0,83f623ea677c4e03b8b7f4d8be4b6877901642b17d5bbd39e639c2f5c032e28f,2024-11-21T08:12:00.090000 @@ -229535,15 +229535,15 @@ CVE-2023-38091,0,0,bb51561f633dfa9891e93d0d8bcd8000995761cdc22f32bc9f98c37884bd0 CVE-2023-38092,0,0,eeb5a6c329e6c65e8abacec96db2e4fb84dcff4c0070fc07665e62604432a908,2024-11-21T08:12:50.570000 CVE-2023-38093,0,0,743035d11b5fa9e12e03505e0c6dd6217b546b8b67ef47737ecd6c13d936b658,2024-11-21T08:12:50.690000 CVE-2023-38094,0,0,b8b2708825f84b31ace9f1b788457d4e79340f3b36fc654efcc5db04dbb30b33,2024-11-21T08:12:50.813000 -CVE-2023-38095,0,1,537650068edd2fb43c6a6dc8f901f100fea80ba698ba75ebe6a920ed25916af5,2025-02-06T18:01:51.207000 -CVE-2023-38096,0,1,0641bfcb8616c92ce18e8dcb3c8057968bda6b9263496d01d65a8eced4d1d2ba,2025-02-06T18:01:32.923000 -CVE-2023-38097,0,1,4bb9369d26b4740cc0197f3971b79c32437bbd02d1d8a76e09fa9e29d8ce85ea,2025-02-06T18:01:59.430000 -CVE-2023-38098,0,1,9faf784ed6b23beb68229ec7f296cd859a715f2125402bf570bd83d48381cb35,2025-02-06T18:01:42.617000 -CVE-2023-38099,0,1,76dfe14bbcb2ccd9f177d1a2c79ba6a5fa8ce71b8d9f346026dc3ee5fca450ab,2025-02-06T18:01:12.890000 +CVE-2023-38095,0,0,537650068edd2fb43c6a6dc8f901f100fea80ba698ba75ebe6a920ed25916af5,2025-02-06T18:01:51.207000 +CVE-2023-38096,0,0,0641bfcb8616c92ce18e8dcb3c8057968bda6b9263496d01d65a8eced4d1d2ba,2025-02-06T18:01:32.923000 +CVE-2023-38097,0,0,4bb9369d26b4740cc0197f3971b79c32437bbd02d1d8a76e09fa9e29d8ce85ea,2025-02-06T18:01:59.430000 +CVE-2023-38098,0,0,9faf784ed6b23beb68229ec7f296cd859a715f2125402bf570bd83d48381cb35,2025-02-06T18:01:42.617000 +CVE-2023-38099,0,0,76dfe14bbcb2ccd9f177d1a2c79ba6a5fa8ce71b8d9f346026dc3ee5fca450ab,2025-02-06T18:01:12.890000 CVE-2023-3810,0,0,e2f5a70a9f5a08c44ce434ae49a185c38246e73f8c3412f8643bf0b4516a06a2,2024-11-21T08:18:07.190000 -CVE-2023-38100,0,1,431581815a8d4dbd651fd2fd093dd033b53fbbe0d944595eb3729937070da158,2025-02-06T18:01:21.237000 -CVE-2023-38101,0,1,b889ad0bb101b843b7bf65647841d4f04ec8742d29368fe6164027dcd66fe1fc,2025-02-06T18:01:03.677000 -CVE-2023-38102,0,1,35ed89124ca412237b18b7c4207a7a53ad5af5e292b72e0864b6fb73d1b814eb,2025-02-06T18:00:50.560000 +CVE-2023-38100,0,0,431581815a8d4dbd651fd2fd093dd033b53fbbe0d944595eb3729937070da158,2025-02-06T18:01:21.237000 +CVE-2023-38101,0,0,b889ad0bb101b843b7bf65647841d4f04ec8742d29368fe6164027dcd66fe1fc,2025-02-06T18:01:03.677000 +CVE-2023-38102,0,0,35ed89124ca412237b18b7c4207a7a53ad5af5e292b72e0864b6fb73d1b814eb,2025-02-06T18:00:50.560000 CVE-2023-38103,0,0,3cdce54e162150da464da399c9b9e1c4388b7ac2145c716d720abb464f083fed,2024-12-17T15:42:00.237000 CVE-2023-38104,0,0,5528faae49391c960e915d48b6773e68e3e1a04370f96c6152370adf1281351b,2024-12-17T15:42:12.487000 CVE-2023-38105,0,0,0f928ec871a53c3c8baa75735f9a5f1c2658b9f931e1560b3d891d20c65e5b10,2024-11-21T08:12:52.193000 @@ -229946,7 +229946,7 @@ CVE-2023-38507,0,0,cac8fc0fc6e74b95c9eec0c97622519f8a153f1028f2d03b5265342e0f3d0 CVE-2023-38508,0,0,0c25ca91d6d490d5602f8284ef12f35fd813864a46f92e09f4792069c4cacbab,2024-11-21T08:13:43.343000 CVE-2023-38509,0,0,1520331cd8a5f6cdc7f0de9aaea7c0adb976fbe7f0d4ec1e78fbbc081a929ac6,2024-11-21T08:13:43.487000 CVE-2023-38510,0,0,a0b8688f15740e2485288121ce661be685f802c5e9dcc49ed3f2510b0a4a5e36,2024-11-21T08:13:43.610000 -CVE-2023-38511,0,0,27d95c73f79e18a7ef3b7fa4d2f5bc1b5ab72ffadb71f17efcab66746964b304,2024-11-21T08:13:43.750000 +CVE-2023-38511,0,1,d2b7c10baf4a757e619105a55239a8cb3ef279b9fbb142551ecc46ef820be2ee,2025-02-06T20:55:41.760000 CVE-2023-38512,0,0,12731a7362d56a8ba96faaae329eb71207136467c0d724c56cb2caba80f219d2,2024-11-21T08:13:43.897000 CVE-2023-38513,0,0,7e65b204a99947e6c65f012292ab5b2584dc8160768c8ee545999958eb1e21d8,2024-11-21T08:13:44.033000 CVE-2023-38514,0,0,dc99245b98888c2c3012c61144ebe7b3d169fdb9247a15f88b24ab016e0d8120,2024-12-13T15:15:20.030000 @@ -233977,7 +233977,7 @@ CVE-2023-43787,0,0,c4a946eaaedc74ad6717a8a87ac5bff32eafbbc7a96a1f58f319cb3f0554a CVE-2023-43788,0,0,e46a9e0f2d54e96e96ca6b67fbec85e743967d3ab5a3227a89d83df8aec006d2,2024-11-21T08:24:47.003000 CVE-2023-43789,0,0,14b196f006d2a36e06a2005180ca27aeb1455849efae4d9a719da7d610e0d9f6,2024-11-21T08:24:47.163000 CVE-2023-4379,0,0,1d264e989151036db3f2ea2b62b6658878b29f0bd734693fbb4b8dae0b37645a,2024-11-21T08:34:58.093000 -CVE-2023-43790,0,0,5ae411a6781b72b641d67ed75017ca69b26e6b73efccd90d510e44b000ccd5b3,2024-11-21T08:24:47.323000 +CVE-2023-43790,0,1,fac96f32c34ff1619c08026acd14dfbba76a9f79a4dd2cfed967b264b4870641,2025-02-06T20:56:06.907000 CVE-2023-43791,0,0,144e007105541e0b4f8afe28b58293f30c7ede47d06ec491037e641cb46893fd,2024-11-21T08:24:47.447000 CVE-2023-43792,0,0,fcd1e8baab9825a9917cb478cfb7eed2008ddf8f7d8f167f50f7ccf39854cc0b,2024-11-21T08:24:47.610000 CVE-2023-43793,0,0,d12c191af8b25b542536a8e29428ad088566911eb873ea088f20601a3ba7504f,2024-11-21T08:24:47.737000 @@ -234463,7 +234463,7 @@ CVE-2023-44392,0,0,af7e339914c7d435a19fe30f529c698a395ce04ea000d3853d52be1f9d0ac CVE-2023-44393,0,0,bf38ec3b7b6a8ae3e0d2b448d3bba1c29838161d649eefc3522bfe91e8e3b384,2024-11-21T08:25:48.623000 CVE-2023-44394,0,0,ed79f13500223849653fe85bd1dbca65e7a791757ec61085047d11d390e74498,2024-11-21T08:25:48.777000 CVE-2023-44395,0,0,bc324d53fd48a51978201b97e3396ff53b00af251c5d5b84d30bdf40705a3e8b,2024-11-21T08:25:48.913000 -CVE-2023-44396,0,0,1218ce67989dd3d82122c7a71f034069a1ce797e4ed99b0dc59ef6b0a27fe1be,2024-11-21T08:25:49.063000 +CVE-2023-44396,0,1,510c79d8b212f11927e1b279cb5e51584e8899d3d0ae6c41e73b25807963f3fe,2025-02-06T20:56:16.497000 CVE-2023-44397,0,0,6a18dde70f8b826f15906c397d98bd6825e87089de676e1aab82bd3884052bd5,2024-11-21T08:25:49.193000 CVE-2023-44398,0,0,224d4ed8944813effaac5176663434e0a20902a5598bd2749f8da326c9aa6daa,2024-11-21T08:25:49.320000 CVE-2023-44399,0,0,3a764591c21c5d09532c22d5d98081b6f00efd965f1350cb0c2a0dc42d109903,2024-11-21T08:25:49.450000 @@ -235282,7 +235282,7 @@ CVE-2023-45804,0,0,dc3dcadd1fa31289495558cbc9b18ddf506c53bed3ec877dd82065d35e3d6 CVE-2023-45805,0,0,c5af310fe66f01d667b7fb5cddce1349736cd3217071ab78f14903c02f3aa58c,2024-11-21T08:27:23.383000 CVE-2023-45806,0,0,c05b966e1560e265903f6becc8050636b81b223d0abd4b86cbb2ffb7456407f9,2024-11-21T08:27:23.527000 CVE-2023-45807,0,0,b371a0374d426fad7b85dc360cebf5342fe87a7842cec427f73dde9681f6dfe4,2024-11-21T08:27:23.667000 -CVE-2023-45808,0,0,e9e2197b5228580f7d7368549051784f481250e2a7ecb1cbfb5bf5623379a605,2024-11-21T08:27:23.783000 +CVE-2023-45808,0,1,714675e06d5beef1627b2bdc41caeb2b37394c0183b3a9020770078f7b7c4efa,2025-02-06T20:58:02.757000 CVE-2023-45809,0,0,f7d8017f34c62a7de1d7f2523f37f053fe1b07e8605c609ca6574eaafcd4221d,2024-11-21T08:27:23.907000 CVE-2023-4581,0,0,bd1d2378f330bd780809dd4baa0835770e2299240d35d4714e71e7bad6bbce09,2024-11-21T08:35:28.540000 CVE-2023-45810,0,0,0cee8b3e318639b334fe833df5dc7bed6794de0c3f8c2566df5337446840ed97,2024-11-21T08:27:24.053000 @@ -236319,7 +236319,7 @@ CVE-2023-4712,0,0,b2567f4f915515f140537a5f8b4f62540160c07e1181c419c14df598f4a47b CVE-2023-47120,0,0,80d9f711ba6509e6255ff749327bdac587dd69d0609131201240d3ef8aa6cbdc,2024-11-21T08:29:49.150000 CVE-2023-47121,0,0,f56da2e7b7090c8a3e94aedc96e0af5f28f62b1416ef9d9bd2135c1440584318,2024-11-21T08:29:49.280000 CVE-2023-47122,0,0,b6e5b7f3a33a4575577a334cecdb8904261cfee8edc4934432c0ab6ee1c152a5,2024-11-21T08:29:49.413000 -CVE-2023-47123,0,0,950a0e6f9da94421d5f7947da5ed0834cf1f5ccfb21984f0be0ff77efd6f2386,2024-11-21T08:29:49.547000 +CVE-2023-47123,0,1,8e7d3b4ecb0b88b44e6a996a69b3b318fc542b0d61dff22a31f076e97bef0937,2025-02-06T20:59:58.567000 CVE-2023-47124,0,0,228d1785daa2eaa055b13dd4f2820d8180005fa1c7a0ee1bb9aa7c296246e05a,2024-11-21T08:29:49.663000 CVE-2023-47125,0,0,80c78fbc0ddeaf2a7ec55315d896b93a8da20ca0c44e4fb7327bb16bf8c6872a,2024-11-21T08:29:49.810000 CVE-2023-47126,0,0,4a989f8384c93cb9ed695a17ee5330e896bc52fb5c40924823a528d2b448cc2e,2024-11-21T08:29:49.943000 @@ -241743,7 +241743,7 @@ CVE-2023-6482,0,0,035a6183f64074fe13ae2084da25aada25c7bbff1a52562c11d5d24d35f51e CVE-2023-6483,0,0,a0482d2f8e9f9e813ad8c17906e75f915de5a8deb85131259a90099f4bf7e864,2024-11-21T08:43:56.447000 CVE-2023-6484,0,0,5e8cf06e66713409144e592c149ffbb6939c3d5aad0efc52d631f7bbbc7ae41a,2024-11-21T08:43:56.590000 CVE-2023-6485,0,0,88189a74e618a8780b3b3fb22c708fc0ffaa04a9d99cb8e28f399c48705d4981,2024-11-21T08:43:56.757000 -CVE-2023-6486,0,1,c50efa12e83621ea3172a164531db807b812c7bc5823dcea1a0fc162f737d31d,2025-02-06T18:58:52.357000 +CVE-2023-6486,0,0,c50efa12e83621ea3172a164531db807b812c7bc5823dcea1a0fc162f737d31d,2025-02-06T18:58:52.357000 CVE-2023-6487,0,0,23ae3b05d51ce51f76fa3e9d4fb6f7c2f380e6bbbcb03c51f14db68ee81a1ae4,2024-11-21T08:43:57.017000 CVE-2023-6488,0,0,d98f3cfb2d0e78a494791101f8ea0fff358cf4b57a1ea2cf08e8bf6dfb2dee4d,2024-11-21T08:43:57.150000 CVE-2023-6489,0,0,a9e4d7a039c991299a330f31e1936aa9d07858cc5c43626bc1bfc6ea780b752e,2024-12-11T19:06:06.800000 @@ -242163,10 +242163,10 @@ CVE-2023-6957,0,0,ae6e32578d5d74ff3fcf0c3bd27b964f39c4fb55015f001a374a6328ffc642 CVE-2023-6958,0,0,8eff2e5006ddc42d34f29662a93cea1b72db9351fc15f0bfc55007f882f03985,2024-11-21T08:44:55.267000 CVE-2023-6959,0,0,8ec838b66e35b19352010350b88da588492a0c4f4f1036ef3700c0fbdd552184,2024-11-25T16:47:33.943000 CVE-2023-6960,0,0,b6026c981573a00251f1c36bc13ef75af794522e5812fd8eff4aa7e26dc6a2ca,2024-11-21T08:44:55.563000 -CVE-2023-6961,0,1,89cb45433f8e26b14f3306b32b46bbf8e80e67eb64de5e5403e5343a8f274c7e,2025-02-06T18:40:11.367000 -CVE-2023-6962,0,1,66f618900fdfaaa22e9c739afd3f162cdb00b1772d51df0f7631afccc4d25161,2025-02-06T18:39:37.717000 +CVE-2023-6961,0,0,89cb45433f8e26b14f3306b32b46bbf8e80e67eb64de5e5403e5343a8f274c7e,2025-02-06T18:40:11.367000 +CVE-2023-6962,0,0,66f618900fdfaaa22e9c739afd3f162cdb00b1772d51df0f7631afccc4d25161,2025-02-06T18:39:37.717000 CVE-2023-6963,0,0,01c79ae6ebdcef8bfb9c31ad967ef0972931fd93edc1bd88ea5a1b8e1c328f53,2024-11-25T16:47:33.943000 -CVE-2023-6964,0,1,62ee2c7d615f8230d7786e86f6b4b3fe7611f5b3ff7341e4c5e53f2b3ca4a14c,2025-02-06T18:53:58.280000 +CVE-2023-6964,0,0,62ee2c7d615f8230d7786e86f6b4b3fe7611f5b3ff7341e4c5e53f2b3ca4a14c,2025-02-06T18:53:58.280000 CVE-2023-6965,0,0,671119831e99b85712d14f962400a5f5d2c3e9505fd6f45362771f7c204cacb4,2025-01-22T17:38:52.513000 CVE-2023-6966,0,0,404b8477c36a669c3840eadcbfd58d58203be0eba6f2f11300b8a16c973bcbfc,2024-11-21T08:44:56.403000 CVE-2023-6967,0,0,71a83952da97a18e8c99c2e6cdfbba3ea47b86dcd29e00b7db96e2206ee4bb12,2025-01-22T17:36:41.760000 @@ -242441,7 +242441,7 @@ CVE-2023-7268,0,0,a007920b048244bad12b3daf0ade65763569e4511640cd0844ab63fc1ad6a1 CVE-2023-7269,0,0,808547aae37c3720945cb2e9fb822611d037a6a9f4f70083a54994b35322f068,2024-11-21T08:45:38.383000 CVE-2023-7270,0,0,2cf4371b77ac591f985f4aa4054d5c68cfc25f0a8d757e8da8652827f079b721,2024-11-21T08:45:38.553000 CVE-2023-7271,0,0,d79e2d59a4abb3e53994f65b0f06b3e13e59b6da2f0fa9255e24901196c34c07,2024-11-21T08:45:38.753000 -CVE-2023-7272,0,1,9e7f452cde340b910a18b4f9ee0099908ae833451aa0aac328e7be58b7313621,2025-02-06T18:07:45.847000 +CVE-2023-7272,0,0,9e7f452cde340b910a18b4f9ee0099908ae833451aa0aac328e7be58b7313621,2025-02-06T18:07:45.847000 CVE-2023-7273,0,0,e5ba228f3b4566bef4f7cf912da390cc9652c6c8697993991cf9fef824e90d32,2024-10-04T13:51:25.567000 CVE-2023-7279,0,0,c6a086f465518f8fc20c776aeddccc8546478f7f16f61b270f15bebc0fca554d,2024-11-01T14:43:56.227000 CVE-2023-7281,0,0,2aecb2754631e609ccd0b26f382d5be29afff0def0037bd48c20eff95afd31d0,2025-01-02T17:30:38.013000 @@ -243006,7 +243006,7 @@ CVE-2024-0594,0,0,3780c91feb02e94bec74828d45d759c566a8f297ea89f091b3830ef305b248 CVE-2024-0595,0,0,7f902afc77c6d28ea6274f98e27811635fbf921773d4cf114e15624387c5266d,2024-11-21T08:46:58.040000 CVE-2024-0596,0,0,f2f323d3c877858105600322571d4a5aa05e7628ec32b3feb2e9262204464225,2024-11-21T08:46:58.167000 CVE-2024-0597,0,0,563c6d40585c23a62adc8e55a0cb92896618f6ecf9584c1281599468bdfd0e6d,2024-11-21T08:46:58.300000 -CVE-2024-0598,0,1,16383bc20388c9013e6383dd42a68cb0540bbe26f2eba1dc51d90e675df80f96,2025-02-06T18:51:23.643000 +CVE-2024-0598,0,0,16383bc20388c9013e6383dd42a68cb0540bbe26f2eba1dc51d90e675df80f96,2025-02-06T18:51:23.643000 CVE-2024-0599,0,0,efb4f7ed9814ff58d6b909a4393882a85d57032d3fb7878e531640caef6aee2c,2024-11-21T08:46:58.533000 CVE-2024-0601,0,0,ff6209a8427e9fe1b30504d1686f42635ff37b22a4c8fe62f5c49dcf1a6c5b9a,2024-11-21T08:46:58.667000 CVE-2024-0602,0,0,0d4feccc97e84ba97757f40e264b1f918ca495cbc90c0163dec61adaa52f45da,2024-11-21T08:46:58.800000 @@ -246330,6 +246330,8 @@ CVE-2024-13408,0,0,e396f32e4dcbb651814f9215fd3a09eb2577d8842a6e7054a1c2694b62332 CVE-2024-13409,0,0,16195c232130678b474ab73526a536d491d9fdbf657fb8a2a79faa0112e2d1e0,2025-02-05T01:36:36.047000 CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-13415,0,0,078aa9b6eeb5af1c8634c02c595bbb40a0a7ec1b15e21674b1397103dd29c669,2025-01-31T06:15:29.287000 +CVE-2024-13416,1,1,a5504171c853e5ab7783219bef44e9686d16de4196f93fb534ad50c02913d8f1,2025-02-06T19:15:19.220000 +CVE-2024-13417,1,1,14f02e601e8ac93710e7c92450dd9c18fe716d24c047dd595fcdad00d9710199,2025-02-06T20:15:39.273000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-13422,0,0,edac0508b914957f5223777fa87a143f36eeebdc6522d4663ecb13bbee620189,2025-01-23T12:15:28.163000 CVE-2024-13424,0,0,60791b2caef2c4384bda44bc4634febeec12d84f3bded4fd1a0d6202fd13ad5f,2025-01-31T06:15:29.443000 @@ -246420,7 +246422,7 @@ CVE-2024-1360,0,0,d34fec545a10bf09bb924f3a0696da0f2401b54143d8aefeb9f97ea01bb848 CVE-2024-13607,0,0,633beb2a2a6d7ae2c71ea299ed2662752f0bc22dd7047c64857b269f6e61835c,2025-02-04T07:15:12.973000 CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000 CVE-2024-13612,0,0,f0c3e3f55ca6b4ca35bac236a126cd1995e073b744e2e5e3f3cdcfc3b1871559,2025-02-01T13:15:21.320000 -CVE-2024-13614,1,1,dc8ebe34b7c3367b1269701540b20724f2a0672c61152dd75d9995655e6d4294,2025-02-06T17:15:18.080000 +CVE-2024-13614,0,0,dc8ebe34b7c3367b1269701540b20724f2a0672c61152dd75d9995655e6d4294,2025-02-06T17:15:18.080000 CVE-2024-1362,0,0,ebe61894e3dd1fecb8d4711188e9d8f7e6a2ff043508a2ee93131b033a0336dd,2025-01-15T18:40:30.490000 CVE-2024-13623,0,0,2cada29a90e918414353741b6e3b8cf08dc12a83860192531fa76e51a17031e8,2025-01-31T07:15:09.830000 CVE-2024-1363,0,0,d8d6ccccee9c9def4bc84105015213aa12c981523f1a518cfb483c29cffbd734,2024-11-21T08:50:25.093000 @@ -248510,10 +248512,10 @@ CVE-2024-21611,0,0,334e98596de5cccc370c36d1b9f4ee75740cb3840f270668136be62f04aaf CVE-2024-21612,0,0,a1c64368428607152868a7719ac581eb5c0c82d11e43ace9c200d48539f7d1d6,2024-11-21T08:54:43.200000 CVE-2024-21613,0,0,1b5cc7582af8e29a485625fa0664bab35c6731001707514eb375ebe0f6bde842,2024-11-21T08:54:43.363000 CVE-2024-21614,0,0,b8cfc954d71e656b148f776a9cdce08320ee92fc1fee351de38773bc96f08832,2024-11-21T08:54:43.510000 -CVE-2024-21615,0,1,6937e878141904830ce4844911ad4d800aaeaeba22df54eb139a2f9410d31fb5,2025-02-06T18:39:32.977000 +CVE-2024-21615,0,0,6937e878141904830ce4844911ad4d800aaeaeba22df54eb139a2f9410d31fb5,2025-02-06T18:39:32.977000 CVE-2024-21616,0,0,dae6d3cf5f996c4574feebd645f2cb4466d7284cf13155699974e1982a1269c0,2024-11-21T08:54:43.780000 CVE-2024-21617,0,0,e02746f478369a08710b2842d6ebafbdcdc6c88c5e46abb063d87e66959b628c,2024-11-21T08:54:43.923000 -CVE-2024-21618,0,1,b69061a71c35aa2e062c3aacf8ca2d7b7cc5029e8508bc10b3be7b4e300dc01d,2025-02-06T18:39:21.123000 +CVE-2024-21618,0,0,b69061a71c35aa2e062c3aacf8ca2d7b7cc5029e8508bc10b3be7b4e300dc01d,2025-02-06T18:39:21.123000 CVE-2024-21619,0,0,962a2acb8ea0c416286b40b04f6078c6f01bd0b1338c587066e8de7d8d28c2dd,2024-11-21T08:54:44.270000 CVE-2024-2162,0,0,f341aeae09ce952cfa8e1acd1945a0549f50e443c3354f0bdf994fb4d6053e54,2024-11-21T09:09:09.727000 CVE-2024-21620,0,0,20a6571558a9873a7736ceb942ff276ea766ceffdb71a376e43b64af8dc5f4c7,2024-11-21T08:54:44.457000 @@ -248942,7 +248944,7 @@ CVE-2024-22114,0,0,b98aec6151fc366c3b669a552c78744585fb46223fe45a4b12b56beb46fb5 CVE-2024-22116,0,0,c04c3de9f5b4ead60d384f4b087010c1878ec579b099b751b4e2eb65332cdb41,2024-12-04T15:21:51.983000 CVE-2024-22117,0,0,7fc14c99bc14c7a825c70601bd00a916ed4cd735ca0a5ac830de2071ccb4345e,2024-11-26T15:15:31.510000 CVE-2024-22119,0,0,4bd6f0e5973d39a2a0656293d459ca6ef306ff5763274518b9b5aa7967be8dfa,2024-11-21T08:55:37.150000 -CVE-2024-2212,0,1,9ba0fd8d98fd108ad5659d434d545d08ad45c38884454618ea7faad0006ad212,2025-02-06T18:04:46.317000 +CVE-2024-2212,0,0,9ba0fd8d98fd108ad5659d434d545d08ad45c38884454618ea7faad0006ad212,2025-02-06T18:04:46.317000 CVE-2024-22120,0,0,8e56862446422e0e91455a2e1599414d6b8f9c030d42b3dcc7917f5cc5622a4c,2024-11-21T08:55:37.330000 CVE-2024-22121,0,0,04688fcf4ead04e75d87d970b502bc82bd60fd65218ebd0ae0a8a7c1417de80a,2024-12-10T16:19:19.810000 CVE-2024-22122,0,0,a69e95a695ed6b70c3002d8ba75c57f766f7300bf0a8c0b2aa8dfda24d05dfe1,2024-12-10T19:21:09.207000 @@ -248964,7 +248966,7 @@ CVE-2024-22136,0,0,8f52e774bda0b9f0b1e9c148e2068bea711435d376963412b477b6d460659 CVE-2024-22137,0,0,b4c525be0bbbbd93566fd8a107178d775b6329114037ef14c38a180d05af46e7,2024-11-21T08:55:39.583000 CVE-2024-22138,0,0,1e4b47ab56bd10667a141c7f7a86013338ccc1dfcee1fcd6e393c4b6a3c93b78,2024-11-21T08:55:39.713000 CVE-2024-22139,0,0,18a68de42e65699069263b499e3664c8d8989a572f549eba4b71234a8f6b33d5,2024-11-21T08:55:39.840000 -CVE-2024-2214,0,1,63cd15ec62d1e98c46bc137e9820a0ea35cdffe0d8fc0890b7b5fd972d0bfc33,2025-02-06T18:05:18.013000 +CVE-2024-2214,0,0,63cd15ec62d1e98c46bc137e9820a0ea35cdffe0d8fc0890b7b5fd972d0bfc33,2025-02-06T18:05:18.013000 CVE-2024-22140,0,0,8f14281157b2c21fe890252d5618fadbc13a246f8a467905c8e3b92196b1bc2c,2024-11-21T08:55:39.970000 CVE-2024-22141,0,0,a97b04e061ecea388e3df3124bbc699c0721e87b1981e731585c28a092195b68,2024-11-21T08:55:40.097000 CVE-2024-22142,0,0,3e3351023de6f8a48af9955accf3cc3be61b2a901defcaff7a898407b2cacacd,2024-11-21T08:55:40.220000 @@ -250631,7 +250633,7 @@ CVE-2024-2451,0,0,d8f84f1a8d968d9c219f3d8ecd0dfa93e04557648710ac7bb3b4841f43d583 CVE-2024-24510,0,0,fe153ad743918c8504fe229d44cd06e63524799002da9e0641cd9e46d6b1aa82,2024-11-05T21:35:06.877000 CVE-2024-24511,0,0,da61fbb9c54501d007e31fe08563efc4167a2d8cbec1ba32dda11137b67ba717,2024-11-21T08:59:21.877000 CVE-2024-24512,0,0,019ed928477af2c76383f0dd0a60b623736726b46fa172045ba6a57358273cec,2024-11-21T08:59:22.127000 -CVE-2024-2452,0,1,0a571f9b56c67c2101c6e86e3e480aeb7370286c35fe0bdc684b48d7e0a8faae,2025-02-06T18:05:49.437000 +CVE-2024-2452,0,0,0a571f9b56c67c2101c6e86e3e480aeb7370286c35fe0bdc684b48d7e0a8faae,2025-02-06T18:05:49.437000 CVE-2024-24520,0,0,ace09330e8107cb68f2429ae0de5179ef4a6d633dbf4aed473a923b4cade80a6,2024-11-21T08:59:22.353000 CVE-2024-24524,0,0,dbc985fa4d017562f46de6601e7655cc2e5785ac6fbd89bbcbcc5f191b44e49f,2024-11-21T08:59:22.583000 CVE-2024-24525,0,0,3900b179dc9cf60476a9abf4c81b26fd5dc897ea1eb93e4b15aeb161b8c6a332,2024-11-21T08:59:22.813000 @@ -250642,7 +250644,7 @@ CVE-2024-2454,0,0,0529696b46064432400ecb536438bbd0c068e6096f5377190013117326aba0 CVE-2024-24543,0,0,59c3b1da73d28451a1cf1cfc188099161f9c980e5c2def4a9d3bc67372ba2315,2024-11-21T08:59:23.253000 CVE-2024-24548,0,0,66be0b6ba6ef0844ddd2a0ae230a74ca3e9c9ffcbeb06975fa2c032719d8c629,2024-11-21T08:59:23.410000 CVE-2024-24549,0,0,4ed77430af1fe22cf50322942baa69bc3dabad1352e6f759abd9a7ffc96a9448,2024-11-21T08:59:23.603000 -CVE-2024-2455,0,1,9421d2c98431153e8f9671ef489581dca268c7a08fe4717b3f0c09afb468fdd6,2025-02-06T17:46:37.687000 +CVE-2024-2455,0,0,9421d2c98431153e8f9671ef489581dca268c7a08fe4717b3f0c09afb468fdd6,2025-02-06T17:46:37.687000 CVE-2024-24550,0,0,27cb7af9bd449f0fbdf95ef0a021af6839a34983570783985ee03919c2f67595,2024-11-21T08:59:23.793000 CVE-2024-24551,0,0,b7a1c2d46c2b177adadcae41ee83ffab2ce81a9d7f916acc3bf4554ccc8ba3f2,2024-11-21T08:59:23.940000 CVE-2024-24552,0,0,08553109cc8f803ca2660d07fd76902953e8d5b86d511086fa1825b8cb168286,2024-11-21T08:59:24.080000 @@ -251480,7 +251482,7 @@ CVE-2024-25701,0,0,4777cddc8671a4cbdf08df97793cb6fbc659f1f3848b27a12dd4728c3d3dc CVE-2024-25702,0,0,3b42a2341816cd1940ae7f2801adf99cef9cc48b11969bf629ed4e52d3d6cb3d,2024-10-16T21:03:33.347000 CVE-2024-25703,0,0,1afe4ca1ce005dadbbbe3861ac31e3fa775711912585fe3575d9e4d068c0830c,2024-04-25T19:15:49.520000 CVE-2024-25704,0,0,fb54909d350b3454c6bcc148be02f730a032c03d05d0a91141a9e8dbb6c64f5c,2024-04-25T19:15:49.597000 -CVE-2024-25705,0,1,68943a52d054c5c0195f75e33ae746334a378c48a854c5cbd39cfc32c5ab5b5c,2025-02-06T18:15:30.930000 +CVE-2024-25705,0,0,68943a52d054c5c0195f75e33ae746334a378c48a854c5cbd39cfc32c5ab5b5c,2025-02-06T18:15:30.930000 CVE-2024-25706,0,0,600484eed8897ea0828c44518c90f03573bbab70d24e0af6fb3b1629c531bd2e,2025-01-08T15:42:03.523000 CVE-2024-25707,0,0,3ee4e6517fecbbb60a3555239aa46206819a90f2a089c6815089490eaf01924b,2024-10-15T14:34:43.597000 CVE-2024-25708,0,0,c169d9f12e5c83634b5ad6fd76892e5d4c412c0f5e491ade778100b826ccc3a8,2025-01-31T13:27:06.877000 @@ -252201,7 +252203,7 @@ CVE-2024-26666,0,0,f3d57571a156c221255e6ed43ce466550f0474a9e05c86712515e781d1d5d CVE-2024-26667,0,0,e5ad506f4c73ca6a1fa85cffa41c22f32b9dc8afefacf0aae7843e76fbaf00b7,2024-11-21T09:02:48.243000 CVE-2024-26668,0,0,19e99ff104cefd1cd23ad3007ee1b6d98ed06b00b2ab1e0701085c50b1f5ac6e,2024-11-21T09:02:48.360000 CVE-2024-26669,0,0,90097569a49a5176e771f573d811a05aad14be50ef5376396ed78cab8665c6e3,2024-11-21T09:02:48.477000 -CVE-2024-2667,0,1,d282ffc5e01fe0e8e2fd621d0bc389071ac6381353033f69580a1376a7d3d05c,2025-02-06T18:05:25.020000 +CVE-2024-2667,0,0,d282ffc5e01fe0e8e2fd621d0bc389071ac6381353033f69580a1376a7d3d05c,2025-02-06T18:05:25.020000 CVE-2024-26670,0,0,f0434dc6654cbb832b662a959d3f3c14d1ada1ad2e2fe326da6066d12f65c9f4,2024-11-21T09:02:48.597000 CVE-2024-26671,0,0,84084285a16fed952d677d5fd710644ee60fc8d9cf10cb504c7604e28c9208a6,2024-11-21T09:02:48.720000 CVE-2024-26672,0,0,c70a64110bcd68bbde0a906463b82213fcccd910d662981df3a389ebb7bea170,2024-11-21T09:02:48.840000 @@ -252706,7 +252708,7 @@ CVE-2024-27133,0,0,0bc1efdc0e9ed092d39790d962760e4b53b0fb29de201e5b7a8c363318010 CVE-2024-27134,0,0,43c47d7561ac0b1c99cf22d9f7d4bfc185fca5cbaa5e50446a0cf04563788920,2025-02-03T15:05:50.187000 CVE-2024-27135,0,0,80b8ba32d4f0a656beacca0ee117fdd873e18aeb3bfa0ccfdd421e2596348736,2025-01-22T21:07:10.113000 CVE-2024-27136,0,0,bb37721f8ed99b1ce670c8cc12d36d4a8ef9b3720f3c4a42663714f551f679da,2024-11-21T09:03:55.410000 -CVE-2024-27137,0,0,3c8c1254d7b894f604b51b08d08a21fc4c6a49c97d25f39048532ec0e27b65f7,2025-02-04T11:15:08.220000 +CVE-2024-27137,0,1,0040a0928685ad553690e1c5ca39af843785c2397aed269bb33f4f2ff7a3cec2,2025-02-06T20:15:39.397000 CVE-2024-27138,0,0,6de0692168ffb8321db4d7a75bc11e70c526c15c151f740bb19b59afdf3d020e,2024-11-21T09:03:55.543000 CVE-2024-27139,0,0,0e47c700de8536bf68cca727388be88ae3266f1f9250f903b9607229f69d3631,2024-11-21T09:03:55.740000 CVE-2024-2714,0,0,66e8d3fe9fa1d2073bf349e396b405f9f7d2a9346c9183368ac1d8c5d57099c5,2024-11-21T09:10:21.427000 @@ -253139,7 +253141,7 @@ CVE-2024-27705,0,0,3233e9b763f57c6dfaf8627c6d6ec7d3ff266929e0ec29e347f4290ec6ac9 CVE-2024-27706,0,0,09be5dff0dff62897d4b671897beea1323154b3e00d34465281c351db1a9a829,2024-11-21T09:04:54.783000 CVE-2024-27707,0,0,4a3147229ae75fdd871763049e313de06f4e4ab116ff888bbcd9fcfca501d9b3,2024-11-21T09:04:55.010000 CVE-2024-27709,0,0,0dc8a00434a9bdc593d8c809bc45f53ca009c10107690ba39b988794ca398a66,2024-11-21T09:04:55.230000 -CVE-2024-2771,0,1,aad3fa90a08950deafce786c821cb832ce7543d9c8b3a9d708d7c98814f8cda5,2025-02-06T18:33:57.330000 +CVE-2024-2771,0,0,aad3fa90a08950deafce786c821cb832ce7543d9c8b3a9d708d7c98814f8cda5,2025-02-06T18:33:57.330000 CVE-2024-27710,0,0,c8353ddb223f00eb8be323f22ae1c338a10420e1d09067b6d197578182aaeae6,2024-11-21T09:04:55.450000 CVE-2024-27711,0,0,e77b75fdc2ee9d9427d667dd496df30c03c8c25b9aab7888b9e4b92b504ef697,2024-11-21T09:04:55.667000 CVE-2024-27712,0,0,2902d6c089684557ece1a3bc166a4d74aee13eefc7e652a85152dc904b72ec22,2024-11-21T09:04:55.897000 @@ -253149,7 +253151,7 @@ CVE-2024-27716,0,0,4e33ff7b1a83f51fed4b80a3d94c6d3a9ee0c5bb94137c0b4ce8ff1d81d64 CVE-2024-27717,0,0,c7a465d57d9696ee282c5e2da6989aec7f7e2c8a7a21ea428485a6e172665524,2024-11-21T09:04:56.707000 CVE-2024-27718,0,0,6fd0ecf52683c3600c47787d4abfe093befe302da46880121fb7e6cebae4c848,2024-11-21T09:04:56.920000 CVE-2024-27719,0,0,341c9c74660e8da6c3b635ee840b9ff7db619da44f18728b3cc02c5bde0fae9d,2024-11-21T09:04:57.123000 -CVE-2024-2772,0,1,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 +CVE-2024-2772,0,0,02f750b020a1c0ddcf10a0cbf86dad19edb566b57ce2911796231437ddd08a75,2025-02-06T18:38:03.913000 CVE-2024-27728,0,0,46e06ce272ce05b5accc64e25080f982ab4dc5a49c281203dbe76629733a8fd4,2024-08-20T14:35:06.747000 CVE-2024-27729,0,0,809fcc66d1703da695f3fdd07183b33a76080add392f01a1abb9d8a582f159f5,2024-09-11T20:29:52.477000 CVE-2024-2773,0,0,018fb490a9d26494d921abab57a48493b2cfc80bcef8c4ecda213f042e19cd06,2024-11-21T09:10:29.120000 @@ -253221,7 +253223,7 @@ CVE-2024-27816,0,0,d126026a0e8c09579a5f31347cc45bf3577225eb227c98451e45b114e71fb CVE-2024-27817,0,0,6dd9dd975d0fcfe58238d9ba3ba9e1921b514abadfa496cb71844ef21c201d0f,2024-11-21T09:05:08.793000 CVE-2024-27818,0,0,bf2ff5e56a5dcc0026326b877c5d2f40490029874fbc80b54df6651b77bfe1fe,2024-12-12T14:33:00.640000 CVE-2024-27819,0,0,af5349cb7fb8018051d3446391b7c541613e37fd1a57a702dbccd3af5f1ae345,2024-11-21T09:05:09.137000 -CVE-2024-2782,0,1,4931fdc4df8ed3acfb0c8dd9f989cff8c77993e44758615114a33bc703f78142,2025-02-06T18:37:34.907000 +CVE-2024-2782,0,0,4931fdc4df8ed3acfb0c8dd9f989cff8c77993e44758615114a33bc703f78142,2025-02-06T18:37:34.907000 CVE-2024-27820,0,0,b615b9c5d68a674c239e6993b78212fe0266a4c1058c37eeaa57e7bae0332265,2024-11-21T09:05:09.333000 CVE-2024-27821,0,0,662c0fdb4a6b9881c4e3b0e9bdefd91c75dc8c6155b30ede36ff0f65a0b09925,2024-12-12T14:33:00.640000 CVE-2024-27822,0,0,f8be55eb8bf86503cf81512385aa89b340f124c8a3f8c20fd852538813632324,2024-12-09T20:45:57.453000 @@ -253295,7 +253297,7 @@ CVE-2024-27894,0,0,ccad49273a629a1c78e24163856afe63701367571263de1e6484edc4071a1 CVE-2024-27895,0,0,d55175960df25787806e528bf2b5b0b690105cc86f51c145001c192d4b0382fc,2024-12-09T17:59:55 CVE-2024-27896,0,0,cefb57e4fd2360f9ca76121f5d55c0879f2b9778073436f6d450ff9f01865a42,2024-11-29T15:15:16.833000 CVE-2024-27897,0,0,e0fd628e199d1ad9f7d1973d04b30e3b226e987f2d07bcbb58339313ac383abd,2024-11-21T09:05:22.297000 -CVE-2024-27898,0,0,c2d3b08c19bcc9441d41152e0adc29161c3cc4bd4087815407fe1ae7ebd853e0,2024-11-21T09:05:22.490000 +CVE-2024-27898,0,1,c3dfaff305379d70787fec6732768df3e98dfbdf735d5678f3af917676efd22a,2025-02-06T19:01:07.703000 CVE-2024-27899,0,0,a604999ac254f893bf484b56f8c916b1c621d5e943e54c837b0fa2e56a53a410,2024-11-21T09:05:22.627000 CVE-2024-2790,0,0,46430baf671506f8e8e0e96de5abb2a9dbcf4a843ba1d0b27f99c14044a5e043,2025-01-28T19:26:37.203000 CVE-2024-27900,0,0,0959b2054b27454fdc1ef4ac218f2c38f403415af9de5e09c07c2e491cac493b,2024-11-21T09:05:22.767000 @@ -253336,16 +253338,16 @@ CVE-2024-27935,0,0,a818d438fc92cb3829b80e0c20360d6755dd4a7e2d490856f973009bf50a4 CVE-2024-27936,0,0,2099c76d277ac21c38cfc54bbc485707bce8fc86e66cd1bed544e652cab80946,2025-01-03T19:27:46.510000 CVE-2024-27937,0,0,82e87c7e48ea4409826e73644eb6a015968a77c77ade52ed938f8f3395a1fbf4,2025-01-02T16:20:03.713000 CVE-2024-27938,0,0,f3fa24107d64f072de2a337377f22dc2fedd62e7046e2b3f6a494579c82cdd75,2024-11-21T09:05:27.543000 -CVE-2024-27939,0,1,b667eb0a9384cfc5a2aeebee363b7da2248c153b2463d3acf87d14eca4d3795b,2025-02-06T18:16:36.110000 +CVE-2024-27939,0,0,b667eb0a9384cfc5a2aeebee363b7da2248c153b2463d3acf87d14eca4d3795b,2025-02-06T18:16:36.110000 CVE-2024-2794,0,0,33955f4149d64b1b269ef69fbe9402b7695f6b6b91e1246e2fc086085da81caf,2024-11-21T09:10:31.997000 -CVE-2024-27940,0,1,2dd5fb975e6e449ebc295eb8f31cae07cd0aac3f9359e397fb08557ee431ff1b,2025-02-06T18:16:23.880000 -CVE-2024-27941,0,1,bbb2ae4be8ddda07e6c3f4438950f120dc72835c5644843fd6cdd83d012c8e7b,2025-02-06T18:16:12.487000 -CVE-2024-27942,0,1,8a0407dfbac5ed7f6383a0a457bcc8b9cc6bf90b5f542b3c33476c8eb306486f,2025-02-06T18:15:39.537000 -CVE-2024-27943,0,1,0fe02cdc7ea82a907fc9228596527e3ec29e6115f0ca689cc14f68e215d81cd7,2025-02-06T18:15:25.550000 -CVE-2024-27944,0,1,05ab27b23cd4c65e6018640103ddc19702d299728eb220c6782a117a1187bf53,2025-02-06T18:15:10.320000 -CVE-2024-27945,0,1,94dc03c5788951b945f52561612580dbf6389fd2990ae0ab8d0bbe20a70c318a,2025-02-06T18:14:57.147000 -CVE-2024-27946,0,1,66f384ac73b5b0b78bf2b244d51655e2f723913f54e6237bebd67311ea34e9ec,2025-02-06T18:14:26.713000 -CVE-2024-27947,0,1,3037bcb4c0e3535d9bac491e457cd5f8cda27629d0af16e036379bf52f9162dc,2025-02-06T18:13:55.330000 +CVE-2024-27940,0,0,2dd5fb975e6e449ebc295eb8f31cae07cd0aac3f9359e397fb08557ee431ff1b,2025-02-06T18:16:23.880000 +CVE-2024-27941,0,0,bbb2ae4be8ddda07e6c3f4438950f120dc72835c5644843fd6cdd83d012c8e7b,2025-02-06T18:16:12.487000 +CVE-2024-27942,0,0,8a0407dfbac5ed7f6383a0a457bcc8b9cc6bf90b5f542b3c33476c8eb306486f,2025-02-06T18:15:39.537000 +CVE-2024-27943,0,0,0fe02cdc7ea82a907fc9228596527e3ec29e6115f0ca689cc14f68e215d81cd7,2025-02-06T18:15:25.550000 +CVE-2024-27944,0,0,05ab27b23cd4c65e6018640103ddc19702d299728eb220c6782a117a1187bf53,2025-02-06T18:15:10.320000 +CVE-2024-27945,0,0,94dc03c5788951b945f52561612580dbf6389fd2990ae0ab8d0bbe20a70c318a,2025-02-06T18:14:57.147000 +CVE-2024-27946,0,0,66f384ac73b5b0b78bf2b244d51655e2f723913f54e6237bebd67311ea34e9ec,2025-02-06T18:14:26.713000 +CVE-2024-27947,0,0,3037bcb4c0e3535d9bac491e457cd5f8cda27629d0af16e036379bf52f9162dc,2025-02-06T18:13:55.330000 CVE-2024-27948,0,0,b732e099eb8d33255cbd588aca4384acf3def7c5bf75988d8fd3f639ac56c572,2024-11-21T09:05:28.937000 CVE-2024-27949,0,0,7571c2eec4740781a9a2f5965e4f7152dcfbce473dbe8ae2485667fe0e9ebffb,2024-11-21T09:05:29.090000 CVE-2024-2795,0,0,cbb3083cd20608539cd31cee2da48aa63acf65d8b787a018dc03ebe3f26d6f51,2024-11-21T09:10:32.120000 @@ -253784,7 +253786,7 @@ CVE-2024-28589,0,0,1bfa399e8667380e57d79d60e7e8112d34b500470544fbd640b99eb387afb CVE-2024-2859,0,0,dac8d21db08b510f0688c306fab175a2c2b28639dec048727d7d670e2d55c32b,2024-11-21T09:10:41.990000 CVE-2024-28593,0,0,1a079ea18745517fd72417a437989c95fe391bb286fe69494ae3e8d32ae13d70,2024-11-21T09:06:40.980000 CVE-2024-28595,0,0,66c34ce4bde45fe86231be9499209a487847155b52f1ce03ae9c3349832dd0c2,2024-11-21T09:06:41.353000 -CVE-2024-2860,0,1,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 +CVE-2024-2860,0,0,10251222dd61f264c5573f16801b3605bbe75235d60096fd89f14c7bdd2709e8,2025-02-06T17:54:45.057000 CVE-2024-2861,0,0,c2d3624bb2be1c2521a84faa67c026ea9a14975ce99e1b76831fa573f79b5912,2024-11-21T09:10:42.250000 CVE-2024-28613,0,0,1e06981ecb1401862be92768d275fb03ab14ccde7887b574aa43591385c5bc3e,2024-11-21T09:06:41.640000 CVE-2024-2862,0,0,14a1762a6c3e20bf3034d91b1b834706f11e22304545cc9e55cbfbe0c8b435d2,2024-11-21T09:10:42.370000 @@ -255129,30 +255131,30 @@ CVE-2024-30377,0,0,5fedfa7ad2f481f3b5188ccaa34065076e4b733235d8435732180716c5e92 CVE-2024-30378,0,0,d71d4638dbc6eba8bae8051ca94bfce66728e9312382c0209d27d8a1be3871f7,2024-11-21T09:11:48.497000 CVE-2024-30380,0,0,30d27fc4fb37e8fcf3110341c7dad597f8672ba176bf654fadce5c58846d10c6,2024-11-21T09:11:48.667000 CVE-2024-30381,0,0,16af65d0f620fa329a4ee8e3a262a00f313455370e8bb1cae2f8a98e8cb8cb80,2024-11-21T09:11:48.810000 -CVE-2024-30382,0,0,752e3bb8c3fcd8853636d3f4e08f4b115d771ef80f966d87fa43da61676645e9,2024-11-21T09:11:48.950000 -CVE-2024-30384,0,0,56758caea72cbef5f25742ae842bd5ce8702a90f5b015d5db24c551ae4aef5ea,2024-11-21T09:11:49.083000 -CVE-2024-30386,0,0,8848eb8beac37456e7b53d7a7e3723e63b9cf5aa32df3c08bf3f5caf59dd5c8a,2024-11-21T09:11:49.213000 -CVE-2024-30387,0,0,b98db6519463ddd7c92dc4b559aa144f22ee103f72b2bf1419945c4699f6457d,2024-11-21T09:11:49.347000 +CVE-2024-30382,0,1,f8f31571180ddbab9dad1368968a8345df42a3a90337a215255038387c9e251d,2025-02-06T20:37:07.020000 +CVE-2024-30384,0,1,c91a7da585eff57dac618eda9d9ce97391b61ba5aa7738484bff14c570ff5f60,2025-02-06T20:36:55.430000 +CVE-2024-30386,0,1,4d8ec9d857c9c5ef282c36e0a02ab3bd6fa3140022fc89c222f4cbca2e5fb1d6,2025-02-06T20:36:32.980000 +CVE-2024-30387,0,1,442c52f07c4aa85d8d9ef9c5b8a4e6ba01c1c49beddf02d669c87aa52fde1be9,2025-02-06T20:36:42.403000 CVE-2024-30388,0,0,5479ac57a7690c3084c8bf7194ef0ec8ee2438e646028ad3b05b99d3fd987b6c,2024-11-21T09:11:49.483000 -CVE-2024-30389,0,0,a644dee0fc8ee3d34feda83fa3a97632737225f3a606769fbe4239321d135075,2024-11-21T09:11:49.620000 +CVE-2024-30389,0,1,39fee6ecc8931e1cffcb0f3c13f2220edd58929a510e916fbe78c4f4aef82884,2025-02-06T20:36:23.717000 CVE-2024-3039,0,0,f8c1134c02cb56fcdef93cfda91853c6b28b369a533ccc823dc09c5759efd6cc,2024-11-21T09:28:44.357000 -CVE-2024-30390,0,0,9167fd18a72b63a549cb4805b98b82a068299c15839b30307421f6bc5ec0442c,2024-11-21T09:11:49.743000 +CVE-2024-30390,0,1,dca042fc0915c2bbee31c03663258f0e3497326d1c45b0b2c7e17bb0b9a50230,2025-02-06T20:36:12.843000 CVE-2024-30391,0,0,26463ded791348d93d472c555f39d23710f07b99c228bda423ecaddde8772c30,2024-11-21T09:11:49.877000 CVE-2024-30392,0,0,b065ca165687360d84ba02e43d04835f798b47b0cd57f527ccc64d72d770e70a,2024-11-21T09:11:50.017000 -CVE-2024-30394,0,1,282a1d5b5196375d15831e6bd393cab1f623bd77958f81043f7297f549a1ea27,2025-02-06T18:39:12.470000 -CVE-2024-30395,0,1,78b53f43de2e8d4fc94e7e6cfa8d455e8d1b61416414b6cb165d9e06dbce8f2b,2025-02-06T18:39:02.430000 -CVE-2024-30397,0,0,e8d26c609669b43a62044924d609ee4f86c72d9873d1901ee01000b54745a84d,2024-11-21T09:11:50.447000 -CVE-2024-30398,0,0,c0128d712f61883d46f7c98ec83f67266147bc909ec4c59e416c56bd9d8e160a,2024-11-21T09:11:50.580000 +CVE-2024-30394,0,0,282a1d5b5196375d15831e6bd393cab1f623bd77958f81043f7297f549a1ea27,2025-02-06T18:39:12.470000 +CVE-2024-30395,0,0,78b53f43de2e8d4fc94e7e6cfa8d455e8d1b61416414b6cb165d9e06dbce8f2b,2025-02-06T18:39:02.430000 +CVE-2024-30397,0,1,89ad3822f5ad994ba8174ce496d747035dee94379d29f2531507a9e41f9fd1f3,2025-02-06T20:36:00.690000 +CVE-2024-30398,0,1,748cda7438f21fb8eb288f97d46a55d17b09925e4e8b509b19cfad359b674f28,2025-02-06T20:35:49.817000 CVE-2024-3040,0,0,e8c4532d809f9a8b19abfa76a9f6ebe9924a89e71110ffe1060952aafc9cc4ce,2024-11-21T09:28:44.500000 CVE-2024-30401,0,0,e66f9f288671cc268b0bbabbb0c77a681bc7fc825f4f062725eca8cb61117058,2024-11-21T09:11:50.720000 -CVE-2024-30402,0,0,367a55497bf84871e50b42a00b9509fc2851bfc547c510f9f380a673502eed7d,2024-11-21T09:11:50.863000 -CVE-2024-30403,0,0,267900985710403452224865cf74913dffb6fc592e9ef6c6e3ed6bd147361bcf,2024-11-21T09:11:51.013000 +CVE-2024-30402,0,1,11bf8adf636354ad51e53c009b313389d2ed4942885d4bcb54d9b2c57d81a8c4,2025-02-06T20:35:36.530000 +CVE-2024-30403,0,1,dfa24a06bbb67d392236bf8e03f84105aeace41af9511fe3103480265eddc2e5,2025-02-06T20:35:23.557000 CVE-2024-30405,0,0,93ca037c766cfbea85d792ad3da86ac2017744d3b9276fae2ab082c4c193089b,2024-11-21T09:11:51.157000 CVE-2024-30406,0,0,263c121b9935ac1f0cba68507fa3ddf84f6f74b8de0b1d32637ecd0e25ab0902,2024-11-21T09:11:51.300000 CVE-2024-30407,0,0,3406d1368ddd83e61968965dc4c4570bf87e9ccfa14bdcb20ff4987c446bc626,2024-11-21T09:11:51.440000 -CVE-2024-30409,0,1,402f5335486175569efe57a40ebcbb8d4d027fe6871c2eb8345aecfb1a962d50,2025-02-06T18:32:50.510000 +CVE-2024-30409,0,0,402f5335486175569efe57a40ebcbb8d4d027fe6871c2eb8345aecfb1a962d50,2025-02-06T18:32:50.510000 CVE-2024-3041,0,0,6f2bffc2e1a437822437c063857217532c383d64d6768a16e1a8a163af570748,2024-11-21T09:28:44.667000 -CVE-2024-30410,0,1,987c9089b9684d584832777808a90d7753e404175aa42736cc3471e077538a12,2025-02-06T18:21:04.777000 +CVE-2024-30410,0,0,987c9089b9684d584832777808a90d7753e404175aa42736cc3471e077538a12,2025-02-06T18:21:04.777000 CVE-2024-30413,0,0,8b2fcb61d9248313939f7e26b7251e9fe525eb574f922f425a89ae50be45b77f,2024-12-09T18:33:13.660000 CVE-2024-30414,0,0,1cbf0e27f204f782c07469ae5f2be612236272d538f377b4392129fdcb02311a,2024-11-21T09:11:52.047000 CVE-2024-30415,0,0,fd280c5c87e2b4090f2d65136432e219d0920e7ac6771b8b662f7b008a1b9bfa,2024-11-21T09:11:52.227000 @@ -255204,7 +255206,7 @@ CVE-2024-30456,0,0,3b319bf606c266f33dce1e9365d6a96a64d0b365b070db2d43a512cff55ef CVE-2024-30457,0,0,139e634767f3e800b6975b518d9104891f1cf3cea8a5e4ff0346a1015c6f78bf,2024-11-21T09:11:57.863000 CVE-2024-30458,0,0,31ee813e32b80bec12e11d4f1053babce9599a613a4ee3e754b18321eb8ce9ce,2024-11-21T09:11:57.990000 CVE-2024-30459,0,0,07cf176cd29f78f03e7cd46d8baece3e54d45e20ef8c4dc87ca5cd03d705aac0,2024-11-21T09:11:58.107000 -CVE-2024-3046,0,1,73f463ae615db3578b107ae28e5ae667ee9e298d51b55f0233112ecd07cb8a18,2025-02-06T18:07:07.747000 +CVE-2024-3046,0,0,73f463ae615db3578b107ae28e5ae667ee9e298d51b55f0233112ecd07cb8a18,2025-02-06T18:07:07.747000 CVE-2024-30460,0,0,630e5c2ffb4a95824e8e4853a7eef4c8bce151f8e1e356e31fe09b006020c589,2024-11-21T09:11:58.223000 CVE-2024-30462,0,0,de44f93354209bc72cc996bde10718ff344d11973d211ce8b1723bb75082c472,2024-11-21T09:11:58.350000 CVE-2024-30463,0,0,4649a86c5e920678dade7c66bacd35af26317d67d7bedcf696fa842f75297167,2024-11-21T09:11:58.470000 @@ -255587,7 +255589,7 @@ CVE-2024-31063,0,0,b1a298bb0ba6c4c6d6137ab2a5b0c69d571b1288ce8f85730331fa203124c CVE-2024-31064,0,0,4412d32292f4f1a606e86dde19af7fec75a1aa99b33a1873a73f9908346823b3,2024-11-21T09:12:47.083000 CVE-2024-31065,0,0,a00112f4528754b8c1afee754696d282ee5e69a60575a305b812e8485c2614ed,2024-11-21T09:12:47.320000 CVE-2024-31069,0,0,fb53502e6d7be7a5a82d5cf9033afaa2c76b005b5ac9eb9741b945f53d80a4ae,2024-11-21T09:12:47.533000 -CVE-2024-3107,0,1,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 +CVE-2024-3107,0,0,c22762523eba600b4dbc1b069854272268244e515078d9e612846739a0b99f1f,2025-02-06T18:05:03.810000 CVE-2024-31070,0,0,1c611948de1365114224205017306826df6e14c3741670ceac64efb86dc1f19e,2024-11-21T09:12:47.663000 CVE-2024-31071,0,0,d588fd52b561587765d8d52346268042bc1c49cbc106c6b370e0c836853f77c7,2024-11-21T09:12:47.910000 CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90dad,2024-11-15T14:00:09.720000 @@ -257611,7 +257613,7 @@ CVE-2024-33698,0,0,4ea57f0cc8a312f87370897367d94743d3e8e2246a2e22a1152a2d834ffce CVE-2024-33699,0,0,458e7a7b3d1333ee5c45aaa1189ebfd93e764aed965cf8534dfc556b9d953918,2024-11-21T09:17:25.897000 CVE-2024-3370,0,0,4977c8af342ca5e43bc003b305e8d121bc66eb96b01495a3eae5208891dcba00,2024-11-18T17:11:17.393000 CVE-2024-33700,0,0,407022dfdd24550f293ac6fd28c96f8309930375ca8392caa396c0d28c47198e,2024-11-21T09:17:26.020000 -CVE-2024-3371,0,1,cc589373ae662508941a855023d27fc8418d237328f0b34fc7ce1fb0345e52d1,2025-02-06T17:58:01.577000 +CVE-2024-3371,0,0,cc589373ae662508941a855023d27fc8418d237328f0b34fc7ce1fb0345e52d1,2025-02-06T17:58:01.577000 CVE-2024-3372,0,0,9985599742d439ffa17423dc746ef69a4c46078d1a4bc85b4d1bdf33a84aad3a,2024-11-21T09:29:29.083000 CVE-2024-3373,0,0,96f798528e4f26f5f7ed620423ce0ceea8a332fb5523807f0664c03b7076ff87,2024-09-30T12:45:57.823000 CVE-2024-3374,0,0,420f73150af02275166b9c440c567922c144b0ea7f73169b89eb730ef81c3a98,2024-11-21T09:29:29.323000 @@ -258103,7 +258105,7 @@ CVE-2024-34383,0,0,368afe4ccd3bcd0c564e31b32a6354242bf4d2a1a8eb2a057367148cbc4cc CVE-2024-34384,0,0,96baee298b94f91577980ebb1ec9dd30ac39b004b4ae716c15725a34785b0218,2024-11-21T09:18:33.463000 CVE-2024-34385,0,0,db9a31aac2715305d92de29ce46df8252edb655c8c22e8169c5b06a794473108,2024-11-21T09:18:33.597000 CVE-2024-34386,0,0,9da976d24e0d5aeeb02414cc0c4aae3577ee02aa899b3c07190d502d9efc750d,2024-11-21T09:18:33.727000 -CVE-2024-34387,0,1,d700e1218edc69a5918da3f94f049752d12878e66103c3e9fce405c787443117,2025-02-06T18:00:25.190000 +CVE-2024-34387,0,0,d700e1218edc69a5918da3f94f049752d12878e66103c3e9fce405c787443117,2025-02-06T18:00:25.190000 CVE-2024-34388,0,0,33f199fe21c651ec8f4605befcd820e055517d139bd0be99e6e03301767972e8,2024-11-21T09:18:33.967000 CVE-2024-34389,0,0,0c7ffb5d9d3d2ed613c09a1ed7a9b4f3f2574b913c36b95aecb6789f5401d15a,2024-11-21T09:18:34.083000 CVE-2024-3439,0,0,1de1ce698d975ed4a2550822063838233878d08b05c8467b61676ffa90c33ba5,2024-11-21T09:29:36.577000 @@ -258259,7 +258261,7 @@ CVE-2024-34566,0,0,2671e0b5139844bb2688036f565bfd7344554ba83df594d02643341f22296 CVE-2024-34567,0,0,2ab276be8a7d5ba54eff2226d21311c587c26eddbddaace14bc714e7d0243fe0,2024-11-21T09:18:57.143000 CVE-2024-34568,0,0,e2a99021dbe034875bba53eef3b45ca37b51ca7526699e547fd5d14e77646bbc,2024-11-21T09:18:57.270000 CVE-2024-34569,0,0,cd8352582a68c7f60aec609b227b4580a06f5f85d280b7f4cd9eabb100d8aa73,2024-11-21T09:18:57.397000 -CVE-2024-3457,0,0,d3bae7ce7fdfd874cea312a852cff6ef05d2613ce0fcc8e7efcda3f9cc058e3e,2024-11-21T09:29:38.343000 +CVE-2024-3457,0,1,c1377f6fbed834cde544f5adb1d6d1ebbd2571e7bab310a97c32643fa2e45ea8,2025-02-06T19:06:55.503000 CVE-2024-34570,0,0,72ec41046fadce288923d6af421f065b956d18b06befcc315d2ec19a3c08a093,2024-11-21T09:18:57.520000 CVE-2024-34571,0,0,5e9d9d242360c55f4c2a8c468ad669f3fc59cd02309a2ba9dae0eb9a6df020d8,2024-11-21T09:18:57.647000 CVE-2024-34572,0,0,873a14a5585dd6d89b1175c9cc14374ba21a587bd64e8d5e5b9debcd1ec306eb,2024-11-21T09:18:57.783000 @@ -258268,7 +258270,7 @@ CVE-2024-34574,0,0,871147d88ddbbe403ad07267a1d94866cf59f9131e4c297094224e459568f CVE-2024-34575,0,0,c7e8ae0dfc8ffcb80dad6d4977fccd670908b42388ceb4498b484ec1cf63a0e6,2024-11-21T09:18:58.233000 CVE-2024-34577,0,0,f3255e55536d0eb4bb14c59b08f09dd86b76f85d6d1e936c7770bbe6551a4405,2024-09-03T14:59:01.767000 CVE-2024-34579,0,0,104acd3e2e38a82fac512c7a1af9a9535e4871945105b555720ff20b3465715f,2025-01-17T01:15:22.377000 -CVE-2024-3458,0,0,a2fac5653fa1106e695d9d641fc9dcfcda43439beaaa13eb375906ce69f167a5,2024-11-21T09:29:38.487000 +CVE-2024-3458,0,1,f33f933771a2ad915feee4ba190a78c4bb983f83e9939d6a3962f939b0d81482,2025-02-06T19:06:02.007000 CVE-2024-34580,0,0,45af0526328f2aea2eabd45e84f4b9bd97e31bfab36893128b721024e6204898,2024-11-21T09:18:58.437000 CVE-2024-34581,0,0,c66b7b716fa6a8506c21f90ac27fa18a0c9d46baf752a05e8a667ec61ba2b234,2024-11-21T09:18:58.680000 CVE-2024-34582,0,0,e9da027dd3cd2935dfa086a08f9a50592c5ada2ee26bac89574b38c1b050f137,2024-11-21T09:18:58.923000 @@ -259850,12 +259852,12 @@ CVE-2024-36548,0,0,01b7ce50cf0fc63201e92693d54aaa0bc9a11618ac9b6efd8349380331b85 CVE-2024-36549,0,0,224449c544d61b2ff0b40e60f64777eec95197970a9ad86d6e5188f71eceb4dc,2024-11-21T09:22:23.910000 CVE-2024-3655,0,0,22a504c089fe887876bc27ad5b7ec22ec3c09d25a44f1078ede97c4adbd0433a,2024-09-03T14:35:06.060000 CVE-2024-36550,0,0,9e2ca3c2189fe235c68b1b738e70fb08b06a861a221a4eb60674aa7d98bd37a0,2024-11-21T09:22:24.137000 -CVE-2024-36553,1,1,31b38d0ecd60673d0ddc9de2a7744d882ebc9cde7c798b79ea0483b560f5220f,2025-02-06T18:15:31.100000 -CVE-2024-36554,1,1,4384d0672eb69dee6bfee745e6e8595ac690f81db61d0db012ddc741316e7433,2025-02-06T18:15:31.273000 -CVE-2024-36555,1,1,bc124197bfba85a14e7ffc67eb97c3abe05c39acdc7dcab66789c62d37c939c5,2025-02-06T18:15:31.423000 -CVE-2024-36556,1,1,f85c5238a55ef66515887cafb8667338bd3ddb4b7bdc976f2c23eeef37febe8e,2025-02-06T18:15:31.580000 -CVE-2024-36557,1,1,0d13210db59a2d83ea083f90c2b8d9a5283c6f84eb916d8a69197217ac640157,2025-02-06T18:15:31.750000 -CVE-2024-36558,1,1,bb3adda23a629d8895c2ecb0a9312a273e1769c7815ea74281dbb8368b888913,2025-02-06T18:15:31.903000 +CVE-2024-36553,0,0,31b38d0ecd60673d0ddc9de2a7744d882ebc9cde7c798b79ea0483b560f5220f,2025-02-06T18:15:31.100000 +CVE-2024-36554,0,0,4384d0672eb69dee6bfee745e6e8595ac690f81db61d0db012ddc741316e7433,2025-02-06T18:15:31.273000 +CVE-2024-36555,0,0,bc124197bfba85a14e7ffc67eb97c3abe05c39acdc7dcab66789c62d37c939c5,2025-02-06T18:15:31.423000 +CVE-2024-36556,0,0,f85c5238a55ef66515887cafb8667338bd3ddb4b7bdc976f2c23eeef37febe8e,2025-02-06T18:15:31.580000 +CVE-2024-36557,0,0,0d13210db59a2d83ea083f90c2b8d9a5283c6f84eb916d8a69197217ac640157,2025-02-06T18:15:31.750000 +CVE-2024-36558,0,0,bb3adda23a629d8895c2ecb0a9312a273e1769c7815ea74281dbb8368b888913,2025-02-06T18:15:31.903000 CVE-2024-3656,0,0,cc6741c2183e9b71634bb4ef1d35a6085988e0cc98193d8f3bcaf2ac00dfb710,2024-12-23T14:15:05.553000 CVE-2024-36568,0,0,4dc3650ba5db2618f853f2d8a4fc5d941192ca1d82f4f78ca0f379bf1740efe1,2024-11-21T09:22:24.367000 CVE-2024-36569,0,0,237834c9de6e90d428bcfe4a628116c726e8895e63611649f26cb41fa5adc5f6,2024-11-21T09:22:24.610000 @@ -261887,7 +261889,7 @@ CVE-2024-39027,0,0,9c0579dae898d595139f332264c60946a6305463079e5e828b96e35983d71 CVE-2024-39028,0,0,655f86c8b3e4e1291e9d2943922a75fa2fc9393ff19cad0b2a5dbdcb29dc16b3,2024-11-21T09:27:09.863000 CVE-2024-3903,0,0,3abc3093808cbf33494e777ab78a2a1f0d0a381b5e414e8aae50b0d04cda30b0,2024-11-21T09:30:39.727000 CVE-2024-39031,0,0,31600cbde8bea78bc56e4a9598adfa8ee74fe57d43a5d0365ca0ab764476d743,2024-11-21T09:27:10.103000 -CVE-2024-39033,1,1,1fddfbaab85a7b30af84db5590fcc697b3b4cc4be0ba70982579180eeb4da62d,2025-02-06T17:15:18.553000 +CVE-2024-39033,0,0,1fddfbaab85a7b30af84db5590fcc697b3b4cc4be0ba70982579180eeb4da62d,2025-02-06T17:15:18.553000 CVE-2024-39036,0,0,b4bfbf7ae964d272ab5cded04fc4273edac34005bdb2e82fca5b7e2e2aae34a3,2024-11-21T09:27:10.370000 CVE-2024-3904,0,0,ad761d288d957d794b31c5702f59b35dfd5c44b747d0c7e16f2e403dae30a0d0,2024-11-21T09:30:39.910000 CVE-2024-3905,0,0,9aec538ba78b45e146b8f6c24f3c93fb5bc07cae6875cd9278304145b8c7d491,2025-01-21T18:39:28.047000 @@ -261976,7 +261978,7 @@ CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb55 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 CVE-2024-3927,0,0,c5a7a83540dd0108e0c95456e196911f953d1c089ad9153186ac7abf5eac21fd,2024-11-21T09:30:43.063000 -CVE-2024-39272,1,1,d2b56cd2bf724722ff345ac093b9ef2dac96c14503b7b0016b361c27968d6409,2025-02-06T17:15:18.647000 +CVE-2024-39272,0,1,b15eb61aaa795ad338db8e51169c1df45944c657c8b77a5c99ab6dd141c0f483,2025-02-06T19:15:19.357000 CVE-2024-39273,0,0,5181699ccf93ef18ef6af16c2c5b39bedb60a9d8446642e1b83f04b362725f80,2025-01-14T16:15:30.227000 CVE-2024-39274,0,0,6e7d1a33b0e5d020249e1265d5c2fe803a054c23d02db7f7ac41bcc85d95ece2,2024-08-23T14:39:29.247000 CVE-2024-39275,0,0,3a30aa64f40c900af2046a32b51bca26459d15ed56339ef5c87dcb823873ae2a,2024-10-07T15:25:17.050000 @@ -263525,7 +263527,7 @@ CVE-2024-41551,0,0,e1d018116726b59a859c54c726d033d68adc85dd274a77d026bca8345fe43 CVE-2024-4156,0,0,6f9b01015adaa4ff0ac52ad6f60aa60b33aca22e2236ec15beacb1162f132472,2025-01-15T18:04:58.607000 CVE-2024-41564,0,0,24f60296f7995573baa861824a54d1622bd6248d719f1fa88e107bb7ee60a876,2024-09-19T14:40:32.270000 CVE-2024-41565,0,0,e90f9d0bec65bf131f69559e330499ee7d867ffa90ce21c920c44c5a44079338,2024-09-19T16:19:59.317000 -CVE-2024-4157,0,1,29d22a0a757cca99ea487ddaea2d2e53381fd88b5244509866bd98027aec7fca,2025-02-06T18:36:20.893000 +CVE-2024-4157,0,0,29d22a0a757cca99ea487ddaea2d2e53381fd88b5244509866bd98027aec7fca,2025-02-06T18:36:20.893000 CVE-2024-41570,0,0,bc7c6440b2a67efc5463bb4c39b989d97eed435dea63e8e6c437acf558913c6d,2024-08-29T13:32:21.020000 CVE-2024-41572,0,0,a9f0d828cc4e2bc36792fc456a6a868ace184f72abe54a0c002137b56b623f16,2024-09-11T14:15:13.380000 CVE-2024-41577,0,0,b1f882437231c85f732c91780240de4516b5d2682e39952346ec72953d56207b,2024-11-05T22:35:07.160000 @@ -263538,7 +263540,7 @@ CVE-2024-41586,0,0,1dfe0a57832209bcd6e050fea5d10d9e2cc77b9729ee84c61dfed10c20884 CVE-2024-41587,0,0,8ec618c35df2d6b6c47f939e884fc8f9f85c116799f47d62322ced2da972c24f,2024-10-08T15:32:18.313000 CVE-2024-41588,0,0,fd3ce7f7855398e35ab5f6ddf4c9ca224e9b39f193258ed7cd185f9bbcbce78f,2024-10-07T19:37:15.063000 CVE-2024-41589,0,0,933f60891b4d710c7b37c18705d8a2738d871d9d2c4ed1642f1e707d191ac66c,2024-10-04T13:50:43.727000 -CVE-2024-4159,0,1,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 +CVE-2024-4159,0,0,79fc1543f1260705e74b8deeae175c555b129f183a9014a6e4288a6f9681a384,2025-02-06T17:49:55.727000 CVE-2024-41590,0,0,1e2ec45258e7c07e175972d8811464c9173bad3d822ce356ae18fa7f32371b1c,2024-10-07T19:37:16.150000 CVE-2024-41591,0,0,9767b51f50983ef943152726983cd0f16f4c2ed85dfc575b8f6635c8aedb6c03,2024-10-08T15:34:46.453000 CVE-2024-41592,0,0,6cafebc6f0d6fbb4004a1dfb277a5338bfce167123047c3517ae584872bca55c,2024-10-04T13:50:43.727000 @@ -263554,7 +263556,7 @@ CVE-2024-41601,0,0,24d5874bc7cb95d07f742d5d1793554eddb41d336e6f486826186b821534e CVE-2024-41602,0,0,e468936d57b3a3622bfd9d63c4330d90ec2e1727d154efe9fd4cd7b9544c36e1,2024-11-21T09:32:49.867000 CVE-2024-41603,0,0,9a670a1274f5fda7a31aaaab662ed5464115536c9a59c98d4aa278930a602bd7,2024-11-21T09:32:50.083000 CVE-2024-41605,0,0,2ee5b1df8b80351aa42bd277a05ebe6cfd3eeadae217388add65bc02cfd62e6f,2024-09-30T12:46:20.237000 -CVE-2024-4161,0,1,1b6be13aebf10d87c0f4597f26cf874ea32ec0118ac42fcf6ef1f439dc2d672b,2025-02-06T17:50:45.147000 +CVE-2024-4161,0,0,1b6be13aebf10d87c0f4597f26cf874ea32ec0118ac42fcf6ef1f439dc2d672b,2025-02-06T17:50:45.147000 CVE-2024-41610,0,0,ee52e88443b2f617e3925db264d751b2bb4fbceebf67245eca9aa7aa17900d82,2024-11-21T09:32:50.507000 CVE-2024-41611,0,0,d336e31da2e56f9dc99927877cda9dece32880476434433bac7111aed24f4268,2024-11-21T09:32:50.723000 CVE-2024-41613,0,0,b5839e9cf5e2defa3647c67fdf9f50fc087e41d0dad936c67d39705f8d63a28c,2024-08-14T18:13:25.017000 @@ -263662,7 +263664,7 @@ CVE-2024-41726,0,0,1634589ac3ac4ec4129067b4ba8087d1381f27ca1092297eaee5f918681fe CVE-2024-41727,0,0,415c4c6276b486188d6e6914f90931e80153458b758b99e57617b7ad6d32b486,2024-08-20T19:25:12.490000 CVE-2024-41728,0,0,da066a33d0f0d2dfaa585ea4e3472de9187a4f59e3c0192c0243458b46de0f68,2024-09-16T14:14:52.840000 CVE-2024-41729,0,0,96dc04676b815e555a804314dc8047d39c132aa5becf84a2c900894243d11d5b,2024-09-10T12:09:50.377000 -CVE-2024-4173,0,1,9e89f7b398b0c012488f349bc037f0cf65ddc15b2a33e8514b27cd2dd5ce161f,2025-02-06T17:53:25.287000 +CVE-2024-4173,0,0,9e89f7b398b0c012488f349bc037f0cf65ddc15b2a33e8514b27cd2dd5ce161f,2025-02-06T17:53:25.287000 CVE-2024-41730,0,0,ce7277ad2a7258c483d2e415f893f21fd08dcb4e3029ec3b962ae7e1408020ed,2024-09-12T13:56:51.237000 CVE-2024-41731,0,0,d0eb550e39ae0d81931b4ecd6064892f550794d739af705cd7bb0cc8cfca45d2,2024-12-10T07:15:06.187000 CVE-2024-41732,0,0,8bfe4c2fcb6c965e1260a4713476ae411b9ce3b0a3f11da9ea27c89aada979ab,2024-09-11T17:52:39.477000 @@ -265348,7 +265350,7 @@ CVE-2024-43774,0,0,267603d5dcdafd9bbb030b267307fb5b633f3e8c3df39d738d42af146bd76 CVE-2024-43775,0,0,895151aa205f09b9fadb348edccc220463b0287de3568477154d6fffb476bf97,2024-09-04T12:27:22.670000 CVE-2024-43776,0,0,0e7377c058f9e86c53a9fbcebac62784c97230bd50dee78fb2efa5dfee29a277,2024-09-04T12:27:40.113000 CVE-2024-43778,0,0,93d68d17e0a2e000a95bbf7644af02e0b191bd578d600aa43c2fc854145868d0,2024-09-20T12:30:51.220000 -CVE-2024-43779,1,1,5d6b9330a0784c1f922610451abcf56d46e7f6b71bc7785934b7332cd6dc5a03,2025-02-06T17:15:19.160000 +CVE-2024-43779,0,1,d6ae19e31d7ac9ca95935d8ca7df259d0de4a7ac68b50749e98c4479cfc7aea4,2025-02-06T19:15:19.447000 CVE-2024-4378,0,0,d4319ee5339d2a9817c61070bfcf510c89afd3406f28aa380fe0de9169b486dc,2025-01-08T20:07:57.800000 CVE-2024-43780,0,0,46050aabd5861673e59431ba81794de47ac0366f2a10d4dfb8ab15f44f094284,2024-10-16T20:07:50.637000 CVE-2024-43781,0,0,169ded40ca31dbd1f0dfd97b5659e936ba8664c1c6e73ed600899e39b741292b,2024-09-10T12:09:50.377000 @@ -266474,7 +266476,7 @@ CVE-2024-45345,0,0,4e5002e5dc81035c1af4e238f5f319df35e1e7454ff3bb9f51dea50624303 CVE-2024-45346,0,0,7e5d27b5e0bb35d703afc2aa4711ce7de5023d11e83b251a6cc5a4802c05e84f,2025-01-09T18:15:28.703000 CVE-2024-45348,0,0,1e1db77a5a16312aa537fb47b5ac485ad4a9ec1edf7b08e9d1addf2cc98471e9,2024-11-25T17:14:11.713000 CVE-2024-4535,0,0,09bcb906ab5065886bd16710eccdce15006e447ef07dbc5cac7e797ac8618de8,2024-11-21T09:43:03.457000 -CVE-2024-4536,0,1,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000 +CVE-2024-4536,0,0,d554a9fba63153c422b87ae2d4b0219537ca1cbc00fd943074006c5d6a843426,2025-02-06T17:32:48.777000 CVE-2024-45366,0,0,d13f4b03dcbe654ea752888fe69e44580333b063ff67391732408feaba64beb9,2024-11-05T22:35:10.920000 CVE-2024-45367,0,0,52ee3f66db69a964bee9b68a4b313e658b9e6142ecc7bffcdc98b979c0bac4a4,2024-10-04T13:50:43.727000 CVE-2024-45368,0,0,0df313c0124da271d2ee1491e7393fda4b02992ab2b9f7115e22ddbea19c65a2,2024-09-14T11:47:14.677000 @@ -267569,7 +267571,7 @@ CVE-2024-47086,0,0,63473724fc366f58b877dfed9456a75923cb2dca0b63de6fc657bfea2fb6c CVE-2024-47087,0,0,aadede43cd6982b03d609814fe13168dfb2ee6915d193c1af719e757a292b001,2024-09-26T15:25:51.467000 CVE-2024-47088,0,0,efc4d9edbe3ddab005f2b2845098209fc6282389589b324ea91fcecf3010d130,2024-09-26T19:12:58.083000 CVE-2024-47089,0,0,7c817288360e94794b37bdc1706058a816cc69e4972a94427a49b22937a99014,2024-09-26T19:09:44.377000 -CVE-2024-4709,0,1,fb8e04b1891ec411dac50f73dd21b9dddab9f77110643379d3cb27db5c3b5a21,2025-02-06T18:37:12.683000 +CVE-2024-4709,0,0,fb8e04b1891ec411dac50f73dd21b9dddab9f77110643379d3cb27db5c3b5a21,2025-02-06T18:37:12.683000 CVE-2024-47093,0,0,254373901b8fc660464b2e2de4e7fbfe56fe2ef0b4d8cc4ab6e7d7491a830b6b,2024-12-19T15:15:07.250000 CVE-2024-47094,0,0,d24e1f292f7d19d40d32d967d3e72cc931ea886edc80358cb771de69f5f1ca5a,2024-12-03T20:01:52.610000 CVE-2024-47095,0,0,ab3ae5fb8cc2610821c1dec2e1fa7073f06cbe80c80fa571d8c05d61db95648f,2024-10-10T12:56:30.817000 @@ -267692,7 +267694,9 @@ CVE-2024-47250,0,0,11c644dbe63a41f5d721b32a69341c30ccc7630321c43481390341a1ac658 CVE-2024-47253,0,0,530ab00b63e8441eac6af22fa0a9abb006f28bbe2de90227cc8791b7979c1184,2024-11-07T12:15:24.630000 CVE-2024-47254,0,0,2ab452b813a2090516d8f238800b10e27c786f7540ac56e33f7f38e348d84cdb,2024-11-07T12:15:24.747000 CVE-2024-47255,0,0,ee701a38d60abc2f20bd1d451be45a629b86833aefda6f8e361d6c4f9004efed,2024-11-07T12:15:24.857000 +CVE-2024-47256,1,1,d2a1dbeb558d97d4bc20ea595cf892821bbff2ab5bfcb35e996ccc8c9a154982,2025-02-06T20:15:39.533000 CVE-2024-47257,0,0,25b7637c67a9d4ed1044dbe0e4e54d94537d623f9f8ff95f637768d659647510,2024-11-29T06:15:07.170000 +CVE-2024-47258,1,1,98ebd06d905035fdc4f773f6a7ff9bd071991a883c53b3920db9e2d20a9a7789,2025-02-06T20:15:39.643000 CVE-2024-4726,0,0,3e61e14a791c8650d0008a4e96317f2512c59da3e1881419f89f3069e84d077b,2024-11-21T09:43:27.817000 CVE-2024-4727,0,0,b5703c16f288dbf264e85ffadf388498a97a674e06139b3dd73d60060608ca96,2024-11-21T09:43:27.953000 CVE-2024-4728,0,0,07486e4cc1c7316d942acf75d8218bb01b9e16e07ced0971b743aa5d379224fe,2024-11-21T09:43:28.090000 @@ -269257,9 +269261,9 @@ CVE-2024-49528,0,0,0689ce0d066659539549c0d5fe4e5762c988f22c283394e11cdcc7c4af333 CVE-2024-49529,0,0,bc912441c1467e88d09c1eebc868707893b19843941c8a4da84053631d70d7a6,2024-12-03T14:37:05.960000 CVE-2024-49530,0,0,aa4a763319d4ffe383b3fab4fe13cddb4a4f1e7c8d88eed78a77597afad1c810,2025-01-21T17:07:34.653000 CVE-2024-49531,0,0,84e1a976e59bc70359e7049b20a3a9336812728e43a6ad2bd05ccb3e7904e21d,2025-01-21T17:07:51.873000 -CVE-2024-49532,0,1,b58a786c210eadcdd0f95586bfbaec552cc1450c1f6a0658869a66f2a7404c62,2025-02-06T18:28:13.123000 -CVE-2024-49533,0,1,91babea33dd718352e3230bc38ab26f7d4a0d88aed6567e7d2be3d239217cec2,2025-02-06T18:28:01.443000 -CVE-2024-49534,0,1,4c9e398622f4f8d4cb321012fd5d9d84788de269c80e396167a5720a1da7b0b9,2025-02-06T18:27:41.457000 +CVE-2024-49532,0,0,b58a786c210eadcdd0f95586bfbaec552cc1450c1f6a0658869a66f2a7404c62,2025-02-06T18:28:13.123000 +CVE-2024-49533,0,0,91babea33dd718352e3230bc38ab26f7d4a0d88aed6567e7d2be3d239217cec2,2025-02-06T18:28:01.443000 +CVE-2024-49534,0,0,4c9e398622f4f8d4cb321012fd5d9d84788de269c80e396167a5720a1da7b0b9,2025-02-06T18:27:41.457000 CVE-2024-49535,0,0,69fa5777a789e67947841f1371dc70cef3aeec888dccb58050d6113a7f5c3648,2025-01-23T18:36:07.750000 CVE-2024-49536,0,0,3226abc075af5af9440f5cdc9a3a66360f030ce3d405055960c0bca748fe4e92,2024-11-19T21:21:45.640000 CVE-2024-49537,0,0,ba882a99cef27c89f9b2e8ef04d1eabb52008f24920d39f5c7da20d6b3c16d7b,2024-12-18T15:21:52.587000 @@ -270330,7 +270334,7 @@ CVE-2024-50672,0,0,a506f4d2b4e62571040ff3dd4b935bbaea397a7aabe2668687c8152c3cc15 CVE-2024-50677,0,0,41d5addef3c1d4fcaf4d23ee7f34aa0575b53eb368f3af05bd4b5c5da2166101,2024-12-06T17:15:10.180000 CVE-2024-5069,0,0,ad719aec2191fa4733004e376bcb495f235c4247fa2915a6912d571066c414e6,2024-11-21T09:46:53.973000 CVE-2024-50690,0,0,a1e4aaa91e6a0406a406f4b4f0b873d04e5babf6d3e42c6dbab61414b81919b5,2025-01-24T23:15:08.227000 -CVE-2024-50692,0,1,b4b232b8fd20cfc83ca910c8b78001cb2d8096ac3932e97d2b610a65820b9588,2025-02-06T17:15:19.313000 +CVE-2024-50692,0,0,b4b232b8fd20cfc83ca910c8b78001cb2d8096ac3932e97d2b610a65820b9588,2025-02-06T17:15:19.313000 CVE-2024-50694,0,0,b192cf8569bb942756ad1070033fb5b23a0338a219f3f58bb390a97c9a59335f,2025-02-05T15:15:20.463000 CVE-2024-50695,0,0,9bf1b957244a59b772ead8b2f70e41a1650386c01d6d5befeea804e2a8547f40,2025-02-05T15:15:20.633000 CVE-2024-50697,0,0,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 @@ -271160,7 +271164,7 @@ CVE-2024-52008,0,0,7281563e51f3b39d532519e8a2681001e782e7c2a3e897881477e254e32f3 CVE-2024-52009,0,0,c9066cf7155cd04eacfb31719dd1a8a72528bd2bf8524793c7b6ae503cedfb78,2024-11-12T13:56:54.483000 CVE-2024-5201,0,0,70f2a62b026d2275481fc1646adce1cc60a8e3612df3f1a182e7d38251323855,2024-11-21T09:47:10.680000 CVE-2024-52010,0,0,f693d8dc10fe381f1d93e5d9728758e9faa90c7556c1ec2062d04b5a4b414594,2024-11-21T17:15:23.350000 -CVE-2024-52012,0,1,dc7726d6f55976e17a58afd87c23683cc6ade0bd6d67f5575e49490169267c33,2025-02-06T17:15:19.480000 +CVE-2024-52012,0,0,dc7726d6f55976e17a58afd87c23683cc6ade0bd6d67f5575e49490169267c33,2025-02-06T17:15:19.480000 CVE-2024-52013,0,0,8b6296da77cd7ff5ac33141091f42af5f9ad4a6b318bbf04ba5caf894b9dec57,2024-11-05T16:35:36.337000 CVE-2024-52014,0,0,95c63fbe0d36cf5f1402099d30f68bd084b42e8fece77b8a43cf34d740aab22d,2024-11-05T16:35:37.113000 CVE-2024-52015,0,0,84d00cdc9a202bb00e097769512e415450a582ad27ea697fe4aabe7efef8bade,2024-11-05T16:35:37.890000 @@ -271702,6 +271706,7 @@ CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212 CVE-2024-5288,0,0,35888db4a5e323e6a29faa7e47d2416858cbeb598a42c21aa0c323691cd3d86c,2024-08-28T12:57:39.090000 CVE-2024-5289,0,0,45ad6e1c3a8134226122bea6b70bcd4aeb55721ddc7a695e24fb24c5dc173e1b,2024-11-21T09:47:21.990000 CVE-2024-52891,0,0,c6b610008a5f3ec3869a4a93380f2e9ddf6baaf48eba1e31c2434c79c4127010,2025-01-07T12:15:25.010000 +CVE-2024-52892,1,1,d1bafd536f3440d3a1c0bfd90b6be519c3492875a95435b00fb6292860047dda,2025-02-06T20:15:39.763000 CVE-2024-52893,0,0,93318ea4edf051cd522e6cc747b964878d2b91249e126365b5b3b33f5344312a,2025-01-07T12:15:25.153000 CVE-2024-52896,0,0,4f05d5756387a4a38056c43617cd5bc7f4b71fd12d45391dd4bd8326aa374d5f,2025-01-10T15:15:15.633000 CVE-2024-52897,0,0,81ad80051d1322a8bfb61db68a23039003246d955567fed9fc0a8a2a809d5fdf,2025-01-10T15:15:15.777000 @@ -274087,8 +274092,8 @@ CVE-2024-57065,0,0,5853bd5a0cfac3911d89a9239f95e27c817cdcf0a6b4e14425712a7bc77ac CVE-2024-57066,0,0,4756d883d6d97a12c7fe683bf21981f578b74dab49898ee28414da8237ad4516,2025-02-06T16:15:39.803000 CVE-2024-57067,0,0,4394f9e32c024d8a3d10d2f11622ba82bb25acd4c682842453cc9cfd79267ebe,2025-02-06T16:15:39.980000 CVE-2024-57068,0,0,6cbddddd900614e2f3a0924414cb60a804a1dcba3fd390608d93afe8db659787,2025-02-06T16:15:40.150000 -CVE-2024-57069,0,1,5833874420a5b55d33b4ba199729e3dc6d3cc8cbe23b5e3c7ecf3d1fd2607b1d,2025-02-06T17:15:19.647000 -CVE-2024-57071,0,1,2d256581cf4b947033630c13b7529b8f367bb35cb5bc03ff5c6e7e7ccffdfd4f,2025-02-06T17:15:19.793000 +CVE-2024-57069,0,0,5833874420a5b55d33b4ba199729e3dc6d3cc8cbe23b5e3c7ecf3d1fd2607b1d,2025-02-06T17:15:19.647000 +CVE-2024-57071,0,0,2d256581cf4b947033630c13b7529b8f367bb35cb5bc03ff5c6e7e7ccffdfd4f,2025-02-06T17:15:19.793000 CVE-2024-57072,0,0,5ffa872ededabdb0739a5d0405a390fff41c788fb3613d132bbb706c968c40f2,2025-02-06T16:15:40.310000 CVE-2024-57074,0,0,2ab2e028fa5d834db13ae60448602456812e0885ccb3626ff8affd4719b73616,2025-02-06T15:15:15.347000 CVE-2024-57075,0,0,970568121a59cc35ea6582e0d23d90946c2caaf344af4e3af0a34eb61c5861ea,2025-02-06T15:15:15.500000 @@ -274097,12 +274102,12 @@ CVE-2024-57077,0,0,0fd5457281886f8ef8ff1e57793f38e12666464c86810fe2e03063742fc7a CVE-2024-57078,0,0,ad1da0644d0ebb1d77f3f782cd38741010af2e2697e047a9b09abf14e4667141,2025-02-06T16:15:40.497000 CVE-2024-57079,0,0,24c4041620fe4eb666480c9134c43daa9029b729bdfa84922c2c31ea99d7c95e,2025-02-06T15:15:15.950000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 -CVE-2024-57080,0,1,c27a3693dc10c1913b168b61f0caf829d1e7fb1490217b7be2daa22dca9603d8,2025-02-06T17:15:19.933000 +CVE-2024-57080,0,0,c27a3693dc10c1913b168b61f0caf829d1e7fb1490217b7be2daa22dca9603d8,2025-02-06T17:15:19.933000 CVE-2024-57081,0,0,7cac20819fadca6fc4259ab8bc88daff5fdd9d3e1ff95215ab57c09708d35617,2025-02-06T15:15:16.100000 CVE-2024-57082,0,0,197407c0de09474d05f334c12207fc39d0d46c4fc5e8c0007c65360a32ec8d15,2025-02-06T15:15:16.247000 CVE-2024-57084,0,0,4092dc4cc9dea9569ffdafbb2596ed1f9ccf781214455a44da37c2ced3b0dc7e,2025-02-05T22:15:32.613000 CVE-2024-57085,0,0,6c933162c254c702d391cb2d1984a69e8dee7f0c4841adb9392ab8f81c6da474,2025-02-06T15:15:16.390000 -CVE-2024-57086,0,1,35fb361e0bf59457b906a3f99dedd4143894ad38875963914f72babb151071fe,2025-02-06T17:15:20.073000 +CVE-2024-57086,0,0,35fb361e0bf59457b906a3f99dedd4143894ad38875963914f72babb151071fe,2025-02-06T17:15:20.073000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 CVE-2024-57095,0,0,feaabc133222d755bb64c81b7f48c86d504504845f631c6909ee10ad4152eadc,2025-02-05T17:15:21.720000 CVE-2024-57097,0,0,72178de57ebc65af2f3143ffe454f119040395fbc17e427dcd5315ca4490337e,2025-02-03T21:15:14.450000 @@ -274167,18 +274172,19 @@ CVE-2024-57369,0,0,0beeb3a945370495c7fab19794a2bd15bf04ce80c00d4b38b5b7c779de679 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 -CVE-2024-57373,0,1,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 +CVE-2024-57373,0,0,55b5a66e1a93744a164d63416378de309c1b9a5faab6102e8edbf1875b843e8d,2025-02-06T17:15:20.213000 CVE-2024-57376,0,0,9564a5a5f1c678a5ed27c086bacc6d63834708967615de401284e6c6ddc391ef,2025-01-29T16:15:43.367000 CVE-2024-57386,0,0,ad9377994dc2b991f013b227dbedd5251f54c47616d12069f6305d876047b1bb,2025-01-31T16:13:06.540000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-57395,0,0,2c6b9838d8d0a9b17c18c2b5c319e27ac8a0ab4c8fbbb39ded3167ef6bff33f1,2025-01-31T21:15:11.383000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 -CVE-2024-57427,1,1,d285cd880f7a853b464e25a346510f02f9182642e9eabe14981f37a228436678,2025-02-06T17:15:20.357000 -CVE-2024-57428,1,1,e0bb07e10a2cff961e075df840a152247b32fa243f7d820119ca118e2b972c86,2025-02-06T17:15:20.527000 -CVE-2024-57429,1,1,45cb205c9d03aa148bbab11b5b421d874e3fa32787cdc4a91f1f3a8ac4a1ccd9,2025-02-06T17:15:20.627000 +CVE-2024-57426,1,1,85c5f30a986dcd6e8d97d3c93cff0dfd218a35b1ef5b378f4c8cd012553f7fe7,2025-02-06T20:15:39.923000 +CVE-2024-57427,0,0,d285cd880f7a853b464e25a346510f02f9182642e9eabe14981f37a228436678,2025-02-06T17:15:20.357000 +CVE-2024-57428,0,0,e0bb07e10a2cff961e075df840a152247b32fa243f7d820119ca118e2b972c86,2025-02-06T17:15:20.527000 +CVE-2024-57429,0,0,45cb205c9d03aa148bbab11b5b421d874e3fa32787cdc4a91f1f3a8ac4a1ccd9,2025-02-06T17:15:20.627000 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 -CVE-2024-57430,1,1,dd23719e7e5d0c81473d565f9d1aba8bc813f9efb0a4a379a8c41321d2bcad8c,2025-02-06T17:15:20.717000 +CVE-2024-57430,0,0,dd23719e7e5d0c81473d565f9d1aba8bc813f9efb0a4a379a8c41321d2bcad8c,2025-02-06T17:15:20.717000 CVE-2024-57432,0,0,919d02e0a1b59673a162a8bd045a890978b7d93d202a67f79b5bbe75f3b09109,2025-02-03T17:15:21.883000 CVE-2024-57433,0,0,601b1b01df0eb69ac29e9606a7271bf2e47013cd403f277bf878079604fcd3c8,2025-02-03T17:15:22.020000 CVE-2024-57434,0,0,4cb782d653dc97e32efd3c538fcda0d8ae1d5de2464c175da5ed00584e2c5b3b,2025-02-03T21:15:14.600000 @@ -274212,6 +274218,7 @@ CVE-2024-57514,0,0,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a59 CVE-2024-57519,0,0,f6dcaa2139e878d99c2f1ee25c0738631af5afa261e3598c7b8dd197ab7d57b0,2025-02-05T17:15:22.157000 CVE-2024-57520,0,0,8bbae23e7762cd227ca8e5301b6d653dba1991f6d1d7d76c7dea92b784a46e73,2025-02-06T16:15:40.833000 CVE-2024-57522,0,0,6827e8e059e3a15cee0dfb1b5aff915559d0509dea45093a502583c52a098ef1,2025-02-03T19:15:13.513000 +CVE-2024-57523,1,1,37032cf62e20a6985f6e886f604f75f344628ba7ba71429a7aad32c984641c12,2025-02-06T20:15:40.050000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 @@ -274246,10 +274253,10 @@ CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff CVE-2024-57590,0,0,468c69413bd6e8b154542bd7668e59449dcd31e5c13459bc4d0598be16b164ab,2025-01-28T20:15:55.973000 CVE-2024-57595,0,0,d5693a2fe10b4abac0b79780793b0dd88de974ed3b2d52993c0faf6b5032403c,2025-01-27T16:15:31.613000 CVE-2024-57598,0,0,145a87ddac35d0fab6c2b623e0b0d68a323a745f638d00fa2e3ace232ac680ec,2025-02-06T16:15:41 -CVE-2024-57599,1,1,f7031f3b84d0652b034acfca2a972d23eb3533aaf618ac5f216f84a3f490c3c6,2025-02-06T17:15:20.820000 +CVE-2024-57599,0,0,f7031f3b84d0652b034acfca2a972d23eb3533aaf618ac5f216f84a3f490c3c6,2025-02-06T17:15:20.820000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 -CVE-2024-57610,1,1,244d693947d7282b05e405de57c37865b94df40f7de66b0572bef4af7ca2d494,2025-02-06T18:15:32.133000 +CVE-2024-57610,0,0,244d693947d7282b05e405de57c37865b94df40f7de66b0572bef4af7ca2d494,2025-02-06T18:15:32.133000 CVE-2024-57611,0,0,5a6260621739d59dcd08f111a764de6bcadc66f193b1b7892272336da3d323c2,2025-02-03T19:15:13.717000 CVE-2024-57615,0,0,29d723949a23cc6bc26d66fa548c118c8909a244d6e9df34eacae9812cc8a92d,2025-01-17T18:15:29.320000 CVE-2024-57616,0,0,afeb4ed5820ffe4cd117c4bd6013d3dbe80f28e3ffb828fcb905abd5d47b56e4,2025-01-17T18:15:29.573000 @@ -274307,8 +274314,11 @@ CVE-2024-57662,0,0,dde74e7238b4f4135dd41986a6589f04bf57c54ee09407d6ad9eaea1bfaea CVE-2024-57663,0,0,af724e08b2512d2fac8b54c94a21a2980259518668a0fc995304976d26139003,2025-01-23T17:15:18 CVE-2024-57664,0,0,a6fa34a691d9da68c87bfab6ccf4d259a0f0e898f32cce10aaac7c8f53eb5576,2025-01-23T17:15:18.160000 CVE-2024-57665,0,0,809d5e38d9875ce8f564eef43bf055ef7a18d727db5a6a5c84b4ec0d4427f2c8,2025-02-03T20:15:34.787000 +CVE-2024-57668,1,1,d0cabd9d8e4c2d382e123cdef2364b6806b23a25302e5d01ce0c41cf551de137,2025-02-06T19:15:19.643000 CVE-2024-57669,0,0,6bd10bbf91cdcd56c4203123470fc7a934ba1644d36243028508a60d3cc7fa53,2025-02-04T16:15:40.503000 CVE-2024-5767,0,0,83b611dd489bb163f66e83f90bca18a4479f0bb38020979c04a07f5718f3596b,2024-11-21T09:48:18.420000 +CVE-2024-57672,1,1,eba6cd9911e6c0d8357988b31978ab95019cb2d0bf8f07a4e2a688df324cdcbd,2025-02-06T20:15:40.227000 +CVE-2024-57673,1,1,75c4b0a852dfea23ca9996feaeca5a9e2eab94ba60b7d21040c11ca0193b8bb6,2025-02-06T20:15:40.347000 CVE-2024-57676,0,0,e83a47428b1d887cd28b25fca6dda620f4ad43daa5a72e70d4126bf8b4179c60,2025-02-03T20:15:35.083000 CVE-2024-57677,0,0,228e1b223bcdd2d005bff9c95109b40002a995fe11f1b04b0899143b94e0a8fb,2025-02-03T20:15:35.260000 CVE-2024-57678,0,0,cfdbcf90eed1dbbf2bfed09ea56c1ac50437174f92f99812ddc4e869d1085850,2025-02-03T20:15:35.427000 @@ -274493,7 +274503,7 @@ CVE-2024-57962,0,0,aa02adc9a628f0a58ddefcc0a44bc2813378806d45112cb634abff123b940 CVE-2024-57965,0,0,beca1a5c4241b8a17f2dc2e6caf9cfcb35d784b0c331b6bcd655a61453686e3e,2025-01-29T10:15:08.113000 CVE-2024-57966,0,0,40e2f22cb22a31ff1abb28cf2e7cdb6b2203c6459f1e312f0ed24484eb3b3c7c,2025-02-03T05:15:10.080000 CVE-2024-57967,0,0,91eb1bfd2e20a3b6504519270fe1735c3bd2ee8a6236093524acc33a3a4157f6,2025-02-03T18:15:37.853000 -CVE-2024-57968,0,1,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 +CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 CVE-2024-5800,0,0,0f1ba4e6921bceda8aa9f69d4954ff1ca271a0069f260f484c22f7b777658fee,2024-08-12T13:41:36.517000 @@ -275257,7 +275267,7 @@ CVE-2024-6621,0,0,df7308a44678068e926e4c44c4ed4f05c26c938c3ef568a5161090dd66bcd2 CVE-2024-6624,0,0,552d36257e8bfaa4330013290315eab120066dcc2d886a9d94d7a9269b76a470,2024-11-21T09:50:01.337000 CVE-2024-6625,0,0,1b1c39349f634a560833a8b14095d12391f881dda66986404d732704553d9c8a,2024-11-21T09:50:01.480000 CVE-2024-6626,0,0,249866bf2ce6f0742e7ebbb55a39f819e02fa1bb5ce90e67c70e877b0a80889f,2024-11-08T21:18:44.400000 -CVE-2024-6627,0,1,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000 +CVE-2024-6627,0,0,46c1b50f2f4fc4f4915a5d60c7232a25ef2d8e7212d2215183cdea5ab45a44d0,2025-02-06T17:40:50.280000 CVE-2024-6628,0,0,6aa0bc00ea08b9aef593c460a4a806b0f9f48500a8836f10b79693acacaf2498,2024-11-18T17:11:17.393000 CVE-2024-6629,0,0,a527624ccafa4d4e16277a177029cdaa056a5fd7eb7a8772535daaafb91b33a4,2024-11-21T09:50:01.973000 CVE-2024-6630,0,0,7742b604143993a9d769b9ab9c3e5aab85337a51e6772bb186961af80d29fee2,2024-07-10T18:15:05.407000 @@ -275651,7 +275661,7 @@ CVE-2024-7094,0,0,b22ce77ffacf979339f568296208b1cc49b896d3f1ddb1fcde0ad4f63f1273 CVE-2024-7095,0,0,8022420a39cbfcd3372a34a53680c91a4d262f7eb4cb2666208fca7996ad0343,2025-01-14T15:15:27.263000 CVE-2024-7098,0,0,6d3f84e80cfe29d233429433ab17908fcb372f3ed014d96486b0feeee4cd8197,2024-09-20T17:14:53.063000 CVE-2024-7099,0,0,bda544dd9e76b13f20607b0db9189f48ec9b784ebdc1cb4c7f2f85bee57631ea,2024-10-15T12:57:46.880000 -CVE-2024-7100,0,1,99b418bd0fa2b35d671dd7874a6f6d5de7ddcdf351d66e487703289243d154d4,2025-02-06T17:45:05.493000 +CVE-2024-7100,0,0,99b418bd0fa2b35d671dd7874a6f6d5de7ddcdf351d66e487703289243d154d4,2025-02-06T17:45:05.493000 CVE-2024-7101,0,0,9cff880016a5f9e0ed8231c55bcfaaf90d7d1f0c57ac153566c6db7e59555606,2024-11-21T09:50:52.813000 CVE-2024-7104,0,0,d151c6e16e88a5882a2b03171a169ade8cff74d82ddb88ba3882405b7b893113,2024-09-20T14:44:18.010000 CVE-2024-7105,0,0,fffd7ab0d02896c184458c588856c1c84d9793c8f1ac9f8069eda1b041dde46a,2024-11-21T09:50:53.067000 @@ -276104,8 +276114,8 @@ CVE-2024-7591,0,0,6acedbc9c4fc9143dc69c6763f675f903ea94c54c7b69e2e118e2d6e5e20e6 CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000 CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 -CVE-2024-7595,0,1,078772cb53bd57fc6b0594ec7d8fbab39e32846c764737eb7066dae0d8872e9a,2025-02-06T18:14:41.017000 -CVE-2024-7596,0,1,60d4b173633fab13dc99e93e7fd9635eb0ef7a88acf3edb365dac3546fe63ffb,2025-02-06T18:14:55.137000 +CVE-2024-7595,0,0,078772cb53bd57fc6b0594ec7d8fbab39e32846c764737eb7066dae0d8872e9a,2025-02-06T18:14:41.017000 +CVE-2024-7596,0,0,60d4b173633fab13dc99e93e7fd9635eb0ef7a88acf3edb365dac3546fe63ffb,2025-02-06T18:14:55.137000 CVE-2024-7599,0,0,72cd50d41050beabf75c41eb70dc5180e8f76ad0927504bdf008f5b3f70870db,2024-09-26T16:45:58.507000 CVE-2024-7600,0,0,34b4914eedc647ff0a0d5a284f0b5d05eddd5cf8a511f0ca9df95820d310e297,2024-08-23T16:35:31.137000 CVE-2024-7601,0,0,3abc93709b908f4d7ee1f44c6b4ea7404a5a295ad0d93da10509fdc9a72448e0,2024-08-23T16:35:52.383000 @@ -277707,7 +277717,7 @@ CVE-2024-9520,0,0,2204db2ed999130ed8146384857546e10c1ae13991a3509590a6f4522bf1f8 CVE-2024-9521,0,0,d3d9a6be6f9014aa41c5ad870c2defc71925b1ae41265bb2b72fa894954634f8,2024-10-16T16:38:14.557000 CVE-2024-9522,0,0,81a7015961146d67081255db9702f745971d5b01a572ccb06cd379a82785f7bd,2024-10-15T14:27:41.553000 CVE-2024-9526,0,0,e1cf51fb6a9699a47e781e65c57b10dbb1d3b240a6e4fc3accb74fa92609f4b9,2024-11-18T17:11:17.393000 -CVE-2024-9528,0,1,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000 +CVE-2024-9528,0,0,324f5a9bfc4a37c1aeda9587a3d9c2b641c0fbccff333ce06df06554eda75394,2025-02-06T18:35:28.637000 CVE-2024-9529,0,0,cb4ddb314320de34a9d5304d06919a3c6fe7964a30fb164d33d4e703fbbc716f,2024-11-15T19:35:19.160000 CVE-2024-9530,0,0,d9770d6d9d81aca35282dd37cad0ec897a8e52cf92a99657df0b6283cc63f82d,2024-10-25T18:52:10.810000 CVE-2024-9531,0,0,791d1eeb40bab30335935df5c98b61329258a298e09b86a5a90c9cf22bd496a9,2024-10-25T12:56:07.750000 @@ -278338,7 +278348,7 @@ CVE-2025-0501,0,0,548edfbc8288b6ff7e57bf4d8a97bca009c549459d9d27e51c8af872c31d24 CVE-2025-0502,0,0,bf19161cdd08710fcd7f99c1f7c838e68552d69acf9f5504bdead56cab49bd6c,2025-01-15T18:15:24.650000 CVE-2025-0507,0,0,c71309f02e1e1a70cd7841937b6297c5bb1df964c2538ccde7cab1ea15c8c533,2025-01-31T05:15:10.280000 CVE-2025-0509,0,0,059ea7538d7423c151804c49d96b92101e4a5153898fdf76407db4b1aeb8fe78,2025-02-04T20:15:49.763000 -CVE-2025-0510,0,0,7651af521ace0b71fb60f58dd06598bee055dd55c568a05c6e23cf1b03e2c603,2025-02-04T14:15:31.550000 +CVE-2025-0510,0,1,55dbecf4736d4caf878110bafc3d5629572b5ad63d3ef04ae5a2922adf98eb8e,2025-02-06T19:27:13.273000 CVE-2025-0515,0,0,5ac36c3cf0188576defc5041e4d2f1cb1b09ae44d7e3c5256fa040d2f88a4731,2025-01-18T07:15:09.903000 CVE-2025-0518,0,0,6d3c5b8ffb150f75c389bd7e05b7aa905d22be4fb895631f5a9526d167be6180,2025-01-16T17:15:12.577000 CVE-2025-0522,0,0,3ba5f92b2bbe968086c463b5b1bea4c0e867d76710c8214f1e5bfb022a5d52d0,2025-02-06T15:15:17.127000 @@ -278434,7 +278444,7 @@ CVE-2025-0710,0,0,010c22bb91a250418d55abc4eaa70cc8949df634eef581adb3636c9db03dda CVE-2025-0720,0,0,1da4f3fb7977aa71d8d9a8e3f7a06c0c3c1ed142f923cc4868ac50fedaa97c0d,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,151152f411aa28e9121ab2a32ebc3ecb28fe5e8b508d6820387e16cbfda81f9c,2025-01-27T00:15:26.317000 CVE-2025-0722,0,0,c9258e96fea043e69bdeaa4cb3c7c089fa7706045bfdfb06a99b2cfbd46d8a8c,2025-01-27T00:15:26.517000 -CVE-2025-0725,0,0,ececce84edd30bf7f72c8ed3d8ba30d12e4bf4efa2eaad6b86a774c7e4b58c21,2025-02-06T11:15:09.683000 +CVE-2025-0725,0,1,523b773d5d9764e97e2768b4b8193792b383788aa0715eb339060768034cb57b,2025-02-06T19:15:19.733000 CVE-2025-0729,0,0,b3cd201258049c526a15c72f22bf765517f681dbe52f68677709aa8b21b9ec16,2025-01-27T17:15:16.917000 CVE-2025-0730,0,0,b0f8b58b424cc51685ec90ca8981a0ca40c34a5eeb1253b074c44fe87e601682,2025-01-27T17:15:17.133000 CVE-2025-0732,0,0,07b41495fd0afdf179fc98fe053710ec1b3fdc2df8bd25c7480598b82ff64b81,2025-01-27T18:15:40.550000 @@ -278527,20 +278537,20 @@ CVE-2025-0972,0,0,3993ac5cb544f96eddd4ea382f0cae390a0048486c03ea18bb36ab062e41c6 CVE-2025-0973,0,0,37f661449c5d41bc7d595495ef0c9ea92e0effb9bc1925009def0bc433286647,2025-02-03T01:15:07.263000 CVE-2025-0974,0,0,8c546eff83dbe5240d979de322859dbce3e0f40803afa459c807306a06c0fe25,2025-02-03T02:15:26.433000 CVE-2025-0982,0,0,3e753dfbc563c4ce8b6b3fa8334843ace7fd76f79278394611157b2e2098a86e,2025-02-06T12:15:27.267000 -CVE-2025-0994,0,1,967998ad6c7bd709dc6f1c3c1bb954c66b407740b0891517168a76f0f64ebd37,2025-02-06T17:15:20.917000 +CVE-2025-0994,0,0,967998ad6c7bd709dc6f1c3c1bb954c66b407740b0891517168a76f0f64ebd37,2025-02-06T17:15:20.917000 CVE-2025-1003,0,0,28c07c3915c653630648b64a7cbd4a7c616ace8285e5d0c3a3c404659b6f5188,2025-02-04T00:15:33.940000 -CVE-2025-1009,0,0,2dfce1a6ef3a5258a1ead4cc70f7690cef7c227c3f80a57d2d9913ffcc23af3e,2025-02-05T19:15:44.887000 -CVE-2025-1010,0,0,03e8b449c171fa78173030080d8bb8a5a467a9a0474962b20870b954fbc5c75d,2025-02-05T19:15:45.040000 -CVE-2025-1011,0,0,9708bb6e610498c1fec9bb5b68d13c48eb7ab4520952ea47e80ee5e175241ef1,2025-02-05T19:15:45.200000 -CVE-2025-1012,0,0,371f4c9e30444228e0bae55710cd824171d3e52dd3e463d62d64cdeb48f66b41,2025-02-05T16:15:41.677000 +CVE-2025-1009,0,1,2eaef1afd010c535fd50fceaedaa339dbea694d459d94247ca2cdf1816ccd1a0,2025-02-06T19:28:52.820000 +CVE-2025-1010,0,1,62a03586b01b5384628b2b24394869ef4f272c9b8354e05188dae652a849042c,2025-02-06T19:30:13.637000 +CVE-2025-1011,0,1,c7aab2f6a9c0415627154b90d3f96ebb209e4ddce064fa55ea39e2629e66c93d,2025-02-06T19:31:38.610000 +CVE-2025-1012,0,1,7b0c4ab0855cffefa552cdbb9537cf53fcf1593bbc730581babeb8c5fa1ab156,2025-02-06T19:33:46.407000 CVE-2025-1013,0,0,7850c4d6d2e109643a59fb961c11cb0730ae6f20ae9c8d7c940078d1f0c9d295,2025-02-04T22:15:41.743000 -CVE-2025-1014,0,0,544817131bc2a393c39ccd531718fe5c0dd3a6cd30b85cb9bf6937fb9e6d4be4,2025-02-04T14:15:32.237000 -CVE-2025-1015,0,0,78f5fecd53c2aa86c7ca6d563228a76004114ac181528abd6a45351d728a1c0a,2025-02-04T14:15:32.363000 -CVE-2025-1016,0,0,efa8db97120255b01241f5781d3dc7ba89f46e1536b94d5bcfc3c70208ef9d4a,2025-02-04T14:15:32.467000 -CVE-2025-1017,0,0,f5f7b8b5a8afec6f64c593865fae0e1442488e21ca02614ca10f9acba9138165,2025-02-04T14:15:32.600000 -CVE-2025-1018,0,0,cd92a6e0b57368cc5388f0343ce69c3844e558f1d129d9bb2826871121b9c45d,2025-02-05T17:15:22.293000 -CVE-2025-1019,0,0,4c88bc6137c6891dce1140bc9fc08cfc596cdc5e87b30280a2fd0e0bac1e354b,2025-02-05T19:15:45.343000 -CVE-2025-1020,0,0,eda0323a4c0776f4a73195a989cdd4cfe84003acb905d73dc0fc500a0b13bb10,2025-02-04T14:15:32.953000 +CVE-2025-1014,0,1,72e954afdb2a5439cf22d92d66ca81d43c1a07dd6b2375882eca8e6f852ff436,2025-02-06T19:35:57.283000 +CVE-2025-1015,0,1,8cd8821a11adb9aa991ac07b9fa9a7c63237ea5eac6002814534c0d64b762b17,2025-02-06T19:36:43.867000 +CVE-2025-1016,0,1,6092e11898dc6cc902e2a02c4c1a954004cb7767f3bcd66722dcd943b12b6aeb,2025-02-06T19:38:42.147000 +CVE-2025-1017,0,1,fdbb7ca785930f7cf3789cecf56f87efc12ce8fe1e8eec8dc330797ac22cfae0,2025-02-06T19:39:03.230000 +CVE-2025-1018,0,1,2c63b770ee1eb8404a9ddd357bafe82e637b324657da1135e622c93e59b669ec,2025-02-06T19:40:01.263000 +CVE-2025-1019,0,1,97756c2ae277aabeaedab68cc3d112cc358adac0f1529efc7a271f2ce7df17b0,2025-02-06T19:40:29.267000 +CVE-2025-1020,0,1,2fadfc812587ee5e52391dd9a7a252623bd48f3887da1df6a12c70989f54edaa,2025-02-06T19:40:45.937000 CVE-2025-1022,0,0,c6f927693382feefd3496fa1fab29d0d3220169dd409cf06d2e60bb8c3a871ef,2025-02-05T20:15:45.470000 CVE-2025-1025,0,0,47807b8e82e17527c7201ea4708ddff28a865df6bf51354013b48cefc410618d,2025-02-05T20:15:45.593000 CVE-2025-1026,0,0,934680430568ee4f9133f3caf4202e9f856a4d1cce3fe9e6aa36c7f381dad077,2025-02-05T05:15:10.687000 @@ -278548,7 +278558,7 @@ CVE-2025-1028,0,0,e2d695e5f743c52691e2706279de4015f0c0e2d5f7e673aad15fe64754f222 CVE-2025-1066,0,0,7e4b41993fef3213d8d368f9758fd930158ec457354ccd8458eb28a70931a69f,2025-02-06T15:15:17.330000 CVE-2025-1074,0,0,8c051b3034ec925098d2cc149a99487b209750af6f897c8ae0e6246aeecd5382,2025-02-06T14:15:30.050000 CVE-2025-1076,0,0,f8bd6961c3afe7e83bd1f50700b9a7057842b534d28d95685ee3dedd4ec97dab,2025-02-06T14:15:30.287000 -CVE-2025-1078,1,1,675c76ff9074af3b88b9bc037c57b0400427cdd389569c0c6f4bd86392660931,2025-02-06T17:15:21.040000 +CVE-2025-1078,0,0,675c76ff9074af3b88b9bc037c57b0400427cdd389569c0c6f4bd86392660931,2025-02-06T17:15:21.040000 CVE-2025-20014,0,0,c7b03c8de0f1a02652afc1076707a5c9ed340500d3cc7fc3a1a2840db59d647f,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,7beae6544fac5da36b705aa7bd201e5432df1e59d09b16381fbe97a847fc40ed,2025-02-05T18:15:29.573000 @@ -279358,8 +279368,8 @@ CVE-2025-22827,0,0,3baed988c384781b752e63a63aac2d02b4618a6f769d736ff71142b8ba1a8 CVE-2025-22828,0,0,327d4fbb4775debb7974f74b72faad2a6d9350ed385605b18892cfc7691fc3c9,2025-01-13T19:15:11.373000 CVE-2025-22846,0,0,ee57cd54683e50c0c5c24a8ae084d7ddc148895112414cbbd702fe57e89ac3b8,2025-02-05T18:15:31 CVE-2025-22865,0,0,19a89c82649ad3129bff7c393f18a8aa29547854e8bed3a25f76183fca3a3ccc,2025-01-28T16:15:40.540000 -CVE-2025-22866,1,1,8a69cf035707480fa8b55ae3b56481f3b164e8e2233ecdcde79769a96cb0341b,2025-02-06T17:15:21.410000 -CVE-2025-22867,1,1,d7efab2ec5f14ec5690e3f2ba26db7c75d1b086d6babee372f0bc13afcbd39af,2025-02-06T18:15:32.543000 +CVE-2025-22866,0,0,8a69cf035707480fa8b55ae3b56481f3b164e8e2233ecdcde79769a96cb0341b,2025-02-06T17:15:21.410000 +CVE-2025-22867,0,0,d7efab2ec5f14ec5690e3f2ba26db7c75d1b086d6babee372f0bc13afcbd39af,2025-02-06T18:15:32.543000 CVE-2025-22890,0,0,3935608c48eed0124a24f4ac9682008606b353294adac3ba9c028788e4197e09,2025-02-06T07:15:17.113000 CVE-2025-22891,0,0,fb75dbb6b742099414608ac1d0bf94bf5176258c88fc5ec7ea32c7f757b15007,2025-02-05T18:15:31.190000 CVE-2025-22894,0,0,54c97e3407aecdb41a2affb888c157b3c8b229c55e8dc632210c6aebf5bd070e,2025-02-06T08:15:30.027000 @@ -279372,6 +279382,7 @@ CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497 CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 CVE-2025-22917,0,0,719cb439e4aa013d46c277c9fd9c1581990f1a43ff92759e99b4634c1058cb35,2025-01-29T16:15:43.907000 CVE-2025-22918,0,0,c2acc93785383a23d09a5f2a5b1d1c26758fcb9ff8c53b46662815b62f354985,2025-02-04T15:15:22.713000 +CVE-2025-22936,1,1,b6d308f8d111e7b7f6c738ec65011341202272836a6d5d0960ff0a290b5f31a9,2025-02-06T20:15:40.460000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22957,0,0,916201be55856fe17638195010411f5f5b49ee491e16fc0f0d0d9fe711b69be4,2025-02-03T17:15:26.677000 @@ -279383,6 +279394,7 @@ CVE-2025-22978,0,0,6be2fb193ba25eb252c1a958b0de2d1d9f8029d13358fd699d94e6d2260df CVE-2025-22980,0,0,90bf7bf36cc737404c9d40dc6715966f270a478ee523b3c5a983294878d28120,2025-01-28T22:15:16.890000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 +CVE-2025-22992,1,1,7c661cfe513926f8a5155e006fda8a3b96d9d1f0b74d27619a10a7070f1a2794,2025-02-06T19:15:19.970000 CVE-2025-22994,0,0,410466b4be1b0d93079f1b91b60b108ad905855e3e14526dfb886653e8c3c7bc,2025-02-03T17:15:26.813000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 @@ -279445,6 +279457,7 @@ CVE-2025-23088,0,0,11e8939209f02d223d02a8c736a60c091ca0a72e8830769054cd9ade82334 CVE-2025-23089,0,0,e62b1ec51c57d0b0d2343387b9c8a249bdf7ad82d31087c994126a1fe23e1a8f,2025-02-05T02:15:28.517000 CVE-2025-23090,0,0,1fa9642da31f6a1f285e901b43018a8c7dae722f8fb49437e281ea29c270fa57,2025-01-22T02:15:34.443000 CVE-2025-23091,0,0,b0cc14c8e209fbe6063fb24eff4314bed321c702e3c91518f97b3035bbea10ee,2025-02-01T07:15:08.277000 +CVE-2025-23093,1,1,6a00fe5e15cfe4b9b828516e168040d46a49f329f9e9979cfda9c0195c5e63e4,2025-02-06T20:15:40.587000 CVE-2025-23108,0,0,0867ae52bf9537919e00df206497183b5abf45a3a43e56579f476cc3d26e8d6c,2025-01-13T18:15:22.680000 CVE-2025-23109,0,0,4d519c5c41161d21ebd8f814ea3659acc2224a598528dd7d3e4c7b87a5ad8cc0,2025-01-13T18:15:22.903000 CVE-2025-23110,0,0,b9e32d20d7e6cf23b28c590dc2ad7f239b5186f27517cd303db97f7275b077fa,2025-01-10T22:15:27.550000 @@ -279478,7 +279491,7 @@ CVE-2025-23213,0,0,aff38eabb9bd04672d3ed96bb05c973962632a9b4695af8a2793f4269fb88 CVE-2025-23214,0,0,c6114b08fe21248133ade50d2d6a2ac869f323455d1c9d1cedbe7eb7fbc50600,2025-01-20T18:15:14.127000 CVE-2025-23215,0,0,1be3e1e70887085b832a175835ac8c19d2ed34db6ec280eeb8b05725c44ff973,2025-01-31T17:15:16.957000 CVE-2025-23216,0,0,57c9f4e5248af1158ac304c02ca8e245dfc7dae4b1223c5ca29bb9fa305846cd,2025-01-30T16:15:31.473000 -CVE-2025-23217,1,1,f0e4b01ffa08e710b33b6c16139b45944b2150c6435547f5b8df2b30a93c1b62,2025-02-06T18:15:32.667000 +CVE-2025-23217,0,0,f0e4b01ffa08e710b33b6c16139b45944b2150c6435547f5b8df2b30a93c1b62,2025-02-06T18:15:32.667000 CVE-2025-23218,0,0,b3958878a7e50b75603e021f29b22e3f870c93039e9cd62b904ad60b93ab16c6,2025-01-21T15:15:15.053000 CVE-2025-23219,0,0,eeb1dd5028561d867342a9c6fb76f8efd39aecc175cf3f46b428158d47aff93a,2025-01-21T15:15:15.247000 CVE-2025-23220,0,0,fba5d8369804436294572c6b5fbca3b0330d59661922d6ab94c95c9d1c63bd2b,2025-01-21T15:15:15.430000 @@ -280212,6 +280225,8 @@ CVE-2025-24781,0,0,484994bfde156149683329b61d50fc2231eb72253e0225c2b52bdff7ffdd7 CVE-2025-24782,0,0,21ad228ba37fd2aa5696bcaa7b969ae8e5e69ba38beb5ed5a7d4a8fbfc59936b,2025-01-27T15:15:17.450000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 CVE-2025-24784,0,0,e18a2c41ee024b7fe4bef8161563b44ced76bd4530bdea9d24f0d5d34fe733b1,2025-01-30T16:15:31.780000 +CVE-2025-24786,1,1,9e97fba275c3a3c05a32719896c275605b519cc02918947c476f19b28c708e99,2025-02-06T20:15:40.720000 +CVE-2025-24787,1,1,01de5df8e071c29015774444910362c4aa23f2f2fd13814ef8f8a9ad6aa2cc22,2025-02-06T20:15:40.840000 CVE-2025-24788,0,0,6f4f5f9df31ae82b30c9743126edb6295b4e5abea443c67b0db3ec5e9c6f0d7e,2025-01-29T21:15:21.140000 CVE-2025-24789,0,0,7102f6a2f0310c054ca119f182f24c156d3368149450da6dfac0647efd2a720c,2025-01-29T18:15:47.030000 CVE-2025-24790,0,0,b7833254bd456fd95b3c1b4fca597f668c550a46e068467b18dd30c4c4c1c4e0,2025-01-29T18:15:47.207000 @@ -280235,7 +280250,7 @@ CVE-2025-24830,0,0,b5cea5c650763df23034acb9b62b7042b8c60cd391af17fb51f4470430854 CVE-2025-24831,0,0,41aa01b37189dd7e532c0fb586eb74b6dcf62ea5d5b94dda8b1bdbbe950a66fa,2025-01-31T16:15:36.487000 CVE-2025-24845,0,0,7184949537678b5e7c7d68346bc1ad85f805d0def36b0e0beab79bc0005c5c59,2025-02-06T08:15:30.673000 CVE-2025-24858,0,0,c8b370ebf6a23d8a0d0719f03f569bf4edc5fc9abf721f7fda019bd06ee5ff23,2025-01-26T07:15:09.237000 -CVE-2025-24860,0,0,2d38bca1b6cbf7a0441710f56a9ff2e44900daa7f598d1dc2890a2df9dd24b3f,2025-02-04T11:15:09.107000 +CVE-2025-24860,0,1,42b3b38d6d024182d8b5dc0fc36a681aa7d4abf967f4c7b6aca3952d970e3eba,2025-02-06T20:15:41.030000 CVE-2025-24882,0,0,832c286c3f4c67b24e19fdd318e4f59b8a1550676b19a67af46c3e57ee5c8653,2025-01-29T18:15:47.570000 CVE-2025-24883,0,0,89c52584c3d302d5c093ec5f6a7d814cb89d380495f11da4de1c303952c30d3a,2025-01-30T16:15:31.947000 CVE-2025-24884,0,0,c8f8a9327c2f3a8834bafd81cd529a51e8f5ae8556d58ea7a307819d441536a1,2025-01-29T21:15:21.667000 @@ -280260,13 +280275,13 @@ CVE-2025-24966,0,0,49a3618cab816f9138955b8f398faab47c04aba012ba2a72ab4c537cd3634 CVE-2025-24967,0,0,2a5cf74e9be945087dca5d1a5e92d20eacb899a614e83afa6af2c59c792a14ec,2025-02-04T20:15:50.813000 CVE-2025-24968,0,0,7c824db034a9e65d8ac07998a73c9c5f3a4b6b7dd3a82be9e185ee36c0355d9c,2025-02-04T20:15:50.997000 CVE-2025-24971,0,0,08629629792a8a718ed179e81d7d3b3e1b069ac4a0637432ba1beed111ce7bd7,2025-02-04T20:15:51.150000 -CVE-2025-24981,1,1,435bf251d9bd2230a8314bb11ee3589e8174dee1836d7426c3ff268c4aa56a00,2025-02-06T18:15:32.847000 +CVE-2025-24981,0,0,435bf251d9bd2230a8314bb11ee3589e8174dee1836d7426c3ff268c4aa56a00,2025-02-06T18:15:32.847000 CVE-2025-24982,0,0,1f0ad84d8e07e22dc45a54eb7fe535ab050ad44dbd615392de494766094c54dc,2025-02-04T05:15:10.543000 CVE-2025-25039,0,0,9ce3f40f951dc829fdbba843978d2e74c3d12eed6211ccfdca91d5ee67b90524,2025-02-04T19:15:33.977000 CVE-2025-25062,0,0,d7cd47140e90c99ff5d70fbea50bb5a39373533859e38c36979aba1d23137e6e,2025-02-03T04:15:09.587000 CVE-2025-25063,0,0,8c34659c6a257a89c707c83868a8b18d34ee010ab7504a5a7479117985ac792f,2025-02-03T04:15:09.760000 -CVE-2025-25064,0,0,c295057976fdc8a8b609d6de80c4b0c6e625906133a6082f47b681501fd47a33,2025-02-04T16:15:43.670000 +CVE-2025-25064,0,1,6dceec11fd59119aed7d408b3f6402c7bd962bb609f5c09b6f193840bd49f8e7,2025-02-06T20:15:41.190000 CVE-2025-25065,0,0,598af3d544a73dc058197b8a6b4d451883a362d398e6a9f9f23664e6dc813c35,2025-02-04T16:15:43.830000 CVE-2025-25066,0,0,d0c17153a53bf4d9b0d515b1e1a73dc9d8d2f57a6959d34f7f617b813c748218,2025-02-03T06:15:11.373000 -CVE-2025-25181,0,1,4d67ec539e847fe84660f43fd38b8d53f4b38c60fadbe4831b0e67bce31509f3,2025-02-06T18:15:33.030000 +CVE-2025-25181,0,0,4d67ec539e847fe84660f43fd38b8d53f4b38c60fadbe4831b0e67bce31509f3,2025-02-06T18:15:33.030000 CVE-2025-25246,0,0,cb6947636cb85304ead4d85dc395f3b8fb47e34388660246ae5e59ea50f5dc41,2025-02-05T05:15:11.663000