From 31da64f5d104dec15399602a2369e90fe009c92c Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Wed, 29 Jan 2025 17:04:23 +0000 Subject: [PATCH] Auto-Update: 2025-01-29T17:00:52.734429+00:00 --- CVE-2020/CVE-2020-182xx/CVE-2020-18280.json | 32 ++- CVE-2020/CVE-2020-210xx/CVE-2020-21038.json | 32 ++- CVE-2020/CVE-2020-233xx/CVE-2020-23362.json | 32 ++- CVE-2020/CVE-2020-233xx/CVE-2020-23363.json | 32 ++- CVE-2020/CVE-2020-239xx/CVE-2020-23966.json | 32 ++- CVE-2020/CVE-2020-360xx/CVE-2020-36065.json | 32 ++- CVE-2021/CVE-2021-289xx/CVE-2021-28998.json | 32 ++- CVE-2021/CVE-2021-312xx/CVE-2021-31240.json | 41 ++- CVE-2021/CVE-2021-317xx/CVE-2021-31711.json | 32 ++- CVE-2021/CVE-2021-442xx/CVE-2021-44283.json | 40 ++- CVE-2022/CVE-2022-329xx/CVE-2022-32917.json | 32 ++- CVE-2022/CVE-2022-365xx/CVE-2022-36537.json | 22 +- CVE-2022/CVE-2022-401xx/CVE-2022-40139.json | 22 +- CVE-2022/CVE-2022-438xx/CVE-2022-43866.json | 32 ++- CVE-2022/CVE-2022-438xx/CVE-2022-43877.json | 34 ++- CVE-2022/CVE-2022-448xx/CVE-2022-44877.json | 32 ++- CVE-2023/CVE-2023-02xx/CVE-2023-0266.json | 32 ++- CVE-2023/CVE-2023-02xx/CVE-2023-0267.json | 22 +- CVE-2023/CVE-2023-05xx/CVE-2023-0526.json | 22 +- CVE-2023/CVE-2023-05xx/CVE-2023-0537.json | 22 +- CVE-2023/CVE-2023-07xx/CVE-2023-0768.json | 22 +- CVE-2023/CVE-2023-08xx/CVE-2023-0894.json | 22 +- CVE-2023/CVE-2023-10xx/CVE-2023-1031.json | 32 ++- CVE-2023/CVE-2023-14xx/CVE-2023-1408.json | 22 +- CVE-2023/CVE-2023-19xx/CVE-2023-1905.json | 22 +- CVE-2023/CVE-2023-227xx/CVE-2023-22779.json | 12 +- CVE-2023/CVE-2023-227xx/CVE-2023-22780.json | 12 +- CVE-2023/CVE-2023-229xx/CVE-2023-22952.json | 32 ++- CVE-2023/CVE-2023-234xx/CVE-2023-23494.json | 32 ++- CVE-2023/CVE-2023-235xx/CVE-2023-23523.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23525.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23526.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23527.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23532.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23533.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23534.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23535.json | 32 ++- CVE-2023/CVE-2023-235xx/CVE-2023-23536.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23537.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23538.json | 32 ++- CVE-2023/CVE-2023-235xx/CVE-2023-23540.json | 22 +- CVE-2023/CVE-2023-235xx/CVE-2023-23541.json | 32 ++- CVE-2023/CVE-2023-235xx/CVE-2023-23542.json | 32 ++- CVE-2023/CVE-2023-235xx/CVE-2023-23543.json | 22 +- CVE-2023/CVE-2023-245xx/CVE-2023-24505.json | 36 ++- CVE-2023/CVE-2023-245xx/CVE-2023-24506.json | 34 ++- CVE-2023/CVE-2023-245xx/CVE-2023-24507.json | 12 +- CVE-2023/CVE-2023-249xx/CVE-2023-24957.json | 32 ++- CVE-2023/CVE-2023-257xx/CVE-2023-25717.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27928.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27929.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27942.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27943.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27945.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27946.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27949.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27951.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27953.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27954.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27955.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27956.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27957.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27958.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27960.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27966.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27967.json | 22 +- CVE-2023/CVE-2023-279xx/CVE-2023-27968.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27969.json | 32 ++- CVE-2023/CVE-2023-279xx/CVE-2023-27970.json | 32 ++- CVE-2023/CVE-2023-281xx/CVE-2023-28125.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28126.json | 32 ++- CVE-2023/CVE-2023-281xx/CVE-2023-28178.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28180.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28181.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28182.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28189.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28190.json | 22 +- CVE-2023/CVE-2023-281xx/CVE-2023-28192.json | 32 ++- CVE-2023/CVE-2023-281xx/CVE-2023-28194.json | 22 +- CVE-2023/CVE-2023-300xx/CVE-2023-30057.json | 32 ++- CVE-2023/CVE-2023-300xx/CVE-2023-30084.json | 32 ++- CVE-2023/CVE-2023-300xx/CVE-2023-30085.json | 32 ++- CVE-2023/CVE-2023-300xx/CVE-2023-30086.json | 32 ++- CVE-2023/CVE-2023-300xx/CVE-2023-30087.json | 32 ++- CVE-2023/CVE-2023-310xx/CVE-2023-31047.json | 32 ++- CVE-2023/CVE-2023-322xx/CVE-2023-32290.json | 32 ++- CVE-2023/CVE-2023-471xx/CVE-2023-47178.json | 62 ++++- CVE-2024/CVE-2024-118xx/CVE-2024-11852.json | 37 ++- CVE-2024/CVE-2024-127xx/CVE-2024-12749.json | 31 ++- CVE-2024/CVE-2024-12xx/CVE-2024-1213.json | 74 ++++- CVE-2024/CVE-2024-12xx/CVE-2024-1214.json | 54 +++- CVE-2024/CVE-2024-12xx/CVE-2024-1278.json | 74 ++++- CVE-2024/CVE-2024-248xx/CVE-2024-24840.json | 52 +++- CVE-2024/CVE-2024-27xx/CVE-2024-2784.json | 74 ++++- CVE-2024/CVE-2024-298xx/CVE-2024-29869.json | 31 ++- CVE-2024/CVE-2024-29xx/CVE-2024-2971.json | 62 ++++- CVE-2024/CVE-2024-301xx/CVE-2024-30185.json | 52 +++- CVE-2024/CVE-2024-304xx/CVE-2024-30496.json | 52 +++- CVE-2024/CVE-2024-32xx/CVE-2024-3247.json | 64 ++++- CVE-2024/CVE-2024-32xx/CVE-2024-3248.json | 64 ++++- CVE-2024/CVE-2024-343xx/CVE-2024-34373.json | 52 +++- CVE-2024/CVE-2024-379xx/CVE-2024-37965.json | 87 +++++- CVE-2024/CVE-2024-381xx/CVE-2024-38175.json | 56 +++- CVE-2024/CVE-2024-39xx/CVE-2024-3900.json | 62 ++++- CVE-2024/CVE-2024-39xx/CVE-2024-3925.json | 74 ++++- CVE-2024/CVE-2024-41xx/CVE-2024-4141.json | 62 ++++- CVE-2024/CVE-2024-431xx/CVE-2024-43152.json | 47 +++- CVE-2024/CVE-2024-434xx/CVE-2024-43477.json | 36 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4359.json | 42 ++- CVE-2024/CVE-2024-43xx/CVE-2024-4360.json | 64 ++++- CVE-2024/CVE-2024-45xx/CVE-2024-4568.json | 62 ++++- CVE-2024/CVE-2024-46xx/CVE-2024-4643.json | 64 ++++- CVE-2024/CVE-2024-473xx/CVE-2024-47366.json | 47 +++- CVE-2024/CVE-2024-483xx/CVE-2024-48310.json | 39 ++- CVE-2024/CVE-2024-49xx/CVE-2024-4976.json | 64 ++++- CVE-2024/CVE-2024-551xx/CVE-2024-55192.json | 64 ++++- CVE-2024/CVE-2024-551xx/CVE-2024-55193.json | 57 +++- CVE-2024/CVE-2024-551xx/CVE-2024-55194.json | 63 ++++- CVE-2024/CVE-2024-559xx/CVE-2024-55968.json | 43 ++- CVE-2024/CVE-2024-55xx/CVE-2024-5576.json | 84 +++++- CVE-2024/CVE-2024-565xx/CVE-2024-56529.json | 39 ++- CVE-2024/CVE-2024-573xx/CVE-2024-57376.json | 43 ++- CVE-2024/CVE-2024-574xx/CVE-2024-57436.json | 29 ++ CVE-2024/CVE-2024-574xx/CVE-2024-57437.json | 33 +++ CVE-2024/CVE-2024-574xx/CVE-2024-57438.json | 33 +++ CVE-2024/CVE-2024-574xx/CVE-2024-57439.json | 33 +++ CVE-2024/CVE-2024-575xx/CVE-2024-57514.json | 47 +++- CVE-2024/CVE-2024-575xx/CVE-2024-57519.json | 39 ++- CVE-2024/CVE-2024-72xx/CVE-2024-7247.json | 94 ++++++- CVE-2024/CVE-2024-76xx/CVE-2024-7630.json | 62 ++++- CVE-2024/CVE-2024-90xx/CVE-2024-9058.json | 54 +++- CVE-2024/CVE-2024-93xx/CVE-2024-9351.json | 37 ++- CVE-2024/CVE-2024-93xx/CVE-2024-9352.json | 37 ++- CVE-2024/CVE-2024-95xx/CVE-2024-9586.json | 57 +++- CVE-2024/CVE-2024-95xx/CVE-2024-9587.json | 54 +++- CVE-2025/CVE-2025-07xx/CVE-2025-0762.json | 37 ++- CVE-2025/CVE-2025-07xx/CVE-2025-0786.json | 14 +- CVE-2025/CVE-2025-07xx/CVE-2025-0787.json | 14 +- CVE-2025/CVE-2025-07xx/CVE-2025-0788.json | 10 +- CVE-2025/CVE-2025-07xx/CVE-2025-0789.json | 10 +- CVE-2025/CVE-2025-07xx/CVE-2025-0790.json | 10 +- CVE-2025/CVE-2025-07xx/CVE-2025-0791.json | 10 +- CVE-2025/CVE-2025-07xx/CVE-2025-0792.json | 10 +- CVE-2025/CVE-2025-201xx/CVE-2025-20156.json | 36 +-- CVE-2025/CVE-2025-229xx/CVE-2025-22917.json | 47 +++- CVE-2025/CVE-2025-240xx/CVE-2025-24085.json | 118 +++++++- CVE-2025/CVE-2025-243xx/CVE-2025-24374.json | 60 ++++ CVE-2025/CVE-2025-247xx/CVE-2025-24792.json | 56 ++++ README.md | 43 ++- _state.csv | 294 ++++++++++---------- 150 files changed, 5302 insertions(+), 497 deletions(-) create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57436.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57437.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57438.json create mode 100644 CVE-2024/CVE-2024-574xx/CVE-2024-57439.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24374.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24792.json diff --git a/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json b/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json index 909388145ce..3a60e0aff46 100644 --- a/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json +++ b/CVE-2020/CVE-2020-182xx/CVE-2020-18280.json @@ -2,7 +2,7 @@ "id": "CVE-2020-18280", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:13.690", - "lastModified": "2024-11-21T05:08:31.273", + "lastModified": "2025-01-29T15:15:08.687", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-210xx/CVE-2020-21038.json b/CVE-2020/CVE-2020-210xx/CVE-2020-21038.json index bbc54968eac..c0aded0c9b1 100644 --- a/CVE-2020/CVE-2020-210xx/CVE-2020-21038.json +++ b/CVE-2020/CVE-2020-210xx/CVE-2020-21038.json @@ -2,7 +2,7 @@ "id": "CVE-2020-21038", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T14:15:10.283", - "lastModified": "2024-11-21T05:12:22.877", + "lastModified": "2025-01-29T16:15:28.150", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-233xx/CVE-2020-23362.json b/CVE-2020/CVE-2020-233xx/CVE-2020-23362.json index 1aa0ad94404..a2e12441a74 100644 --- a/CVE-2020/CVE-2020-233xx/CVE-2020-23362.json +++ b/CVE-2020/CVE-2020-233xx/CVE-2020-23362.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23362", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:13.963", - "lastModified": "2024-11-21T05:13:47.207", + "lastModified": "2025-01-29T15:15:09.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 4.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-269" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json b/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json index f1de11410f0..cfc67185759 100644 --- a/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json +++ b/CVE-2020/CVE-2020-233xx/CVE-2020-23363.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23363", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.090", - "lastModified": "2024-11-21T05:13:47.347", + "lastModified": "2025-01-29T15:15:10.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-239xx/CVE-2020-23966.json b/CVE-2020/CVE-2020-239xx/CVE-2020-23966.json index 87269382f54..020f691000d 100644 --- a/CVE-2020/CVE-2020-239xx/CVE-2020-23966.json +++ b/CVE-2020/CVE-2020-239xx/CVE-2020-23966.json @@ -2,7 +2,7 @@ "id": "CVE-2020-23966", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T14:15:10.493", - "lastModified": "2024-11-21T05:14:15.713", + "lastModified": "2025-01-29T16:15:29.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-360xx/CVE-2020-36065.json b/CVE-2020/CVE-2020-360xx/CVE-2020-36065.json index da26e6e7d58..bfebf100238 100644 --- a/CVE-2020/CVE-2020-360xx/CVE-2020-36065.json +++ b/CVE-2020/CVE-2020-360xx/CVE-2020-36065.json @@ -2,7 +2,7 @@ "id": "CVE-2020-36065", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T14:15:10.563", - "lastModified": "2024-11-21T05:28:42.943", + "lastModified": "2025-01-29T16:15:29.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-289xx/CVE-2021-28998.json b/CVE-2021/CVE-2021-289xx/CVE-2021-28998.json index 58d32e7c0c0..b22269747f5 100644 --- a/CVE-2021/CVE-2021-289xx/CVE-2021-28998.json +++ b/CVE-2021/CVE-2021-289xx/CVE-2021-28998.json @@ -2,7 +2,7 @@ "id": "CVE-2021-28998", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-08T14:15:10.707", - "lastModified": "2024-11-21T06:00:29.950", + "lastModified": "2025-01-29T15:15:10.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-312xx/CVE-2021-31240.json b/CVE-2021/CVE-2021-312xx/CVE-2021-31240.json index c30551d4e35..7c85ed97de8 100644 --- a/CVE-2021/CVE-2021-312xx/CVE-2021-31240.json +++ b/CVE-2021/CVE-2021-312xx/CVE-2021-31240.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31240", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.147", - "lastModified": "2024-11-21T06:05:21.527", + "lastModified": "2025-01-29T15:15:10.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-401" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] } ], "configurations": [ @@ -82,6 +112,15 @@ "Issue Tracking", "Third Party Advisory" ] + }, + { + "url": "https://github.com/libming/libming/issues/218", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json b/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json index 09a29d3fd44..21549cfdcd5 100644 --- a/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json +++ b/CVE-2021/CVE-2021-317xx/CVE-2021-31711.json @@ -2,7 +2,7 @@ "id": "CVE-2021-31711", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.197", - "lastModified": "2024-11-21T06:06:08.750", + "lastModified": "2025-01-29T15:15:10.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-442xx/CVE-2021-44283.json b/CVE-2021/CVE-2021-442xx/CVE-2021-44283.json index b42239fd5ed..29e46192022 100644 --- a/CVE-2021/CVE-2021-442xx/CVE-2021-44283.json +++ b/CVE-2021/CVE-2021-442xx/CVE-2021-44283.json @@ -2,7 +2,7 @@ "id": "CVE-2021-44283", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T03:15:09.197", - "lastModified": "2024-11-21T06:30:42.687", + "lastModified": "2025-01-29T15:15:10.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ @@ -122,6 +152,14 @@ "Exploit", "Issue Tracking" ] + }, + { + "url": "https://github.com/cocoppang/ShieldStore/issues/19", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Issue Tracking" + ] } ] } \ No newline at end of file diff --git a/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json b/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json index 27c091f5418..e11a1629ef6 100644 --- a/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json +++ b/CVE-2022/CVE-2022-329xx/CVE-2022-32917.json @@ -2,7 +2,7 @@ "id": "CVE-2022-32917", "sourceIdentifier": "product-security@apple.com", "published": "2022-09-20T21:15:11.200", - "lastModified": "2024-11-21T07:07:13.980", + "lastModified": "2025-01-29T16:15:30.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json b/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json index 333f86251fd..799c9200c09 100644 --- a/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json +++ b/CVE-2022/CVE-2022-365xx/CVE-2022-36537.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36537", "sourceIdentifier": "cve@mitre.org", "published": "2022-08-26T20:15:08.303", - "lastModified": "2024-11-21T07:13:15.407", + "lastModified": "2025-01-29T16:15:30.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-401xx/CVE-2022-40139.json b/CVE-2022/CVE-2022-401xx/CVE-2022-40139.json index a726a6062ab..faecbe8842f 100644 --- a/CVE-2022/CVE-2022-401xx/CVE-2022-40139.json +++ b/CVE-2022/CVE-2022-401xx/CVE-2022-40139.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40139", "sourceIdentifier": "security@trendmicro.com", "published": "2022-09-19T18:15:09.960", - "lastModified": "2024-11-21T07:20:57.610", + "lastModified": "2025-01-29T16:15:30.573", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json index 9669105b6aa..042d993cd9c 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43866.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43866", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-05T19:15:15.157", - "lastModified": "2024-11-21T07:27:17.750", + "lastModified": "2025-01-29T16:15:30.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-438xx/CVE-2022-43877.json b/CVE-2022/CVE-2022-438xx/CVE-2022-43877.json index 9cae3a27dcc..224eb09ec4e 100644 --- a/CVE-2022/CVE-2022-438xx/CVE-2022-43877.json +++ b/CVE-2022/CVE-2022-438xx/CVE-2022-43877.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43877", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-06T03:15:08.950", - "lastModified": "2024-11-21T07:27:19.137", + "lastModified": "2025-01-29T16:15:31.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -65,6 +85,16 @@ "value": "CWE-922" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json b/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json index 465abaeddca..ce69850022c 100644 --- a/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json +++ b/CVE-2022/CVE-2022-448xx/CVE-2022-44877.json @@ -2,7 +2,7 @@ "id": "CVE-2022-44877", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-05T23:15:09.150", - "lastModified": "2024-11-21T07:28:31.257", + "lastModified": "2025-01-29T16:15:31.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-78" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0266.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0266.json index 459752a1262..5ef1e5e2899 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0266.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0266.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0266", "sourceIdentifier": "cve-coordination@google.com", "published": "2023-01-30T14:15:10.500", - "lastModified": "2024-11-21T07:36:51.723", + "lastModified": "2025-01-29T16:15:31.570", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -56,6 +56,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -83,6 +103,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0267.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0267.json index 4dde2f90a87..6a3bee29fe0 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0267.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0267.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0267", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:10.967", - "lastModified": "2024-11-21T07:36:51.870", + "lastModified": "2025-01-29T15:15:11.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0526.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0526.json index dacc46107f5..ecc2ce9d68d 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0526.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0526.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0526", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:11.507", - "lastModified": "2024-11-21T07:37:20.623", + "lastModified": "2025-01-29T15:15:11.310", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-05xx/CVE-2023-0537.json b/CVE-2023/CVE-2023-05xx/CVE-2023-0537.json index 125bbedcd75..b264a63fe6c 100644 --- a/CVE-2023/CVE-2023-05xx/CVE-2023-0537.json +++ b/CVE-2023/CVE-2023-05xx/CVE-2023-0537.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0537", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:11.677", - "lastModified": "2024-11-21T07:37:21.983", + "lastModified": "2025-01-29T15:15:11.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-07xx/CVE-2023-0768.json b/CVE-2023/CVE-2023-07xx/CVE-2023-0768.json index a499c17b491..8b939915468 100644 --- a/CVE-2023/CVE-2023-07xx/CVE-2023-0768.json +++ b/CVE-2023/CVE-2023-07xx/CVE-2023-0768.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0768", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:12.067", - "lastModified": "2024-11-21T07:37:47.000", + "lastModified": "2025-01-29T15:15:11.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-08xx/CVE-2023-0894.json b/CVE-2023/CVE-2023-08xx/CVE-2023-0894.json index f80ea201efa..75c5e903a6a 100644 --- a/CVE-2023/CVE-2023-08xx/CVE-2023-0894.json +++ b/CVE-2023/CVE-2023-08xx/CVE-2023-0894.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0894", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:12.157", - "lastModified": "2024-11-21T07:38:02.923", + "lastModified": "2025-01-29T15:15:11.903", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-10xx/CVE-2023-1031.json b/CVE-2023/CVE-2023-10xx/CVE-2023-1031.json index 3d94c8c4a69..2832be4d057 100644 --- a/CVE-2023/CVE-2023-10xx/CVE-2023-1031.json +++ b/CVE-2023/CVE-2023-10xx/CVE-2023-1031.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1031", "sourceIdentifier": "help@fluidattacks.com", "published": "2023-05-08T20:15:15.943", - "lastModified": "2024-11-21T07:38:19.223", + "lastModified": "2025-01-29T15:15:12.097", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-14xx/CVE-2023-1408.json b/CVE-2023/CVE-2023-14xx/CVE-2023-1408.json index cb9757059d7..a7e1d366a43 100644 --- a/CVE-2023/CVE-2023-14xx/CVE-2023-1408.json +++ b/CVE-2023/CVE-2023-14xx/CVE-2023-1408.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1408", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:12.577", - "lastModified": "2024-11-21T07:39:07.953", + "lastModified": "2025-01-29T16:15:31.937", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-19xx/CVE-2023-1905.json b/CVE-2023/CVE-2023-19xx/CVE-2023-1905.json index 6287b101da1..64cc001bdf1 100644 --- a/CVE-2023/CVE-2023-19xx/CVE-2023-1905.json +++ b/CVE-2023/CVE-2023-19xx/CVE-2023-1905.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1905", "sourceIdentifier": "contact@wpscan.com", "published": "2023-05-08T14:15:13.417", - "lastModified": "2024-11-21T07:40:07.103", + "lastModified": "2025-01-29T16:15:32.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22779.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22779.json index 3fc6ea8bd1c..2eb055fe06e 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22779.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22779.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22779", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-05-08T15:15:09.817", - "lastModified": "2024-11-21T07:45:24.670", + "lastModified": "2025-01-29T16:15:33.663", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-227xx/CVE-2023-22780.json b/CVE-2023/CVE-2023-227xx/CVE-2023-22780.json index ea689d0e966..e45d25a6871 100644 --- a/CVE-2023/CVE-2023-227xx/CVE-2023-22780.json +++ b/CVE-2023/CVE-2023-227xx/CVE-2023-22780.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22780", "sourceIdentifier": "security-alert@hpe.com", "published": "2023-05-08T15:15:09.880", - "lastModified": "2024-11-21T07:45:24.783", + "lastModified": "2025-01-29T16:15:34.857", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json b/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json index 26052b7bb62..b47b3246e0a 100644 --- a/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json +++ b/CVE-2023/CVE-2023-229xx/CVE-2023-22952.json @@ -2,7 +2,7 @@ "id": "CVE-2023-22952", "sourceIdentifier": "cve@mitre.org", "published": "2023-01-11T09:15:08.787", - "lastModified": "2024-11-21T07:45:42.730", + "lastModified": "2025-01-29T16:15:35.047", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23494.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23494.json index b93d7c3df3e..54119b07b47 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23494.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23494.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23494", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.063", - "lastModified": "2024-11-21T07:46:17.890", + "lastModified": "2025-01-29T16:15:35.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23523.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23523.json index 2f54c704d99..6cfed561bb0 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23523.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23523.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23523", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.117", - "lastModified": "2024-11-21T07:46:21.030", + "lastModified": "2025-01-29T16:15:35.643", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23525.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23525.json index 46466720963..df0699f413f 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23525.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23525.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23525", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.170", - "lastModified": "2024-11-21T07:46:21.260", + "lastModified": "2025-01-29T16:15:35.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23526.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23526.json index adb0a39584f..40eee1b8c8c 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23526.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23526.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23526", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.220", - "lastModified": "2024-11-21T07:46:21.370", + "lastModified": "2025-01-29T16:15:36.057", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23527.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23527.json index d5fa71058f0..9d1f10827ba 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23527.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23527.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23527", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.277", - "lastModified": "2024-11-21T07:46:21.480", + "lastModified": "2025-01-29T16:15:36.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23532.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23532.json index 9443412aac8..745518ae080 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23532.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23532.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23532", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.403", - "lastModified": "2024-11-21T07:46:22.040", + "lastModified": "2025-01-29T16:15:36.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23533.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23533.json index 7c4499a133d..be7781ff3cd 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23533.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23533.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23533", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.457", - "lastModified": "2024-11-21T07:46:22.153", + "lastModified": "2025-01-29T16:15:36.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23534.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23534.json index 84aae85e438..d6d90b06f1d 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23534.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23534.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23534", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.507", - "lastModified": "2024-11-21T07:46:22.263", + "lastModified": "2025-01-29T16:15:36.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23535.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23535.json index dfb1b627c28..52a4dd82ff1 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23535.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23535.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23535", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.567", - "lastModified": "2024-11-21T07:46:22.370", + "lastModified": "2025-01-29T16:15:36.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23536.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23536.json index a9f0a68a2a8..25694e93eed 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23536.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23536.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23536", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.630", - "lastModified": "2024-11-21T07:46:22.500", + "lastModified": "2025-01-29T16:15:37.167", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23537.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23537.json index 8a3b438e264..dd73d8cc4c3 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23537.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23537.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23537", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.687", - "lastModified": "2024-11-21T07:46:22.617", + "lastModified": "2025-01-29T16:15:37.340", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23538.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23538.json index 9e0b3dbf893..4177657c791 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23538.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23538.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23538", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.747", - "lastModified": "2024-11-21T07:46:22.740", + "lastModified": "2025-01-29T16:15:37.520", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23540.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23540.json index 7160c3bcfa8..94c73052ff0 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23540.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23540.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23540", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.797", - "lastModified": "2024-11-21T07:46:22.960", + "lastModified": "2025-01-29T16:15:37.710", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23541.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23541.json index f65efcc5be0..fe990cc0dfa 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23541.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23541.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23541", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.860", - "lastModified": "2024-11-21T07:46:23.093", + "lastModified": "2025-01-29T16:15:37.917", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23542.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23542.json index 2b9b5789df2..a15a50048da 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23542.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23542.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23542", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:16.923", - "lastModified": "2024-11-21T07:46:23.203", + "lastModified": "2025-01-29T16:15:38.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-235xx/CVE-2023-23543.json b/CVE-2023/CVE-2023-235xx/CVE-2023-23543.json index 7ffa9c828e0..74fd02eadfd 100644 --- a/CVE-2023/CVE-2023-235xx/CVE-2023-23543.json +++ b/CVE-2023/CVE-2023-235xx/CVE-2023-23543.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23543", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.003", - "lastModified": "2024-11-21T07:46:23.317", + "lastModified": "2025-01-29T16:15:38.270", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N", + "baseScore": 3.6, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json index cb27a85e40b..e2c6c1b9dce 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24505.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24505", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-05-08T21:15:10.797", - "lastModified": "2024-11-21T07:48:00.500", + "lastModified": "2025-01-29T16:15:38.430", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,13 +52,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "cna@cyber.gov.il", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -68,13 +88,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json index f9dff652659..51af58674ce 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24506.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24506", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-05-08T21:15:10.867", - "lastModified": "2024-11-21T07:48:00.627", + "lastModified": "2025-01-29T16:15:38.683", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,13 +52,33 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "cna@cyber.gov.il", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -68,6 +88,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24507.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24507.json index b1f881cde5b..e2321551048 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24507.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24507.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24507", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-05-08T21:15:10.937", - "lastModified": "2024-11-21T07:48:00.750", + "lastModified": "2025-01-29T16:15:38.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json b/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json index 9d46eda2687..1729585d5cb 100644 --- a/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json +++ b/CVE-2023/CVE-2023-249xx/CVE-2023-24957.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24957", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-06T03:15:09.027", - "lastModified": "2024-11-21T07:48:50.620", + "lastModified": "2025-01-29T16:15:39.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json index b1bb2c3ea2b..e0d7d992626 100644 --- a/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json +++ b/CVE-2023/CVE-2023-257xx/CVE-2023-25717.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25717", "sourceIdentifier": "cve@mitre.org", "published": "2023-02-13T20:15:10.973", - "lastModified": "2024-11-21T07:49:59.737", + "lastModified": "2025-01-29T16:15:39.253", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -53,6 +73,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27928.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27928.json index 564350e8c5f..1976c0c8dea 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27928.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27928.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27928", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.063", - "lastModified": "2024-11-21T07:53:42.930", + "lastModified": "2025-01-29T16:15:39.497", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27929.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27929.json index 73564b6c2ec..7ecbfa1f712 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27929.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27929.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27929", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.130", - "lastModified": "2024-11-21T07:53:43.113", + "lastModified": "2025-01-29T16:15:39.673", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27942.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27942.json index 2f5eeac4856..44bcc9c7961 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27942.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27942.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27942", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.733", - "lastModified": "2024-11-21T07:53:44.950", + "lastModified": "2025-01-29T16:15:39.860", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-922" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27943.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27943.json index 189e3a16d4d..1d81ca5c27e 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27943.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27943.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27943", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.790", - "lastModified": "2024-11-21T07:53:45.090", + "lastModified": "2025-01-29T16:15:40.033", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27945.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27945.json index 8987fafd03a..ac0ea57f96f 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27945.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27945.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27945", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.930", - "lastModified": "2024-11-21T07:53:45.397", + "lastModified": "2025-01-29T16:15:40.173", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json index 66a7b591d80..d7a7a0f668a 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27946.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27946", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:17.990", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T15:15:12.447", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json index be6e22d9dc0..465c3714fed 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27949.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27949", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.043", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T15:15:12.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27951.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27951.json index 463ca445c6e..93ca97b86a9 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27951.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27951.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27951", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.100", - "lastModified": "2024-11-21T07:53:46.283", + "lastModified": "2025-01-29T15:15:12.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27953.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27953.json index 6a30ba94e54..589b61ae40c 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27953.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27953", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.207", - "lastModified": "2024-11-21T07:53:46.723", + "lastModified": "2025-01-29T15:15:13.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json index cb37955f408..6b9c25f6dbc 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27954.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27954", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.267", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T15:15:13.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json index ac32eb2a856..fa86ea8501c 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27955.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27955", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.317", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T15:15:13.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json index 3756d198905..06f8a14d095 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27956.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27956", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.383", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T15:15:13.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27957.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27957.json index 31353bd089c..efcfe5678a1 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27957.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27957.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27957", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.433", - "lastModified": "2024-11-21T07:53:47.610", + "lastModified": "2025-01-29T15:15:13.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27958.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27958.json index 424d004d722..aae52171655 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27958.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27958.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27958", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.493", - "lastModified": "2024-11-21T07:53:47.773", + "lastModified": "2025-01-29T15:15:14.003", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27960.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27960.json index 82609214c16..7762cf7e844 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27960.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27960.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27960", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.603", - "lastModified": "2024-11-21T07:53:48.107", + "lastModified": "2025-01-29T16:15:40.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27966.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27966.json index 32410bd6632..8d2a137b263 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27966.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27966.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27966", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.890", - "lastModified": "2024-11-21T07:53:49.143", + "lastModified": "2025-01-29T16:15:40.500", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 4.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 4.0 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27967.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27967.json index e100cfac2bf..507402ba1e8 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27967.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27967.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27967", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:18.937", - "lastModified": "2024-11-21T07:53:49.307", + "lastModified": "2025-01-29T16:15:40.657", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "baseScore": 8.6, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 6.0 } ] }, diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27968.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27968.json index 454c6b6d12e..36bf2fc35c1 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27968.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27968.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27968", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.000", - "lastModified": "2024-11-21T07:53:49.467", + "lastModified": "2025-01-29T16:15:40.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json index 7c71cf5d8fd..f20a50163e4 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27969.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27969", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.053", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:40.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json index 3bf99e4adf7..30be5be4f5d 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27970.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27970", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.110", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:41.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28125.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28125.json index 6d1b98041b8..d5a5243aa99 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28125.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28125.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28125", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.720", - "lastModified": "2024-11-21T07:54:27.287", + "lastModified": "2025-01-29T15:15:14.183", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28126.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28126.json index b817f7a9ac6..87d1957c9bc 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28126.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28126.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28126", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-09T22:15:09.813", - "lastModified": "2024-11-21T07:54:27.410", + "lastModified": "2025-01-29T15:15:14.370", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json index 586748b0f98..901657f8f36 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28178.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28178", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.163", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:41.367", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28180.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28180.json index a432db4d612..ea6e4bc8066 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28180.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28180.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28180", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.220", - "lastModified": "2024-11-21T07:54:32.993", + "lastModified": "2025-01-29T16:15:41.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json index 25499463255..9f4ef51496f 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28181.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28181", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.273", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:41.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json index 432590b85aa..cf6440578ae 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28182.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28182", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.330", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:41.830", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28189.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28189.json index 27434fd75c7..f790d8f60e1 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28189.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28189.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28189", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.417", - "lastModified": "2024-11-21T07:54:33.847", + "lastModified": "2025-01-29T16:15:41.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28190.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28190.json index b2fdeb9292f..6037d293cd5 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28190.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28190.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28190", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.493", - "lastModified": "2024-11-21T07:54:33.977", + "lastModified": "2025-01-29T15:15:14.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28192.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28192.json index dc7f69908da..e6f37856109 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28192.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28192.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28192", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.577", - "lastModified": "2024-11-21T07:54:34.230", + "lastModified": "2025-01-29T15:15:14.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json b/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json index 1dc958bd5ca..c63847faf42 100644 --- a/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json +++ b/CVE-2023/CVE-2023-281xx/CVE-2023-28194.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28194", "sourceIdentifier": "product-security@apple.com", "published": "2023-05-08T20:15:19.633", - "lastModified": "2024-12-12T14:26:18.893", + "lastModified": "2025-01-29T16:15:42.130", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json index 5d77b055376..adf7c47a17c 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30057.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30057", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T21:15:11.717", - "lastModified": "2024-11-21T07:59:45.233", + "lastModified": "2025-01-29T15:15:14.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30084.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30084.json index 97b8221caf8..6532a040f25 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30084.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30084.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30084", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.423", - "lastModified": "2024-11-21T07:59:46.620", + "lastModified": "2025-01-29T15:15:15.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30085.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30085.json index af6facdbb5e..05fe2118215 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30085.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30085.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30085", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.470", - "lastModified": "2024-11-21T07:59:46.773", + "lastModified": "2025-01-29T15:15:15.250", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30086.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30086.json index 470a47cafb5..560a22d44e7 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30086.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30086.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30086", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.507", - "lastModified": "2024-11-21T07:59:46.917", + "lastModified": "2025-01-29T15:15:15.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-300xx/CVE-2023-30087.json b/CVE-2023/CVE-2023-300xx/CVE-2023-30087.json index 83dafb63658..80f25209566 100644 --- a/CVE-2023/CVE-2023-300xx/CVE-2023-30087.json +++ b/CVE-2023/CVE-2023-300xx/CVE-2023-30087.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30087", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-09T16:15:14.547", - "lastModified": "2024-11-21T07:59:47.060", + "lastModified": "2025-01-29T15:15:15.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-310xx/CVE-2023-31047.json b/CVE-2023/CVE-2023-310xx/CVE-2023-31047.json index 78e93941b5d..36204b71740 100644 --- a/CVE-2023/CVE-2023-310xx/CVE-2023-31047.json +++ b/CVE-2023/CVE-2023-310xx/CVE-2023-31047.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31047", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-07T02:15:08.917", - "lastModified": "2024-11-21T08:01:19.110", + "lastModified": "2025-01-29T16:15:42.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32290.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32290.json index a0062b4c0a6..b06bc4b509a 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32290.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32290.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32290", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-07T02:15:09.360", - "lastModified": "2024-11-21T08:03:03.113", + "lastModified": "2025-01-29T16:15:43.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-311" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-319" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json b/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json index 4d7e687b329..c35e8843332 100644 --- a/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json +++ b/CVE-2023/CVE-2023-471xx/CVE-2023-47178.json @@ -2,8 +2,8 @@ "id": "CVE-2023-47178", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-17T09:15:10.853", - "lastModified": "2024-11-21T08:29:54.607", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:43:57.933", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-22" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.2.9", + "matchCriteriaId": "425E6414-7D96-4324-83F5-9CEFFCBF9E61" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/theplus_elementor_addon/wordpress-the-plus-addons-for-elementor-pro-plugin-5-2-8-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/theplus_elementor_addon/wordpress-the-plus-addons-for-elementor-pro-plugin-5-2-8-unauthenticated-local-file-inclusion-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json index a4eea410007..b957853f64c 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11852.json @@ -2,8 +2,8 @@ "id": "CVE-2024-11852", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-22T02:15:16.510", - "lastModified": "2024-12-22T02:15:16.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:37:30.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.10.13", + "matchCriteriaId": "BB2FBA02-5CB3-4E24-86FB-B8CE523A1FF0" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/includes/template-library/editor/manager/api.php#L100", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3208986%40bdthemes-element-pack-lite%2Ftrunk&old=3204020%40bdthemes-element-pack-lite%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d2d23e6f-d48f-4734-95f8-12bd58eb1c2f?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12749.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12749.json index 0c0a87f3c7f..52d9a3021ce 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12749.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12749.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12749", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-29T06:15:30.387", - "lastModified": "2025-01-29T06:15:30.387", + "lastModified": "2025-01-29T15:15:16.223", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,11 +11,38 @@ "value": "The Competition Form WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/478316b9-9f47-4aa6-92c6-03879f16a3e5/", "source": "contact@wpscan.com" + }, + { + "url": "https://wpscan.com/vulnerability/478316b9-9f47-4aa6-92c6-03879f16a3e5/", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1213.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1213.json index 1944aaa45a7..ee357e6d73d 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1213.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1213.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1213", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:38.290", - "lastModified": "2024-11-21T08:50:03.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:25:21.947", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.5.5", + "matchCriteriaId": "9112BD9C-621E-42FF-8C9E-4F6B4C7961B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3047064%40easy-facebook-likebox&new=3047064%40easy-facebook-likebox&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/262dcea7-3ac4-43ee-90d7-91f200c3496c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3047064%40easy-facebook-likebox&new=3047064%40easy-facebook-likebox&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/262dcea7-3ac4-43ee-90d7-91f200c3496c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1214.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1214.json index 252178530c0..065139b8e02 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1214.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1214.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1214", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:38.487", - "lastModified": "2024-11-21T08:50:03.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:26:04.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.5.5", + "matchCriteriaId": "9112BD9C-621E-42FF-8C9E-4F6B4C7961B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-facebook-likebox/trunk/facebook/admin/class-easy-facebook-likebox-admin.php?rev=3047064", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf62045-b9ce-40d7-92b3-7ab683e5a08c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-facebook-likebox/trunk/facebook/admin/class-easy-facebook-likebox-admin.php?rev=3047064", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aaf62045-b9ce-40d7-92b3-7ab683e5a08c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-12xx/CVE-2024-1278.json b/CVE-2024/CVE-2024-12xx/CVE-2024-1278.json index a6e92300831..28711d7c7a8 100644 --- a/CVE-2024/CVE-2024-12xx/CVE-2024-1278.json +++ b/CVE-2024/CVE-2024-12xx/CVE-2024-1278.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1278", "sourceIdentifier": "security@wordfence.com", "published": "2024-03-21T02:51:40.820", - "lastModified": "2024-11-21T08:50:13.287", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:26:48.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:easysocialfeed:easy_social_feed:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "6.5.5", + "matchCriteriaId": "9112BD9C-621E-42FF-8C9E-4F6B4C7961B9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/easy-facebook-likebox/tags/6.5.4/facebook/frontend/easy-facebook-likebox.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b76bddf3-96ad-4bb0-a37b-33b451da6713?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/easy-facebook-likebox/tags/6.5.4/facebook/frontend/easy-facebook-likebox.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b76bddf3-96ad-4bb0-a37b-33b451da6713?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json b/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json index 95f858bb50b..660530fe923 100644 --- a/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json +++ b/CVE-2024/CVE-2024-248xx/CVE-2024-24840.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24840", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-23T15:15:07.600", - "lastModified": "2024-11-21T08:59:49.863", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:33:27.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.4.12", + "matchCriteriaId": "D335C68E-5979-405B-91F4-B85410AEB878" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-4-11-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-4-11-broken-access-control-on-duplicate-post-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json index f15141d59df..50970ca77a5 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2784.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2784", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-24T05:15:09.620", - "lastModified": "2024-11-21T09:10:30.660", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:49:47.620", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.5", + "matchCriteriaId": "0D27F5E3-6E21-4F1F-A5DE-BADF122FE24A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3090866/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6fdb7c-b750-4f03-9785-a9dc7573580d?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3090866/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cc6fdb7c-b750-4f03-9785-a9dc7573580d?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json index 09c0db61c28..9f0a48efc76 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29869.json @@ -2,16 +2,43 @@ "id": "CVE-2024-29869", "sourceIdentifier": "security@apache.org", "published": "2025-01-28T22:15:15.727", - "lastModified": "2025-01-28T23:15:07.370", + "lastModified": "2025-01-29T15:15:16.417", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Hive creates a credentials file to a temporary directory in the file system with permissions 644 by default when the file permissions are not set explicitly. Any unauthorized user having access to the directory can read the sensitive information written into this file.\u00a0Users are recommended to upgrade to version 4.0.1, which fixes this issue." + }, + { + "lang": "es", + "value": "Hive crea un archivo de credenciales en un directorio temporal en el archivo sistema con permisos 644 de manera predeterminada cuando los permisos del archivo no est\u00e1n configurados expl\u00edcitamente. Cualquier usuario no autorizado que tenga acceso al directorio puede leer la informaci\u00f3n confidencial escrita en este archivo. Se recomienda a los usuarios actualizar a la versi\u00f3n 4.0.1, que soluciona este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json index 9d5f583f780..7458bc543b0 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2971", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-03-26T22:15:08.190", - "lastModified": "2024-11-21T09:10:57.570", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:08:39.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-2971.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-2971.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json b/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json index 3a8f17d2a72..2398a2e3e27 100644 --- a/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json +++ b/CVE-2024/CVE-2024-301xx/CVE-2024-30185.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30185", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-27T12:15:13.710", - "lastModified": "2024-11-21T09:11:23.273", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:34:03.450", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.5.4", + "matchCriteriaId": "CEA2F449-CCE8-405D-BA65-FB96CEB9AC61" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-elementor-addons-plugin-5-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json b/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json index edeba16d209..e5ccaceb40c 100644 --- a/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json +++ b/CVE-2024/CVE-2024-304xx/CVE-2024-30496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30496", "sourceIdentifier": "audit@patchstack.com", "published": "2024-03-29T14:15:12.737", - "lastModified": "2024-11-21T09:12:02.553", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:29:50.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.5.4", + "matchCriteriaId": "CEA2F449-CCE8-405D-BA65-FB96CEB9AC61" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-lite-plugin-5-5-3-sql-injection-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/bdthemes-element-pack-lite/wordpress-element-pack-lite-plugin-5-5-3-sql-injection-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3247.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3247.json index ee86d464cae..76db33e1567 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3247.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3247", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-04-02T23:15:55.300", - "lastModified": "2024-11-21T09:29:14.313", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:19:03.877", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-674" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://forum.xpdfreader.com/viewtopic.php?t=43597", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://forum.xpdfreader.com/viewtopic.php?t=43597", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-32xx/CVE-2024-3248.json b/CVE-2024/CVE-2024-32xx/CVE-2024-3248.json index 89a5b498c66..b2992ccf544 100644 --- a/CVE-2024/CVE-2024-32xx/CVE-2024-3248.json +++ b/CVE-2024/CVE-2024-32xx/CVE-2024-3248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3248", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-04-02T23:15:55.493", - "lastModified": "2024-11-21T09:29:14.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:18:20.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-674" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://forum.xpdfreader.com/viewtopic.php?t=43657", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://forum.xpdfreader.com/viewtopic.php?t=43657", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json b/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json index 2cf3099be80..949c93ffec4 100644 --- a/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json +++ b/CVE-2024/CVE-2024-343xx/CVE-2024-34373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34373", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-06T19:15:08.333", - "lastModified": "2024-11-21T09:18:32.047", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:41:21.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "5BFEFE69-71B2-407D-B3A8-C63D0A045DAA" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/the-plus-addons-for-elementor-page-builder/wordpress-the-plus-addons-for-elementor-plugin-5-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/the-plus-addons-for-elementor-page-builder/wordpress-the-plus-addons-for-elementor-plugin-5-4-2-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-379xx/CVE-2024-37965.json b/CVE-2024/CVE-2024-379xx/CVE-2024-37965.json index c069db40fc1..ea31f2a6815 100644 --- a/CVE-2024/CVE-2024-379xx/CVE-2024-37965.json +++ b/CVE-2024/CVE-2024-379xx/CVE-2024-37965.json @@ -2,8 +2,8 @@ "id": "CVE-2024-37965", "sourceIdentifier": "secure@microsoft.com", "published": "2024-09-10T17:15:19.000", - "lastModified": "2024-09-10T17:43:14.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:28:07.807", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,93 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.6300.2", + "versionEndExcluding": "13.0.6445.1", + "matchCriteriaId": "8611D71C-D109-43DB-B24F-AD9D8DE1D754" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "13.0.7000.253", + "versionEndExcluding": "13.0.7040.1", + "matchCriteriaId": "30B9A4F3-56C1-49B6-AC31-8E15C25409E8" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.1000.169", + "versionEndExcluding": "14.0.2060.1", + "matchCriteriaId": "092AF402-BDA3-46C2-ADB8-BEA92DF81BA5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "14.0.3006.16", + "versionEndExcluding": "14.0.3475.1", + "matchCriteriaId": "6E6AD612-AB64-4454-970E-D868420C6CC6" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.2000.5", + "versionEndExcluding": "15.0.2120.1", + "matchCriteriaId": "64D0E7A9-846A-421E-A3E0-E2C0CDACD13C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "15.0.4003.23", + "versionEndExcluding": "15.0.4390.2", + "matchCriteriaId": "AF8BBB82-ED5C-4943-A787-EA07536BCFBF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.1000.6", + "versionEndExcluding": "16.0.1125.1", + "matchCriteriaId": "30D1D16A-0B3E-49B4-9DB4-77FC462BA503" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*", + "versionStartIncluding": "16.0.4003.1", + "versionEndExcluding": "16.0.4140.3", + "matchCriteriaId": "148D362E-101A-4121-9790-B537D02CB114" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-37965", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json b/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json index 03f90ae8a92..579b4238014 100644 --- a/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json +++ b/CVE-2024/CVE-2024-381xx/CVE-2024-38175.json @@ -2,8 +2,8 @@ "id": "CVE-2024-38175", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-20T19:15:09.950", - "lastModified": "2024-08-21T12:30:33.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:31:25.970", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -43,6 +43,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 5.8 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -56,12 +76,42 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:azure_managed_instance_for_apache_cassandra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "110D400E-5713-4224-B11D-0AB0F76E6D9C" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38175", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3900.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3900.json index d40a6c0ecd9..2626e63e52d 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3900.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3900.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3900", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-04-17T19:15:08.347", - "lastModified": "2024-11-21T09:30:39.610", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:16:54.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-3900.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-3900.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json index d4dd0cccb94..a42634283d2 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3925.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3925", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-12T08:15:50.500", - "lastModified": "2024-11-21T09:30:42.837", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:31:21.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.6.12", + "matchCriteriaId": "4C0AB91B-E824-4E11-9FEC-434E750A203A" + } + ] + } + ] + } + ], "references": [ { "url": "https://wordpress.org/plugins/bdthemes-element-pack-lite/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/263dd246-32ed-4efc-b7a6-ee6c9d305f89?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://wordpress.org/plugins/bdthemes-element-pack-lite/#developers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/263dd246-32ed-4efc-b7a6-ee6c9d305f89?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4141.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4141.json index 6f2cbd9ed95..1c07cb76bad 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4141.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4141.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4141", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-04-24T19:15:47.953", - "lastModified": "2024-11-21T09:42:15.917", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:13:50.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-4141.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-4141.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json b/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json index 97303adf03c..974a5b5d735 100644 --- a/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json +++ b/CVE-2024/CVE-2024-431xx/CVE-2024-43152.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43152", "sourceIdentifier": "audit@patchstack.com", "published": "2024-08-12T22:15:09.310", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:19:05.707", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:3dflipbook:3d_flipbook:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.15.7", + "matchCriteriaId": "B71C07E9-B982-41D5-AFA4-ACCDD2B66C22" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/interactive-3d-flipbook-powered-physics-engine/wordpress-3d-flipbook-plugin-1-15-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json b/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json index 99a58ed6df5..c1e6bff3fc9 100644 --- a/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json +++ b/CVE-2024/CVE-2024-434xx/CVE-2024-43477.json @@ -2,8 +2,8 @@ "id": "CVE-2024-43477", "sourceIdentifier": "secure@microsoft.com", "published": "2024-08-23T02:15:07.440", - "lastModified": "2024-09-10T18:15:13.970", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:30:12.927", + "vulnStatus": "Analyzed", "cveTags": [ { "sourceIdentifier": "secure@microsoft.com", @@ -56,12 +56,42 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:entra_id:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D09E509F-AFF3-4991-877A-D197388E7AD4" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-43477", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json index 40f1e7c6068..b5ff8b2942e 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4359.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4359", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-12T13:38:36.593", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:44:39.083", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,16 +49,50 @@ "value": "CWE-98" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-829" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.7.3", + "matchCriteriaId": "33AB0EA4-4E94-411A-8E95-BFAACBFC8B9E" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/svg-image/widgets/svg-image.php#L847", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a55cfeb3-7632-4a88-ac71-8e119b060721?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json index 528ee22e9e6..8c6fbfa24e8 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4360.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4360", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-12T13:38:36.840", - "lastModified": "2024-08-12T13:41:36.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:45:04.363", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.7.7", + "matchCriteriaId": "18693427-4553-48DF-986F-B285E329D5CF" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/custom-gallery/skins/skin-abetis.php#L164", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/910c0a32-b169-4728-888c-0dfea2066c9c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4568.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4568.json index dbf54fa7b42..ec4293b649e 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4568.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4568.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4568", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-05-06T20:15:12.203", - "lastModified": "2024-11-21T09:43:07.640", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:12:47.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.4, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-674" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-674" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/object-loops.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.xpdfreader.com/security-bug/object-loops.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json index 5a8532f9636..88b6342cf3c 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4643.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4643", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-02T10:16:00.770", - "lastModified": "2024-08-02T12:59:43.990", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:44:01.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndIncluding": "5.7.1", + "matchCriteriaId": "BB838D7C-355D-4C18-A2CE-E10C6294AFFD" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/countdown/widgets/countdown.php#L2501", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f281ef5-bb2e-42f9-be51-6f7bd3069f59?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json index 3943bf78027..357bab80e29 100644 --- a/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json +++ b/CVE-2024/CVE-2024-473xx/CVE-2024-47366.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47366", "sourceIdentifier": "audit@patchstack.com", "published": "2024-10-06T10:15:05.483", - "lastModified": "2024-10-07T17:47:48.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:38:17.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:webtechstreet:elementor_addon_elements:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.13.7", + "matchCriteriaId": "C495BB62-6ECA-4679-89D8-91F47D07B463" + } + ] + } + ] + } + ], "references": [ { "url": "https://patchstack.com/database/vulnerability/addon-elements-for-elementor-page-builder/wordpress-elementor-addon-elements-plugin-1-13-6-cross-site-scripting-xss-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json b/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json index 6bc94e7985b..18bf7eca4c8 100644 --- a/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json +++ b/CVE-2024/CVE-2024-483xx/CVE-2024-48310.json @@ -2,7 +2,7 @@ "id": "CVE-2024-48310", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:07.677", - "lastModified": "2025-01-28T23:15:07.677", + "lastModified": "2025-01-29T15:15:16.637", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "AutoLib Software Systems OPAC v20.10 was discovered to have multiple API keys exposed within the source code. Attackers may use these keys to access the backend API or other sensitive information." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] + } + ], "references": [ { "url": "https://seclists.org/fulldisclosure/2025/Jan/11", diff --git a/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json b/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json index 52896be820e..648ecbf48cf 100644 --- a/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json +++ b/CVE-2024/CVE-2024-49xx/CVE-2024-4976.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4976", "sourceIdentifier": "xpdf@xpdfreader.com", "published": "2024-05-15T21:15:09.560", - "lastModified": "2024-11-21T09:43:59.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:11:00.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -59,6 +59,28 @@ "providerUrgency": "NOT_DEFINED" } } + ], + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } ] }, "weaknesses": [ @@ -71,16 +93,50 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:xpdfreader:xpdf:*:*:*:*:*:*:*:*", + "versionEndIncluding": "4.05", + "matchCriteriaId": "20E42312-53C6-4D3F-963D-06CD49603AF3" + } + ] + } + ] } ], "references": [ { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-4976.html", - "source": "xpdf@xpdfreader.com" + "source": "xpdf@xpdfreader.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.xpdfreader.com/security-bug/CVE-2024-4976.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json index e2e24cb439d..0ab596b6f6f 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55192.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55192", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.333", - "lastModified": "2025-01-23T22:15:14.333", - "vulnStatus": "Received", + "lastModified": "2025-01-29T15:36:45.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,67 @@ "value": "Se descubri\u00f3 que OpenImageIO v3.1.0.0dev contiene un desbordamiento de mont\u00f3n a trav\u00e9s del componente OpenImageIO_v3_1_0::farmhash::inlined::Fetch64(char const*)." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", + "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4550", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55193.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55193.json index 917f4ccc45c..43069c2687e 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55193.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55193.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55193", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.453", - "lastModified": "2025-01-24T22:15:33.730", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:27:45.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", + "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4551", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json index 0634cc7ed2a..141b762809f 100644 --- a/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json +++ b/CVE-2024/CVE-2024-551xx/CVE-2024-55194.json @@ -2,8 +2,8 @@ "id": "CVE-2024-55194", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-23T22:15:14.560", - "lastModified": "2025-01-28T16:15:39.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:19:50.313", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,14 +81,39 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:openimageio:openimageio:3.1.0.0:dev:*:*:*:*:*:*", + "matchCriteriaId": "7AD65390-203E-40E5-ACA9-2D0C8A0A8613" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/AcademySoftwareFoundation/OpenImageIO/issues/4552", - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json b/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json index a37159d93db..395800cfd3c 100644 --- a/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json +++ b/CVE-2024/CVE-2024-559xx/CVE-2024-55968.json @@ -2,16 +2,55 @@ "id": "CVE-2024-55968", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T22:15:15.860", - "lastModified": "2025-01-28T22:15:15.860", + "lastModified": "2025-01-29T15:15:16.770", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in DTEX DEC-M (DTEX Forwarder) 6.1.1. The com.dtexsystems.helper service, responsible for handling privileged operations within the macOS DTEX Event Forwarder agent, fails to implement critical client validation during XPC interprocess communication (IPC). Specifically, the service does not verify the code requirements, entitlements, security flags, or version of any client attempting to establish a connection. This lack of proper logic validation allows malicious actors to exploit the service's methods via unauthorized client connections, and escalate privileges to root by abusing the DTConnectionHelperProtocol protocol's submitQuery method over an unauthorized XPC connection." + }, + { + "lang": "es", + "value": "Se descubri\u00f3 un problema en DTEX DEC-M (DTEX Forwarder) 6.1.1. El servicio com.dtexsystems.helper, responsable de gestionar operaciones privilegiadas dentro del agente DTEX Event Forwarder de macOS, no implementa la validaci\u00f3n cr\u00edtica del cliente durante la comunicaci\u00f3n entre procesos (IPC) de XPC. Espec\u00edficamente, el servicio no verifica los requisitos del c\u00f3digo, los derechos, los indicadores de seguridad o la versi\u00f3n de ning\u00fan cliente que intente establecer una conexi\u00f3n. Esta falta de validaci\u00f3n l\u00f3gica adecuada permite que los actores maliciosos exploten los m\u00e9todos del servicio a trav\u00e9s de conexiones de cliente no autorizadas y escalen privilegios a la ra\u00edz al abusar del m\u00e9todo submissionQuery del protocolo DTConnectionHelperProtocol a trav\u00e9s de una conexi\u00f3n XPC no autorizada." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/Wi1DN00B/CVE-2024-55968", diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json index 902f943d38e..d95e6c0bc1e 100644 --- a/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5576.json @@ -2,8 +2,8 @@ "id": "CVE-2024-5576", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-20T06:15:05.153", - "lastModified": "2024-08-20T15:44:20.567", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:25:42.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,32 +69,78 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms_elementor_addons:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.1.5", + "matchCriteriaId": "68C6A734-53E4-47F6-B825-9EF04DCE1405" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tutor-lms-elementor-addons/tags/2.1.4/templates/course/course-carousel.php#L81", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3136459/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3136459/#file13", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3136459/#file9", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/tutor-lms-elementor-addons/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fdd1b1c-84b5-451a-a921-80be3b154398?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56529.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56529.json index 805af435443..40dbcf7e817 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56529.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56529.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56529", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:07.947", - "lastModified": "2025-01-28T23:15:07.947", + "lastModified": "2025-01-29T15:15:16.923", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Mailcow through 2024-11b has a session fixation vulnerability in the web panel. It allows remote attackers to set a session identifier when HSTS is disabled on a victim's browser. After a user logs in, they are authenticated and the session identifier is valid. Then, a remote attacker can access the victim's web panel with the same session identifier." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] + } + ], "references": [ { "url": "https://github.com/mailcow/mailcow-dockerized/security/advisories/GHSA-23c8-4wwr-g3c6", diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json index ac7e903c513..4c108eefce8 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57376.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57376", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T22:15:15.990", - "lastModified": "2025-01-28T22:15:15.990", + "lastModified": "2025-01-29T16:15:43.367", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer Overflow vulnerability in D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N from 3.13 to 3.17B901C allows unauthenticated users to execute remote code execution." + }, + { + "lang": "es", + "value": "La vulnerabilidad de desbordamiento de b\u00fafer en D-Link DSR-150, DSR-150N, DSR-250, DSR-250N, DSR-500N, DSR-1000N de 3.13 a 3.17B901C permite a usuarios no autenticados ejecutar c\u00f3digo remoto." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.dlink.com/en/security-bulletin/", diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57436.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57436.json new file mode 100644 index 00000000000..a5f80168fc6 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57436.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-57436", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-29T15:15:17.073", + "lastModified": "2025-01-29T15:15:17.073", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RuoYi v4.8.0 was discovered to allow unauthorized attackers to view the session ID of the admin in the system monitoring. This issue can allow attackers to impersonate Admin users via using a crafted cookie." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/peccc/restful_vul/blob/main/ruoyi_elevation_of_privileges/ruoyi_elevation_of_privileges.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yangzongzhuan/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://ruoyi.vip/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json new file mode 100644 index 00000000000..e7101fbe81c --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57437.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-57437", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-29T15:15:17.183", + "lastModified": "2025-01-29T15:15:17.183", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "RuoYi v4.8.0 was discovered to contain a SQL injection vulnerability via the orderby parameter at /monitor/online/list." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/y_project/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/peccc/restful_vul/blob/main/ruoyi_sqli_orderby/ruoyi_sqli_orderby.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yangzongzhuan/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://ruoyi.vip/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57438.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57438.json new file mode 100644 index 00000000000..a290048908c --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57438.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-57438", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-29T15:15:17.283", + "lastModified": "2025-01-29T15:15:17.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insecure permissions in RuoYi v4.8.0 allows authenticated attackers to escalate privileges by assigning themselves higher level roles." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/y_project/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/peccc/restful_vul/blob/main/ruoyi_insecure_role_assignments/ruoyi_insecure_role_assignments.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yangzongzhuan/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://ruoyi.vip/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-574xx/CVE-2024-57439.json b/CVE-2024/CVE-2024-574xx/CVE-2024-57439.json new file mode 100644 index 00000000000..ce322f66386 --- /dev/null +++ b/CVE-2024/CVE-2024-574xx/CVE-2024-57439.json @@ -0,0 +1,33 @@ +{ + "id": "CVE-2024-57439", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-29T15:15:17.387", + "lastModified": "2025-01-29T15:15:17.387", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in the reset password interface of ruoyi v4.8.0 allows attackers with Admin privileges to cause a Denial of Service (DoS) by duplicating the login name of the account." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gitee.com/y_project/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/peccc/restful_vul/blob/main/ruoyi_dos/ruoyi_dos.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yangzongzhuan/RuoYi", + "source": "cve@mitre.org" + }, + { + "url": "https://ruoyi.vip/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json index 94d50adbed8..b1f360c5287 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57514.json @@ -2,20 +2,63 @@ "id": "CVE-2024-57514", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T22:15:16.103", - "lastModified": "2025-01-28T22:15:16.103", + "lastModified": "2025-01-29T16:15:43.533", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The TP-Link Archer A20 v3 router is vulnerable to Cross-site Scripting (XSS) due to improper handling of directory listing paths in the web interface. When a specially crafted URL is visited, the router's web page renders the directory listing and executes arbitrary JavaScript embedded in the URL. This allows the attacker to inject malicious code into the page, executing JavaScript on the victim's browser, which could then be used for further malicious actions. The vulnerability was identified in the 1.0.6 Build 20231011 rel.85717(5553) version." + }, + { + "lang": "es", + "value": "El TP-Link Archer A20 v3 router es vulnerable a Cross-site Scripting (XSS) debido a la gesti\u00f3n inadecuada de las rutas de listado de directorios en la interfaz web. Cuando se visita una URL manipulado especial, la p\u00e1gina web del router muestra el listado de directorios y ejecuta JavaScript arbitrario incrustado en la URL. Esto permite al atacante inyectar c\u00f3digo malicioso en la p\u00e1gina, ejecutando JavaScript en el navegador de la v\u00edctima, que luego podr\u00eda usarse para otras acciones maliciosas. La vulnerabilidad se identific\u00f3 en la versi\u00f3n 1.0.6 Build 20231011 rel.85717(5553)." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://www.zyenra.com/blog/xss-in-tplink-archer-a20.html", "source": "cve@mitre.org" + }, + { + "url": "https://www.zyenra.com/blog/xss-in-tplink-archer-a20.html", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json index accf4375f5b..1947812a4d0 100644 --- a/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json +++ b/CVE-2024/CVE-2024-575xx/CVE-2024-57519.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57519", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T23:15:08.230", - "lastModified": "2025-01-28T23:15:08.230", + "lastModified": "2025-01-29T15:15:17.483", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "An issue in Open5GS v.2.7.2 allows a remote attacker to cause a denial of service via the ogs_dbi_auth_info function in lib/dbi/subscription.c file." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], "references": [ { "url": "https://github.com/f4rs1ght/vuln-research/tree/main/CVE-2024-57519", diff --git a/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json b/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json index c85679136e4..24db27f7ad1 100644 --- a/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json +++ b/CVE-2024/CVE-2024-72xx/CVE-2024-7247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7247", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-13T06:15:05.777", - "lastModified": "2024-08-13T12:58:25.437", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:29:55.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,40 +69,92 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.7.3", + "matchCriteriaId": "33AB0EA4-4E94-411A-8E95-BFAACBFC8B9E" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/bdt-uikit.js#L4223", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L514", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/ep-scripts.js#L576", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3133714/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3133714/#file1110", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3130355%40bdthemes-element-pack-lite&new=3130355%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/bdthemes-element-pack-lite/#developers", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/86068c50-2f24-4af9-a20f-704d52e98ce2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-76xx/CVE-2024-7630.json b/CVE-2024/CVE-2024-76xx/CVE-2024-7630.json index b1ca277bbb7..155c1fb7f82 100644 --- a/CVE-2024/CVE-2024-76xx/CVE-2024-7630.json +++ b/CVE-2024/CVE-2024-76xx/CVE-2024-7630.json @@ -2,8 +2,8 @@ "id": "CVE-2024-7630", "sourceIdentifier": "security@wordfence.com", "published": "2024-08-16T03:15:10.093", - "lastModified": "2024-08-19T13:00:23.117", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:22:28.413", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:relevanssi:relevanssi:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.23.0", + "matchCriteriaId": "5C808B09-0182-4978-922E-C66615B160AE" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3134753/relevanssi/trunk/lib/common.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3fa78f4e-ede2-4863-a2d7-99bd8c7b5912?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json b/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json index 93bdcf0d8ad..da3e2b71cac 100644 --- a/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json +++ b/CVE-2024/CVE-2024-90xx/CVE-2024-9058.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9058", "sourceIdentifier": "security@wordfence.com", "published": "2024-12-03T07:15:04.230", - "lastModified": "2024-12-03T07:15:04.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T15:36:12.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*", + "versionEndExcluding": "5.10.6", + "matchCriteriaId": "5DBCB653-4D29-4AE9-9CB3-0688DBA91F00" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3189994/bdthemes-element-pack-lite", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e343ea3-996c-47c7-9480-e6264cbded98?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json index 1e7c03ba100..b4f01a8c668 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9351.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9351", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.433", - "lastModified": "2024-10-18T12:53:04.627", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:51:37.343", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmudev:forminator_forms:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.36.0", + "matchCriteriaId": "93366E57-C8FC-4C2A-9230-135FC97F26FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.35.0/library/modules/quizzes/admin/admin-loader.php#L719", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3169243/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8d89e3b7-d980-42bb-ab0c-d86ab174a69c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json index 222d060e216..bcdab8012a5 100644 --- a/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json +++ b/CVE-2024/CVE-2024-93xx/CVE-2024-9352.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9352", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-17T06:15:03.850", - "lastModified": "2024-10-18T12:52:33.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:55:44.870", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -51,18 +51,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpmudev:forminator_forms:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "1.36.0", + "matchCriteriaId": "93366E57-C8FC-4C2A-9230-135FC97F26FA" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/forminator/tags/1.35.0/library/modules/custom-forms/admin/admin-loader.php#L418", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3169243/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/81e6e266-078a-4f4f-a335-c9d388f41ef2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json index 5eb7d60d71f..a43b33c68a9 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9586.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9586", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:19.823", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:40:44.013", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -51,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkz.ai:linkz.ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "02D430D8-49C6-4B0C-8CD8-4CA369858F0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/linkz-ai/tags/1.1.8/init.php#L142", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/linkz-ai/tags/1.1.8/init.php#L159", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b4b4ca5b-c806-4b68-acb8-6b63d6ca5728?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json b/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json index 333e346990f..d85ebcd78a1 100644 --- a/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json +++ b/CVE-2024/CVE-2024-95xx/CVE-2024-9587.json @@ -2,8 +2,8 @@ "id": "CVE-2024-9587", "sourceIdentifier": "security@wordfence.com", "published": "2024-10-11T13:15:20.043", - "lastModified": "2024-10-15T12:58:51.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-29T16:45:00.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:linkz.ai:linkz.ai:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.2.0", + "matchCriteriaId": "02D430D8-49C6-4B0C-8CD8-4CA369858F0B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/linkz-ai/tags/1.1.8/init.php#L252", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1faa178-e4b1-4d2e-85f1-b852fbf3ab17?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0762.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0762.json index 6ac20eec348..e331226efcf 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0762.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0762.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0762", "sourceIdentifier": "chrome-cve-admin@google.com", "published": "2025-01-29T11:15:09.593", - "lastModified": "2025-01-29T11:15:09.593", + "lastModified": "2025-01-29T15:15:17.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "chrome-cve-admin@google.com", @@ -22,6 +45,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json index d4d17195289..d5c1a90d186 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0786.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0786", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-28T22:15:16.423", - "lastModified": "2025-01-28T22:15:16.423", + "lastModified": "2025-01-29T15:15:17.923", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG V5. Se ha clasificado como cr\u00edtica. Se ve afectada una funci\u00f3n desconocida del archivo /appDetail.jsp. La manipulaci\u00f3n del argumento flowId provoca una inyecci\u00f3n SQL. Es posible lanzar el ataque de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.483339", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json index ea65360a6c4..52f9e32ae22 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0787.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0787", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-28T22:15:16.600", - "lastModified": "2025-01-28T22:15:16.600", + "lastModified": "2025-01-29T15:15:18.033", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in ESAFENET CDG V5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /appDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en ESAFENET CDG V5. Se ha declarado como problem\u00e1tica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /appDetail.jsp. La manipulaci\u00f3n del argumento curpage conduce a Cross Site Scripting. El ataque se puede lanzar de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 primeramente con el proveedor sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -59,7 +63,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +140,10 @@ { "url": "https://vuldb.com/?submit.483340", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0788.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0788.json index 8641f1e74ab..f8eee1c9a6a 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0788.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0788.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0788", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-28T23:15:08.427", - "lastModified": "2025-01-28T23:15:08.427", + "lastModified": "2025-01-29T15:15:18.157", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.483341", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/content_top.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0789.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0789.json index f1b896eb638..b89c71eaab4 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0789.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0789.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0789", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-28T23:15:08.610", - "lastModified": "2025-01-28T23:15:08.610", + "lastModified": "2025-01-29T15:15:18.287", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.483342", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/doneDetail.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0790.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0790.json index 43cd7aaaede..858d234042e 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0790.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0790.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0790", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-29T00:15:08.280", - "lastModified": "2025-01-29T00:15:08.280", + "lastModified": "2025-01-29T15:15:18.410", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.483343", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0791.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0791.json index 91a17620434..e3ed07fb77f 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0791.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0791.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0791", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-29T00:15:08.480", - "lastModified": "2025-01-29T00:15:08.480", + "lastModified": "2025-01-29T15:15:18.533", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.483344", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/sdDoneDetail.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0792.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0792.json index 3283715dca1..d8adc8d059e 100644 --- a/CVE-2025/CVE-2025-07xx/CVE-2025-0792.json +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0792.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0792", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-29T00:15:08.653", - "lastModified": "2025-01-29T00:15:08.653", + "lastModified": "2025-01-29T15:15:18.653", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -136,6 +136,10 @@ { "url": "https://vuldb.com/?submit.483345", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/Rain1er/report/blob/main/CDG/sdTodoDetail.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json index 0e9c2e326cb..cde731a7e24 100644 --- a/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json +++ b/CVE-2025/CVE-2025-201xx/CVE-2025-20156.json @@ -2,8 +2,8 @@ "id": "CVE-2025-20156", "sourceIdentifier": "psirt@cisco.com", "published": "2025-01-22T17:15:12.800", - "lastModified": "2025-01-22T17:15:12.800", - "vulnStatus": "Received", + "lastModified": "2025-01-29T16:15:43.693", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -19,27 +19,7 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", - "cvssData": { - "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "baseScore": 9.9, - "baseSeverity": "CRITICAL", - "attackVector": "NETWORK", - "attackComplexity": "LOW", - "privilegesRequired": "LOW", - "userInteraction": "NONE", - "scope": "CHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "availabilityImpact": "HIGH" - }, - "exploitabilityScore": 3.1, - "impactScore": 6.0 - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", @@ -69,16 +49,6 @@ "value": "CWE-274" } ] - }, - { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Primary", - "description": [ - { - "lang": "en", - "value": "CWE-276" - } - ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json index 1f10182afd6..401f6e2c780 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22917.json @@ -2,20 +2,63 @@ "id": "CVE-2025-22917", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-28T22:15:16.770", - "lastModified": "2025-01-28T22:15:16.770", + "lastModified": "2025-01-29T16:15:43.907", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A reflected cross-site scripting (XSS) vulnerability in Audemium ERP <=0.9.0 allows remote attackers to execute an arbitrary JavaScript payload in the web browser of a user by including a malicious payload into the 'type' parameter of list.php." + }, + { + "lang": "es", + "value": "Una vulnerabilidad Cross-Site Scripting (XSS) Reflejado en Audemium ERP <=0.9.0 permite a atacantes remotos ejecutar un JavaScript arbitrario payload en el navegador web de un usuario mediante incluida un payload malicioso en el par\u00e1metro 'type' de list.php." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/timosarkar/vulnerabilities/blob/main/CVE-2025-22917/README.md", "source": "cve@mitre.org" + }, + { + "url": "https://github.com/timosarkar/vulnerabilities/blob/main/CVE-2025-22917/README.md", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json index 4661d982c39..0e758679b79 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24085.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24085", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-27T22:15:14.990", - "lastModified": "2025-01-28T16:15:41.540", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-29T16:56:13.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -18,8 +18,8 @@ "metrics": { "cvssMetricV31": [ { - "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "source": "nvd@nist.gov", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", @@ -36,17 +36,95 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.3, + "impactScore": 5.9 } ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", "description": [ { "lang": "en", - "value": "CWE-276" + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:ipados:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "6B7F80FC-EB0A-4B78-8CB7-18E5F162CD6A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "71A94ACA-8143-475F-8A89-8020B86CE80B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "15.3", + "matchCriteriaId": "38BA63B3-CC2C-4E63-AE2C-B8DB08B5E89B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "18.3", + "matchCriteriaId": "60C0BA29-0969-4181-B6F1-4606986B18E4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:visionos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.3", + "matchCriteriaId": "F91BF3D5-D8E5-437C-8301-C9F22AAFB8BD" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", + "versionEndExcluding": "11.3", + "matchCriteriaId": "7A128237-004C-49D7-A559-5BBC38362361" + } + ] } ] } @@ -54,23 +132,43 @@ "references": [ { "url": "https://support.apple.com/en-us/122066", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122068", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122071", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122072", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] }, { "url": "https://support.apple.com/en-us/122073", - "source": "product-security@apple.com" + "source": "product-security@apple.com", + "tags": [ + "Release Notes", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24374.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24374.json new file mode 100644 index 00000000000..dddc5aa0f21 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24374.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24374", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-29T16:15:44.090", + "lastModified": "2025-01-29T16:15:44.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Twig is a template language for PHP. When using the ?? operator, output escaping was missing for the expression on the left side of the operator. This vulnerability is fixed in 3.19.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/twigphp/Twig/commit/38576b12f05df3cc871bf68f39ccb46b418334a3", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/twigphp/Twig/security/advisories/GHSA-3xg3-cgvq-2xwr", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24792.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24792.json new file mode 100644 index 00000000000..c6cfa4dfe9c --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24792.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24792", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-29T16:15:44.273", + "lastModified": "2025-01-29T16:15:44.273", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Snowflake PHP PDO Driver is a driver that uses the PHP Data Objects (PDO) extension to connect to the Snowflake database. Snowflake discovered and remediated a vulnerability in the Snowflake PHP PDO Driver where executing unsupported queries like PUT or GET on stages causes a signed-to-unsigned conversion error that crashes the application using the Driver. This vulnerability affects versions 0.2.0 through 3.0.3. Snowflake fixed the issue in version 3.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-195" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/snowflakedb/pdo_snowflake/security/advisories/GHSA-f8q2-7fv5-cg93", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 398b68f61c8..3f1b52a1b3c 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-29T15:00:29.813094+00:00 +2025-01-29T17:00:52.734429+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-29T14:15:27.653000+00:00 +2025-01-29T16:56:13.513000+00:00 ``` ### Last Data Feed Release @@ -33,21 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279369 +279375 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `6` +- [CVE-2024-57436](CVE-2024/CVE-2024-574xx/CVE-2024-57436.json) (`2025-01-29T15:15:17.073`) +- [CVE-2024-57437](CVE-2024/CVE-2024-574xx/CVE-2024-57437.json) (`2025-01-29T15:15:17.183`) +- [CVE-2024-57438](CVE-2024/CVE-2024-574xx/CVE-2024-57438.json) (`2025-01-29T15:15:17.283`) +- [CVE-2024-57439](CVE-2024/CVE-2024-574xx/CVE-2024-57439.json) (`2025-01-29T15:15:17.387`) +- [CVE-2025-24374](CVE-2025/CVE-2025-243xx/CVE-2025-24374.json) (`2025-01-29T16:15:44.090`) +- [CVE-2025-24792](CVE-2025/CVE-2025-247xx/CVE-2025-24792.json) (`2025-01-29T16:15:44.273`) ### CVEs modified in the last Commit -Recently modified CVEs: `2` +Recently modified CVEs: `142` -- [CVE-2024-57328](CVE-2024/CVE-2024-573xx/CVE-2024-57328.json) (`2025-01-29T13:52:36.473`) -- [CVE-2025-0793](CVE-2025/CVE-2025-07xx/CVE-2025-0793.json) (`2025-01-29T14:15:27.653`) +- [CVE-2024-55194](CVE-2024/CVE-2024-551xx/CVE-2024-55194.json) (`2025-01-29T15:19:50.313`) +- [CVE-2024-5576](CVE-2024/CVE-2024-55xx/CVE-2024-5576.json) (`2025-01-29T16:25:42.263`) +- [CVE-2024-55968](CVE-2024/CVE-2024-559xx/CVE-2024-55968.json) (`2025-01-29T15:15:16.770`) +- [CVE-2024-56529](CVE-2024/CVE-2024-565xx/CVE-2024-56529.json) (`2025-01-29T15:15:16.923`) +- [CVE-2024-57376](CVE-2024/CVE-2024-573xx/CVE-2024-57376.json) (`2025-01-29T16:15:43.367`) +- [CVE-2024-57514](CVE-2024/CVE-2024-575xx/CVE-2024-57514.json) (`2025-01-29T16:15:43.533`) +- [CVE-2024-57519](CVE-2024/CVE-2024-575xx/CVE-2024-57519.json) (`2025-01-29T15:15:17.483`) +- [CVE-2024-7247](CVE-2024/CVE-2024-72xx/CVE-2024-7247.json) (`2025-01-29T15:29:55.873`) +- [CVE-2024-7630](CVE-2024/CVE-2024-76xx/CVE-2024-7630.json) (`2025-01-29T16:22:28.413`) +- [CVE-2024-9058](CVE-2024/CVE-2024-90xx/CVE-2024-9058.json) (`2025-01-29T15:36:12.003`) +- [CVE-2024-9351](CVE-2024/CVE-2024-93xx/CVE-2024-9351.json) (`2025-01-29T16:51:37.343`) +- [CVE-2024-9352](CVE-2024/CVE-2024-93xx/CVE-2024-9352.json) (`2025-01-29T16:55:44.870`) +- [CVE-2024-9586](CVE-2024/CVE-2024-95xx/CVE-2024-9586.json) (`2025-01-29T16:40:44.013`) +- [CVE-2024-9587](CVE-2024/CVE-2024-95xx/CVE-2024-9587.json) (`2025-01-29T16:45:00.530`) +- [CVE-2025-0762](CVE-2025/CVE-2025-07xx/CVE-2025-0762.json) (`2025-01-29T15:15:17.687`) +- [CVE-2025-0786](CVE-2025/CVE-2025-07xx/CVE-2025-0786.json) (`2025-01-29T15:15:17.923`) +- [CVE-2025-0787](CVE-2025/CVE-2025-07xx/CVE-2025-0787.json) (`2025-01-29T15:15:18.033`) +- [CVE-2025-0788](CVE-2025/CVE-2025-07xx/CVE-2025-0788.json) (`2025-01-29T15:15:18.157`) +- [CVE-2025-0789](CVE-2025/CVE-2025-07xx/CVE-2025-0789.json) (`2025-01-29T15:15:18.287`) +- [CVE-2025-0790](CVE-2025/CVE-2025-07xx/CVE-2025-0790.json) (`2025-01-29T15:15:18.410`) +- [CVE-2025-0791](CVE-2025/CVE-2025-07xx/CVE-2025-0791.json) (`2025-01-29T15:15:18.533`) +- [CVE-2025-0792](CVE-2025/CVE-2025-07xx/CVE-2025-0792.json) (`2025-01-29T15:15:18.653`) +- [CVE-2025-20156](CVE-2025/CVE-2025-201xx/CVE-2025-20156.json) (`2025-01-29T16:15:43.693`) +- [CVE-2025-22917](CVE-2025/CVE-2025-229xx/CVE-2025-22917.json) (`2025-01-29T16:15:43.907`) +- [CVE-2025-24085](CVE-2025/CVE-2025-240xx/CVE-2025-24085.json) (`2025-01-29T16:56:13.513`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 5aa05192fd7..ab03c1d52c0 100644 --- a/_state.csv +++ b/_state.csv @@ -152111,7 +152111,7 @@ CVE-2020-18265,0,0,719b5e687e94ece563fb1111947152e197b05ec4d20bd468ff8e01c76ddfb CVE-2020-18268,0,0,a8e082dcb83d943f868488d8cdf395f7e2e83e359830a3d9dd4ed0347edb26cb,2024-11-21T05:08:31.113000 CVE-2020-1827,0,0,6034b8d9a0664323a1fa320f44b82294cef818e7d809ef2848f4735c2f8f2fd8,2024-11-21T05:11:26.723000 CVE-2020-1828,0,0,5a1de5bfd74e6adbe3e766964522e779665c7d2f5e1590a274aa1988dab12c62,2024-11-21T05:11:26.850000 -CVE-2020-18280,0,0,c3928b9b61f07b44a6b32a869c9b4115e0aa2cde37cc292c6922832efaef7858,2024-11-21T05:08:31.273000 +CVE-2020-18280,0,1,a9cfb6ea53a948cf0e342ecc74a2dca2fdaa7c7b9c577376593dea94ce26068e,2025-01-29T15:15:08.687000 CVE-2020-18282,0,0,d950bf391441c8c4f18afaad06176bbc58318584c6c22ff322c0592922611e05,2024-11-21T05:08:31.440000 CVE-2020-1829,0,0,4400c1c20020eb794399c17dd64935689a5a7a7d2746f03b085f845dd3cb71c6,2024-11-21T05:11:26.960000 CVE-2020-1830,0,0,0ddce4b6a7b14fd50fb01fd83ac721a18ad075608807f694e075ac74b09960bc,2024-11-21T05:11:27.083000 @@ -152985,7 +152985,7 @@ CVE-2020-21014,0,0,f0fe40408824d09fd2e983e508a55c3ef0ef88c76bd625bced83c08c379b6 CVE-2020-21016,0,0,a3a607c56a4eae7ba3919a9ea1b2e1f2be4bcb6fe2d8420c7534afe8b2fd5378,2024-11-21T05:12:22.710000 CVE-2020-2102,0,0,5de73b2f7bdc73c021c7ebcf1c332b1b3852f78ac0f9e7dd760bcb4017bad444,2024-11-21T05:24:37.823000 CVE-2020-2103,0,0,93222bcd719fa6700413d12512572d7dc5566d6955329b6d80f546e90121ec0f,2024-11-21T05:24:38.070000 -CVE-2020-21038,0,0,ff5837b44eab581e7c9c552345d2e7e5d5569aac094489e609b7cfaeb6c6b14f,2024-11-21T05:12:22.877000 +CVE-2020-21038,0,1,767faab1b9be3c7d9c9bb8ef7aaec46dd960fb3455a8e6e2af388142125cb1bc,2025-01-29T16:15:28.150000 CVE-2020-2104,0,0,71ecec3554086375dead28c2d1a3091e9450eef479be60c3ac930ef44a80583f,2024-11-21T05:24:38.463000 CVE-2020-21041,0,0,adcbeaf0f72d447cb9fc2e1ea21ba2b8eaa258d5f700c8dc0dc4723acbaef646,2024-11-21T05:12:23.010000 CVE-2020-21046,0,0,1cb15dcb5ad6ac2abbb9be555cbe9d460b2fca97ed8e9effa9326be4c76508ac,2024-11-21T05:12:23.163000 @@ -153791,8 +153791,8 @@ CVE-2020-23356,0,0,5e96418f0a633e4291f7f18e0c9f18c608ecb72b7d8ea22459c49539e4fde CVE-2020-23359,0,0,59fbaf9f0f92ebac52aebfac39f666b2320fc2a4b5496467dd76c117ed8d320a,2024-11-21T05:13:46.797000 CVE-2020-23360,0,0,365de5d998d476838ed2d2d3681eae39798ac4e68bb49f58b8c27bd06faccb93,2024-11-21T05:13:46.930000 CVE-2020-23361,0,0,191b224be8bb9614bee9538990714e9022675a5e1d9849998388fe04825fe2c7,2024-11-21T05:13:47.070000 -CVE-2020-23362,0,0,e9837dc96e97214c4444edd9a48b17c4994be8fd1d26123bad4dc2300da96a9d,2024-11-21T05:13:47.207000 -CVE-2020-23363,0,0,bb4f1b3f3542e4461d1b910668562d7933cf29e26388a3b9af4b0ec1ab1c51f5,2024-11-21T05:13:47.347000 +CVE-2020-23362,0,1,74dcb264085814e63738a01d4ce45aca0282624ac7f50db3f0b9a7e448a97162,2025-01-29T15:15:09.840000 +CVE-2020-23363,0,1,40885194d9effc84518ab38c364314b42b0c44363a37cf996cbc39d70da36acb,2025-01-29T15:15:10.030000 CVE-2020-23369,0,0,c57e4271d8e19e3fc13d20608a06de3ba3d2a89fd3bf0dbccd750b5daf98099a,2024-11-21T05:13:47.487000 CVE-2020-23370,0,0,42a1b4c4138ccedba15857d37f080ee0362fdd4c34f30623aafcb434cccb82c0,2024-11-21T05:13:47.623000 CVE-2020-23371,0,0,8e9226897b567b5663d6bba4dcf8ed76e1d9a38904d70f910da29e38f7b53ed0,2024-11-21T05:13:47.757000 @@ -153989,7 +153989,7 @@ CVE-2020-23945,0,0,840d0a19b1cc93cf79092261ed12b29668dc6a8248b892b84b1469a60a88d CVE-2020-23957,0,0,b50adbc1dcb62b6a1050a6efef88cea0268386f688197328109e4d16d59313dc,2024-11-21T05:14:15.313000 CVE-2020-23960,0,0,988f9e5ae9a83492dc32bd5236eea0de8151bc3a0cc0d89fc6638b929026027e,2024-11-21T05:14:15.443000 CVE-2020-23962,0,0,e6b85178e8b950b51774d17db0a9e5df76845c8600721735a68fa8f88c02fa06,2024-11-21T05:14:15.580000 -CVE-2020-23966,0,0,a86cc8615f5d5cadea1146d8eaaa49cf2597c1e140e477eb5e63224a72aa51e8,2024-11-21T05:14:15.713000 +CVE-2020-23966,0,1,df2353122ba261a8f57b7d2feca0adcd13781d9efa638dffecddd471bc0d427b,2025-01-29T16:15:29.600000 CVE-2020-23967,0,0,0c2e4c0a595c22b5cfe947788fe85375ee8ac990bbdcd83753896134c88013da,2024-11-21T05:14:15.850000 CVE-2020-23968,0,0,188ad8557fe1ecb7c9182834b4988da20446ae1d30217bf1746edaa65be61cc4,2024-11-21T05:14:15.997000 CVE-2020-23971,0,0,b94f925d758590155d0bc2d793b37c9685ec3680ec7dbacbe8cfcc049832be47,2024-11-21T05:14:16.137000 @@ -158939,7 +158939,7 @@ CVE-2020-36052,0,0,77976172f0ad38f428d6cd52efe74e0642675c7f14037ad46bec0c9b9e7ad CVE-2020-36056,0,0,b0fa83a98f6dfd709972c42e4ebe74d5a755d6bf2cb82d6e92d461fb68b33113,2024-11-21T05:28:42.370000 CVE-2020-36062,0,0,edd5e2c6bb01e1c41bf5d9081923ea06529ab601037c995d2fee2221739d03ce,2024-11-21T05:28:42.573000 CVE-2020-36064,0,0,121621cd8d19f1d8709f4d1e4f1914d2d10ae4f765e1bd12c7fd8a6fba84ed35,2024-11-21T05:28:42.757000 -CVE-2020-36065,0,0,e3d2fa280b8b464ef87cd102c6bfa0dfad062bdd96edc6f00304feb161280358,2024-11-21T05:28:42.943000 +CVE-2020-36065,0,1,36cafc2b7b41c95eca0119f13bcc706947d3ae310a9bded6797e87ab10dbbc75,2025-01-29T16:15:29.783000 CVE-2020-36066,0,0,974012e7f4cd6c05a726bca33784345eb95e8c7ffd9bbeaa1a2138f1037c6009,2024-11-21T05:28:43.150000 CVE-2020-36067,0,0,89b7cf9d7124b10737712c705b84fd3e805dce1779bd6505930513f2364b9f9e,2024-11-21T05:28:43.320000 CVE-2020-36070,0,0,95dab914806818676f82d40c49e76bd5b7bc05483f42c2442931dc328bfa12a0,2024-11-21T05:28:43.493000 @@ -173822,7 +173822,7 @@ CVE-2021-28977,0,0,c9161c2ea26aaefdef368aa15e5863d53ff4a91eeaba4acbe73ab8df47be3 CVE-2021-28979,0,0,826dbd5b24a1bd97358a6afd655873c9cc64ffc259117c700cbb8df70c65c390,2024-11-21T06:00:29.473000 CVE-2021-28993,0,0,41072164f8c31fe786765d1b3c8ec550ecea0ab9467800aa9e28a2e57b9ab598,2024-11-21T06:00:29.667000 CVE-2021-28994,0,0,a5d3e85c30ddcd37756a4b723ad76f1ea15126c6c9f9e169c81e8fe30dae5401,2024-11-21T06:00:29.800000 -CVE-2021-28998,0,0,200f32121f21abd819c269e2a7c4b7371e2cc3d73f9ca815f2aa8b9c3701f1e3,2024-11-21T06:00:29.950000 +CVE-2021-28998,0,1,8e31d864f4b0c3f5c38b7026f452cd01623a92a74f0fcbbb0dee32473a827eca,2025-01-29T15:15:10.233000 CVE-2021-28999,0,0,bd04d68c9186b98c70af923f573b8398ee36022e0cf5f1c5050aedafc66ae89b,2024-11-21T06:00:30.080000 CVE-2021-29002,0,0,92e57fd05d20e14ee4ed43a5af5d722a99ad455a3ce534c99df05819aa0baaf4,2024-11-21T06:00:30.217000 CVE-2021-29003,0,0,75030b97e2e029bb8ee745f8492a02b4aa89a5058bf1f3fc9770547a42a4a6ae,2024-11-21T06:00:30.353000 @@ -175612,7 +175612,7 @@ CVE-2021-31232,0,0,7afa9e4f90fa3656de464128e8c50c608977d81973da39247a96e28e62de6 CVE-2021-31233,0,0,a7925e3db41facf326d6d3d52187be6acd59ac4e94e6e5652c4e15ec3b6a9f39,2025-01-10T17:15:09.110000 CVE-2021-31239,0,0,a41179e6f87d85b79c8e742c2fe7c4abe69417956fe0504015be3eed09e51670,2024-11-21T06:05:21.350000 CVE-2021-3124,0,0,7e8479f4f089be4e2ec4d009c5a5b617341034330691e8c6646781c81ee8be1b,2024-11-21T06:20:56.347000 -CVE-2021-31240,0,0,fd1bd2b38c19bb1a0919889ec55142dd1fb8bd1ddac201ff2c912897d01d7ceb,2024-11-21T06:05:21.527000 +CVE-2021-31240,0,1,31a79729e8bd179ee36892af9722da33b510ee783da8cd4fb8a76cd21e38f592,2025-01-29T15:15:10.440000 CVE-2021-31245,0,0,c2704eb42066a28701b270c85c69ee577feea74da6711fb4f80ae403200b7d0c,2024-11-21T06:05:21.670000 CVE-2021-31249,0,0,7bfe1e41cd1da0dfdf37bd4f22786dab9dbfec55e50891fe0703b13963ef79fb,2024-11-21T06:05:21.820000 CVE-2021-3125,0,0,5d0bebeab9152d927d7a4de8294a7cf8ed06328ff4085e8744f84c2b317b5c4b,2024-11-21T06:20:56.520000 @@ -175959,7 +175959,7 @@ CVE-2021-31701,0,0,3b7fc844e3574f68535b41bcf1a4ff96d11dda31f6d6f71deffcd2f477a5a CVE-2021-31702,0,0,3b51184e31b3cd07b45d3f25cbc2d8ea9a00bd6683da84dcd5221c9151503465,2024-11-21T06:06:08.350000 CVE-2021-31703,0,0,22adff2322527385489568250286f2b7a48e2986f4721e744c9306658835a696,2024-11-21T06:06:08.477000 CVE-2021-31707,0,0,4ac69013a139718f6a47768bd20045426db734044bad07dcafd943566dfd2277,2024-11-21T06:06:08.610000 -CVE-2021-31711,0,0,a1f12829ceca5be056e5031d0d010a349cc08dec9e11138e4e6cb7729815f698,2024-11-21T06:06:08.750000 +CVE-2021-31711,0,1,5836dc98e69840056d02b3b4b9ab892963f019edd8fd880f83716d65b4cbdefc,2025-01-29T15:15:10.630000 CVE-2021-31712,0,0,37e669b62610110cdd762e83824512920f41fcca6caba3fdc2f22fcab37a94c5,2024-11-21T06:06:08.890000 CVE-2021-31718,0,0,580996eb0d7c77f0e6e30fc28e4dee664cbfaa246540e61ec25791a23ceb3fa6,2024-11-21T06:06:09.030000 CVE-2021-3172,0,0,9c25e634b1bb6292cb5cc5146180a18b5701210757f9bdfd6e12ede667837b6b,2024-11-21T06:21:03.290000 @@ -185447,7 +185447,7 @@ CVE-2021-44278,0,0,fb5b01d6d68f02d13571d4fb94c90b34e242e9861de51aba9d3d3d3029f37 CVE-2021-44279,0,0,fafb6cedd7a51f4c0a456caf247467a51fdd56dfc7fbb721f0d3cd41f8cc9ec1,2024-11-21T06:30:42.337000 CVE-2021-4428,0,0,54d8f0050be0d8b5cef3d83cecfe22b7ba71e3e4e439cb2beebd9ffbf3764a3b,2024-11-21T06:37:42.410000 CVE-2021-44280,0,0,1b083899440584c2b016974351c68088f6d106907ce81ed11147c090187f4749,2024-11-21T06:30:42.513000 -CVE-2021-44283,0,0,9f4446957e91ff1eb12164c5e86440e0af62850bbd2e472c6c338b314bea73d7,2024-11-21T06:30:42.687000 +CVE-2021-44283,0,1,06c131341eabba5246c631e1bf1969e595897e9a0789d34a6587184b4e56fbba,2025-01-29T15:15:10.857000 CVE-2021-44299,0,0,f14c4fed1e8e71f7e3850db5363c18be980c112d5de13c8de79834917c503226,2024-11-21T06:30:42.890000 CVE-2021-4430,0,0,6f20441168073fa6cff83dc77e3379a697466e998d717c11ef606d77aa541ca0,2024-11-21T06:37:42.570000 CVE-2021-44302,0,0,9f9121814efeb5e0de376f681b04b23236d9dabcbdedf3d4321cf3200d767c5a,2024-11-21T06:30:43.060000 @@ -200974,7 +200974,7 @@ CVE-2022-32913,0,0,bee6ebe7950503c4671f6b8c49b9b32e763fce1b26b9f5979303d145518fc CVE-2022-32914,0,0,c93957ac54124f4a82d1596445082069643ca329b8d54de7ac7bd356a462fcc5,2024-11-21T07:07:13.600000 CVE-2022-32915,0,0,78c1645616a106e9a0eb823083738dc505c10bc26bc5fe020d1a9501ef50763c,2024-11-21T07:07:13.737000 CVE-2022-32916,0,0,8420c01847911ab237df6c870db458a29034fb7635c75b8df91dd2656da74c26,2024-11-21T07:07:13.857000 -CVE-2022-32917,0,0,ff76f28af8e2b79b76e600236f3ef66132b3d995915b0c256e0c646fadb905ce,2024-11-21T07:07:13.980000 +CVE-2022-32917,0,1,f72d000a2f6bf81e09d47c8d717bcb9d0a0b93608ef26baeee74a08a22f5bc2d,2025-01-29T16:15:30.057000 CVE-2022-32918,0,0,7b720f0bcde294bb13f1ee5e56b3d84057c2065e51423f73b3abfbf3cdfd97c9,2024-11-21T07:07:14.143000 CVE-2022-32919,0,0,cc19bca16313977b15c101fcc5b17a18fb56353b18bea3d46c6fe4ebd3d2f68d,2024-11-21T07:07:14.263000 CVE-2022-3292,0,0,65c83db42f543a9e9f1e31aa23648b5d7ede84a2f95a828ce9f929872ace9884,2024-11-21T07:19:13.933000 @@ -203837,7 +203837,7 @@ CVE-2022-36532,0,0,9a6dc258e4acb03d115254806dd77b1afe902e9ad466d5ad69ec4eedbe099 CVE-2022-36533,0,0,3e4b7acaaea00f0ed8f8f2dfc64c45744f18b5417f9762a212a1517b200e0069,2024-11-21T07:13:14.913000 CVE-2022-36534,0,0,874385a331b89e607e3af105ca3b8c2ef7b703fc07b58f0cdde4eee064022ffd,2024-11-21T07:13:15.077000 CVE-2022-36536,0,0,5c0d4b3b945ffc295f10f9aa86bfe286ee7e6a56ebbfd2e99cfc58d6dd6450f9,2024-11-21T07:13:15.240000 -CVE-2022-36537,0,0,1c7f5ec9d0cb9efa07785f7e90197098955cb4be860faaa629c9c52d863a1fe5,2024-11-21T07:13:15.407000 +CVE-2022-36537,0,1,ed0a0d0ced44365df24b17f98e3c3e0148cd180277e3b5ac013cf27ef0f40805,2025-01-29T16:15:30.340000 CVE-2022-36539,0,0,e8d131d51cc67798b30b13dce28738cdcc796ee6e42c637c28c658c874b4bacd,2024-11-21T07:13:15.550000 CVE-2022-3654,0,0,9e7a62cca217f5668122590f52e0a9b83233adb7880b2d013982b509ace6b4c7,2024-11-21T07:19:57.727000 CVE-2022-36542,0,0,f1f8c3cebbdb48f102ceebf852d1ca35116dbe93dc1608940894fb9bfdac0d6f,2024-11-21T07:13:15.707000 @@ -206423,7 +206423,7 @@ CVE-2022-40135,0,0,968d3412c3513cc8612410a147e8673f28b4117704204d33b6ae4a895947f CVE-2022-40136,0,0,2804c0e17cb3d5f2190a682eb99c2cd275c4b142efb949e116f50ea4d6184403,2024-11-21T07:20:56.740000 CVE-2022-40137,0,0,0d8f702638539434dd93694c85cb70be8479fef59883cca3a0fb5679d49df7e6,2024-11-21T07:20:57.040000 CVE-2022-40138,0,0,cf6237fe6c82cd67271d86c2694f31ed4480d16ad2c7f3213f8c43f57eb6a9b2,2024-11-21T07:20:57.487000 -CVE-2022-40139,0,0,3fc4e9b5bfd0ed221a868a1b5cc036c123f01af4be31ada128cadf8e03a93232,2024-11-21T07:20:57.610000 +CVE-2022-40139,0,1,5ee2e6b92626de9262da4d00784118679871a913c307d039c1feb2f61a45adaa,2025-01-29T16:15:30.573000 CVE-2022-4014,0,0,68a3624d5619fbedd49b379cdcfbee9105ea9b40218b3ab440ba344136ae9b66,2024-11-21T07:34:26.960000 CVE-2022-40140,0,0,8aea0f64b801d6ad1f9586f864283c06d326b7b43c72766463a4f41a175e0d16,2024-11-21T07:20:57.767000 CVE-2022-40141,0,0,5ddd156c1cc8b48effc77aed2ae9bf8dcd0549a3eee4c971b09bbb1d5b62bce6,2024-11-21T07:20:57.933000 @@ -209455,7 +209455,7 @@ CVE-2022-4386,0,0,8c58428b2058f6276a18b557c2f00e1cec5dc05db070c3dc77d0653971129c CVE-2022-43860,0,0,bf8896c2918a878da27a88066a54aa22f9b8a47d7820f345d77ca2034424d7b1,2024-11-21T07:27:17.323000 CVE-2022-43863,0,0,dddf6bda47f5ea9771cd3ea118683e34ed99bbefe605fb005a35a24adfb237db,2024-11-21T07:27:17.467000 CVE-2022-43864,0,0,8c33fd21be36da4903a996d2a8cb30afa6dac890a65340fdc07788b180fbf96f,2024-11-21T07:27:17.617000 -CVE-2022-43866,0,0,83ee786b58de60c5e9fb2210c07ab49888d99080bda05ef171327fbb21d6d6a5,2024-11-21T07:27:17.750000 +CVE-2022-43866,0,1,ab5dcd8fe57bda008027d3e5566b155807acc17c5884c117ede89fd884ae38d1,2025-01-29T16:15:30.807000 CVE-2022-43867,0,0,8079cf13b2e1285500e1631ae4f10e3368d6929c155b4202137b23806637e302,2024-11-21T07:27:17.890000 CVE-2022-43868,0,0,52a03bdfd9094b7b4acdbd647b6f3b3abc3deb02f851360780d1737535d6840d,2024-11-21T07:27:18.033000 CVE-2022-43869,0,0,700f5c1c61026b88eece09e493085e25c5c7c6e12dc0a8fa50edf92c8b8e53e6,2024-11-21T07:27:18.187000 @@ -209465,7 +209465,7 @@ CVE-2022-43872,0,0,1a6761e377c318bc25bbc974ec2b8723b030958c986805892bef02ea66e96 CVE-2022-43873,0,0,327de2d5709f5b537976b152e0d3b87368293101303cb58f926488f7dab8a85f,2024-11-21T07:27:18.730000 CVE-2022-43874,0,0,147f305523eaa1065ef4018b0bc69dc2b5e116ea08c960b007980c45ebaacfce,2024-11-21T07:27:18.867000 CVE-2022-43875,0,0,4fc8d47a950f4efe66c74b444f6facf04667fa3a8b973779a0ce03df01dda513,2024-11-21T07:27:19.003000 -CVE-2022-43877,0,0,62ba363d91575dbd4780d3931c7a20afa54970529ecf9cdd0fe4fa5d0d574a35,2024-11-21T07:27:19.137000 +CVE-2022-43877,0,1,381ca38a3b1465a057a8383dba16497d48a33b0d5eef843e508c992edc9a288f,2025-01-29T16:15:31.040000 CVE-2022-43880,0,0,d6aef80fbfa6e2c2a5dba0851f5f12c8f6ea102e82f805e33ac9e23057eefa16,2024-11-21T07:27:19.277000 CVE-2022-43883,0,0,1000ed5863bbf28e9c79acd608199faa7b310f6183efb39a63d032e8596afd5f,2024-11-21T07:27:19.400000 CVE-2022-43887,0,0,85370cdd77be22f7293035663ba3e7849f2afcbbe9df3fb7e1d8a50345c11395,2024-11-21T07:27:19.513000 @@ -210100,7 +210100,7 @@ CVE-2022-4487,0,0,530636e9968fe36f1df1fa2a27c510cd8e26c2f65ecf2d5f0063d5c12e5a00 CVE-2022-44870,0,0,f7f468e318c5da82d1ee8fc2c13b586f55dd09f449ea499e39b516d5a01137d3,2024-11-21T07:28:30.813000 CVE-2022-44874,0,0,1808a181cce6d979b72725aa5e857314beaf695c86b695407374772cd645a684,2024-11-21T07:28:30.950000 CVE-2022-44875,0,0,4a835fffb7582a836b5763db3b95de9d9b0ed6f4913951e39615ad6a2b39dd97,2024-11-21T07:28:31.093000 -CVE-2022-44877,0,0,919ee0d8b18f3614ac540a0aeaded7c8f8faf2365a26be1da718f92b99915e33,2024-11-21T07:28:31.257000 +CVE-2022-44877,0,1,8f614f0bb32b80e0c47f739d39215cb2b955c6a645e295f9fb228b351705ea76,2025-01-29T16:15:31.253000 CVE-2022-4488,0,0,841cd787cc4411fd47187cdd0c11fec3b59424d13ca300f316dd4808b85a3113,2024-11-21T07:35:21.850000 CVE-2022-4489,0,0,be55a6f8b9daa1ce0f43bb34a03a145d7a5dc73fa18211136116245363d7a280,2024-11-21T07:35:21.963000 CVE-2022-44897,0,0,f5a33e940d655cd41ed3766d4566f3215cc518237ea17d3992fc46996940354e,2024-11-21T07:28:31.417000 @@ -213417,8 +213417,8 @@ CVE-2023-0262,0,0,4c2fa46af31ac9b416cbc6f1e88df87fb261a8d6abdcfc38a84e9853fe8682 CVE-2023-0263,0,0,2d2fd76a814a993e55eb8468054f98d46e5188235b95274d1f5b9b7a782745dd,2024-11-21T07:36:51.407000 CVE-2023-0264,0,0,6fac8abb0041323d099260247468abcda159cf0eee8b3f55df0d51afd893cf3f,2024-11-21T07:36:51.503000 CVE-2023-0265,0,0,89f2bce5e942836917321a2fc0397105c35d7c3772ca86b7764f731c681924ae,2024-11-21T07:36:51.617000 -CVE-2023-0266,0,0,eb7a1deb443d7989a0db7bcd9989b252f5c8dafa9c79d05773d3d97f8e3059c2,2024-11-21T07:36:51.723000 -CVE-2023-0267,0,0,9b951ed6bfea4db41f11c640f15951ef1058f04f1c0053cfc0227ce6227beacc,2024-11-21T07:36:51.870000 +CVE-2023-0266,0,1,5de37d15aa1d84be1f3f02d170b0ffebf0b93420e76c3b5f4791cf478b6df82f,2025-01-29T16:15:31.570000 +CVE-2023-0267,0,1,1d12f437c0cd8c4e0bc0ba7aed732624d27ac89d8a6ad2974ea4a101c66a635e,2025-01-29T15:15:11.113000 CVE-2023-0268,0,0,f64be44cc2f1cc4aab5e750e0089c06b552b7b898fea44c492c7e2224b1d9268,2025-01-28T21:15:13.337000 CVE-2023-0269,0,0,a1444d79e87c3f19fbb848742fc9b600d4a4d1c593b1876129c5e0fadfa12980,2023-11-07T04:00:01.967000 CVE-2023-0270,0,0,44aab63ef7829127e706952e5b29c0e3a500353ef14558bd4aed6ac87298a3df,2024-11-21T07:36:52.103000 @@ -213665,7 +213665,7 @@ CVE-2023-0522,0,0,f953723eb5c77677e5b6a266e71baf4e6b008c3517a6decd58cb4c05c23ad1 CVE-2023-0523,0,0,e60934e371bd9a0a628ab0aa7d650316a38ca442114dc90140ed6a52991d5b2e,2024-11-21T07:37:20.253000 CVE-2023-0524,0,0,24db25ea833298500bb190de6768521a9f98dfb325dc289a037f8e5a7a6ee1dc,2024-11-21T07:37:20.370000 CVE-2023-0525,0,0,07cb7783a67bc10133699446f3ace914b9786adaf9057c3f7b5b700666424a15,2024-11-21T07:37:20.470000 -CVE-2023-0526,0,0,72c2d52703119ff1df6b441f03d74a7eca33c5c8e9d112f94ab4e7eef0e5faaa,2024-11-21T07:37:20.623000 +CVE-2023-0526,0,1,79bfe504de7caa1d4d303efcab6cc0380e4183677f2c12d554bc40a7b260e71f,2025-01-29T15:15:11.310000 CVE-2023-0527,0,0,991e1778b1cc8ee8e44f0b090acfd4263b25d9bfb3c48e792c763474c0a57485,2024-11-21T07:37:20.727000 CVE-2023-0528,0,0,72712bcd5f240eab895b7026f9dc1f9cf37745e80d56ff36a0e00682a105f1a2,2024-11-21T07:37:20.860000 CVE-2023-0529,0,0,465fe46942e5cddfa11844774379e1c2ccc0390baa35725029bdc78d1cd2c87b,2024-11-21T07:37:20.990000 @@ -213676,7 +213676,7 @@ CVE-2023-0533,0,0,c178517ebefc16ee41a2f59036c34ccd760249657d48f36ef9ada635b640a8 CVE-2023-0534,0,0,ade7ab28da0420cc365f47dad870343cdd8da608da1a7ddf62838dae0c66a25d,2024-11-21T07:37:21.653000 CVE-2023-0535,0,0,097c1a72387a82081f06503b5910ccdb4d6c97aee981438d38ed487552857661,2024-11-21T07:37:21.773000 CVE-2023-0536,0,0,e637cc93da899c75d4344be893bd279d9c6249fc897c970ef96c3a2f5590177a,2024-11-21T07:37:21.880000 -CVE-2023-0537,0,0,7011c1618f2e3e6df8e02672ca996d3dac2d45d7593bbb6e88eb5d4781ec3325,2024-11-21T07:37:21.983000 +CVE-2023-0537,0,1,2b43fa3c7d6c09be7b74ae22f3c06f76acd623b7b0c21dc267ababb5984feaec,2025-01-29T15:15:11.527000 CVE-2023-0538,0,0,90eb5bd178f7a6820e802465b8b69f8fdf969eb0aef8beb2772cdffc291412c7,2024-11-21T07:37:22.083000 CVE-2023-0539,0,0,eb5da49490d206e212924c29579cf2b2d7eeee726e1ab1af1850e6b4fb48f600,2024-11-21T07:37:22.190000 CVE-2023-0540,0,0,98b75b2c051f118a526aedeef979393d2c5d6fba7747a82ab591af7b6b5ec511,2024-11-21T07:37:22.300000 @@ -213899,7 +213899,7 @@ CVE-2023-0764,0,0,f05a654e5a6a1acd678548dc2b3284237ef5ebec9ba59af16b3be9891b3025 CVE-2023-0765,0,0,f61c06c3f34d1e7d896bc0eee0c48f4f1a4d8c814a5af0365f04fa235d17dc70,2024-11-21T07:37:46.657000 CVE-2023-0766,0,0,1092b03cd783a767d141adca44f8d9dacfc07a7a63563c8f7e23edbf7c3d5f50,2025-01-10T21:15:10.640000 CVE-2023-0767,0,0,4cba498c85229bf7a7445bec9379f226db1951ca0ca3224d3dc334d208756617,2024-11-21T07:37:46.880000 -CVE-2023-0768,0,0,560d0c0653a6dffcd9e199b967aa77c19aa95141b94dc073b9467f1a363fd473,2024-11-21T07:37:47 +CVE-2023-0768,0,1,854944641b4c5c80838898ca164f46cd13b5eb87a809afca93532e5fd701927a,2025-01-29T15:15:11.710000 CVE-2023-0769,0,0,5eb73aa037d1c957a5cf00d758b84f2a8f44950ce424403d490536e87b702de7,2024-11-21T07:37:47.100000 CVE-2023-0770,0,0,42e2b4f0a595f0b7931c2b3eab09288e628e4a581686658c0dc24964b06ee6a1,2024-11-21T07:37:47.203000 CVE-2023-0771,0,0,c5852d70b396a984c744cff0b70a231813098a3efeaf6e285671182f8fcd969e,2024-11-21T07:37:47.330000 @@ -214019,7 +214019,7 @@ CVE-2023-0890,0,0,4d73273c012484aaeff7fc81fc8e1772c749a2f9ec3c4dda1bb8002d2ae751 CVE-2023-0891,0,0,60a89adcaa92afb1a3837ace42cb05dfca1ea747a99824908a578c2a7484dc25,2024-11-21T07:38:02.600000 CVE-2023-0892,0,0,7f2a62f61960cc567a0195dae725c6e118c7f51907c4c1e9a55492716231c885,2025-01-24T21:15:09.507000 CVE-2023-0893,0,0,df438bb69ce370b92d087935b5a942e58daa9c9302b4f8fa3f13002775117f35,2024-11-21T07:38:02.820000 -CVE-2023-0894,0,0,86a747ed21183801a7ec0b4fb1926b2cd1d5cf14ce315bd50c4db8f4932190c9,2024-11-21T07:38:02.923000 +CVE-2023-0894,0,1,cdc8e871a9dd03dfafab10acc905a6eb6a6585e70272458b122a3f52ecf925a1,2025-01-29T15:15:11.903000 CVE-2023-0895,0,0,7a8eccca26ee740fd0de6c373b7d48792a3ca67ce72723be0c25645814a5d69e,2024-11-21T07:38:03.023000 CVE-2023-0896,0,0,9d141618c5ae49e0b2fce0cc35f19724865d32c54c0af7e92a799a3eda9cc225,2024-11-21T07:38:03.140000 CVE-2023-0897,0,0,4488412bab13a91906f7ce2227a72a4a67c2733f6e72f5b034956e9882b86681,2024-11-21T07:38:03.260000 @@ -214150,7 +214150,7 @@ CVE-2023-1027,0,0,fb3621953d7e6b8906984832151b514ef05ffbcc10b959c46c587eac415881 CVE-2023-1028,0,0,dc581d93c07c94e884659a2cb7a138d692398a036ae38a03a29f9615452dbbb3,2024-11-21T07:38:18.863000 CVE-2023-1029,0,0,887915ad16d4acb06a7698d02bd4d1d3bcdb5965b435a4e7827b4974712335e7,2024-11-21T07:38:18.977000 CVE-2023-1030,0,0,72f7ade2a2e17afeb0aeec59fdd9ca5d48f9d464d79bfb9e3360821df8ac1cd4,2024-11-21T07:38:19.087000 -CVE-2023-1031,0,0,920e8e9c9d3f6afa06e2181a6a10f18ca32bb95dc14aa8b2ead8afdef48046dc,2024-11-21T07:38:19.223000 +CVE-2023-1031,0,1,f0c2d71c0798f9b4b9a720491da6b3ef1aa0247d4e03803b9eaba0ade3b81f02,2025-01-29T15:15:12.097000 CVE-2023-1032,0,0,77fcc52d1426eccd495d41e0ab921272a8345b6ca79a132e8c6439d82e73a274,2024-11-21T07:38:19.347000 CVE-2023-1033,0,0,b28d9102d05ee07421b322e9221cd65a492867a73157c7bafc4ac4bd211a216f,2024-11-21T07:38:19.497000 CVE-2023-1034,0,0,6cef5d71b24864ef8fea0fdb0b519564247133adfeaf8c0426c14cf78c223ab2,2024-11-21T07:38:19.620000 @@ -214510,7 +214510,7 @@ CVE-2023-1404,0,0,7de066fe901bec60cc95094448c93e74f3ffe86294e31187ecdd090526c8b5 CVE-2023-1405,0,0,7b662ea5fa9c2f0b1cc5d85828210a99cf19cd2c763c04532d517c1e6eb82afb,2024-11-21T07:39:07.540000 CVE-2023-1406,0,0,f963faccf3d4c93ccce0bec2b837c74a18dff21631badc986ec533f7fc8e0152,2024-11-21T07:39:07.680000 CVE-2023-1407,0,0,6720b48df901a95cb59d78a4ebb5a9f041253ebc7954b8e7a9c8690d89cf1ae6,2024-11-21T07:39:07.797000 -CVE-2023-1408,0,0,96a1d7ad8a157eb22d548cb7d0e6afcccd2b0744d1aaab510f9666c552d8ff3a,2024-11-21T07:39:07.953000 +CVE-2023-1408,0,1,26a90d02a05741b4696c63b193326128c50a3e75855cbf5b7640d662a1816d68,2025-01-29T16:15:31.937000 CVE-2023-1409,0,0,d14e01a3c5bbcd8a10f89252d9321bbc3ab171ee2e8f033a034c9cba10046fde,2024-11-21T07:39:08.080000 CVE-2023-1410,0,0,4e3f97794f69944c55f8788380a3b2b857f09922e2dbe52f9c3b9c1146b617d8,2024-11-21T07:39:08.240000 CVE-2023-1412,0,0,f811e09a3b158dac64b90742e1ab427f28dfe5cdeeea2b6b89b21a2418fb6596,2024-11-21T07:39:08.370000 @@ -214980,7 +214980,7 @@ CVE-2023-1901,0,0,5a2f1c927180388023c098b47628c691a918d1dcf97601a6dd648293b9cca8 CVE-2023-1902,0,0,f263e7bfcf9c8bbf8c5d8e776abc5624dad5a11f841da7584a7136831f797691,2024-11-21T07:40:06.773000 CVE-2023-1903,0,0,efc0da96e9efec639f57af0da1386824a9dd54cff194afba825592fcb116071b,2024-11-21T07:40:06.883000 CVE-2023-1904,0,0,ffbb7dc031b91f22a73be42c7f56c7040dc466cc7cc9e04b2035e3635dd9de4c,2024-11-21T07:40:06.983000 -CVE-2023-1905,0,0,1c8e69e154302dafb57f6191602005d1fb9f553d13ff7fd58cbba47c267631e4,2024-11-21T07:40:07.103000 +CVE-2023-1905,0,1,23f2bcdee982874bbc6c47762707a68d9ec27e1fa3c212948aea5b42173b7325,2025-01-29T16:15:32.253000 CVE-2023-1906,0,0,2474c3121c418f8f1b9c7898365edb5f0f5ff817f30d9fbbb045c48845873f42,2024-11-21T07:40:07.200000 CVE-2023-1907,0,0,7e5d444ed0298ba9f7785c55a14ff0c356de0bcf01ec3878593a7572234eb140,2025-01-09T15:15:10.753000 CVE-2023-1908,0,0,a7f3750c6e61e1597fb00574a671512440b074bfd7d382966345f4da285e0184,2024-11-21T07:40:07.320000 @@ -217554,9 +217554,9 @@ CVE-2023-22775,0,0,e3c8aef35aa4af4554a6ca65574141ad9de0a0017d792d8af5e901bc13eb1 CVE-2023-22776,0,0,05128d506ace55c7761aad646dfb36f508d543994b98b06a085633b405b5fc60,2024-11-21T07:45:24.307000 CVE-2023-22777,0,0,5088c01bbc1f6d1f3d87241193286f179ab418cf2dc9abd11162262fc04e266d,2024-11-21T07:45:24.437000 CVE-2023-22778,0,0,a4d97962a095452dba768282ec0a6f120f6e7a81af49861047d661042bc896f8,2024-11-21T07:45:24.553000 -CVE-2023-22779,0,0,b6600167d1c7d55770f35a6c8d4c5b750d4fa743706b04b7d9ff63c6c2608169,2024-11-21T07:45:24.670000 +CVE-2023-22779,0,1,4efadd3af907efd4e99ac0980d27c269027f7e8f91d74d83330471b6803b3092,2025-01-29T16:15:33.663000 CVE-2023-2278,0,0,0336f44d77434b465c2bc6f3251767932d518620153bd6479a34b05ca72d6d18,2024-11-21T07:58:17.763000 -CVE-2023-22780,0,0,af7fc6771be6d7dfb221e61319ba8bcf2ce03576631733f0cc38731e6dc707da,2024-11-21T07:45:24.783000 +CVE-2023-22780,0,1,12af81a03f2ff0d910da3f9c64734b8cf30a347f77cca2d281898733571f3038,2025-01-29T16:15:34.857000 CVE-2023-22781,0,0,a682c6bb9751ba98148ca19908f61aea671e8cd712f4fce849b464cc40865e1a,2024-11-21T07:45:24.903000 CVE-2023-22782,0,0,8a37f9cf024679875ce6bbe154d28d84bb586bf254e6c77d0a80986252b92975,2024-11-21T07:45:25.037000 CVE-2023-22783,0,0,b5207ab70406888bd2995f1c64f6c6c0d7a5aa475d65bb30c5330bc38d4aa37e,2024-11-21T07:45:25.170000 @@ -217703,7 +217703,7 @@ CVE-2023-22949,0,0,82f16cb82b9a66a94ca4889e6456dc5eea823838581eafd50773499e61baf CVE-2023-2295,0,0,fcfbc079a30ff3d79ad67be0055f08c2987e3f55b7696d8e1fc4a15d43583ed9,2025-01-22T19:15:08.283000 CVE-2023-22950,0,0,993e4a294a9c514778a8ca14770c2aa03ba3c89b8af7fa648a60a7397ec71047,2024-11-21T07:45:42.437000 CVE-2023-22951,0,0,bbdc8f0930e570eafe34117d9c067e683a532746d2f92b3a8915575b776a2c75,2024-11-21T07:45:42.583000 -CVE-2023-22952,0,0,ac128983f9efc92ad2994dcd1e4140cab25939fdaa55e5c57f9c06f942df6611,2024-11-21T07:45:42.730000 +CVE-2023-22952,0,1,1caab7e99e7c34c190666a3db0eaab006f2456b888aee63f776b642b63495f04,2025-01-29T16:15:35.047000 CVE-2023-22953,0,0,bed49673bbc96a045c9877af44a86454f976a2f42cbdac8b1077b232940179e9,2024-11-21T07:45:42.890000 CVE-2023-22955,0,0,f49d36274ca7567a64130f898ca11f77f987f59512cb6653e952d2147c62ef57,2024-11-21T07:45:43.033000 CVE-2023-22956,0,0,1332b5cd87c22c199d8ceae3097ab92ca89dc1d86aebb9f1b90634d9f0c438f0,2024-11-21T07:45:43.200000 @@ -218001,7 +218001,7 @@ CVE-2023-23490,0,0,2d0721fb95f56e21d64379ca4c04944907958dd8ec62348cffcafff03962b CVE-2023-23491,0,0,0b9e63169d302718a0ab2a92e8f374f5c6844828067e30282656ad1acb6aeec4,2024-11-21T07:46:17.540000 CVE-2023-23492,0,0,d3c38acc77917892389fdd545f549877fb15040a71f8907acff4a8b80fd43c8b,2024-11-21T07:46:17.650000 CVE-2023-23493,0,0,261176f2a8b26b025b4dfd56e376abfbea7817062586d08aed72ae11d87b555a,2024-11-21T07:46:17.760000 -CVE-2023-23494,0,0,ce0acbe16ec7b5adfb4fb4e14425b16f88d0081dbf8daa0f02cbdcd4ec3a7d58,2024-11-21T07:46:17.890000 +CVE-2023-23494,0,1,14def5db7a6104b9fee33c787ac4992cd1ab30ea0223e674fef6f7e54618099b,2025-01-29T16:15:35.420000 CVE-2023-23495,0,0,8215e6a092a185f9bdcd7c8ad67231f563ca20654f36aa181da2f172dcf6b7f9,2024-11-21T07:46:18.017000 CVE-2023-23496,0,0,dafb3f4725b70154a6e53f67b672fb292718a764b2e880110ac1f3bf5d9e212a,2024-11-21T07:46:18.143000 CVE-2023-23497,0,0,0eac8f137473676bea54f2e11923e3c9090ba30ff46320e35f376068b557bd56,2024-11-21T07:46:18.280000 @@ -218030,29 +218030,29 @@ CVE-2023-23519,0,0,6ae079c73305079889dc6e2c39307dc9a5c80b6690e163d5d57d6da77db7d CVE-2023-2352,0,0,f2b57b0bbfa316225559cd4e96ca98c890ce4e800269f7fdc72b0f4686c5a062,2024-11-21T07:58:26.520000 CVE-2023-23520,0,0,8777bc89c4d7c677913b2ac7598bb4c26e2ad1a798c78f0b2cfea451cbf6f5c4,2024-11-21T07:46:20.787000 CVE-2023-23522,0,0,bbd0640742c9d2795d413f296659352eddbb371a6c698d12a46f59e02e337e80,2024-11-21T07:46:20.903000 -CVE-2023-23523,0,0,f6484c1d5924f13d985eeac7032881c472edc4084a040c0310aa5e24779e1324,2024-11-21T07:46:21.030000 +CVE-2023-23523,0,1,f269553aabe3b769922b7fe99db9d02491b24fccbae44f488a700e2b7bf839e4,2025-01-29T16:15:35.643000 CVE-2023-23524,0,0,6f3249006836706150b27662ff3f3a3771e72590d4b311d265b914ea55918059,2024-11-21T07:46:21.153000 -CVE-2023-23525,0,0,eda4b588d2d005cd9c9356e244382ceecba87975ef7b9e039d99b2659d2627df,2024-11-21T07:46:21.260000 -CVE-2023-23526,0,0,b3086af3699ce741da5453a76d5bc85b8dee6ab0bc5dad43824708aca57bd44f,2024-11-21T07:46:21.370000 -CVE-2023-23527,0,0,7467e1c2f945799a42381464b89b60e2fdc7f1263c16623761c55829161db0a6,2024-11-21T07:46:21.480000 +CVE-2023-23525,0,1,78db85fa8f2d6299275740c679a54c95ef2f505fd0559284dfc708baa44715ed,2025-01-29T16:15:35.870000 +CVE-2023-23526,0,1,0b8fc79c9ef40704de6cf82fef3307acffc518a897d2d19bd4accf30ae6a56be,2025-01-29T16:15:36.057000 +CVE-2023-23527,0,1,95e09b7643b70de664ad0a17f59b03a1f5ad459216d89c350de15db250b6ebb9,2025-01-29T16:15:36.233000 CVE-2023-23528,0,0,650e9a99e0fd9e60e2db38b8f8e5930d222f449e060a9d63b17dc22d8f595647,2024-11-21T07:46:21.600000 CVE-2023-23529,0,0,06ea1c64d6e35ee6ba270e0752e3d0a3ff377c3acba0734c0c89a688e22ee1e5,2025-01-28T22:15:14.157000 CVE-2023-2353,0,0,d9677ccf6a1806a366039f2a958d6f73e93758433d611231baea25eb5f519b29,2024-11-21T07:58:26.637000 CVE-2023-23530,0,0,d04c218cad5b3190fc98feca7f327753f411ad97fa4c08572069ca30e03769e3,2024-11-21T07:46:21.827000 CVE-2023-23531,0,0,3a266917c705a24968ab3ed97ec3fdfa65e946f8403a4045383cd7e7c6ffbb7c,2024-11-21T07:46:21.933000 -CVE-2023-23532,0,0,10fcedff0e3926cf1eb0f2407e06148c2eb6f281d1802ea108151f6d54a8af72,2024-11-21T07:46:22.040000 -CVE-2023-23533,0,0,4a8a2660735d06adb8d62717c81a13b1cffc892c4f4883c571ffbfc721cdcb47,2024-11-21T07:46:22.153000 -CVE-2023-23534,0,0,f83a3a8dc163646097e29999df9db71f791cf7d1ece66018f966527893485a5b,2024-11-21T07:46:22.263000 -CVE-2023-23535,0,0,2383c36911ed79f6e345612e5cb7c05231157e10cd7ff29c2964bb418a0c5c60,2024-11-21T07:46:22.370000 -CVE-2023-23536,0,0,6be6be300151a2836b7ce75b4385ea0842c30149656ca38e3db862836a88a6cb,2024-11-21T07:46:22.500000 -CVE-2023-23537,0,0,8079be440fe5ff09290ae5a72b360d34353e0c8eb140a3242ad2288a20428729,2024-11-21T07:46:22.617000 -CVE-2023-23538,0,0,eb41c13999350b6533a7b81a6db354ab4d7c506f2da3f99cdd89593070033900,2024-11-21T07:46:22.740000 +CVE-2023-23532,0,1,ddecd4a245a478eba8705477397f953a27552e4b5d464f2a095fb4267bd4cd82,2025-01-29T16:15:36.457000 +CVE-2023-23533,0,1,bd0b9029b458bcf9565adcabbc400c36cc12a55ba52b3e33f2be71d8d8d23fc7,2025-01-29T16:15:36.650000 +CVE-2023-23534,0,1,c71dac694cc8a82b9295a6497b499ea58c063ada52cc8f7baac47a0bbb4434ef,2025-01-29T16:15:36.823000 +CVE-2023-23535,0,1,15aa12c526e71d7dde32907d6fbf98dd1f03f0d18cd9dc7c875fce795dd44f23,2025-01-29T16:15:36.980000 +CVE-2023-23536,0,1,3cd71d9805c0b00d99198e3ca170fec3f5800b46de16ef594aa309277605e96b,2025-01-29T16:15:37.167000 +CVE-2023-23537,0,1,b2cca9affbcf980b076cdfbc87ea2efb3fd672d254c15a91531755593816cf4a,2025-01-29T16:15:37.340000 +CVE-2023-23538,0,1,8f707aeb6e5fa179735d01736b60da0d2003d8113c83abf17eee9e0c3aaf944a,2025-01-29T16:15:37.520000 CVE-2023-23539,0,0,58247f01b1fe7a10618bd5af4f02b7882fd1d7cfc60cf1246878e07eb2ea40a4,2024-11-21T07:46:22.847000 CVE-2023-2354,0,0,4f4aca36b0d973f025e295a21a4896fc72b3b0eee779cb7196f02337a032c024,2024-11-21T07:58:26.750000 -CVE-2023-23540,0,0,70d8f50db48078e26ba4f71f658fafd3e444f233617b4e9293f66b45a9c1c438,2024-11-21T07:46:22.960000 -CVE-2023-23541,0,0,3a8f672c9f7d8eafacf8e5f532f09879417dcdf0e50666146606bd433ebb47da,2024-11-21T07:46:23.093000 -CVE-2023-23542,0,0,8e5ec3fdbd67f99908fb712acc5e2b56fe02573d43065c69cb3346ef7b320668,2024-11-21T07:46:23.203000 -CVE-2023-23543,0,0,ccea5656b88c5df8169cefb6ce5e6efb1d560968951ae1794af6b5524e0c29b1,2024-11-21T07:46:23.317000 +CVE-2023-23540,0,1,a4c765a478ea11981d2de2f93a1d4a9b6b0f919565ab91777d85f12de1263705,2025-01-29T16:15:37.710000 +CVE-2023-23541,0,1,41f7817056d602cfde39436ccd8d8d364aaba9c064864a8ef02cc2b69ad0a1ae,2025-01-29T16:15:37.917000 +CVE-2023-23542,0,1,19906902a9abf6faf963708022276bc415635a7cd352bf61c2640c249f3877de,2025-01-29T16:15:38.107000 +CVE-2023-23543,0,1,549b944b78e3af184a3bdddd45bdfa0d0f455a31fbc992c43d26b22a20a6610a,2025-01-29T16:15:38.270000 CVE-2023-23545,0,0,395a72dbd579a904febe20904b87f5ee489ccb3c5b1113f3a20b24726099a779,2024-11-21T07:46:23.433000 CVE-2023-23546,0,0,c7d3461413b8fbac3b8271b1b0739fb409ff42e18de813df51f912a9ce95f6db,2024-11-21T07:46:23.550000 CVE-2023-23547,0,0,f1c5d488082112b1dfa8fd371d997ed0cb4fc3f37113dc2fd7e8a783f9e22019,2024-11-21T07:46:23.680000 @@ -218888,9 +218888,9 @@ CVE-2023-24501,0,0,1c569c19a4e8749c6c656aa5f98c38f548c6a4f104d0de32012d2271d457a CVE-2023-24502,0,0,9fb4fa073b7b450080f5bf18583f2fa5d148f2ef4b8a391c2ec93b0b92488063,2024-11-21T07:48:00.117000 CVE-2023-24503,0,0,11e8fad5cbddac4a8942d822842c5940d9f27bb25334603e8ccd9541814fb22c,2024-11-21T07:48:00.243000 CVE-2023-24504,0,0,8e96012d0421c27284c620915c823b17452b1699071bc5b9ae1532ee0e801c2c,2024-11-21T07:48:00.363000 -CVE-2023-24505,0,0,a028028127a43ea4bf46adaa13a00d1535978aad95f73e36100ce34c3b30ead2,2024-11-21T07:48:00.500000 -CVE-2023-24506,0,0,38396ed110b27059147bbeb3e0b191d57e7cacca92cd81bd71fba6b8f04d2c68,2024-11-21T07:48:00.627000 -CVE-2023-24507,0,0,2e9de7fcbc18a0321cbe5c7ff564a1bc70766e45837765447333e6bbd59b5ba0,2024-11-21T07:48:00.750000 +CVE-2023-24505,0,1,76651c3fb14b0e6bd9f31113a3a5ec27dd8eaea12e378261ab5609faea7d9945,2025-01-29T16:15:38.430000 +CVE-2023-24506,0,1,215d2d821dfac4a469d6e1e82e567cdfa13c1b66a7eb50950aef73f8104447b8,2025-01-29T16:15:38.683000 +CVE-2023-24507,0,1,c17254710e7c0c99d2edb57440d442d24758ace6c3bf98c00f158de5a6632363,2025-01-29T16:15:38.877000 CVE-2023-24508,0,0,d36f3cbd8c904f96256abdf625f7c1b9cb76bedc482d6f3e709834e2c40ef9c3,2024-11-21T07:48:00.863000 CVE-2023-24509,0,0,f90137618c45fd838d0534e9fbc76582f69c6ef966bc670243a00e380922cc3e,2024-11-21T07:48:00.993000 CVE-2023-2451,0,0,7c54664106bf61e5eebc06d4b0148b9ddc1888c7daa626bc6ec8d4273e23f163,2024-11-21T07:58:38.520000 @@ -219248,7 +219248,7 @@ CVE-2023-24953,0,0,1c1f0ac5177555e37a36553ae1e1f5a489744209078e480c6c56424e3231f CVE-2023-24954,0,0,4769172ebadb5135d6b5565d3a1275ad7fe587670eaf4cbcfcf58c85add51792,2024-11-21T07:48:50.217000 CVE-2023-24955,0,0,5542d5ed3091ae37d4774db32c2ceb7bb9beb86f3e9648bd1febedf1c5faab26,2024-11-21T07:48:50.347000 CVE-2023-24956,0,0,617042c50ae6231f5774921d4079adc25b67a60be09b0750b5d9faca4185fcb4,2024-11-21T07:48:50.477000 -CVE-2023-24957,0,0,c9bf5556706d1c46c488f4bdfd23a4e6b661a07b0c4e97892d721c44791ca7c7,2024-11-21T07:48:50.620000 +CVE-2023-24957,0,1,70ef82c4b3d9f859b3a47f3240d9e435ff3a30a4a3208fd8b5840034f02466f1,2025-01-29T16:15:39.033000 CVE-2023-24958,0,0,1c2ae7c888d61fd05b35f841bed2de1b91f6e80eb7865bcb6181ec4ec4a2a67d,2024-11-21T07:48:50.757000 CVE-2023-24959,0,0,0aca4e07bf5cd1738062a3a2b37b3042cbe98b7481c6e2d2cb138d770528dcc9,2024-11-21T07:48:50.880000 CVE-2023-2496,0,0,f0be24e1e778f88b5ee499f02e79a9d0c300000d3082d5c352f4c1dda0960d8e,2024-11-21T07:58:43.580000 @@ -219874,7 +219874,7 @@ CVE-2023-25713,0,0,dd0d0c101d1005a4dfb41b844ef773d03acdf6055413f757c97bed9c9e64d CVE-2023-25714,0,0,30d1b3b8c2658a5d809246d435c81ddf2f9287a1f5b188d50271eb4a0e4334f7,2024-12-09T13:15:23.967000 CVE-2023-25715,0,0,6d88ef667b64c52873b9245db5fa7fe78e16f2c79bc517d1f15a2686934c9956,2024-11-21T07:49:59.500000 CVE-2023-25716,0,0,6a68a371fb70c98c3f42445bc57863f0a9fc317dbcca5e2cf2d7a9605735c149,2024-11-21T07:49:59.620000 -CVE-2023-25717,0,0,e74d1eee0b5325b9355e668aec0a2894d959be2124ebcddfb4c6513e788921d1,2024-11-21T07:49:59.737000 +CVE-2023-25717,0,1,8bbaa01a33576cfd9c8ee16f21a7be05022bbe98b9b58ff733f0a5074a27fec8,2025-01-29T16:15:39.253000 CVE-2023-25718,0,0,f5451b83d0d2d17afcf3aeff2ebb8c713d359ad1eb925213a0b2737a383e0c42,2024-11-21T07:49:59.913000 CVE-2023-25719,0,0,af067eb4bbeaa87ff5bd0003d5bd5bc28035789641dd59be0ad1c17fd3a0687e,2024-11-21T07:50:00.107000 CVE-2023-2572,0,0,ed886a16c7f1007ac7399c56e87342873576f715bc1e7094b3db9028c0821f2a,2025-01-08T17:15:11.603000 @@ -221611,8 +221611,8 @@ CVE-2023-27923,0,0,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f CVE-2023-27925,0,0,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000 CVE-2023-27926,0,0,452e0fe0b991a0da2a8be11c47cd2297b20bbb72a6e0c2fbc9f597f1f456616b,2025-01-17T19:15:27.213000 CVE-2023-27927,0,0,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000 -CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000 -CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000 +CVE-2023-27928,0,1,992e1c7a03977a6bb7eddb62045f7a27237ec611225902828d799e3b5ed081de,2025-01-29T16:15:39.497000 +CVE-2023-27929,0,1,8fcea2c6b7702b6cdb5480b87b840a4a4b16e2fbe750f91d66feb7daa0f46743,2025-01-29T16:15:39.673000 CVE-2023-2793,0,0,a02ac57ccfcc6bf1345b991bf0b54c08efcba6693c369c3c8f72453068bd79c2,2024-11-21T07:59:18.110000 CVE-2023-27930,0,0,ccd7f66e374f6480e8bd61fb792595510ee2c900f25985c7842ccbbf24321672,2024-11-21T07:53:43.253000 CVE-2023-27931,0,0,337ecc4fe43c8a713528e7f624811a5a1d23a7b5091e92f33520ad19d690a335,2024-11-21T07:53:43.403000 @@ -221627,38 +221627,38 @@ CVE-2023-27939,0,0,cdd3cd8c2175f51e2383b626b90995bb283183f18b11bc2840ea8e753e52e CVE-2023-2794,0,0,323844b4b8eff0819d3cfd2878ab2bebd6a4cd7a2a6e338f710b57f807235188,2024-11-21T07:59:18.233000 CVE-2023-27940,0,0,3f588877ac852901f6450693d72ffd817bfe4a318c432043a768eab43c83728f,2024-11-21T07:53:44.680000 CVE-2023-27941,0,0,0d44edf49d155529c0ab9ad8a9509aa17541df6979c84e122d8628e39ddeceee,2024-11-21T07:53:44.807000 -CVE-2023-27942,0,0,3ecc08594caf9a6757a777d75ec071ee2a208b9788efdbc9a957e6df06e8cf05,2024-11-21T07:53:44.950000 -CVE-2023-27943,0,0,93898ded30863b05ee38e9474954d1cbc946f8739e5d8580b19c6fadef995cdd,2024-11-21T07:53:45.090000 +CVE-2023-27942,0,1,0d699d129b7dff0c4a8a93285bdb3c0b2f49a891bc7ddb6ac255b728c4af6316,2025-01-29T16:15:39.860000 +CVE-2023-27943,0,1,68dad827b013a657e337ec94b83840dee3c17549db5c77e492133636c800881c,2025-01-29T16:15:40.033000 CVE-2023-27944,0,0,f2b8aa1a39cc66b45a2350e92881c5b190f580eb31f8fde93e99402295076d99,2024-11-21T07:53:45.237000 -CVE-2023-27945,0,0,1d36d9a31ae0099c5afd0b68dccb72e1ea6d9cd5681ed25196b42ec2add3e3d2,2024-11-21T07:53:45.397000 -CVE-2023-27946,0,0,4658716f882d77ace1fafe2bcdcb33d875de1ab354be3fcccc413a3af9c5d578,2024-12-12T14:26:18.893000 +CVE-2023-27945,0,1,cce08c4d70f76deaba29dbaaec2ac7b4fb30da4d07b484bb7c4e2e1b249383d9,2025-01-29T16:15:40.173000 +CVE-2023-27946,0,1,a31dbd5265499018f88bcc57845b265b1086130a00277a239bb814eb13e071da,2025-01-29T15:15:12.447000 CVE-2023-27947,0,0,9bf9d3fbde55e086450c5ce93b783034cd711e1641158d1e5bbb1708d0565525,2024-11-21T07:53:45.673000 CVE-2023-27948,0,0,760363adf8d7d0ca02870884a0a0e9fa6b245440dd3df2e635a2aa44ecab95cc,2024-11-21T07:53:45.790000 -CVE-2023-27949,0,0,94bf87b48c9a3a5c84aec88c9a24effc756e5c999de8db419a0d112eb0d8b59b,2024-12-12T14:26:18.893000 +CVE-2023-27949,0,1,ae87aa572e5e26e64332ae0f78c92e6c3850fcd0e401a7d8cfe16b24b6c05e0f,2025-01-29T15:15:12.670000 CVE-2023-2795,0,0,1134a4f4c2856595d0eca4004b0d37ee1461cd84cc05ae468aa9f7ee1279458e,2024-11-21T07:59:18.350000 CVE-2023-27950,0,0,382f8ebc081a8dba327fc928069a71cba666cd4fe1a6c22366c971263e51f9a0,2024-11-21T07:53:46.073000 -CVE-2023-27951,0,0,273a0bb5b11e80a4f64c3b772233292e3a49197dfe48e0bc69231017a9e3117c,2024-11-21T07:53:46.283000 +CVE-2023-27951,0,1,72b35ee46d1968ad615ea14ae1c9beba0663d85f3b80f23d68c2e82ac0ab3533,2025-01-29T15:15:12.863000 CVE-2023-27952,0,0,71c584277ce7e7878c8ff4fa1d46c992f11399da6db6f5472d8356133b6674e9,2024-11-21T07:53:46.517000 -CVE-2023-27953,0,0,882334bb505d92aedf3ef28df592344c3d189b00052a4aa25a5774d3da0d6c85,2024-11-21T07:53:46.723000 -CVE-2023-27954,0,0,d5e69b4018517c57c05d166c75572cfed92bb8df7dfe32eecc6fbea6fd25d15f,2024-12-12T14:26:18.893000 -CVE-2023-27955,0,0,7acf8a7793e4b719acdaf66694a3822c1348de2230a60099f121cefdbfef126e,2024-12-12T14:26:18.893000 -CVE-2023-27956,0,0,a208b16ed3bab62b90db436d4fa73c9552c541d7479c9b855380d7eeeb2ec94f,2024-12-12T14:26:18.893000 -CVE-2023-27957,0,0,d1e7b3b508465a6866530fc7113267739c37584824db57ecc458485e18cefd8b,2024-11-21T07:53:47.610000 -CVE-2023-27958,0,0,46eb7deb505f5e3897b9b5522e801fbefb236a052e189591d28ec2b72f2e9ee4,2024-11-21T07:53:47.773000 +CVE-2023-27953,0,1,acfd1dfc6b6f635337b045ddac1a76e4ce147a98b84454a6de18f6d547a4d98c,2025-01-29T15:15:13.060000 +CVE-2023-27954,0,1,885474f642d3ce30e8080252bb338289d9875be64c5417ae91bf53b489f930dc,2025-01-29T15:15:13.240000 +CVE-2023-27955,0,1,c1c78df751c98038e9105eef44f348d8d19f9e00a112430b5eb63dc998bf94bf,2025-01-29T15:15:13.437000 +CVE-2023-27956,0,1,8a7658f582b20de743c9a9630326b8e46c22b246cfadd10a54609b9264b026a4,2025-01-29T15:15:13.640000 +CVE-2023-27957,0,1,40a46a7e8daf871323753b16bd68fd783137880b55c3ed387cacdf810519e129,2025-01-29T15:15:13.813000 +CVE-2023-27958,0,1,c1856a1bd78d04255d992c271d68b182e6e28b096ca663d886e29d288ab0a876,2025-01-29T15:15:14.003000 CVE-2023-27959,0,0,93f088a3d2cd12f6488f2a83e930e5b4640c45e601cd51de8c6e1d5789140d21,2024-12-12T14:26:18.893000 CVE-2023-2796,0,0,efcf9f17319a3efd07e6eb558157012737214df0290a562d2adb729552c32388,2024-11-21T07:59:18.450000 -CVE-2023-27960,0,0,a775190b8842b0c3b8a81f624c230a57c4f33980270a40a1b212244445925782,2024-11-21T07:53:48.107000 +CVE-2023-27960,0,1,c17a84c8d6919b866c026a7bc206b477471480e23b17d2ef2321f4b4472c4417,2025-01-29T16:15:40.347000 CVE-2023-27961,0,0,184216b2faccb1468fad7c6686a8ffc8d233ef0643d3de27eea3c613c3abe845,2024-12-12T14:26:18.893000 CVE-2023-27962,0,0,39774aa61a14583e66301eb335bdb09877c9692002f6084dc5ebedde5c9bc5ae,2024-11-21T07:53:48.427000 CVE-2023-27963,0,0,871eaaf1ed6152750e4a3b0c5b9459687c54af50cc37274d8bd96c673b253664,2024-12-12T14:26:18.893000 CVE-2023-27964,0,0,66c685f1ae1959baf0bc535c35accef15fb3af44c505366884bd10b44ff2d874,2024-11-21T07:53:48.813000 CVE-2023-27965,0,0,d36260e906ea921ae2b3b9889a511ed9b1581da9ad128bba673ca418057616ce,2024-11-21T07:53:48.973000 -CVE-2023-27966,0,0,926402e8f275ea22b5d8bf82349144414fc85ac8fc75118d770d8a642c646911,2024-11-21T07:53:49.143000 -CVE-2023-27967,0,0,97e449f089e56958277363060aba143c547f4a3a525212eb9abf0ca467f18d6c,2024-11-21T07:53:49.307000 -CVE-2023-27968,0,0,ea25c17c07b88b6ee4e5fc8bccf5dfa389009c4d4961141985a5e418ffcfa535,2024-11-21T07:53:49.467000 -CVE-2023-27969,0,0,f1f20ce6904cc30931a6abbcfb3f675aed7b844d1bf572e2b498faf5dc0064d5,2024-12-12T14:26:18.893000 +CVE-2023-27966,0,1,b87f702dff6ee97cc272da4dd0a1049e5a3a49fd975aaad03d4fe0fe4f8b71b9,2025-01-29T16:15:40.500000 +CVE-2023-27967,0,1,4e38daaf2d0928f33bd4e0e1a1fb592847a75718f4213a755c60f0b7c391ee23,2025-01-29T16:15:40.657000 +CVE-2023-27968,0,1,d4ae6b7569d5b9f939ef1dc58eac523afec32ff9892f263680ad6667e5edd137,2025-01-29T16:15:40.807000 +CVE-2023-27969,0,1,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000 CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000 -CVE-2023-27970,0,0,b35fd2e501512d070ab8abb0064d9cb019af1ee0a86e5172680f09686df7094e,2024-12-12T14:26:18.893000 +CVE-2023-27970,0,1,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000 CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000 CVE-2023-27972,0,0,420429654e9bf1c36921c5fb5ba9fd2a3cef17c110a30df72aaea78d27cfc78c,2024-11-21T07:53:50.660000 CVE-2023-27973,0,0,d08fe914a7a90b67c8fff32446e07617af2ab2e8c1d32e40b6c83140c1b3a4f8,2024-11-21T07:53:50.817000 @@ -221816,8 +221816,8 @@ CVE-2023-28121,0,0,ec8fff6d6e41724f8544797a24801e52673d8d932749cae73931ca46b253f CVE-2023-28122,0,0,2bc21c696415be5bb15ee8705cc555d3392196074dceafbd506b758ce250de18,2024-11-21T07:54:26.937000 CVE-2023-28123,0,0,6aeaec24addbc5446d4b9dfcebba426183a2c5b7ba1d5c92eba28e82a2e7be5f,2024-11-21T07:54:27.050000 CVE-2023-28124,0,0,115c3967a934e801b02b4b4aeb557c0ace0d5bb57a3b0139fd3dfece492e520b,2024-11-21T07:54:27.173000 -CVE-2023-28125,0,0,9beb5954cda52e2e9fd1c557a74dab5e7d8a6fa59a7b363ab928157d3235c7dc,2024-11-21T07:54:27.287000 -CVE-2023-28126,0,0,204a03ad38e769daa61a756a4db3bf54bfafa6d7355515d2eddac409e52b14e8,2024-11-21T07:54:27.410000 +CVE-2023-28125,0,1,0616c4138262008237abdee41d5f561abece0c6d638bef244f113ce62e2e6682,2025-01-29T15:15:14.183000 +CVE-2023-28126,0,1,bcb8774a138aa415cbb5c4ad25484eb894a58ab2d3cc19ed89da6e10d3d73bf8,2025-01-29T15:15:14.370000 CVE-2023-28127,0,0,cb19d557cd45d8477d19041eef65b871de8872b2af726736e204161a4df672c8,2025-01-28T21:15:13.850000 CVE-2023-28128,0,0,735c14e977cb119525a50db5e7d0c570ffa4b44e1129f5923acca5ca0ded4641,2025-01-28T21:15:14.003000 CVE-2023-28129,0,0,e2a3867ae077eed14f4219bec8f42b7b4e6ec0beb5471c37832c7af4a73f5a2f,2024-11-21T07:54:27.773000 @@ -221863,21 +221863,21 @@ CVE-2023-28174,0,0,0395f476edf5e053e887a9f7995d741a62bb05f347b95557bd275ffdeacef CVE-2023-28175,0,0,5522213ae06f55fcc5fb60c67fd4792ba0f4a7a1d16d7415fe6640350e531681,2024-11-21T07:54:32.270000 CVE-2023-28176,0,0,62a0a9c58e2435a209c4f3085fefb1280d27fb30a4a014e46c3d70a90f340edb,2025-01-08T21:15:07.713000 CVE-2023-28177,0,0,65a46b6aac6840bf6058fecd18ecc397b5c70e9cb15c480d5f5265c0a0e11af7,2025-01-08T21:15:07.957000 -CVE-2023-28178,0,0,bea5f49c485e4cbec3e11cd8d816ba700342509178a6f14df66ec06a05ec4418,2024-12-12T14:26:18.893000 +CVE-2023-28178,0,1,e9cc3c49324b9815f5c79f16794d9facb0ebf567af4055f45c6e9b23dc747703,2025-01-29T16:15:41.367000 CVE-2023-28179,0,0,870008b95a647a1114870423bafa8a6a05fdcb978c8b81dd449c39ea8b394b6f,2024-11-21T07:54:32.867000 CVE-2023-2818,0,0,735a9c6bb7b4e983aea153a48d7553aa85a0db10d10608cbd385e641830a2924,2024-11-21T07:59:20.993000 -CVE-2023-28180,0,0,0ce33ac5d5a2979c95d935bfd32b1833849725ddf91941f17d2054c2cf71e983,2024-11-21T07:54:32.993000 -CVE-2023-28181,0,0,999111fcedce705b76e3e07cc47b0246fcb4defa65f9b7837c9509cbfa4cca3d,2024-12-12T14:26:18.893000 -CVE-2023-28182,0,0,8a71ead8d7c1a5607dfede369db99ac87448a4e203e347ef760c72939cd497f4,2024-12-12T14:26:18.893000 +CVE-2023-28180,0,1,69b9a6f7415b36b0c99c67cdc91356de8a172290896e650ad757311e8403aef7,2025-01-29T16:15:41.527000 +CVE-2023-28181,0,1,4b3711a77bdb13988b7724ea5507328a7a26d0228769f67b09bc7ffb2c019845,2025-01-29T16:15:41.680000 +CVE-2023-28182,0,1,610380eae69cbd3ed058b252db51e61a56661a134bc6a2bb30cdba530e143aa6,2025-01-29T16:15:41.830000 CVE-2023-28185,0,0,daea7675bd9566307ac8ce74e72790c4119b91a66b24f2f9152cc8c5ddb3b31c,2024-11-21T07:54:33.430000 CVE-2023-28187,0,0,40a29a1b4bc9415b4849d4f34e04745eda7dc3fb7e002919cc6706a7403562d0,2024-11-21T07:54:33.587000 CVE-2023-28188,0,0,25a78be88c94d9bf595f284b54e423d2516fc344a5483e69e2bfc4dddd4809a5,2024-11-21T07:54:33.713000 -CVE-2023-28189,0,0,695154703e981cba343c710dce80f5d77766605210fd6314c4079337a8e2df8b,2024-11-21T07:54:33.847000 +CVE-2023-28189,0,1,76ebb62413fdcdfd41eb7fc8f6657bbfe927a2bcd04ef4ec509a00609474a7c3,2025-01-29T16:15:41.980000 CVE-2023-2819,0,0,3b247f5e1d6c37a7d71b49d023a88849ee6321753c3431bf9020211da96c539b,2024-11-21T07:59:21.110000 -CVE-2023-28190,0,0,1f82ddef5936295dcf73abb8973b0ae3383f3e5f03fdeb02923fe9c8639f3f86,2024-11-21T07:54:33.977000 +CVE-2023-28190,0,1,e1efb49d6f92c156b1dd502301b9d18158463c1d2b0be22da28c05908bd1f348,2025-01-29T15:15:14.550000 CVE-2023-28191,0,0,6664ec9e1968effd5625736bb352c1ff2957736653242e5c49084c5c4ffb4a69,2024-12-05T17:15:07.650000 -CVE-2023-28192,0,0,bec9476248d838879f049cdff7c7fc6b9811ab932643e2b25e917dae2446625d,2024-11-21T07:54:34.230000 -CVE-2023-28194,0,0,ef88e882c90ab27eed46eeb54efd34e0f525019b73601447931aa3df0fde4727,2024-12-12T14:26:18.893000 +CVE-2023-28192,0,1,bf18b3fddcebf5e8cc5fc632c1a1c9b544cc220ec41326629766ecb0a258cda2,2025-01-29T15:15:14.740000 +CVE-2023-28194,0,1,8dfebeba220944ac1e6413d7e55ece1d53163182e1816bc9f748cab255b3f4b7,2025-01-29T16:15:42.130000 CVE-2023-28195,0,0,8cbb6e52e93eaa1b59d3b6c05cd65ee9bba3ab7a0f8a3e99e51be3ea64c9a34c,2024-11-21T07:54:34.510000 CVE-2023-28197,0,0,b0028e40b4402ddcd64e533b5a9757c40af44232ee19051239601e0493f7972c,2024-11-21T07:54:34.650000 CVE-2023-28198,0,0,ae34c1a56fa2108ed8ad4fc0a54302c4b1d1b763dabdc5146efb236d14a3dd22,2024-11-21T07:54:34.807000 @@ -223398,7 +223398,7 @@ CVE-2023-3005,0,0,3bba8cacc036632961efeac95189798a09bffe62ba77b928588a5fed8bf055 CVE-2023-30053,0,0,f3bd1468b26518ad8d3304e0e8b887484d598f74b9be177880ff58c73fc48dcf,2024-11-21T07:59:44.783000 CVE-2023-30054,0,0,ce3a10e2e89bc097c6e0a1d7f7c4c67a67ab7f61c38515ebef8f05d7357297ae,2024-11-21T07:59:44.927000 CVE-2023-30056,0,0,6d95d7c9a372d8253025b83485bbae5471165bbe0390d508b2d82c8663003e40,2025-01-28T20:15:29.300000 -CVE-2023-30057,0,0,1097e9c9efa4bc678fcfc635b3ea4a844ea8e292f33ae43e51d6b408894c0f64,2024-11-21T07:59:45.233000 +CVE-2023-30057,0,1,726d4bec05b1e9e908e9778e8250ed0403b061aea40051dbec1511cb5dbfceb7,2025-01-29T15:15:14.913000 CVE-2023-30058,0,0,a14c637e7ed9b07c2ce1d3897753efad75676fa7cd24b43bab168d6ecf9c03ed,2024-11-21T07:59:45.390000 CVE-2023-3006,0,0,57110f4979d3de6105b8e337e633736e1bd96816739ef045414e50bfe2f4ef02,2025-01-09T21:15:24.500000 CVE-2023-30061,0,0,44d91a549ae30fb7caab41e446ef56390bd7837ceb4263fcd4ec91220508bc6d,2024-11-21T07:59:45.550000 @@ -223412,10 +223412,10 @@ CVE-2023-30079,0,0,1864953fe33081a6ea74d96fafa4bcbdbe00bfd5214eb8cad4b963faa87f6 CVE-2023-3008,0,0,b8bd483b2ec70b6ad2626cdc7694f3bc2e5a2939898ff1ee6f945c20cd116aa1,2024-11-21T08:16:13.703000 CVE-2023-30082,0,0,9bb92d956ae82dd34b1e5eff81dd134b18a6dbb5022b10b0299f85bc1e4eed12,2025-01-06T17:15:12.460000 CVE-2023-30083,0,0,8888e61bd828ffb4ab2bc9196072c75f60937c3595712f3dab71d9b2499fbdd3,2025-01-28T20:15:29.483000 -CVE-2023-30084,0,0,7552fbb903af88672409296a89ad83fd9ad9d43cf09e45ece4226f8cda3ea36a,2024-11-21T07:59:46.620000 -CVE-2023-30085,0,0,8c1db376031a008fa08bd255201efb63329805c701c8606c89bd9a319998c4ed,2024-11-21T07:59:46.773000 -CVE-2023-30086,0,0,8f278bd8578fae9ef0ccc8fe776e9cb44e07a988c299c5c62b0c5d5bbb0f6978,2024-11-21T07:59:46.917000 -CVE-2023-30087,0,0,434f647269a8191336a4f8f716236ddf9b388aaa77923fcda13459a3cd1ca839,2024-11-21T07:59:47.060000 +CVE-2023-30084,0,1,18193f6f8e54d5a50ca7411131bbbd46b380735954c901e8f373361ff6ca2dbd,2025-01-29T15:15:15.093000 +CVE-2023-30085,0,1,7f719375cb4082a4fb739c230339bdec1011bca7789062d61a945a77f9879fc0,2025-01-29T15:15:15.250000 +CVE-2023-30086,0,1,d80080c45c424ea66376b1e1a642a0639f3421054cc317908c1d7fc9e400624f,2025-01-29T15:15:15.413000 +CVE-2023-30087,0,1,e0db58ce50218f4025110360234d012ebcdc4faae6b35bacee371fa1a653e62e,2025-01-29T15:15:15.590000 CVE-2023-30088,0,0,19743a14decf4dde0a2825489231fbad4ee776fa374bffcee6e6769d8501b314,2024-11-21T07:59:47.213000 CVE-2023-3009,0,0,659c8bae0add349db5b93202ddd68395c9f16b0ff54449bf720170e5d05bfd7c,2024-11-21T08:16:13.857000 CVE-2023-30090,0,0,1d7d640d9bee30ca7baf48441e09d4a88395692ad39373407b5ddea85275c9b8,2024-11-21T07:59:47.357000 @@ -224162,7 +224162,7 @@ CVE-2023-31042,0,0,72401b3ba0d57cf29a8f1e2be7a4a4d563a1be2571469225c19bb08347400 CVE-2023-31043,0,0,2c91f73f91ebe950bc353eaec7f3f1d308df209eeedf5ee3d114692fff3adbf2,2024-11-21T08:01:18.577000 CVE-2023-31045,0,0,c126a7cc44ca268d69ad51fa941eaf20b26a87c97df467c11156d9d81bf002a6,2024-11-21T08:01:18.720000 CVE-2023-31046,0,0,3ac29ea6d4e5166845971ab99b96b293b782c2035ab0d58eacab31cfc11a6dc1,2024-11-21T08:01:18.953000 -CVE-2023-31047,0,0,fc1163552e82519dbde0f5000bc82aea3ed065d0a2c08ccd9173b03c2f3fca2b,2024-11-21T08:01:19.110000 +CVE-2023-31047,0,1,4a41e385a561331c1c344327f38a55572ca949976c78aa02bba574e4c4faacf3,2025-01-29T16:15:42.863000 CVE-2023-31048,0,0,08b37a15f82332da28dca62696de6c2aec8ff4313275dcb6ed4c6bd05e3fc637,2024-11-21T08:01:19.273000 CVE-2023-3105,0,0,f48b866e9434f9513e33f8ae3c51e30ec91edf335435c1971f363accabaaf643,2024-11-21T08:16:28.137000 CVE-2023-31056,0,0,85a5cc38e5a3c232e1bdf065bd8788082ebbb55df3f6c4c80269934161f89b5f,2024-11-21T08:01:19.520000 @@ -225053,7 +225053,7 @@ CVE-2023-32285,0,0,98ef0293a5ae9d1c27252f5ab49cdf2eb2c45aa79d05962e381289ddd222d CVE-2023-32288,0,0,eb31c2378126f1fc5a4d17d7dc29a63b369ee46b35b58f76be9ae654b39ffec0,2024-12-23T22:15:07.623000 CVE-2023-32289,0,0,831692e60f900d61c13697e9724b2cf94d5cb61a356c360dfeeb8c1f3cb56ae8,2024-11-21T08:03:02.987000 CVE-2023-3229,0,0,1a970c549f63ac6d576d7882e00269a4f0740704078d39cb5af4f2cc5d314b6d,2024-11-21T08:16:44.943000 -CVE-2023-32290,0,0,6064c4d4ce58ee0d9d82cfe3fa985c8a9f74303a960cb4899e735aa0f8b928ce,2024-11-21T08:03:03.113000 +CVE-2023-32290,0,1,78e53bd2eb4a33a1818f44a1b760d14fb0fcb570ce83bcc61f6d97bd9f5b7d64,2025-01-29T16:15:43.157000 CVE-2023-32291,0,0,a3ef43b678ed62ad5a4fd4bbcda3577d568b1aa50a25525462fc75c00621d66e,2024-11-21T08:03:03.267000 CVE-2023-32292,0,0,e4f399e186a04a7333a010ef0ba55ed899c981710ad9c9bd8adb83fa40b2f362,2024-11-21T08:03:03.397000 CVE-2023-32293,0,0,6ce479b95519d6976ea6e40d132e7cc3411969d577b48345288435a1c36f42bf,2024-12-09T13:15:29.177000 @@ -236344,7 +236344,7 @@ CVE-2023-47172,0,0,f96d33596e8b87e991b9c1bd2e5d357f2f4287534e7bec6e2b7630ac982e0 CVE-2023-47174,0,0,3186c7e8ead148bdd3055be43e883eeb52845b4bb17391af02c9e2f9e782f64c,2024-11-21T08:29:54.190000 CVE-2023-47175,0,0,e6466d777ede55f4ca2956ddf87f9d9ccb59b506c80c039228ad2f228638590c,2024-11-21T08:29:54.350000 CVE-2023-47177,0,0,5361d5e2ce6ca046282c69eed906a4725ac787feb21fc61cd92dd9eb5cb3b9f7,2024-11-21T08:29:54.483000 -CVE-2023-47178,0,0,b0765ee6678c8a999c62e97bcf824bb02ea00eb3a925c4b58156438a081b4100,2024-11-21T08:29:54.607000 +CVE-2023-47178,0,1,ca6eb6a67026e3ac07d25f432922877b226e3d0050d5aa2f825618d9879a17f3,2025-01-29T16:43:57.933000 CVE-2023-47179,0,0,185f89fba70b217eae973470f902f61214348c87ca9089f087650da3cf4cb3fd,2025-01-02T12:15:14.560000 CVE-2023-4718,0,0,06a5b75b66fc698c34861c2a65bd83baf4703a617480c21068c1a488ea0f84fb,2024-11-21T08:35:49.300000 CVE-2023-47180,0,0,39fbff9596598457c2b099251bcde8e3d5ce2f9aedb60fbb8fc79680ed7fe752,2025-01-02T12:15:14.713000 @@ -244986,7 +244986,7 @@ CVE-2024-11848,0,0,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07a CVE-2024-11849,0,0,fb65e5751887cf6f925710b520da76940b8a448761cc265aabd26f7c6635383f,2025-01-06T14:15:07.883000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-11851,0,0,c4800712965876560a1d0b855389ef84037bf8e91f70f8903026d35b656dc5a7,2025-01-15T12:15:25.630000 -CVE-2024-11852,0,0,247fa49c341ad85d61d3b5deab0469e6e00526c346849e078d27356e459b9917,2024-12-22T02:15:16.510000 +CVE-2024-11852,0,1,cde55478a8690be81021078aa410bb46eab34dbdb8c2c1796e5258338d0c5760,2025-01-29T15:37:30.010000 CVE-2024-11853,0,0,34e99eba0841fa956ba4d7c4a308f8505540f1a8e5d486ec7f2fdd3d46494b2f,2024-12-03T08:15:06.710000 CVE-2024-11854,0,0,999afde0352966c3848f9613a3046f97c5bfc972302cd671fa92812a3b6bafdc,2024-12-04T12:15:19.250000 CVE-2024-11855,0,0,b8bfb341060496fd32ee788a9ac0c446229bec4b5e208f7ac30bcfa919ff4d7a,2024-12-14T05:15:07.960000 @@ -245218,12 +245218,12 @@ CVE-2024-12124,0,0,a12b1d90f861203c941bece90b3e641e0a338c3e7eddd07742ae947869789 CVE-2024-12126,0,0,f0dba97c4b38b793141b5ed36f9c91b3565cc2f54b35bc6ac8e4ea605c3201a9,2025-01-07T05:15:14.533000 CVE-2024-12127,0,0,5a71954d556e5e4eca59c6ef18b25e4cca9d5062e24f45d25c54cd9cd408718b,2024-12-17T10:15:05.830000 CVE-2024-12128,0,0,c4db33033b659bed09aac37afde730f735bf98fa121412b3aa3432fe49f39a39,2024-12-07T10:15:05.843000 -CVE-2024-1213,0,0,71ef51029e532fbd05d5ffce04ca88ce9c1183a8c328c139d7f9dd3d163c9edb,2024-11-21T08:50:03.180000 +CVE-2024-1213,0,1,46a1c578e51af4f5ea0de6f43fa1aef1a4b74eefd9efa4b8f5743377924d31c5,2025-01-29T16:25:21.947000 CVE-2024-12130,0,0,05811205e7cf6b9d5db685121cc1c0a1d80fffaab6e459b31891b300ff7dfa2c,2024-12-17T15:52:01.670000 CVE-2024-12131,0,0,13f02a71aaa32136e25257b1d5a02357f3bae8da21875c47830a0a64cb341eb0,2025-01-07T13:15:06.440000 CVE-2024-12132,0,0,80a7c8d496b1886913eb9109e260df5ae2c0aa6f78d2c4d5ff0aee7f1f0cf7f0,2025-01-03T09:15:05.983000 CVE-2024-12138,0,0,8d975d6d21268c978bf38e4ecd10070b486d972f9cb2bde16883c51e239ae6fa,2024-12-04T14:15:19.413000 -CVE-2024-1214,0,0,006edfeb44add0513d6df0049d407da5a783feee7b6e41af090a449d9f26b334,2024-11-21T08:50:03.383000 +CVE-2024-1214,0,1,382730d768a688205ca8799a488dd078c9ebf42deffdb7914279459963207788,2025-01-29T16:26:04.440000 CVE-2024-12140,0,0,c2add199266b1c986c32a034700db286963405079b6f69910eeedd64a6ce0f35,2025-01-07T05:15:14.730000 CVE-2024-12142,0,0,804d5eb963f5e31b1897c048183440c78533ae216be480727967ce98366adecf,2025-01-17T11:15:08.683000 CVE-2024-12147,0,0,a60a326d5e97949b76dd4b6bfe3685435b958d0b913ec9ae9ab905066656d093,2025-01-14T14:15:28.163000 @@ -245702,7 +245702,7 @@ CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a8 CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000 CVE-2024-12746,0,0,df5c191123ddac7611e41b52ec167446638f37d1f7bfb5919f7163608ca92308,2024-12-26T15:15:06.650000 CVE-2024-12747,0,0,ebc91191d07badeb79dc6f2f702ff942b05784a8436470a9a76f1e6a5f2c2932,2025-01-14T22:15:26.700000 -CVE-2024-12749,0,0,fc313d5feab22f8121324f61a74b655471231ec246bb75d52bc817604d98fc50,2025-01-29T06:15:30.387000 +CVE-2024-12749,0,1,00572cde3c5d611a9af439912325c64830dff1fb08fcbf12acd3fb0705d24218,2025-01-29T15:15:16.223000 CVE-2024-1275,0,0,55e303d499b7cd70146b064f11442ebd0ad45cafbb26b305d69871c04faa255a,2024-11-21T08:50:12.913000 CVE-2024-12751,0,0,c8d36ab052c0d3e9ec35af9571e74ed832930012381575b9dc1af30fc71ca134,2024-12-30T21:15:06.130000 CVE-2024-12752,0,0,23a1df67098cb18d5a208109678c48c3e7913067d5db32571522e50bc90bc4a8,2024-12-30T21:15:06.260000 @@ -245714,7 +245714,7 @@ CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de129 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 CVE-2024-12773,0,0,3b6ccba6d5a0d86034acd0b69772715b708483a05c85a38abdbf411e59a1e181,2025-01-27T17:15:15.290000 CVE-2024-12774,0,0,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000 -CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 +CVE-2024-1278,0,1,5fc68c762fc836b6c12a71eed788de7c0888610c449a9d12f31cc3647bf88af1,2025-01-29T16:26:48.717000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12782,0,0,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000 CVE-2024-12783,0,0,1cbf05ea91cf262fc7ff861feed31dbe6250d2c08bd8ebca814337722a82f119,2025-01-10T21:26:40.627000 @@ -250643,7 +250643,7 @@ CVE-2024-24837,0,0,7ad01e4d66bd18540fc4a1df9e3655e1c4a199a45b0859636572272be2977 CVE-2024-24838,0,0,8e4d815e4da317a92180027f298a62e47e86b6f757666b5c0dfaf2710c513fa3,2024-11-21T08:59:49.593000 CVE-2024-24839,0,0,8ec42c577cfc36527fd5af38ece006b20f9475083205745abdecca2ce49ff896,2024-11-21T08:59:49.730000 CVE-2024-2484,0,0,5cb9f8308022675c8287e20f9cbb0a5855b23416d0e6952dd026d326a0eb190c,2024-11-21T09:09:51.280000 -CVE-2024-24840,0,0,2e4855962f74827073bf43796e4103b0f774243de2eafb70a6fab3ec08c3e82b,2024-11-21T08:59:49.863000 +CVE-2024-24840,0,1,79b6880bcd3a77be55a4808f1056825f6a3cebf08a2847fc190e0d907d7649fb,2025-01-29T15:33:27.707000 CVE-2024-24841,0,0,c8af00789e244d7e2334accb9d107678e5ab5c4481b749d6b368a2dd649af192,2024-11-21T08:59:49.980000 CVE-2024-24842,0,0,71d734bdc7e9888aadb804fc377f87f4d0aa14e084a80124a283ddc10c12b4da,2024-11-21T08:59:50.110000 CVE-2024-24843,0,0,370e161acc98fe061f1d3bb53c93d59788125611eb7de858ca848f928bdaa1d8,2024-11-21T08:59:50.233000 @@ -253031,7 +253031,7 @@ CVE-2024-27836,0,0,cbc2d84b81c4d8680b3e2ce71e679c4626236304b018eec892d9a66d50b30 CVE-2024-27837,0,0,dbe00fc9ad9cfd5169a026b6dd14e56e505a786293836f85ce62ef635b022b41,2024-12-09T19:50:49.497000 CVE-2024-27838,0,0,f48a4ff4fde890aeedd51ce8d5c4a8dd37d520a0fe71173be2957a5d08c5e442,2024-11-21T09:05:14.337000 CVE-2024-27839,0,0,25de2ffde9540eeb3dfd6497c179aacaa009bc4d2b387bc139e8b6349aa09d8e,2024-12-09T19:49:50.323000 -CVE-2024-2784,0,0,25eeabba0047303bdf38fd1047fc143c853e498fcc56a23a83934f1f4854bc32,2024-11-21T09:10:30.660000 +CVE-2024-2784,0,1,d93696e021650672f378a38aa248f523c029fbe3ea2736657b8e0dfa01153bd8,2025-01-29T16:49:47.620000 CVE-2024-27840,0,0,453af47d9309a88c2e180a33c2d097b7c43c49ce2350ecde6e4b6a774767854d,2024-11-21T09:05:14.717000 CVE-2024-27841,0,0,36aa403c3b820f7969c7032fb508bab18a8911fc289482fb447f16f18f6db9c7,2024-12-09T19:41:14.837000 CVE-2024-27842,0,0,49df2c33f0e29eda2c7919a0e93a2fcf54846b0aefcfb3b461eee7983e68528c,2024-12-09T19:37:50.357000 @@ -254246,7 +254246,7 @@ CVE-2024-29684,0,0,e8dbdce83a941c64ac6edc30c8842538d41a99e6916fd5c622b5fa9cb194c CVE-2024-29686,0,0,dd4602e40450a98807ebea08943b3d33227d8556788b71ad77de072080560ff7,2024-11-21T09:08:09.957000 CVE-2024-2969,0,0,785f1584b4e311e1df6bcae2e9225c995485f47c4c481aaa76fe61a8674a7a76,2024-11-21T09:10:57.347000 CVE-2024-2970,0,0,58ffecbd5106b1adbdbbe04dc163028de669087d340fcbcec23ff4ab1440d9a4,2024-11-21T09:10:57.457000 -CVE-2024-2971,0,0,683aae5a1187a099d9586d028bebd88d5d8e98168795023800378056222a1256,2024-11-21T09:10:57.570000 +CVE-2024-2971,0,1,31382b13d7b33245a5b1c01e223b67db7046488c35b8df8b2f48b74981bf2c0b,2025-01-29T16:08:39.727000 CVE-2024-2972,0,0,e63c0ef06cb9a4ccf740cce3ef4981a7380dff7ba4c6f86b78d086bbe05e2ec4,2024-11-21T09:10:57.700000 CVE-2024-29723,0,0,4facbcf1dce8bc91ab4f543c82ea0a9955634cb2c02136e49409e4267e834a61,2024-08-30T15:51:01.163000 CVE-2024-29724,0,0,a220f26a5ec02ae57256e7f37807c32849b60618eafb806f77ea9218e935f788,2024-08-30T15:50:50.157000 @@ -254401,7 +254401,7 @@ CVE-2024-29864,0,0,500db002acb5f8444110c04fdf6c1755d974238286749d97d2f574426dd00 CVE-2024-29865,0,0,9ff88181cc09011dacc69644a77d36e95923b0be430e91548467a246755f07e0,2024-11-21T09:08:30.040000 CVE-2024-29866,0,0,8fc166448f3fbecaecd8b7ed9d6aa230d3bb984af892d0077240e75b9b6f7a9a,2024-11-21T09:08:30.190000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 -CVE-2024-29869,0,0,87c948ae2b1ca479133713452286fe3fae7d76cc7fd831bfd967c01c8d9aa86c,2025-01-28T23:15:07.370000 +CVE-2024-29869,0,1,1284d8c96e2130470fb174f0491a62c64182df18bce3403995e11f17a7ac3956,2025-01-29T15:15:16.417000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 CVE-2024-29870,0,0,b73bbe674034b941cb1de42af16181f829d1cbe733c707402192e9d9f2c3eec7,2025-01-24T18:18:36.670000 CVE-2024-29871,0,0,61f4b4d6f5a977f77b612c4fe0dcdf35eb10ba2cd3db813456ced514fcadbcf3,2025-01-24T18:18:34.350000 @@ -254711,7 +254711,7 @@ CVE-2024-30181,0,0,4b63a15f923a825c1f6a8173bcb6b942101ded5f17f3fc266f511573c31cc CVE-2024-30182,0,0,a81fe3e00d46c578a5fa49e4c9a985f129425c5b65c74e18be12daadef011fdc,2025-01-28T20:39:34.613000 CVE-2024-30183,0,0,3c466350958593d90ca423ea65b4cb5e481df5dfd1cc5ae5c5525bde0c6264fe,2024-11-21T09:11:23.023000 CVE-2024-30184,0,0,687d938a7f6ece9acd3b8185e8886757183e17afb63a5ca83ac7911758ed5b39,2024-11-21T09:11:23.150000 -CVE-2024-30185,0,0,d9a11fa1493c3d39202258e7784ebd32e5e9ef6143e723e534df965b9d61d3e5,2024-11-21T09:11:23.273000 +CVE-2024-30185,0,1,787e08030b6e37360a04f3751038f8618b01aeb2d2ef62ed332526e7c3605226,2025-01-29T15:34:03.450000 CVE-2024-30186,0,0,53bb03ad1cbb4fa177e7f7e64fdaf3dca0853a01d6025157da33afee090214b3,2024-11-21T09:11:23.400000 CVE-2024-30187,0,0,6ab90f628d4de6ea936b04cbe7ef6693781b7e8f80de722020d6b283f2bcf671,2024-11-21T09:11:23.513000 CVE-2024-30188,0,0,0be51808a0bc5ec77e2bd06528cca0a9f7702d4428b403b3dca1bd25f0cce002,2024-11-21T09:11:23.740000 @@ -255027,7 +255027,7 @@ CVE-2024-30492,0,0,944b6e4f4861258dbb795ac5398cdeb34f608f275efd240e733c219ffb14e CVE-2024-30493,0,0,d4995f3c0236a8f39e19456beb10363f62a43dacd003296c017289c489e75ea0,2024-11-21T09:12:02.167000 CVE-2024-30494,0,0,86881d3246dd3af7f8df46136cf1d3c24086e55d5e94a82b4f320a5589a42ea9,2024-11-21T09:12:02.290000 CVE-2024-30495,0,0,56d4b880e421a985cd717d31e56ebfadc437be45f7645d1c309628bdbebd1eaa,2024-11-21T09:12:02.420000 -CVE-2024-30496,0,0,365ccedb9c8649f89d3beed93700d73c3e6867c9030d9821a985bf1ef35bed5f,2024-11-21T09:12:02.553000 +CVE-2024-30496,0,1,6a15feda013161da1c801f0a5fa7382b5ba9414a9a3c3bf64930f5c742b05279,2025-01-29T15:29:50.593000 CVE-2024-30497,0,0,0c148092d9f0a9526c995e4b66b42cb69cb00ad77c3f3d302fbf00845f117224,2024-11-21T09:12:02.670000 CVE-2024-30498,0,0,36abd756ee2c580f1867577bf2aa51997e57ebeac3f6a296181f99dafc180b56,2024-11-21T09:12:02.810000 CVE-2024-30499,0,0,5275ac0246d15f9470bda59f657161aa6f3dfea157e8092fa09a4390dbf0b051,2024-11-21T09:12:02.973000 @@ -256393,7 +256393,7 @@ CVE-2024-32466,0,0,2ae55b82510fb3f1db27c5f3bb3651732cbc3ca634c83b453efcf043c01bd CVE-2024-32467,0,0,0151de4c52d85fbbb474f2bf40e8fcd25c3435dc22f3a5d436f993bf2f52130f,2024-11-21T09:14:58.507000 CVE-2024-32468,0,0,a0c1a73d28199e22d12d433bc9df33cb5698a918a82a41afae5009fa616c5d53,2024-11-25T19:15:09.510000 CVE-2024-32469,0,0,8f393f9540eea59d9a56df87d08c8e0451dd006cfa4a90639150b881b129c202,2024-11-21T09:14:58.630000 -CVE-2024-3247,0,0,b43e1e4b31c769f0ce2634809fcc833ee59ffa676a3162148d0f25a5a9882607,2024-11-21T09:29:14.313000 +CVE-2024-3247,0,1,8acc702c4f602e3458bad6c55b629494771213929ef7ba04834fe2acce639c2f,2025-01-29T16:19:03.877000 CVE-2024-32470,0,0,07d92888b5776b54a11aea28d578b3575a8b455a49e04c07e2156877e19bf747,2024-11-21T09:14:58.760000 CVE-2024-32472,0,0,fe2a0a9caa78755d6a0487539bfa91fc972eb527d0e5f5a15cd8a2d8c4ddcd21,2024-11-21T09:14:58.893000 CVE-2024-32473,0,0,b03152f2151b4db5bf049f6d89cf2b5a88ab97629da9e9673297ad34089b6039,2024-11-21T09:14:59.013000 @@ -256403,7 +256403,7 @@ CVE-2024-32476,0,0,60005a329fdea1342eb55360614b11da6900c705219ea8f8af40586fd6b34 CVE-2024-32477,0,0,494d7aa505c03a502fe674596e2b08451f2479b6f416fe22566baafa6e7d8a9e,2024-11-21T09:14:59.523000 CVE-2024-32478,0,0,4a0ba2a83afa6519a783dca6fc4358d1834574a4640a413c698e36240b9618b0,2024-11-21T09:14:59.640000 CVE-2024-32479,0,0,9b7bdf880dcb0a194868d6600b4a7208b0b85f04828886eb5935f050e1e08162,2025-01-02T21:32:19.123000 -CVE-2024-3248,0,0,4851aa09d5e7929eda0b40bef806189c43c1b02783229891fd6b7f0eee6eec00,2024-11-21T09:29:14.437000 +CVE-2024-3248,0,1,4d9bd80bd4ed62fe94852f5bf7f67f462c42fa4c778580cbe1f5799efe09e63e,2025-01-29T16:18:20.637000 CVE-2024-32480,0,0,075798433acc46de9af0226806765757117dcd1d1201d1492ab04337525466fc,2025-01-02T21:38:11.383000 CVE-2024-32481,0,0,04e9af9bf4e958551ff5b9ab44674cfd14049e81d175c17656409aed3c42b33d,2024-11-21T09:15:00.013000 CVE-2024-32482,0,0,522b777247914831e62e413386cb4671fbd87cce86fa96f638265994ccb940e0,2024-11-21T09:15:00.140000 @@ -257875,7 +257875,7 @@ CVE-2024-3437,0,0,bcf3c80a48dc3d5cf0953af92c9042ed5f968c48f541ba1ebf1af92f41735f CVE-2024-34370,0,0,4047551e28a0b3c8984c1f8dd180dc78c06c6194ff8ba96eb64ad39dfda39854,2024-11-21T09:18:31.687000 CVE-2024-34371,0,0,e846a2fe676040566f4e6efa50b35269655bad9983cf7c77a9c9788717f4eaee,2024-11-21T09:18:31.803000 CVE-2024-34372,0,0,6e08f9389cdc780953f7d11dfd76b886412e9c780b4d6714a57a67ed1541b47a,2024-11-21T09:18:31.923000 -CVE-2024-34373,0,0,aef22129749e0f74a97bfdb3552de88e51bfc89b0b1c5939239b311529caa87d,2024-11-21T09:18:32.047000 +CVE-2024-34373,0,1,9a3853e05633db0457c23a26560ddf3c076d45e1bd24a34d6a00a0c54d2bec35,2025-01-29T16:41:21.897000 CVE-2024-34374,0,0,a527a1d2996d1e2f0a995148ce15f3a2815570a5f249ae10c11b53749e5c2744,2024-11-21T09:18:32.177000 CVE-2024-34375,0,0,42c642f287ca3e9930a3cfbb84eebb7ed663620473f6ae9bd8aeebdfbf7f742f,2024-11-21T09:18:32.293000 CVE-2024-34376,0,0,be096431336d572ee1902ef44d862b693396a16053ee69d5a1dee92f13e9dea6,2024-11-21T09:18:32.413000 @@ -260693,7 +260693,7 @@ CVE-2024-3796,0,0,5e13880a616d837f5f87d8ca618a02d49accff6c61baaf75a0f5a9c0334540 CVE-2024-37960,0,0,88ecfceb39b7e0063b870ddb68c9129955f8d29f0184bea950ac004cc590cadd,2024-11-21T09:24:35.723000 CVE-2024-37961,0,0,cf66c48c044de3bddb607a0cf3c90167369e2890a5e938294c10f20a360a5cca,2024-11-21T09:24:35.847000 CVE-2024-37962,0,0,db2675353f860399b9d6d1a0495bf62bb81eedede36ed49cbf58759c240cc39a,2024-12-19T12:15:06.737000 -CVE-2024-37965,0,0,6babe1d0e2999b39cc0895ef2ca352332d264b85c5043751559162ff1c32b3d2,2024-09-10T17:43:14.410000 +CVE-2024-37965,0,1,a944e5bf628579e1549308bfbade5ea52730da5291236c86805adf31bb50f66f,2025-01-29T16:28:07.807000 CVE-2024-37966,0,0,902a6d8ad8d1506ce3f6dc31414e49d9cee54d275d5e12dd48e5597741d913e9,2025-01-15T22:31:41.957000 CVE-2024-37968,0,0,54c65ab38f96c984d47f26d7973e70fed12b5bc92a49f3dcf7903784570e6447,2024-08-16T20:54:18.347000 CVE-2024-37969,0,0,3dcb4134c3158b14ca3242c535734c22f29e358125eadc3ea20366ebc7be9900,2024-11-21T09:24:36.200000 @@ -260902,7 +260902,7 @@ CVE-2024-38170,0,0,f6c3ecd54c98b563753e5cfb581a39945e34c2d53db0bfb25eea1d23631b8 CVE-2024-38171,0,0,d713845db96ce6ccbd566162da42e7b8315e3986014c34070bf8057d762ca2ac,2024-08-16T19:16:23.683000 CVE-2024-38172,0,0,f2fa71df243c274f4bd951c482452393c8520b5c4637f0edb31e5bc5bf2865c5,2024-08-16T19:18:06.187000 CVE-2024-38173,0,0,e64486f8537eb5cce387c1f4438aef5a29425d1d7360217d83f4fe2f9a0942cb,2024-08-16T19:18:39.243000 -CVE-2024-38175,0,0,edc1561e781314415c34e6b284e01ccee287be825b9aafac3aad917918d814b8,2024-08-21T12:30:33.697000 +CVE-2024-38175,0,1,4c5bda6b2c26000e3340ae7f93db3732733f3db95ccb02079af47a3768b24fd7,2025-01-29T16:31:25.970000 CVE-2024-38176,0,0,aa3a4f34af8469add62ce12d0158807f604374631c43c076d35245ad61d9b0bd,2024-11-21T09:25:00.997000 CVE-2024-38177,0,0,757fe2eacba6da7bd617a3c2ff9c4cb5d47aaef5cc5f8a7f61acf18ec7b188b8,2024-08-16T19:20:08.750000 CVE-2024-38178,0,0,8ff9e87483f3f9c5eebd0833a25976b9926409426eb8c59a572761d75cd8ad91,2024-08-14T16:34:46.337000 @@ -261625,7 +261625,7 @@ CVE-2024-38996,0,0,8fd4a7ef6b42b1a63cd868322179bb9481740ea02fd238379ee386c0fbf6a CVE-2024-38997,0,0,29421658f8acbee523241d363ca96c6a4d61054e874bc93ac98fb62157248214,2024-11-21T09:27:04.613000 CVE-2024-38998,0,0,1ddfa2c100a7af4725f52a46bac654024fff6a96a1ee34fbb54fd0ca70641bb2,2025-01-28T20:15:31.103000 CVE-2024-38999,0,0,7f217baaa25d7f40b740199108f4604ad2f09c6c0fdc981cabbaf727e9dace92,2024-11-21T09:27:05.063000 -CVE-2024-3900,0,0,237e455ad1182954d947891d10732281c5e53fdf19636fc42d58fae27637f1c4,2024-11-21T09:30:39.610000 +CVE-2024-3900,0,1,4f48924de8a040fa4ce001d92f2cdc8b9242f157dae539e47c7b7b901fcc4068,2025-01-29T16:16:54.577000 CVE-2024-39000,0,0,530f16d741de9db26cb1201234320349b7ea94293b8a7e4203a71d20e34e8516,2024-11-21T09:27:05.280000 CVE-2024-39001,0,0,2f0c661649b344a676f65234c3f62899c117c48e25c4f9c2e9b679047c10f205,2024-11-21T09:27:05.497000 CVE-2024-39002,0,0,179a4fc39a0e44f8ece8bdda6ee54450d45e06a31a529e0d645aa70dc7d3dba9,2024-11-21T09:27:05.710000 @@ -261733,7 +261733,7 @@ CVE-2024-39242,0,0,43a91895e92bd720e6caad7b641764febae124befd54612aee776ab0a64ab CVE-2024-39243,0,0,8a71f18c951566d7879eb980241b0471ab0905142b0166e227a16eb2063f3a99,2024-11-21T09:27:21.760000 CVE-2024-39248,0,0,1bf76b2262f3407a8431a3b3e26c4e6ae4412d8dbda47d486dad5141d6444024,2024-11-21T09:27:21.960000 CVE-2024-39249,0,0,7be8f0314a4b46939ea494f384d9ffdc384f5f98b6cd05eb17cc6b2d50d2a427,2024-11-21T09:27:22.130000 -CVE-2024-3925,0,0,a9fdc485a6f2473b83b57153efb2c86617818a4f60c235c7ca15d6fa03880593,2024-11-21T09:30:42.837000 +CVE-2024-3925,0,1,cd8dfd6d51ac6cd690d67929a196f6da1ca4ca4430d5caf127ecc9ab5f16da00,2025-01-29T15:31:21.800000 CVE-2024-39250,0,0,21b05446dfdc54cf0c98fe165562927c7c8516143bc3a042c68b6df4fcb5511d,2024-11-21T09:27:22.363000 CVE-2024-39251,0,0,436e36fb029e96f3eeb340649f39e7025990c183f0b0096b87a3f46c8d1727ae,2024-11-21T09:27:22.573000 CVE-2024-3926,0,0,fa19456efa357b066885387799b645bd8aa9371a065efe590ac8cd9be31edae6,2024-11-21T09:30:42.947000 @@ -263223,7 +263223,7 @@ CVE-2024-41380,0,0,c91ee5fe749e3ef01fe04ca7e47de96f927a3f244bc8d6d4ebc7a2827921e CVE-2024-41381,0,0,e1394fbc9c5108882fcf715895502556b81ceee40d74513efda31c30f21c444f,2024-08-07T19:35:10.370000 CVE-2024-4139,0,0,d89559b1b4471a7e463a9a29d54f1baf6d47eaaf8313ebaf2c6a8903e698e4fd,2024-11-21T09:42:15.637000 CVE-2024-4140,0,0,d5c3ddad82cd3853e4a85ab5c005b956a8ce982136b5f49ff6a6a4a409977929,2024-11-21T09:42:15.750000 -CVE-2024-4141,0,0,8b99f619c8609a71f5844ce37e311260014d833e4551780ee4e0ffc0cda2fe6d,2024-11-21T09:42:15.917000 +CVE-2024-4141,0,1,b81efc85b4c0bd7da9ef83d43c3a09d13870a5fa7a9706a833d10e88317b7ae1,2025-01-29T16:13:50.470000 CVE-2024-4142,0,0,c12692bcc068da387a6db582131995a742308322b7064695e2fc462582d5ac5f,2024-11-21T09:42:16.043000 CVE-2024-4143,0,0,358908d0b0c6e0648fc8a9c90fd71c7a7449d67ffd1159ca639b75ffacefbf65,2024-11-21T09:42:16.163000 CVE-2024-41432,0,0,7825a40ec5fbf977251be015af2234a488bf74ef67cbf12c2260f10afd65a2e9,2024-08-08T15:02:52.647000 @@ -264504,7 +264504,7 @@ CVE-2024-43149,0,0,9790e35ed9ebc22ce7591793bf69738eec4fa49c273f5891df1dd077ffada CVE-2024-4315,0,0,e763108c78dad72bebf08ec43afce7d1a9cefe46d407df73d71b5a11ed56b345,2024-11-21T09:42:36.577000 CVE-2024-43150,0,0,ce5e318f42570113094f77afe38504814afe3158c0604237ad810d4363c1e576,2024-08-13T12:58:25.437000 CVE-2024-43151,0,0,e4709912198de31cab516a307442fc8a4171eaeea915ddcde86ddff97c798dfa,2024-08-13T12:58:25.437000 -CVE-2024-43152,0,0,fdc1bc28f6de80354df4f758aaee6f89f6f590802543a7465db9f7e67c4f32aa,2024-08-13T12:58:25.437000 +CVE-2024-43152,0,1,42d75f64764e45d522bba78e9506bea17e7b6d97cbcf143d83714888439b9313,2025-01-29T16:19:05.707000 CVE-2024-43153,0,0,edb2b54323393ef5505dbf5adb1f3b1e8d839c6a276ae467a33311c1cc3db344,2024-08-13T12:58:25.437000 CVE-2024-43154,0,0,e8b44b7270a93c0e181140b8d68ad010660d44beb9c75acab453a112a051816c,2024-11-01T20:24:53.730000 CVE-2024-43155,0,0,33c4c43fa6a4f4404ea0bbc304e95416a686301209cd813771c66b8106ce8b45,2024-08-13T12:58:25.437000 @@ -264817,7 +264817,7 @@ CVE-2024-43472,0,0,f8e3c9d6561ac8ce5ee6caae48e1fe73371e9553c9d00583bd608487f652c CVE-2024-43474,0,0,34d0a8030540bbfd63b455373b872bb8de8f8337d541fdec541bcbb4c7793dfc,2025-01-07T15:19:09.057000 CVE-2024-43475,0,0,2d33677ace577039cbd96da19d3adf454164cf2978024d3721e0391b3fc51c0e,2024-09-13T14:42:52.533000 CVE-2024-43476,0,0,c09b8c55c9964dc9f155766a737473ad6c5f443b790981f8712ada0463e6fd6d,2024-09-13T14:39:20.693000 -CVE-2024-43477,0,0,e6cc806f74b6683e07d5bd22159ff78489c4915a4a56167b18f8893a367f7d01,2024-09-10T18:15:13.970000 +CVE-2024-43477,0,1,10e89522ff27cddea3212bfb4ba1fb608a527ab9b48edc39461060c2202c9bd7,2025-01-29T16:30:12.927000 CVE-2024-43479,0,0,9fe2e8162ef04bb8ee5c87722775aab03fe924b310a0a05d7fec2799f41ca41f,2024-09-13T14:38:13.873000 CVE-2024-4348,0,0,b2bc52a40c1a3e0511f7a3278ad325bd75bb66c9f6badaf942d1b5905271a09a,2024-11-21T09:42:40.453000 CVE-2024-43480,0,0,2b8c7026769acc492cb135f3a902f5b8efd2fdfa0fc93d7a520b9c444afc664e,2024-10-17T21:14:20.777000 @@ -264927,7 +264927,7 @@ CVE-2024-43584,0,0,48e627cfea6a9647e06f5895df87f7de5808f3364c6c538ecf02965881aa5 CVE-2024-43585,0,0,abb358e19455f7e715fa07d11f064f5897658545f27c7ebbd3d9c4d861590896,2024-10-16T21:38:57.467000 CVE-2024-43587,0,0,9de9e4aae1c926feb9c254fb5c9841a525dc7e95ddee4987c94a6de807a75369,2024-10-18T16:54:36.267000 CVE-2024-43589,0,0,cc903ffbf9d43a375770e2d4c51903c8c3fd1fb1fffb8f41fcf7a5ca5018c226,2024-10-22T19:29:53.660000 -CVE-2024-4359,0,0,a847c8a4556be0bc64499ff4a494bda5373f3e9fea07d39ae70522d6aa358cf4,2024-08-12T13:41:36.517000 +CVE-2024-4359,0,1,d6c26df8de512de9bbb97561e8c7b00954cdbd8b14effca42d54b0baf644a68d,2025-01-29T15:44:39.083000 CVE-2024-43590,0,0,56f37bed6fa12b529a536cabd867859c2b7202ec5a699f63f91ae2da59bda0d9,2024-10-16T21:44:50.927000 CVE-2024-43591,0,0,122a3422706c1a52ba2f8f892feb955dcc1b1b00d57e2a43f0bf994287808e37,2024-10-16T21:46:38.153000 CVE-2024-43592,0,0,b9ca8e169ff2961078c91cf3fb1e31e9b422da371a8ddcc4dbd570ca574c2533,2024-10-22T19:30:02.777000 @@ -264937,7 +264937,7 @@ CVE-2024-43595,0,0,cb5b5951e4919de1a872d590fd0c42132b697a287d76901f8d92265438716 CVE-2024-43596,0,0,378e2538af1a4ff984cad3b4476baafa72ef2d70988fd63f25f16366167c11ae,2024-10-18T16:59:08.667000 CVE-2024-43598,0,0,e3ba2ac69aa626cce11d0f511da9d5528d9a33bfea6bff124e6fc71c816b20a4,2024-11-19T03:52:01.630000 CVE-2024-43599,0,0,39101324225bdbc43df2de78182987bbfc7288ac33fcdced82345e1095aeaf54,2024-10-17T20:03:28.687000 -CVE-2024-4360,0,0,6252dc41739530b13b80d54c3ba928a6dcd0865b27642a102a8ba40f784b0055,2024-08-12T13:41:36.517000 +CVE-2024-4360,0,1,c435f9e8ec441ae38f5c8d2f3f13114df8646f187e858103949a8c64f48357f7,2025-01-29T15:45:04.363000 CVE-2024-43600,0,0,512e86bf1b068e11fed10f17ded98012e43b045697c873b109da2f251d32875c,2025-01-08T12:39:18.487000 CVE-2024-43601,0,0,f4750adec6049954723df6377c0e9969d37c9d4c9bb640431f543dc8ccffc558,2024-11-08T22:15:20.270000 CVE-2024-43602,0,0,8305a93b11e5988c2ad84757fc77cd97d5fa424c6919ea25cb20c9e18393fcb4,2024-11-19T03:40:15.550000 @@ -266433,7 +266433,7 @@ CVE-2024-45672,0,0,1f284c4606417b08ac2cd87243460783df32e665537ee9aa04c2649281078 CVE-2024-45676,0,0,eb22d41374a33aad487840972b05f99b6866c07ad3faeb5bebf20d811966d571,2024-12-11T03:21:10.387000 CVE-2024-45678,0,0,e2a0d8da3cf25ebb49239ae7c4c164f5edac3b90ddc52e1952c353b2d0051611,2024-09-12T20:07:09.640000 CVE-2024-45679,0,0,48441f1f5183f0d7a57b97dcb6b4ce06cc54aa383bc180413d74ccec8981a81d,2024-09-20T12:30:51.220000 -CVE-2024-4568,0,0,ff209e2496a42e1ca9483240418a0ce7bdc3cb877d55c4b5fcd8142a3e8e8866,2024-11-21T09:43:07.640000 +CVE-2024-4568,0,1,f6f19a8fa55535a065733ec93f910b17949f269894c359358bfe3741c8e56d5d,2025-01-29T16:12:47.597000 CVE-2024-45682,0,0,29a9b38c1416c69b93fcebe786e804315833f976987dba100541108ea6e9c025,2024-09-27T18:54:51.820000 CVE-2024-45687,0,0,fb5ef7b89d22677518e0461852b4ab50e70f974a50627f18150439ae409709eb,2025-01-21T17:15:14.073000 CVE-2024-45689,0,0,24ad739d86f57b241e660f9ec4f1e0ba9faa3e7a1346cc907cdf651c0a914431,2024-11-21T13:57:24.187000 @@ -266762,7 +266762,7 @@ CVE-2024-46410,0,0,31e03ba0c54c3d457ace9a72e0933a7183f5084a10c157e4925b9d8e3c1ca CVE-2024-46419,0,0,7af2356fc4a4cdc079ec535cf9b6451b04fa1664f50917e909fd51e655efa97a,2024-09-17T14:35:29.797000 CVE-2024-4642,0,0,feffee00bc573269c6a6673aa02a71420853934841cc7ed393cab7b6bdc385e1,2024-05-20T17:15:09.667000 CVE-2024-46424,0,0,2273b0f58286ad09b52a454674cc24b223f9c5afb4eee6fc1ffbbf08a1bb4cd9,2024-09-17T14:35:30.557000 -CVE-2024-4643,0,0,a86c5cb3704a17a98d8db6a028780c7179de9fcbdca27c95d2dadeffb8c47c36,2024-08-02T12:59:43.990000 +CVE-2024-4643,0,1,efcadbb3309b78f5cf67ed2cf30f7177332b3f74fa06b30eacdef749adb487da,2025-01-29T15:44:01.137000 CVE-2024-4644,0,0,789900a44e8049f565d0a084645f78e0226f44174b1ef54d3027776d0eb82aaf,2024-11-21T09:43:16.477000 CVE-2024-46441,0,0,228695ddcca85ab6755bc8a154549c980bf013ca49086460cfb0ab87ca194c52,2024-09-30T12:45:57.823000 CVE-2024-46442,0,0,5d34ebfc68b0e9b498265063d998a52d1a2b56b4b766741de6c5c955f52d52df,2024-12-11T15:15:10.250000 @@ -267509,7 +267509,7 @@ CVE-2024-47362,0,0,56bc4f07dcdfdb017da34c825963826df9398c632c974d75f574faa2381d2 CVE-2024-47363,0,0,c615105e8ee5adfd6a8485d6e6e139d86ffcb58bc6a37be5e338f997edaafe55,2024-10-07T17:47:48.410000 CVE-2024-47364,0,0,2fe33474edb540126db4c4281ee3227a6e9d0509c934dee31dea30c33ddc6c06,2025-01-22T18:27:35.677000 CVE-2024-47365,0,0,afb0d6a8b18ae6c2493d0789ee81de1a1a73bd252d339cdf1953803b3d5de00b,2024-10-07T17:47:48.410000 -CVE-2024-47366,0,0,053f42113b59ef83e856091fc89745927ca7b3076a3b5c902417845d0179611a,2024-10-07T17:47:48.410000 +CVE-2024-47366,0,1,9a8640f53841e63abbaa6c882fd9b5874e9358c5d704affd1242038fad2277c5,2025-01-29T16:38:17.940000 CVE-2024-47367,0,0,bad7707269a1522b052638ed4752b9594efc2bb8cd40e160a382a90cb47d38c9,2024-10-07T17:47:48.410000 CVE-2024-47368,0,0,140e803e6950f7326f1e6b15ee6693d347657db9198984fe3e9218e824931693,2024-10-07T17:47:48.410000 CVE-2024-47369,0,0,b4ba30321ff31b6d5404fcc8dcb4022561f79093b37b4abe243703fc7d96ce2a,2024-10-07T17:47:48.410000 @@ -268239,7 +268239,7 @@ CVE-2024-48292,0,0,7f8838e82390766bc039b0ef3c145c9a3b0d547a1c16ba215a4c6efa9a2b1 CVE-2024-48293,0,0,8a90ee64d8e0a4016d250a132997b503f4e4629ba1cda5993d263cd1dc28000c,2024-11-19T21:57:56.293000 CVE-2024-48294,0,0,b81e296c829bb2fe4de4a0412fb8c7880c02529a65b2eb4833c50f9d6d79d02e,2024-11-19T21:57:56.293000 CVE-2024-48307,0,0,c22be44a58172dc5d3cbbd2ec37d65d406965554da3ca5be5d01278c103946f3,2024-11-01T12:57:03.417000 -CVE-2024-48310,0,0,c68088f1c34146fc422a4c415b9e44e616eb3f0bf963e2b6f700d8545623dcf2,2025-01-28T23:15:07.677000 +CVE-2024-48310,0,1,323931965ce303736a871559eed1cb9016fc6304c8138a9f963277489be6f26d,2025-01-29T15:15:16.637000 CVE-2024-48311,0,0,7adcb6c5854b4d19d1b383e2c788236df358780ce416fa6f2145bfd33d1d4bbc,2024-11-01T12:57:03.417000 CVE-2024-48312,0,0,16be675ed6d7db1e9ea949b11ad7528da4ef74c3da828eaa8f911e1d7178e590,2024-11-06T18:17:17.287000 CVE-2024-48322,0,0,453a8d1cb35ea3f4b3a13e3127e90b37ffabae51ef64174d60c5422cdab445d0,2024-11-12T17:35:10.953000 @@ -269156,7 +269156,7 @@ CVE-2024-49756,0,0,8781567264d3417f0bceabd108a3b1b3c126fe263609c6bbe3601a9a34e1a CVE-2024-49757,0,0,cd33347069fe86131684955a24695f844327b0cfeb10ad530025601c3efb0e2e,2024-10-28T13:58:09.230000 CVE-2024-49758,0,0,f891ae0ec5c7895deabc0eccebd3e73286a9d9fd4354848fbc41505bd0bd67f6,2024-11-20T14:40:36.990000 CVE-2024-49759,0,0,610a4e9f5af24f6dcf0d77f64b6089eb7684536e8fb10bf2683f8d4527857243,2024-11-20T14:40:17.500000 -CVE-2024-4976,0,0,16bd07a57c5dc4ac4f14e557fadcc8a28548e360e7369bfe14dca9926e162c22,2024-11-21T09:43:59.473000 +CVE-2024-4976,0,1,909389d80e3ddd1b5fc2d3e58e3fcf798d9f5820cde4b0ed917f677c51a8c04b,2025-01-29T16:11:00.080000 CVE-2024-49760,0,0,75841761dd5df70a4ca6c3e394f7ea6839399355b25f53d5f5cc9d4a1b4206b8,2024-11-06T15:01:01.013000 CVE-2024-49761,0,0,74c9ed8af3a70d422dfb6dc224418808179b97cab54a609db7fba09a6e58be38,2024-12-27T16:15:24.890000 CVE-2024-49762,0,0,8bec7a982a398dc7244cc4fcff8a6228db9aa548054deba17633d09b61bb84ad,2024-10-25T12:56:07.750000 @@ -272730,9 +272730,9 @@ CVE-2024-5517,0,0,9c6c0ed78bbf755155b1de3e7badf246bb353c07efc38fd531426187fbced7 CVE-2024-5518,0,0,67f3312fdd1ae90617f9bd3a59508e7bb4618cb669e21c1a0f613af9578fc941,2024-11-21T09:47:51.250000 CVE-2024-55186,0,0,80cbe31f0c6c827f9fe1ea965ee9f035483ef81bd6d62228d42baa84cd806d8a,2024-12-20T21:15:08.850000 CVE-2024-5519,0,0,8f24512a902c7b13458f945742cb7fe1d59be3b3655c7a61619611df90263eb7,2024-11-21T09:47:51.393000 -CVE-2024-55192,0,0,578bf5cd95b055e6f8fe1927d392f06ecc291e7aec5d564d1ff85089ed561a72,2025-01-23T22:15:14.333000 -CVE-2024-55193,0,0,90629f8274796f894b01b17f5a7ef0934dbb53d009417deff7ad371f489b7b38,2025-01-24T22:15:33.730000 -CVE-2024-55194,0,0,c38cb72c8f81c8ae4f496dafee53f7ca664e363ce35004199c8c73fda469a1f8,2025-01-28T16:15:39.927000 +CVE-2024-55192,0,1,26c1e7ff343e107b701c496dfe211001163d6e7a24b6b5dc787dda728908acb5,2025-01-29T15:36:45.337000 +CVE-2024-55193,0,1,0f75943a360377f358bf91940fa5c0eb0e9864d1e224b5f8bd3862d50383a7a5,2025-01-29T15:27:45.020000 +CVE-2024-55194,0,1,799ae146f84784be00303f9aeb594d8fa15840a2b0f65212b9c0a8351a49006c,2025-01-29T15:19:50.313000 CVE-2024-55195,0,0,3d6a6b502efecaed9d3ad6b8e5977b4cdb9be52138440fb5894e677fa50c7906,2025-01-28T15:15:12.647000 CVE-2024-55196,0,0,967b3e10360837eff90c3277f4028e12b0cc2c527c2b826781915311e274c9a4,2025-01-02T20:16:06.017000 CVE-2024-5520,0,0,2719a0027800a6c03c5991cd5e32370933ecb1de4c1c57d912093caa874b1ac4,2024-11-21T09:47:51.540000 @@ -272890,7 +272890,7 @@ CVE-2024-5571,0,0,ae8cb63e38515475363d3cd263dba29e75b985154e958809420e44ea4be8ec CVE-2024-5573,0,0,7c8be1fb78430b946846fdf907ee0f1ab458fd4ee02637f7f42dcbf7f460bb7e,2024-11-21T09:47:57.260000 CVE-2024-5574,0,0,127413076092defd66a0dfb0ea13ecbb8213135b42ecc0d290f451a7afcb21c4,2024-11-21T09:47:57.427000 CVE-2024-5575,0,0,a18977544b056ef70c96acde9c0e077f47c1fd074f82be76696ab6b12e378612,2024-11-21T09:47:57.537000 -CVE-2024-5576,0,0,389a5c080e463511dcbebc6c4b4cad64035de37ec7f8a8903a61b3e88f9fdde5,2024-08-20T15:44:20.567000 +CVE-2024-5576,0,1,69f186ff5f87d8840a8bd6e59d72b82ccb79ad3a33530faf0108446b4508c31d,2025-01-29T16:25:42.263000 CVE-2024-5577,0,0,d6a0b7b3ebeae611897aab9331671d52daedc179f969fec933b28fa6938a3d55,2024-11-21T09:47:57.763000 CVE-2024-5578,0,0,8ff5c059d67eef9c23c15e6af86c084247aa1632d08eb63b57ce73acdd865228,2024-11-06T15:44:19.040000 CVE-2024-5579,0,0,df41f1f8e37ce2dd34be082c8591a46166ba4c240df05f4e1ff86f7cd3c4f76f,2024-11-22T20:15:09.780000 @@ -272958,7 +272958,7 @@ CVE-2024-55957,0,0,ada0c45326625ede7128814a2ddf1c6230493a1309cb930f3b7b704c3c7a0 CVE-2024-55958,0,0,805e9804f2e0f436a8b6462c6f5ea66eb72f3312c0b5dba8bff8785036cb57cd,2025-01-22T22:15:09.453000 CVE-2024-55959,0,0,1be9d85eb46493c77ed7db4321425d1d95d759742cf6d5fdd1afad68017b844f,2025-01-23T16:15:36.147000 CVE-2024-5596,0,0,eb53dbc41b5b12ac359e7b7f77cdb6558119327982ea8ec36e1ee0087b4d4e06,2024-11-21T09:47:59.330000 -CVE-2024-55968,0,0,6d11fa4978388981fa7ab5e137e2a4683d2b3584e877259ec30742448cc87026,2025-01-28T22:15:15.860000 +CVE-2024-55968,0,1,8f1442c123cf03f5941530bdfea44bd73e24c67e87ca7db5fd4acd500fc20a60,2025-01-29T15:15:16.770000 CVE-2024-55969,0,0,1d80cecd30844cd68ce96a6b7ee5ef5d3b9107e1b08adee083a129c50a18336c,2024-12-16T17:15:12.337000 CVE-2024-5597,0,0,c028f291e4b563828a2ebebe088654ce56adccaea078f8905bc0de855460aa3c,2024-11-21T09:47:59.443000 CVE-2024-55970,0,0,16abb0c0e0265704de9252f7802bb4c1dcee3b6024c122812d4fa638388a012b,2024-12-16T17:15:12.517000 @@ -273344,7 +273344,7 @@ CVE-2024-56520,0,0,ff4fb3d2adb6c71c503d044fa0b3b3389f24638650ec092efa0e72e1ef66d CVE-2024-56521,0,0,5d4a5d0ca5e3c3bf7d88ebb212d4979e0d67251982c8b0fd19fb2eec1058ca1b,2024-12-31T19:15:48.020000 CVE-2024-56522,0,0,c0719b044dbc0fcdc0d4eaed012a8c95725e84ecda329fba60f601478e6101fc,2024-12-30T16:15:11.920000 CVE-2024-56527,0,0,bc553a98c63c830a826f605f9380ce4cabbc6f74db77f93c30b7ece0efc5737f,2024-12-28T19:15:07.800000 -CVE-2024-56529,0,0,a3e15c0fddaf36b62d3d191c831d72a07bdb5068a16f9c71521613a315ff5df4,2025-01-28T23:15:07.947000 +CVE-2024-56529,0,1,efa296ebb3a61bbf06b1519e3c59524e6f7b5602bed15e7bc796ff09ab62d82b,2025-01-29T15:15:16.923000 CVE-2024-5653,0,0,6a43b27cee3d2293652e8e6e2ccb4fc0236822263be85c5365c247a4f0b2a7b5,2024-11-21T09:48:05.873000 CVE-2024-56531,0,0,9232cb3a908777655dbde1aa267550e5ea5aa16a08b8557030526152c4ddd82e,2024-12-27T14:15:32.503000 CVE-2024-56532,0,0,5bcb2cd4e9965371ef2a861ddd25ad6f994e367edbb9b2eec6976a7bc0fb3478,2024-12-27T14:15:32.640000 @@ -273761,7 +273761,7 @@ CVE-2024-5730,0,0,7c8f1898d38c08e8565f96fa000ade8830daf4e5695b898fe37d498e1b84f2 CVE-2024-5731,0,0,99cde3770eb4bb22d4df842ccd17736dc2c4de3b0872957b6cccc970f9aebbfd,2024-11-21T09:48:14.893000 CVE-2024-5732,0,0,bae922b5c8991939ba1e818074f05f0af271c0e545373cd8953ba60d2361abce,2024-11-21T09:48:14.997000 CVE-2024-57326,0,0,f180f5eb378fee710c2fef74b7902987cfe7cb6676a2ae1cdef006043bfcf103,2025-01-24T22:15:34.017000 -CVE-2024-57328,0,1,19b4e50cbbdf72861c20532f2246e510dad0346800852a45ddbe4b096de9ae6c,2025-01-29T13:52:36.473000 +CVE-2024-57328,0,0,19b4e50cbbdf72861c20532f2246e510dad0346800852a45ddbe4b096de9ae6c,2025-01-29T13:52:36.473000 CVE-2024-57329,0,0,0fef9f5ceda046114647cee1595a2f5f9e8310debafdf99a1a89de6298c7dfeb,2025-01-24T22:15:34.500000 CVE-2024-5733,0,0,08c79914b3b228d8239c5511d15a5ec639094518968ef7bdf362b13a6205828e,2024-11-21T09:48:15.130000 CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac34828502652b,2024-11-21T09:48:15.300000 @@ -273773,12 +273773,16 @@ CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63 CVE-2024-57370,0,0,dba61003ac0742f925ea5ff1cc95bfbaed4369615ca108aeba895cf60279fedb,2025-01-23T21:15:14.663000 CVE-2024-57372,0,0,359f6085d50456f0eac4043a58ce1cc9b440df64af0e5401b40a68976c846ffa,2025-01-17T22:15:28.957000 CVE-2024-57373,0,0,74730975947491afdedfbebc28e66e12f3622db8206f792838168db38a80a123,2025-01-28T20:15:55.040000 -CVE-2024-57376,0,0,e95b386207c3770a9d6a0b865b82a180ad5fc53bbc01066c4a87ea838284c166,2025-01-28T22:15:15.990000 +CVE-2024-57376,0,1,9564a5a5f1c678a5ed27c086bacc6d63834708967615de401284e6c6ddc391ef,2025-01-29T16:15:43.367000 CVE-2024-57386,0,0,581b3c2804a2401ceb5ccd2cee1eff29157b5f56941a4ae147cc84b888d64fff,2025-01-24T22:15:34.727000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 +CVE-2024-57436,1,1,e2dcfb1e4d8214f4c8417fc0db15f3eb23ab6285ca8b6bed50b9f79fa53a1efb,2025-01-29T15:15:17.073000 +CVE-2024-57437,1,1,5c2be1103d2a53a06b5953b0aa1df25beed689ba1993f08e4a4a9f55702c575a,2025-01-29T15:15:17.183000 +CVE-2024-57438,1,1,29a891679d0ef74373e84c69956ebd7b23aa117aa3b8549cb1b841dc3835d4d1,2025-01-29T15:15:17.283000 +CVE-2024-57439,1,1,35c6bd49655415b70cf633d3d61c05e41e8c512416513c7919764a6df939715e,2025-01-29T15:15:17.387000 CVE-2024-5744,0,0,f08529b05aa9992ca46f071419027f83a7c3d97cd6c27e854ef9ed714ed839f1,2024-11-21T09:48:16.267000 CVE-2024-5745,0,0,f5c2e0226ff1c47168df0c237981cdbe9e1838dc0b6144c20848884be5dc91bf,2024-11-21T09:48:16.423000 CVE-2024-5746,0,0,983f92b35d2851c40a6d833edd298ce544be182f3cbb073e4d5723a172283607,2024-11-21T09:48:16.580000 @@ -273793,8 +273797,8 @@ CVE-2024-57488,0,0,cab6b66e7059e8f245e671e69563c712386f2de2b58d5eb8328ea47276f13 CVE-2024-5749,0,0,36203d1040051e343d9d050a3c2e3f863a807627eb7d14e1470ca394531f4751,2024-10-16T16:38:43.170000 CVE-2024-5750,0,0,476ad6c00a3180d456740d0beb63c2959ea56c746a3fc254c90c1eef52867b01,2024-06-18T14:15:11.383000 CVE-2024-5751,0,0,a075ba1bce0283dcf2eb1909116e18ed1aeef6c0cfd6415ef5931a3fb6320c2f,2024-11-21T09:48:16.813000 -CVE-2024-57514,0,0,e99a7b2deac18e183210e68fabf07af7499306a8f2837163a590f976255e8484,2025-01-28T22:15:16.103000 -CVE-2024-57519,0,0,1cf7e65b02c95b5a1c944f6695dbb497fb4fe776b01de2fe0546b59548206eec,2025-01-28T23:15:08.230000 +CVE-2024-57514,0,1,13fe20ec02c985be4c4a4af0379f9e9b23030591a55f13ac002a7fb596a5977e,2025-01-29T16:15:43.533000 +CVE-2024-57519,0,1,f9f22502c5ada556084f29ecb50f13a3c100397757f34e75d07754f50f22423b,2025-01-29T15:15:17.483000 CVE-2024-5753,0,0,35e5857965ec4fb8ff4da87da0ad57743fc77f757356d105b68f8e07a9b9291a,2024-11-21T09:48:16.923000 CVE-2024-57536,0,0,02e8c7373d9548e0be6ef2dd6f50d54d1dae50f3849a42bda8fca1e700f8b5b0,2025-01-22T21:15:10.100000 CVE-2024-57537,0,0,7a57264ee99ea2cf07d8beff99c09ac577ded2e5e2c43aa0cae71e5949ab6ad2,2025-01-22T21:15:10.287000 @@ -275349,7 +275353,7 @@ CVE-2024-7243,0,0,d8efedfda209b92e52d5dad9e9c4531992bf4800620fe2fcccf37e9c2dcab6 CVE-2024-7244,0,0,eb11b557c66abb67e1bbc5350acc825117ef0b5327cc2a46248288ad36e4f638,2024-11-26T15:05:19.570000 CVE-2024-7245,0,0,5353f8b5127068a9dd54e7fd614deef0dcf70d45e402d61e0b3dcb255a066a43,2024-11-26T15:06:24.367000 CVE-2024-7246,0,0,5b551756aa64b646c0e8e881fba2a2834e3885531b294d7e37142960ce721d3e,2024-08-06T16:30:24.547000 -CVE-2024-7247,0,0,0f59c1ab6ddf54c0600c59d9109918a8a11b50a8a71b5504df5c5f4ad7603aae,2024-08-13T12:58:25.437000 +CVE-2024-7247,0,1,9c8e99939be764d904d364c191173a7769f09d1e2b4a378a71739f6a76a966c7,2025-01-29T15:29:55.873000 CVE-2024-7248,0,0,b6af417e2c97216fc5e3a483dd0b083d821b6fb6433a3a88038758c6b286f12f,2024-11-21T09:51:08.503000 CVE-2024-7249,0,0,5aa3a812d1f0251cb8d39b7db15af9ff39e19781022a6d80d602145f3b1a07d1,2024-11-21T09:51:08.627000 CVE-2024-7250,0,0,77e3676540095583ee54282377d752e59ba470ce7bc9b0c39a793c956014b296,2024-11-21T09:51:08.753000 @@ -275695,7 +275699,7 @@ CVE-2024-7626,0,0,acb590d53cfc7ff0f752b107c4788e7f8cb1f661fa0fd16cad1862bcdd4cf3 CVE-2024-7627,0,0,7a27d6248993c2a650c62eed80c2a5e47d8cc6211f5d1a0602c8ccc0f987de58,2024-09-11T16:31:21.893000 CVE-2024-7628,0,0,4bd4e14d76545c2e8bcfc51a6645f197df19cd176fabd50da5276351688734f0,2024-08-15T13:01:10.150000 CVE-2024-7629,0,0,7bc9d72619eba9ce5af5b25ffde36344f5d4d93091888459c631aca72d1ccb16,2024-09-27T17:32:43.853000 -CVE-2024-7630,0,0,33c672fc773a2e63190d08a9eecf4698c94fc6c6c155959cec5f133d4ce8f81f,2024-08-19T13:00:23.117000 +CVE-2024-7630,0,1,4630bc731f8dbceb03acb36ac721f9e36af7dcf6e0bb86831f258bb953081d25,2025-01-29T16:22:28.413000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 CVE-2024-7634,0,0,b54395f95ee21bd46b61f00e1c7ee926a7e23332c8330b5915a810a5ca726cf2,2025-01-24T16:14:16.497000 CVE-2024-7635,0,0,e36460d792c677fe4e87c32f8cc026963fda07d9440df512b0c7708b6927bc4e,2024-08-15T18:12:33.270000 @@ -276886,7 +276890,7 @@ CVE-2024-9050,0,0,3010fc5c627c8c1972d6f17910d5cdccb5923b375100e48adbc3d5a72e9ff9 CVE-2024-9051,0,0,c5391680d54c46a0bbf9a1fc0deb0ba09610fc9b3f0482409fd6a0ca17d3cbe1,2024-10-15T12:58:51.050000 CVE-2024-9054,0,0,927656c8c5c09baed0e0e2481c9a8a0a983362342cb7c32b1ad1b92f1bc2ff04,2024-10-17T15:19:32.803000 CVE-2024-9057,0,0,da1a5d02a395b3aaf5d692a1b568952646bd6e0d0489aae5adf09df9f0d061b4,2024-10-15T13:58:19.960000 -CVE-2024-9058,0,0,9d53a99366a9ef1bbf4ee3a35eec94be0163410cc37f635f400029db809ccb4e,2024-12-03T07:15:04.230000 +CVE-2024-9058,0,1,957d898d6b987a3e8d6376fcb6dbb80e952b4863252def7195bf52513150b6df,2025-01-29T15:36:12.003000 CVE-2024-9059,0,0,2de7cdef7dd504aa7a2c0a537071b903a9a4a3ccef9184b58357a333d4e0fec7,2024-11-19T15:53:56.680000 CVE-2024-9060,0,0,115d34d9bb64dc2044107f650f557576e82cb04506528a7a9b45b1634927378a,2024-10-04T13:51:25.567000 CVE-2024-9061,0,0,5eb6cf4b39011a255613e0a9aee627f267b69c291569e2b350b332f4002fa368,2024-10-30T21:11:17.450000 @@ -277119,8 +277123,8 @@ CVE-2024-9347,0,0,940da9406d12ee0caf4ee9b86611bdc9bbcdc9df19fd90075163c26f781b22 CVE-2024-9348,0,0,7a3a3a4ecbeb01ca228812ca3f4882abaa9dc1676200c3bcc9675960900d4abe,2024-10-16T16:38:14.557000 CVE-2024-9349,0,0,55d16df237a20343387493b3a6cd09adfd270e82326e8e29d171e5de70fd76c6,2024-10-10T20:25:57.580000 CVE-2024-9350,0,0,657c5995043502e56c0a5ef90cf64491d92d2833df40202d33beba6bb4ff459d,2024-10-29T13:44:03.897000 -CVE-2024-9351,0,0,8c60356c74b5289b1b5c96d740b2fa05d0f6b4827055024ad840356f123e1f1e,2024-10-18T12:53:04.627000 -CVE-2024-9352,0,0,3b8fb1637c21808559702aff8bbb23ece5b30d262393796f634cb67231e15269,2024-10-18T12:52:33.507000 +CVE-2024-9351,0,1,6939a772037d269b38909f4c529a5ff524dffc44ed5b7ad203159606b3c2e3d4,2025-01-29T16:51:37.343000 +CVE-2024-9352,0,1,bba0582d4e82efc5990ee75e2a1523425bad66f38703444b8c1409ada89447d5,2025-01-29T16:55:44.870000 CVE-2024-9353,0,0,8e0d86c3f9aaa2024af022239a79f55d320063d37d43e9df0d1290550d424793,2024-10-08T18:50:51.357000 CVE-2024-9354,0,0,eb04c5105330fca3da944e4cbdaadcc9a14a2f66d98a9175685bb64431637ef1,2025-01-07T07:15:28.140000 CVE-2024-9355,0,0,b0ec2555edb2be21aba884cb9f09977310be30a82039454ba7e0acd9a6463ce0,2024-11-21T20:15:45.247000 @@ -277317,8 +277321,8 @@ CVE-2024-9582,0,0,6c88e6027360fdb4a7811abb4656ed677e99bb646218f90897f5e23c866b2e CVE-2024-9583,0,0,aa4f3f9b033fa37c9a90de980f04f150d9e621c5bb21785813367191c14d792c,2024-10-25T16:28:17.497000 CVE-2024-9584,0,0,567d29a760ee9c5535861847bafecd27aa3529601174432798f2b887b09993c8,2024-11-05T17:04:31.937000 CVE-2024-9585,0,0,88edaaa62474457b47ed76d64b14b66bac9da98dc2e47348845f6205f0ee70a3,2024-11-05T17:05:59.960000 -CVE-2024-9586,0,0,521406ff787b967a41fb76920d1ca3754314c9d9fc6c3d23a8610bead5396de2,2024-10-15T12:58:51.050000 -CVE-2024-9587,0,0,67d388e5921203f98ee160126dcb278be07f5fbda01307513b30595c4c472da7,2024-10-15T12:58:51.050000 +CVE-2024-9586,0,1,4c7602549091dfde9d069ca751dd693b133cf5fda5e4ee8a292deee0dde53657,2025-01-29T16:40:44.013000 +CVE-2024-9587,0,1,d95cd86778b0ff0cd11283ad08550a209f59082ba866a85aada153ccdacf5a1a,2025-01-29T16:45:00.530000 CVE-2024-9588,0,0,a67e73b2a261d9bb69bd24f11e8d3d874ada43d3ef1ceeed16337461fe25c72b,2024-10-25T21:15:39.970000 CVE-2024-9589,0,0,b947c1181a260b70a3b30b41f3d8b0398c4545414c8ef852aad240a7c57d813e,2024-10-29T16:07:54.387000 CVE-2024-9590,0,0,31d8b3dcd29326d9f12acf30409ed90c98c9b1859a9098d17bbc5b51db1b9a93,2024-10-29T16:07:43.737000 @@ -277954,19 +277958,19 @@ CVE-2025-0751,0,0,9f427bf6982d8d00073ea612bcd95872a42bd7d0903214c0ac2165ec846c06 CVE-2025-0752,0,0,1b42777fbab8f210bb46e72869b6d162494a92c3430459e509f1ea2dbae1520b,2025-01-28T10:15:09.493000 CVE-2025-0753,0,0,29a68c520c1ada30651b7f7625e23d6a168a36c3acded86be6c51a51e40dbdd7,2025-01-27T21:15:13.653000 CVE-2025-0754,0,0,21b0a16e61d630284d94dc77a57efde391026f0970f86dbbcd4b271b50d2d4d2,2025-01-28T10:15:09.697000 -CVE-2025-0762,0,0,bde4b3f5afeab796d2b22876a8a0d63e01e5a6a98d2ddd4d457a3bf583cd50e2,2025-01-29T11:15:09.593000 +CVE-2025-0762,0,1,2e29791ffb78b0628bc1140902c45bb23118b7a20017b2273699b3af10d921eb,2025-01-29T15:15:17.687000 CVE-2025-0781,0,0,214a818c7c2b2293ca3062156b160496a04ecec4361de80f5717a7c9f099ef63,2025-01-28T17:15:25.947000 CVE-2025-0783,0,0,3c77d3cfdf2201674ecbdede441dab5378dd73d2ccd0550d79b37d0ba4ece4d4,2025-01-28T19:15:14.410000 CVE-2025-0784,0,0,a8c3e506115e968bf468e598a7692b89d7da0f46aee3c8c8a5b369bef734be1a,2025-01-28T20:15:56.230000 CVE-2025-0785,0,0,2992afab5cf313550498ef84714c1e7ce64ba998bb955708bf5bf24ca107c2be,2025-01-28T22:15:16.227000 -CVE-2025-0786,0,0,6f511fdf24b161499607ed1af7269b33bd8c799131441e982437a286b62ed574,2025-01-28T22:15:16.423000 -CVE-2025-0787,0,0,b94bbfdae5956ccc142cc8bf5ad249ec2a3929865330e7b7c9d5f46a6f438eec,2025-01-28T22:15:16.600000 -CVE-2025-0788,0,0,6ee2b2656e0ed314a1722426c15e72635c020b217f286cb8b74c4adb80abf0e9,2025-01-28T23:15:08.427000 -CVE-2025-0789,0,0,bd903a889483adb380bb808dbce778486f383f1cfb17d2838c4a03598cc21687,2025-01-28T23:15:08.610000 -CVE-2025-0790,0,0,c14128cc9e24a47d8babd06f25eb1611e28c9340a3b3f145587a737244cba0ec,2025-01-29T00:15:08.280000 -CVE-2025-0791,0,0,2bbc6307e0f949be30edfe62afe2de9fdf14f404295fb30e640461e7d00d928a,2025-01-29T00:15:08.480000 -CVE-2025-0792,0,0,1317824d356cc27e333471ace805125208890f40e815bdbb46c306e8148950f3,2025-01-29T00:15:08.653000 -CVE-2025-0793,0,1,3f5cc31726b4a701eacb8c16c1dd94fd1d578506163c1f576529f2d74a89a991,2025-01-29T14:15:27.653000 +CVE-2025-0786,0,1,ebc014411adc1a72ea8aaf0c0455bc379806585fa21c855ab2ccb19c1a9a6945,2025-01-29T15:15:17.923000 +CVE-2025-0787,0,1,7ed72012411b9bfdd607ae2e6e7f4359e09e5498f61375185f5edf915d3e9113,2025-01-29T15:15:18.033000 +CVE-2025-0788,0,1,4cee0e7f70fbb9d41dcd67b9d62bafa8fdfb8830b46f4b89e1c8d0609367e806,2025-01-29T15:15:18.157000 +CVE-2025-0789,0,1,f565fe125381a281624e1985179b3741fb4167867d62bcf5e0232228a73d8f33,2025-01-29T15:15:18.287000 +CVE-2025-0790,0,1,743f60bbaef78321c7cbccb8447df9d744b9ca2e2eb1f892515deb449c9f8061,2025-01-29T15:15:18.410000 +CVE-2025-0791,0,1,9f8cfabad505e7279f1b4bd2f0017a76f7e0f7158047f6f44a866ed7e40b0769,2025-01-29T15:15:18.533000 +CVE-2025-0792,0,1,4b95e20b062306796153b5e1bf5524a853e2b6b02e7c2bc56519af019c9030e9,2025-01-29T15:15:18.653000 +CVE-2025-0793,0,0,3f5cc31726b4a701eacb8c16c1dd94fd1d578506163c1f576529f2d74a89a991,2025-01-29T14:15:27.653000 CVE-2025-0794,0,0,62eac179b1207c092b14c56be4fee9bac1d0a64f815b5f23dbc8e78e583b81c9,2025-01-29T01:15:07.943000 CVE-2025-0795,0,0,792684233106145fcc3a4a3e9d586076fcf6ffb98483870be7df9ed626e1e557,2025-01-29T02:15:26.830000 CVE-2025-0797,0,0,6ba325226959359fde4bd11f46a76270adf519a9d5227bfda784b96037740daf,2025-01-29T02:15:27.010000 @@ -277986,7 +277990,7 @@ CVE-2025-20088,0,0,d069a0a8d0e55448ae448cb2d1bba620f97cc6785542779fdc1ef2f2206cb CVE-2025-20123,0,0,de0e2ee9204f4a04ceea1910b99fa9c19c34866a6ef4e69299265f979ffad510,2025-01-08T16:15:38.150000 CVE-2025-20126,0,0,3777d2eff476c85da5fc4cb45d8938a798421c8f7fbe1d8cce16b92ec7e53c3f,2025-01-08T19:15:38.553000 CVE-2025-20128,0,0,49a3ea4c4c30c63722b70d40b0901308ccfa54cc2769e27e3ea6c87f09ff367e,2025-01-22T17:15:12.583000 -CVE-2025-20156,0,0,9da0b6298f862c0f888e3d1071042845f197256e6c0fb045f01a2c7b704c7311,2025-01-22T17:15:12.800000 +CVE-2025-20156,0,1,a527039b2224fb2e1569b94e994f48bac4f0388ec14d162b5b6f9fa7371b4f83,2025-01-29T16:15:43.693000 CVE-2025-20165,0,0,245fa887fd26631b8371ae5a07816457d0e1aa152c69949ce63e7ac0e9c502d2,2025-01-22T17:15:13.010000 CVE-2025-20166,0,0,96d5726ca24f4531a66ef2215a68dccdad336b2fd7d2f71791c019cb3a6d5163,2025-01-08T17:15:16.990000 CVE-2025-20167,0,0,07090f5f73893ce7a7f63b8dbe397ff57d54c4cdc37bbefbe4dc905874869caa,2025-01-08T17:15:17.163000 @@ -278650,7 +278654,7 @@ CVE-2025-22907,0,0,7f4df8d028c2fe44cc7562e2d8471c7b2f2133589b9f732904dbb3e904199 CVE-2025-22912,0,0,76a106dcfc3b15a68f41cb86af5f0bc6ce507166c1320e2c062df05ffbaedd44,2025-01-16T15:15:15.717000 CVE-2025-22913,0,0,3bc9600e263923113da087744ed3f4aa37ff9ee04dbfd0442bed480f8f497585,2025-01-16T15:15:15.903000 CVE-2025-22916,0,0,3b1c3cad59207b1adc896532af2f2e01463f789a6a5c3c67e9a5bc2566ececf1,2025-01-16T15:15:16.113000 -CVE-2025-22917,0,0,cceb121fc3141a273948bad5e011f82085a64955f68d8d363c22dab392705ce6,2025-01-28T22:15:16.770000 +CVE-2025-22917,0,1,719cb439e4aa013d46c277c9fd9c1581990f1a43ff92759e99b4634c1058cb35,2025-01-29T16:15:43.907000 CVE-2025-22946,0,0,7db37666dfbf9142b1788db2e9c9ed7b839c8fa56ddb82a64c0b003e5a2cac22,2025-01-14T15:15:28.480000 CVE-2025-22949,0,0,4497a547d6c85b77c71713f92e0bd769cd0fee1b37f22227e370aa8af86f0dec,2025-01-14T15:15:28.637000 CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11ba78,2025-01-13T16:15:19.367000 @@ -279124,7 +279128,7 @@ CVE-2025-24027,0,0,f65ac7308f5c3c6cd8129d80f7855beb382ff6483816ea5d90d7daafc13bd CVE-2025-24030,0,0,5733e61c16a6bce864062ac2236910f12c910592f3dec3b8474553af8903d5b1,2025-01-23T04:15:07.100000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 -CVE-2025-24085,0,0,cd6eaca5b429f80fb0a35bc2d721227de78643291355f6b6fe912a9dcce479cf,2025-01-28T16:15:41.540000 +CVE-2025-24085,0,1,3836e6d6eb5008f7b7e367a730327440a5dee9e5bd23a21bd0070f3563a29d68,2025-01-29T16:56:13.513000 CVE-2025-24086,0,0,7c5dca39e6ccd2231eef6bf1dd5f599552abe1ede3ec1541e3a2ac0474eb97aa,2025-01-27T22:15:15.080000 CVE-2025-24087,0,0,835732cf3eefe74b8ac13f2a4025988b418c0a20b7f315efff16a3050e6ed224,2025-01-27T22:15:15.180000 CVE-2025-24092,0,0,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65cbb0,2025-01-28T16:15:41.697000 @@ -279203,6 +279207,7 @@ CVE-2025-24365,0,0,d6342940809c27d9918f0aa477a7b2f50186c8429dabb272c8726a06897b5 CVE-2025-24367,0,0,2dde85784ec9629d596d7bcf8877ef61ab7a77a4d03b902c93b772a1e0c8bf52,2025-01-27T19:15:29.440000 CVE-2025-24368,0,0,761affe4f81311650725b2d0afa011960bd8f2b1d46ad3a802c200945d7bb31c,2025-01-27T19:15:29.540000 CVE-2025-24369,0,0,9730b81a70e801fabbb471b0ad4e9b27e118e3371046e937665a429126c9ea18,2025-01-27T23:15:11.310000 +CVE-2025-24374,1,1,f578e447307218a84c1c03c82fb88e32f22e0777305e270f4df7c9481dc24824,2025-01-29T16:15:44.090000 CVE-2025-24389,0,0,703cd148aa55fffbc38e036ef55c06da66449ab5152579e3986444865088b5ce,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,31dccc33f27efa697a88d53c2bd0e3339846722442ec6537bda6f0c65832dee4,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000 @@ -279363,6 +279368,7 @@ CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534a CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 CVE-2025-24783,0,0,16acaefd8445952b553e27b44c44e73c798d385c295acd08deef74497b7f723b,2025-01-28T16:15:44.880000 +CVE-2025-24792,1,1,0c6ba300c335a0a1c7c562a58d2beb7b1ca215c8c40be47770cdccb927c1d810,2025-01-29T16:15:44.273000 CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000 CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000