diff --git a/CVE-2022/CVE-2022-414xx/CVE-2022-41400.json b/CVE-2022/CVE-2022-414xx/CVE-2022-41400.json index 68a5a6ead1d..f0d337495f1 100644 --- a/CVE-2022/CVE-2022-414xx/CVE-2022-41400.json +++ b/CVE-2022/CVE-2022-414xx/CVE-2022-41400.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41400", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T13:15:13.560", - "lastModified": "2024-11-21T07:23:09.593", + "lastModified": "2025-01-30T21:15:09.157", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-242xx/CVE-2023-24269.json b/CVE-2023/CVE-2023-242xx/CVE-2023-24269.json index 9f775251aea..95fe059c78a 100644 --- a/CVE-2023/CVE-2023-242xx/CVE-2023-24269.json +++ b/CVE-2023/CVE-2023-242xx/CVE-2023-24269.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24269", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T22:15:08.887", - "lastModified": "2024-11-21T07:47:38.710", + "lastModified": "2025-01-30T21:15:09.913", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-279xx/CVE-2023-27971.json b/CVE-2023/CVE-2023-279xx/CVE-2023-27971.json index 15a2e26c77a..ee2a69c9807 100644 --- a/CVE-2023/CVE-2023-279xx/CVE-2023-27971.json +++ b/CVE-2023/CVE-2023-279xx/CVE-2023-27971.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27971", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-04-28T16:15:09.840", - "lastModified": "2024-11-21T07:53:50.490", + "lastModified": "2025-01-30T21:15:10.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28821.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28821.json index 57221697a50..a06011827f4 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28821.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28821.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28821", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T14:15:10.753", - "lastModified": "2024-11-21T07:56:04.903", + "lastModified": "2025-01-30T21:15:10.470", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-640" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-640" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json b/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json index faa15c0cfd4..39c53f8e016 100644 --- a/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json +++ b/CVE-2023/CVE-2023-288xx/CVE-2023-28882.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28882", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T04:15:38.017", - "lastModified": "2024-11-21T07:56:13.220", + "lastModified": "2025-01-30T21:15:10.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29268.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29268.json index deb0c270501..f59ab45aaae 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29268.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29268.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29268", "sourceIdentifier": "security@tibco.com", "published": "2023-04-26T18:15:09.160", - "lastModified": "2024-11-21T07:56:46.553", + "lastModified": "2025-01-30T22:15:07.977", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29815.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29815.json index feabb5e7f84..97c0e9bdb9b 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29815.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29815.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29815", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T15:15:10.737", - "lastModified": "2024-11-21T07:57:32.690", + "lastModified": "2025-01-30T21:15:10.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30204.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30204.json index 0ea99fad934..abf9ff74944 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30204.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30204.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30204", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-03T21:15:23.643", - "lastModified": "2024-11-21T07:59:54.240", + "lastModified": "2025-01-30T21:15:11.507", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30205.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30205.json index f3cb6da76fc..b57261b2a3b 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30205.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30205.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30205", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-03T21:15:24.230", - "lastModified": "2024-11-21T07:59:54.377", + "lastModified": "2025-01-30T21:15:11.693", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-303xx/CVE-2023-30300.json b/CVE-2023/CVE-2023-303xx/CVE-2023-30300.json index 207827753b2..1425b969ac0 100644 --- a/CVE-2023/CVE-2023-303xx/CVE-2023-30300.json +++ b/CVE-2023/CVE-2023-303xx/CVE-2023-30300.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30300", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-03T20:15:10.327", - "lastModified": "2024-11-21T07:59:59.290", + "lastModified": "2025-01-30T21:15:11.870", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-835" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-835" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30405.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30405.json index 1ca4fe13e6f..266ea0ad08b 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30405.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30405.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30405", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T21:15:09.083", - "lastModified": "2024-11-21T08:00:08.217", + "lastModified": "2025-01-30T21:15:12.067", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30454.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30454.json index d561c3d01d6..92a0345166a 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30454.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30454.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30454", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T19:15:16.993", - "lastModified": "2024-11-21T08:00:13.123", + "lastModified": "2025-01-30T21:15:12.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-304xx/CVE-2023-30455.json b/CVE-2023/CVE-2023-304xx/CVE-2023-30455.json index 663842ea1ad..69ab1e1116b 100644 --- a/CVE-2023/CVE-2023-304xx/CVE-2023-30455.json +++ b/CVE-2023/CVE-2023-304xx/CVE-2023-30455.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30455", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-28T18:15:26.680", - "lastModified": "2024-11-21T08:00:13.273", + "lastModified": "2025-01-30T21:15:12.490", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-312xx/CVE-2023-31290.json b/CVE-2023/CVE-2023-312xx/CVE-2023-31290.json index d0adafcd5b6..3161c425fdd 100644 --- a/CVE-2023/CVE-2023-312xx/CVE-2023-31290.json +++ b/CVE-2023/CVE-2023-312xx/CVE-2023-31290.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31290", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-27T05:15:08.807", - "lastModified": "2024-11-21T08:01:44.153", + "lastModified": "2025-01-30T21:15:12.700", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-338" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11609.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11609.json new file mode 100644 index 00000000000..bb340136bcd --- /dev/null +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11609.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11609", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.163", + "lastModified": "2025-01-30T21:15:13.163", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AutomationDirect C-More EA9 EAP9 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24772." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1673/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11610.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11610.json new file mode 100644 index 00000000000..5143fa876b9 --- /dev/null +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11610.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11610", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.303", + "lastModified": "2025-01-30T21:15:13.303", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24773." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1674/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11611.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11611.json new file mode 100644 index 00000000000..41bd65a830b --- /dev/null +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11611.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11611", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.450", + "lastModified": "2025-01-30T21:15:13.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "AutomationDirect C-More EA9 EAP9 File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of AutomationDirect C-More EA9. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of EAP9 files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24774." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://certvde.com/en/bulletins/bulletins/2182-automationdirect-c-more-ea9-programming-software/", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1675/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json index 4a00a828deb..46215dffb36 100644 --- a/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json +++ b/CVE-2024/CVE-2024-120xx/CVE-2024-12085.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12085", "sourceIdentifier": "secalert@redhat.com", "published": "2025-01-14T18:15:25.123", - "lastModified": "2025-01-30T17:15:17.527", + "lastModified": "2025-01-30T22:15:08.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -84,6 +84,10 @@ "url": "https://access.redhat.com/errata/RHSA-2025:0790", "source": "secalert@redhat.com" }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0849", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-12085", "source": "secalert@redhat.com" diff --git a/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json index 9c63b8018fb..692798d4375 100644 --- a/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json +++ b/CVE-2024/CVE-2024-132xx/CVE-2024-13269.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13269", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T20:15:35.687", - "lastModified": "2025-01-09T20:15:35.687", + "lastModified": "2025-01-30T22:15:08.550", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de inserci\u00f3n de informaci\u00f3n confidencial en datos enviados en Drupal Advanced Varnish permite una navegaci\u00f3n forzada. Este problema afecta a Advanced Varnish: desde la versi\u00f3n 0.0.0 hasta la 4.0.11." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, "weaknesses": [ { "source": "mlhess@drupal.org", diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json index 52d2a7e094c..aac31181781 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13308.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13308", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.623", - "lastModified": "2025-01-09T21:15:28.623", + "lastModified": "2025-01-30T22:15:08.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de neutralizaci\u00f3n incorrecta de la entrada durante la generaci\u00f3n de p\u00e1ginas web ('Cross-site Scripting') en Drupal Browser Back Button permite Cross-Site Scripting (XSS). Este problema afecta al bot\u00f3n Atr\u00e1s del navegador: desde la versi\u00f3n 1.0.0 hasta la 2.0.2." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "mlhess@drupal.org", diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json index cb5d4129b60..c065cc9f8b6 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13309.json @@ -2,7 +2,7 @@ "id": "CVE-2024-13309", "sourceIdentifier": "mlhess@drupal.org", "published": "2025-01-09T21:15:28.740", - "lastModified": "2025-01-09T21:15:28.740", + "lastModified": "2025-01-30T22:15:08.880", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "La vulnerabilidad de autenticaci\u00f3n incorrecta en Login Disable de Drupal permite explotar niveles de seguridad de control de acceso configurados incorrectamente. Este problema afecta a Login Disable: desde 2.0.0 antes de 2.1.1." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, "weaknesses": [ { "source": "mlhess@drupal.org", diff --git a/CVE-2024/CVE-2024-14xx/CVE-2024-1488.json b/CVE-2024/CVE-2024-14xx/CVE-2024-1488.json index 2618cb4d522..8c79cb0369b 100644 --- a/CVE-2024/CVE-2024-14xx/CVE-2024-1488.json +++ b/CVE-2024/CVE-2024-14xx/CVE-2024-1488.json @@ -2,7 +2,7 @@ "id": "CVE-2024-1488", "sourceIdentifier": "secalert@redhat.com", "published": "2024-02-15T05:15:10.257", - "lastModified": "2025-01-24T06:15:26.913", + "lastModified": "2025-01-30T22:15:09.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,7 +62,7 @@ "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -416,6 +416,10 @@ "Third Party Advisory" ] }, + { + "url": "https://access.redhat.com/errata/RHSA-2025:0837", + "source": "secalert@redhat.com" + }, { "url": "https://access.redhat.com/security/cve/CVE-2024-1488", "source": "secalert@redhat.com", diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54156.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54156.json index 0ee7ac77004..013372ee424 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54156.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54156.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54156", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-12-04T12:15:20.340", - "lastModified": "2024-12-04T12:15:20.340", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:46:25.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.52635", + "matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54157.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54157.json index 5c537e16d22..6e60968e489 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54157.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54157.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54157", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-12-04T12:15:20.473", - "lastModified": "2024-12-04T12:15:20.473", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:47:10.683", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.52635", + "matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54158.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54158.json index 9a41072a10b..317ce588ee4 100644 --- a/CVE-2024/CVE-2024-541xx/CVE-2024-54158.json +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54158.json @@ -2,8 +2,8 @@ "id": "CVE-2024-54158", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-12-04T12:15:20.623", - "lastModified": "2024-12-04T12:15:20.623", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:50:32.770", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "cve@jetbrains.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-173" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.52635", + "matchCriteriaId": "88F95E9A-5078-436A-A171-96E49C05447B" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json index 5d7c27b4b5f..3ccbc803edc 100644 --- a/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json @@ -2,16 +2,55 @@ "id": "CVE-2024-57276", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-27T17:15:16.827", - "lastModified": "2025-01-27T17:15:16.827", - "vulnStatus": "Received", + "lastModified": "2025-01-30T22:15:09.297", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path." + }, + { + "lang": "es", + "value": "En Electronic Arts Dragon Age Origins 1.05, el servicio DAUpdaterSVC contiene una vulnerabilidad de ruta de servicio sin comillas. Este servicio est\u00e1 configurado con permisos inseguros, lo que permite a los usuarios modificar la ruta del archivo ejecutable que utiliza el servicio. El servicio se ejecuta con privilegios NT AUTHORITY\\sistema, lo que permite a los atacantes aumentar los privilegios reemplazando o colocando un ejecutable malicioso en la ruta del servicio." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-428" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md", diff --git a/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json b/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json index 768df415e28..433767e5522 100644 --- a/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json +++ b/CVE-2025/CVE-2025-02xx/CVE-2025-0241.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0241", "sourceIdentifier": "security@mozilla.org", "published": "2025-01-07T16:15:38.767", - "lastModified": "2025-01-13T22:15:15.330", + "lastModified": "2025-01-30T22:15:09.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Al segmentar texto especialmente manipulado, la segmentaci\u00f3n corromp\u00eda la memoria y provocaba un bloqueo que pod\u00eda explotarse. Esta vulnerabilidad afecta a Firefox < 134 y Firefox ESR < 128.6." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L", + "baseScore": 7.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-401" + } + ] + } + ], "references": [ { "url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023", diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json new file mode 100644 index 00000000000..43c9d0ec51e --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0568.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0568", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.587", + "lastModified": "2025-01-30T21:15:13.587", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-049/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json new file mode 100644 index 00000000000..e34c935ff42 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0569.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0569", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.710", + "lastModified": "2025-01-30T21:15:13.710", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-052/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json new file mode 100644 index 00000000000..3fe0c9c677a --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0570.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0570", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.830", + "lastModified": "2025-01-30T21:15:13.830", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-050/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json new file mode 100644 index 00000000000..66127d10d15 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0571.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0571", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:13.960", + "lastModified": "2025-01-30T21:15:13.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-051/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json new file mode 100644 index 00000000000..26219573360 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0572", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:14.093", + "lastModified": "2025-01-30T21:15:14.093", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server Web Portal DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25308." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-054/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json new file mode 100644 index 00000000000..150a5c34690 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0573", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:14.227", + "lastModified": "2025-01-30T21:15:14.227", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-053/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json new file mode 100644 index 00000000000..5715e3fb4fc --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0574.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-0574", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-01-30T21:15:14.357", + "lastModified": "2025-01-30T21:15:14.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-055/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json new file mode 100644 index 00000000000..a484babecf7 --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0880.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0880", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-30T21:15:14.487", + "lastModified": "2025-01-30T21:15:14.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/updateplan.php. The manipulation of the argument planid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.294125", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.294125", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.488716", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.yuque.com/u21735104/brookes/za83ilxr9g2fkv8b", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json new file mode 100644 index 00000000000..4542bf34718 --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0881.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0881", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-30T21:15:14.650", + "lastModified": "2025-01-30T22:15:09.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/saveroutine.php. The manipulation of the argument rname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/wizdzz/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.294126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.294126", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.489192", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/wizdzz/CVE/issues/1", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json b/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json new file mode 100644 index 00000000000..ffadf13ed71 --- /dev/null +++ b/CVE-2025/CVE-2025-08xx/CVE-2025-0882.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0882", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-30T21:15:14.820", + "lastModified": "2025-01-30T21:15:14.820", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/LamentXU123/cve/blob/main/sql_injection3.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.294127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.294127", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.491463", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json index bf40ceb4741..eb9a973ac10 100644 --- a/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24099.json @@ -2,7 +2,7 @@ "id": "CVE-2025-24099", "sourceIdentifier": "product-security@apple.com", "published": "2025-01-30T17:15:18.473", - "lastModified": "2025-01-30T17:15:18.473", + "lastModified": "2025-01-30T22:15:10.160", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "The issue was addressed with improved checks. This issue is fixed in macOS Sequoia 15.3, macOS Ventura 13.7.3, macOS Sonoma 14.7.3. A local attacker may be able to elevate their privileges." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], "references": [ { "url": "https://support.apple.com/en-us/122068", diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json index 8cb8a777703..44d9dc8850d 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24456.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24456", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:18.320", - "lastModified": "2025-01-21T18:15:18.320", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:28:52.003", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,76 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, "weaknesses": [ { "source": "cve@jetbrains.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-288" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:hub:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.55417", + "matchCriteriaId": "7C6F9298-B076-46A1-BBF5-92D75CCD7F9A" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json index 70bac7b9e60..4933fcdd880 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24457.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24457", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:18.520", - "lastModified": "2025-01-21T18:15:18.520", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:31:24.150", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.55417", + "matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json index 994c2b0476e..e6824bf9673 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24458.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24458", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:18.697", - "lastModified": "2025-01-21T18:15:18.697", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:35:05.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:youtrack:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.3.55417", + "matchCriteriaId": "273778FC-DBA5-40E4-A8F7-D7786652D8C1" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json index a91a699e135..c1db484012c 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24459.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24459", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:18.890", - "lastModified": "2025-01-21T18:15:18.890", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:22:22.917", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.12.1", + "matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json index fea46405527..3ace254883a 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24460.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24460", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:19.067", - "lastModified": "2025-01-21T18:15:19.067", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:25:18.337", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -51,10 +71,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.12.1", + "matchCriteriaId": "F955D6EE-CC8E-4782-B7A4-2F915A7BF290" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json b/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json index 7758d692589..444db880a38 100644 --- a/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json +++ b/CVE-2025/CVE-2025-244xx/CVE-2025-24461.json @@ -2,8 +2,8 @@ "id": "CVE-2025-24461", "sourceIdentifier": "cve@jetbrains.com", "published": "2025-01-21T18:15:19.260", - "lastModified": "2025-01-21T18:15:19.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-30T21:26:17.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -51,10 +71,30 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:2024.12.1:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E73863-CD45-441D-8935-DEEBF201E302" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/README.md b/README.md index 5617a5b97fb..99b0404f8fc 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-30T21:00:30.606915+00:00 +2025-01-30T23:00:33.211774+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-30T20:15:51.010000+00:00 +2025-01-30T22:15:10.160000+00:00 ``` ### Last Data Feed Release @@ -33,56 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279541 +279554 ``` ### CVEs added in the last Commit -Recently added CVEs: `24` +Recently added CVEs: `13` -- [CVE-2024-10026](CVE-2024/CVE-2024-100xx/CVE-2024-10026.json) (`2025-01-30T20:15:32.600`) -- [CVE-2024-10603](CVE-2024/CVE-2024-106xx/CVE-2024-10603.json) (`2025-01-30T20:15:32.803`) -- [CVE-2024-10604](CVE-2024/CVE-2024-106xx/CVE-2024-10604.json) (`2025-01-30T20:15:33.003`) -- [CVE-2024-12248](CVE-2024/CVE-2024-122xx/CVE-2024-12248.json) (`2025-01-30T19:15:13.390`) -- [CVE-2024-44142](CVE-2024/CVE-2024-441xx/CVE-2024-44142.json) (`2025-01-30T19:15:13.910`) -- [CVE-2025-0142](CVE-2025/CVE-2025-01xx/CVE-2025-0142.json) (`2025-01-30T20:15:33.853`) -- [CVE-2025-0143](CVE-2025/CVE-2025-01xx/CVE-2025-0143.json) (`2025-01-30T20:15:34.050`) -- [CVE-2025-0144](CVE-2025/CVE-2025-01xx/CVE-2025-0144.json) (`2025-01-30T20:15:34.210`) -- [CVE-2025-0145](CVE-2025/CVE-2025-01xx/CVE-2025-0145.json) (`2025-01-30T20:15:34.547`) -- [CVE-2025-0146](CVE-2025/CVE-2025-01xx/CVE-2025-0146.json) (`2025-01-30T20:15:34.907`) -- [CVE-2025-0147](CVE-2025/CVE-2025-01xx/CVE-2025-0147.json) (`2025-01-30T20:15:35.253`) -- [CVE-2025-0626](CVE-2025/CVE-2025-06xx/CVE-2025-0626.json) (`2025-01-30T19:15:14.010`) -- [CVE-2025-0680](CVE-2025/CVE-2025-06xx/CVE-2025-0680.json) (`2025-01-30T19:15:14.147`) -- [CVE-2025-0681](CVE-2025/CVE-2025-06xx/CVE-2025-0681.json) (`2025-01-30T19:15:14.300`) -- [CVE-2025-0683](CVE-2025/CVE-2025-06xx/CVE-2025-0683.json) (`2025-01-30T19:15:14.460`) -- [CVE-2025-24500](CVE-2025/CVE-2025-245xx/CVE-2025-24500.json) (`2025-01-30T19:15:14.600`) -- [CVE-2025-24501](CVE-2025/CVE-2025-245xx/CVE-2025-24501.json) (`2025-01-30T19:15:14.723`) -- [CVE-2025-24502](CVE-2025/CVE-2025-245xx/CVE-2025-24502.json) (`2025-01-30T19:15:14.863`) -- [CVE-2025-24503](CVE-2025/CVE-2025-245xx/CVE-2025-24503.json) (`2025-01-30T19:15:16.453`) -- [CVE-2025-24504](CVE-2025/CVE-2025-245xx/CVE-2025-24504.json) (`2025-01-30T19:15:16.967`) -- [CVE-2025-24505](CVE-2025/CVE-2025-245xx/CVE-2025-24505.json) (`2025-01-30T19:15:17.210`) -- [CVE-2025-24506](CVE-2025/CVE-2025-245xx/CVE-2025-24506.json) (`2025-01-30T19:15:17.590`) -- [CVE-2025-24507](CVE-2025/CVE-2025-245xx/CVE-2025-24507.json) (`2025-01-30T19:15:17.920`) -- [CVE-2025-24802](CVE-2025/CVE-2025-248xx/CVE-2025-24802.json) (`2025-01-30T20:15:51.010`) +- [CVE-2024-11609](CVE-2024/CVE-2024-116xx/CVE-2024-11609.json) (`2025-01-30T21:15:13.163`) +- [CVE-2024-11610](CVE-2024/CVE-2024-116xx/CVE-2024-11610.json) (`2025-01-30T21:15:13.303`) +- [CVE-2024-11611](CVE-2024/CVE-2024-116xx/CVE-2024-11611.json) (`2025-01-30T21:15:13.450`) +- [CVE-2025-0568](CVE-2025/CVE-2025-05xx/CVE-2025-0568.json) (`2025-01-30T21:15:13.587`) +- [CVE-2025-0569](CVE-2025/CVE-2025-05xx/CVE-2025-0569.json) (`2025-01-30T21:15:13.710`) +- [CVE-2025-0570](CVE-2025/CVE-2025-05xx/CVE-2025-0570.json) (`2025-01-30T21:15:13.830`) +- [CVE-2025-0571](CVE-2025/CVE-2025-05xx/CVE-2025-0571.json) (`2025-01-30T21:15:13.960`) +- [CVE-2025-0572](CVE-2025/CVE-2025-05xx/CVE-2025-0572.json) (`2025-01-30T21:15:14.093`) +- [CVE-2025-0573](CVE-2025/CVE-2025-05xx/CVE-2025-0573.json) (`2025-01-30T21:15:14.227`) +- [CVE-2025-0574](CVE-2025/CVE-2025-05xx/CVE-2025-0574.json) (`2025-01-30T21:15:14.357`) +- [CVE-2025-0880](CVE-2025/CVE-2025-08xx/CVE-2025-0880.json) (`2025-01-30T21:15:14.487`) +- [CVE-2025-0881](CVE-2025/CVE-2025-08xx/CVE-2025-0881.json) (`2025-01-30T21:15:14.650`) +- [CVE-2025-0882](CVE-2025/CVE-2025-08xx/CVE-2025-0882.json) (`2025-01-30T21:15:14.820`) ### CVEs modified in the last Commit -Recently modified CVEs: `13` +Recently modified CVEs: `31` -- [CVE-2023-1526](CVE-2023/CVE-2023-15xx/CVE-2023-1526.json) (`2025-01-30T20:15:30.230`) -- [CVE-2023-27972](CVE-2023/CVE-2023-279xx/CVE-2023-27972.json) (`2025-01-30T20:15:31.307`) -- [CVE-2023-27973](CVE-2023/CVE-2023-279xx/CVE-2023-27973.json) (`2025-01-30T19:15:09.283`) -- [CVE-2023-29639](CVE-2023/CVE-2023-296xx/CVE-2023-29639.json) (`2025-01-30T19:15:11.527`) -- [CVE-2023-29641](CVE-2023/CVE-2023-296xx/CVE-2023-29641.json) (`2025-01-30T19:15:12.073`) -- [CVE-2023-29643](CVE-2023/CVE-2023-296xx/CVE-2023-29643.json) (`2025-01-30T19:15:12.503`) -- [CVE-2023-29680](CVE-2023/CVE-2023-296xx/CVE-2023-29680.json) (`2025-01-30T19:15:12.690`) -- [CVE-2023-29681](CVE-2023/CVE-2023-296xx/CVE-2023-29681.json) (`2025-01-30T19:15:12.900`) -- [CVE-2023-30123](CVE-2023/CVE-2023-301xx/CVE-2023-30123.json) (`2025-01-30T20:15:31.857`) -- [CVE-2023-31486](CVE-2023/CVE-2023-314xx/CVE-2023-31486.json) (`2025-01-30T20:15:32.297`) -- [CVE-2024-35633](CVE-2024/CVE-2024-356xx/CVE-2024-35633.json) (`2025-01-30T19:52:10.193`) -- [CVE-2024-4697](CVE-2024/CVE-2024-46xx/CVE-2024-4697.json) (`2025-01-30T19:43:10.207`) -- [CVE-2025-24113](CVE-2025/CVE-2025-241xx/CVE-2025-24113.json) (`2025-01-30T19:10:53.077`) +- [CVE-2023-29815](CVE-2023/CVE-2023-298xx/CVE-2023-29815.json) (`2025-01-30T21:15:10.877`) +- [CVE-2023-30204](CVE-2023/CVE-2023-302xx/CVE-2023-30204.json) (`2025-01-30T21:15:11.507`) +- [CVE-2023-30205](CVE-2023/CVE-2023-302xx/CVE-2023-30205.json) (`2025-01-30T21:15:11.693`) +- [CVE-2023-30300](CVE-2023/CVE-2023-303xx/CVE-2023-30300.json) (`2025-01-30T21:15:11.870`) +- [CVE-2023-30405](CVE-2023/CVE-2023-304xx/CVE-2023-30405.json) (`2025-01-30T21:15:12.067`) +- [CVE-2023-30454](CVE-2023/CVE-2023-304xx/CVE-2023-30454.json) (`2025-01-30T21:15:12.300`) +- [CVE-2023-30455](CVE-2023/CVE-2023-304xx/CVE-2023-30455.json) (`2025-01-30T21:15:12.490`) +- [CVE-2023-31290](CVE-2023/CVE-2023-312xx/CVE-2023-31290.json) (`2025-01-30T21:15:12.700`) +- [CVE-2024-12085](CVE-2024/CVE-2024-120xx/CVE-2024-12085.json) (`2025-01-30T22:15:08.410`) +- [CVE-2024-13269](CVE-2024/CVE-2024-132xx/CVE-2024-13269.json) (`2025-01-30T22:15:08.550`) +- [CVE-2024-13308](CVE-2024/CVE-2024-133xx/CVE-2024-13308.json) (`2025-01-30T22:15:08.723`) +- [CVE-2024-13309](CVE-2024/CVE-2024-133xx/CVE-2024-13309.json) (`2025-01-30T22:15:08.880`) +- [CVE-2024-1488](CVE-2024/CVE-2024-14xx/CVE-2024-1488.json) (`2025-01-30T22:15:09.037`) +- [CVE-2024-54156](CVE-2024/CVE-2024-541xx/CVE-2024-54156.json) (`2025-01-30T21:46:25.813`) +- [CVE-2024-54157](CVE-2024/CVE-2024-541xx/CVE-2024-54157.json) (`2025-01-30T21:47:10.683`) +- [CVE-2024-54158](CVE-2024/CVE-2024-541xx/CVE-2024-54158.json) (`2025-01-30T21:50:32.770`) +- [CVE-2024-57276](CVE-2024/CVE-2024-572xx/CVE-2024-57276.json) (`2025-01-30T22:15:09.297`) +- [CVE-2025-0241](CVE-2025/CVE-2025-02xx/CVE-2025-0241.json) (`2025-01-30T22:15:09.700`) +- [CVE-2025-24099](CVE-2025/CVE-2025-240xx/CVE-2025-24099.json) (`2025-01-30T22:15:10.160`) +- [CVE-2025-24456](CVE-2025/CVE-2025-244xx/CVE-2025-24456.json) (`2025-01-30T21:28:52.003`) +- [CVE-2025-24457](CVE-2025/CVE-2025-244xx/CVE-2025-24457.json) (`2025-01-30T21:31:24.150`) +- [CVE-2025-24458](CVE-2025/CVE-2025-244xx/CVE-2025-24458.json) (`2025-01-30T21:35:05.127`) +- [CVE-2025-24459](CVE-2025/CVE-2025-244xx/CVE-2025-24459.json) (`2025-01-30T21:22:22.917`) +- [CVE-2025-24460](CVE-2025/CVE-2025-244xx/CVE-2025-24460.json) (`2025-01-30T21:25:18.337`) +- [CVE-2025-24461](CVE-2025/CVE-2025-244xx/CVE-2025-24461.json) (`2025-01-30T21:26:17.583`) ## Download and Usage diff --git a/_state.csv b/_state.csv index c27b3a7c824..081a33abad2 100644 --- a/_state.csv +++ b/_state.csv @@ -207471,7 +207471,7 @@ CVE-2022-41397,0,0,e550e999db9fb97f17a47593dc51cf6c030770f72f449972298740d3093e2 CVE-2022-41398,0,0,c17218acd420ff655b26811137f78a5661b0edf354c55ad9ff3d225542cc956e,2024-11-21T07:23:09.297000 CVE-2022-41399,0,0,fcc852656cb71fcabc26dc07cae79fcdb4063aa98e94541d9d75741dded7cecf,2024-11-21T07:23:09.440000 CVE-2022-4140,0,0,7e63f4a6ccaabd415fca8d4da1a93c4238ce031863fb255cdc6459952944a879,2024-11-21T07:34:39.223000 -CVE-2022-41400,0,0,e66ae562bf6f123d22a26c5862571d1ba6606e3e2d4692e9c9e43aca10aacfc8,2024-11-21T07:23:09.593000 +CVE-2022-41400,0,1,b470023b601676d4a30a303d35e0a2b5766f41b951dc4f2c3a182bc32261e6f1,2025-01-30T21:15:09.157000 CVE-2022-41401,0,0,f6dc1a80aa2c4c3b1e1657937140fae471690a1cc072966b25f9a2e8573d6694,2024-11-21T07:23:09.723000 CVE-2022-41403,0,0,0086c7298073cbccbda5a8f09c32b1d1dbb0d6d1030e2855337110eb05e244d0,2024-11-21T07:23:09.880000 CVE-2022-41404,0,0,a5cb6dc1041f1669e9e1adb6dd7a90b0e9e235a9fc2ddaa84ffd2c30379279a5,2024-11-21T07:23:10.010000 @@ -214619,7 +214619,7 @@ CVE-2023-1522,0,0,070dcf9d4bee913fff5d64a61e497177354768261de777323e89038b498e33 CVE-2023-1523,0,0,e33d8037be249eb9c37a3baeaa357b5ce6cf643d512a05007dcdf784033b647c,2024-11-21T07:39:21.537000 CVE-2023-1524,0,0,f8b678f6be7ad1e8e7316c0ff029f2f0b1c061101505f9c1a3fb4ce2fdbd092d,2025-01-10T21:15:10.800000 CVE-2023-1525,0,0,87c70f3d61d61d75374dcd01bd6c995692b55b602d7e76a135e18fad1943c07f,2025-01-30T15:15:12.910000 -CVE-2023-1526,0,1,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000 +CVE-2023-1526,0,0,96b8bf57979dbc863563294472f67f71b675e2ae3fec7e648b659714a8a27702,2025-01-30T20:15:30.230000 CVE-2023-1527,0,0,df9e594ef91e55df45549cbbbe7ee59c84351454cd8897cabe1194089effbb36,2024-11-21T07:39:22.037000 CVE-2023-1528,0,0,16b4cebb9dd63d94e0854c1038605ed283b1f79a7036d21e1aa4daaf763ab7c6,2024-11-21T07:39:22.163000 CVE-2023-1529,0,0,2487285e765808b0f7ba1f72e36427b931583b7d2d6f3e08e8c267fcf3f4be2a,2024-11-21T07:39:22.407000 @@ -218701,7 +218701,7 @@ CVE-2023-24256,0,0,ab94b83dee58fd204888899d968128cc2e8cfb1fe9d90e9913108287ee7d6 CVE-2023-24258,0,0,c560e94249e7effb2fba83ba9a90735af30e031ae8bca37a27f2e5c6457522ef,2024-11-21T07:47:38.410000 CVE-2023-2426,0,0,ef02528cf3f86e2dade0f21ec20e5bc5ef91f7d9f0dafb0b0a6d4993b908e464,2024-11-21T07:58:35.860000 CVE-2023-24261,0,0,1df1249714b381fb797a02b61181770e71af0c6f3534b72a552b166bc02cf9fa,2024-12-06T20:15:20.260000 -CVE-2023-24269,0,0,f48af64cfd982b88f7a378571f946d21d8722e142349c9b7ae16fcb1b805aa2e,2024-11-21T07:47:38.710000 +CVE-2023-24269,0,1,cad8a6e2e2ae03275129640ff93a4a599628066511c1c528afaca1d9bef90fe9,2025-01-30T21:15:09.913000 CVE-2023-2427,0,0,cc7634109d3dc8efda5374a98b8468e9436866ef3fb52d0740fea4b0f208142c,2024-11-21T07:58:35.980000 CVE-2023-24276,0,0,67044dbae195360ca724641eac5e1a7bea343e1ce78ece2a40996fd1418543cb,2024-11-21T07:47:38.850000 CVE-2023-24278,0,0,ea2aba4c7ef6892eaabe0ca8ca8a379b85908d877edfb3c6028c5a568eb0a3f0,2024-11-21T07:47:38.993000 @@ -221660,9 +221660,9 @@ CVE-2023-27968,0,0,d4ae6b7569d5b9f939ef1dc58eac523afec32ff9892f263680ad6667e5edd CVE-2023-27969,0,0,b14fe3920ce4e5145aeb4a2fd9b653cb023aca86c3063a47505324ad70d2a67f,2025-01-29T16:15:40.977000 CVE-2023-2797,0,0,fb89d0dd696fa3fd3bf50998e2011f08d07f94aacecb091584283fafb9123a12,2024-11-21T07:59:18.557000 CVE-2023-27970,0,0,7f6a3a9f3ad0761499e2da341caa65ba339cee5161ff202ac656ff31b834ed66,2025-01-29T16:15:41.147000 -CVE-2023-27971,0,0,697871038e9f195dda48b8c3a640aa8bbf063c21a5ff59442a2ac68d2ea6c782,2024-11-21T07:53:50.490000 -CVE-2023-27972,0,1,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000 -CVE-2023-27973,0,1,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000 +CVE-2023-27971,0,1,f3547f8f1fc06fdd31c84236d22098a7b906bb7ffd0e1b4e6ad04ca2e328e5d7,2025-01-30T21:15:10.260000 +CVE-2023-27972,0,0,7ab67790d615e4c8b945a6af12e8e64fd25bf0b85ec30b3b9d0757f78917e73f,2025-01-30T20:15:31.307000 +CVE-2023-27973,0,0,b8493437848190632d4b12d9f6e464f837fffb2c5d6bf69bd85e93768a5a9d6d,2025-01-30T19:15:09.283000 CVE-2023-27974,0,0,3ad1eff0022adec35468a53c0c2dda6cdf1c1306b3acd8c5eb169ac126c3b376,2024-11-21T07:53:50.983000 CVE-2023-27975,0,0,cad6a6a46caf1f602a761162c88f04c91eb374d47dcef656f5e96ae11a1132f6,2024-12-11T19:33:27.327000 CVE-2023-27976,0,0,c9e7b6414182280b5321204dda9a565d1b11b5480c1526060214744a17382832,2024-11-21T07:53:51.340000 @@ -222504,7 +222504,7 @@ CVE-2023-28818,0,0,79d36f0c7cbe3e9da98253142830e529bc5af2bf12294a4aeadb32b61c200 CVE-2023-28819,0,0,bf58c4e71ab50881bb2ffbc84d1c7fa3a8784d89494821093a5ed0aaa8ee47b9,2024-11-21T07:56:04.597000 CVE-2023-2882,0,0,547a60c36b1f71c0384a0e2edbdc3677ea8064a56e3eb94f89b4b3f016b80700,2024-11-21T07:59:29.350000 CVE-2023-28820,0,0,e10d4a00308ba1ab34db498a843935a90acbe0ade20fa15055d9a0ff7f590453,2024-11-21T07:56:04.757000 -CVE-2023-28821,0,0,3b23d992637d21ecb74fbbedbe80ce17d8ac3cda960cc9ac7ffb7824e8f934ee,2024-11-21T07:56:04.903000 +CVE-2023-28821,0,1,afa76c8a009539aae0198682bc90e862e42f3a76d4259436095052fa1a40e0cc,2025-01-30T21:15:10.470000 CVE-2023-28823,0,0,b38855621f61c058dba0e2d9c38b33206b84c1d843699145c318ad3909e98d3c,2024-11-21T07:56:05.053000 CVE-2023-28824,0,0,8caf82701251f8229a6994b01253e38294b5b02a55174bcabc24c5ed5118a657,2025-01-09T20:15:32.740000 CVE-2023-28826,0,0,a9e9528aa9c3972fd09362058c3be3f967ed732ddc79dfa5a2473b385e1b19c1,2024-12-20T17:09:10.193000 @@ -222564,7 +222564,7 @@ CVE-2023-28876,0,0,c1806b7567a07b6cd5bad89db8f8e663f0abfbc4dc05ab4f0a81a9cd8dd1c CVE-2023-28877,0,0,627be02d2c5299af68f11f8c96f6b7aada4171df85e2baa2b1f21f3a8ad679d4,2024-11-21T07:56:12.927000 CVE-2023-28879,0,0,60cfcaff1525c3d961f9d460730fe7f9b4cdfbbd84fe1d0f2487d7d6fb6987b6,2024-11-21T07:56:13.057000 CVE-2023-2888,0,0,733c180cbb32ecf6bf022f0642b31e69e75e65e424d1dfab8b5653572373f8cd,2024-11-21T07:59:30.160000 -CVE-2023-28882,0,0,c5bdbfa5e7447d196129d5a1545ef5d61fea128b86b10c66c438ea6977ab503d,2024-11-21T07:56:13.220000 +CVE-2023-28882,0,1,bc3618c2bba907bca3f9aa9f8805ff257885286929515e723c141b37d4fc5cf0,2025-01-30T21:15:10.640000 CVE-2023-28883,0,0,13fb4d539b10aabd1da3181f43ed36ef1e089eb05afaff3d3ea2e3bab420b8e6,2024-11-21T07:56:13.360000 CVE-2023-28884,0,0,4f01d869cc02df48ff436a2fda2a2686d4bd4e20ae90aed5def51856ad72acc5,2024-11-21T07:56:13.503000 CVE-2023-28885,0,0,1bfa45a7cd263e2b756f199a2cb3130bf8cccc6aef28faf9f20192196ba060d3,2024-11-21T07:56:13.647000 @@ -222881,7 +222881,7 @@ CVE-2023-2926,0,0,e170779cbdb918f6b82fda64b55ac82af1d75547be3a52cc9653ae8c1e1011 CVE-2023-29260,0,0,5408599e6cd86b2024a7083620ca9e1157b82ab64940c6b91e6344545ff43157,2024-11-21T07:56:46.190000 CVE-2023-29261,0,0,000cb61df9c131f78dc46594dae178995161d7f97bedafeb6092b59e914e453a,2024-11-21T07:56:46.300000 CVE-2023-29267,0,0,f1d5e4709b78cdc02762d88ffdde6af1b8b3c8f402c90acb9448493f3d4a9426,2024-11-21T07:56:46.417000 -CVE-2023-29268,0,0,1fefceb330f7b63e4a39a102ebde4873626aa6b341fa88e9a8393e3f0ed1912f,2024-11-21T07:56:46.553000 +CVE-2023-29268,0,1,a7d326511142a04650060778e408b03f298f713386898c6fb0b233b9b2dafebf,2025-01-30T22:15:07.977000 CVE-2023-2927,0,0,f90bf785db0896781f165401b7930a7505d713ae2a675c0fc18800b00f36de39,2024-11-21T07:59:34.940000 CVE-2023-29273,0,0,3500ec904dda178d9f2b96c75ba1aa9e15356cce2d5939ccbde1d811b000d8b0,2024-11-21T07:56:46.677000 CVE-2023-29274,0,0,674c4f2006d12755378e1ad4454840e82cbf88b3d7ac122ced0d5e22dc37afad,2024-11-21T07:56:46.780000 @@ -223203,18 +223203,18 @@ CVE-2023-29635,0,0,7b7e122f0d8c9b413f472665250e3516b44a5ecfd295ecf840be5aaed663e CVE-2023-29636,0,0,4b9a9a6e898f80609b34c7e02aaa5b4343653cad5f96db32b805d904ca44b12f,2025-01-30T17:15:14.333000 CVE-2023-29637,0,0,c1e444d3c369fd37ce81c4fe1917992d80cada9fcd11c4f6d20198373be12d0c,2025-01-30T17:15:14.483000 CVE-2023-29638,0,0,e50ce1c402f4f8b6e90b82f00d1b01d2f40bb391b5df29154b81d06ca1e488d3,2025-01-30T17:15:14.640000 -CVE-2023-29639,0,1,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000 +CVE-2023-29639,0,0,23dc52eb44854aa5ff0c590d1d07f20c87e31b185260618e19170ae79ed5ccf3,2025-01-30T19:15:11.527000 CVE-2023-2964,0,0,1d3278bf302564765627761894f402290b8c52e46be3d5e4f4bb1deddc4a2b2f,2024-11-21T07:59:39.620000 -CVE-2023-29641,0,1,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000 -CVE-2023-29643,0,1,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000 +CVE-2023-29641,0,0,a6a072ff9104e0b27a3d1b50525dfba2aecbe9fae2c0a14df6068163f9557db4,2025-01-30T19:15:12.073000 +CVE-2023-29643,0,0,8cab4df3005126ac1023ad61113e5caf336627d9fc525087584bb7391abbf578,2025-01-30T19:15:12.503000 CVE-2023-29656,0,0,a190f968c9b1e7640b2ec05941bfad4eda34e6985b30539e83a1f8e9649a3b3b,2024-11-21T07:57:22.500000 CVE-2023-29657,0,0,aa8f581305ab53803794f1539ce0a704fb05194c2ac57e21afcf877a051f25e0,2025-01-24T20:15:29.760000 CVE-2023-29659,0,0,132ae2d10add93c7773c8520ebaa4453b39811fd3670fff631ea0b0365f174c7,2025-01-29T20:15:31.107000 CVE-2023-29665,0,0,dc5bcda9680e3e806a58c210d638989728a9beeb191b9384e06e9fdf34c58cb4,2024-11-21T07:57:22.933000 CVE-2023-2967,0,0,68b3934288b12b39ac75de572ea12e8a00d7bce5b33663c2007fc9474a10f59f,2024-11-21T07:59:39.733000 CVE-2023-2968,0,0,a3845e13a87af48a0e68b2259b826b32bb5677da3feff4e6d7abb46b7f02345a,2024-11-21T07:59:39.843000 -CVE-2023-29680,0,1,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000 -CVE-2023-29681,0,1,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000 +CVE-2023-29680,0,0,2d798067b093f5651bf6d94d903f17f76bb8195866a4e67223d7d18f32cc04c7,2025-01-30T19:15:12.690000 +CVE-2023-29681,0,0,dfc9f188a3452f4abeaff8d760933a4e34a3d929f9c867c08e0462693d2cf08f,2025-01-30T19:15:12.900000 CVE-2023-29689,0,0,962e47d4421172abd4f6a1330537e1d28be98a1502580c517300e3c2b2ee7d61,2024-11-21T07:57:23.383000 CVE-2023-29693,0,0,709f39f2818705690323691653131c15063e3d7ec3771ad2324a6717c9d9590f,2025-01-29T19:15:16.267000 CVE-2023-29696,0,0,eca44308ce4c869f65e5e1aa1a665534ee73c24004fe10991f0dfa64898fe4e0,2025-01-29T19:15:16.473000 @@ -223293,7 +223293,7 @@ CVE-2023-29805,0,0,eab8f6c7a340db7effd1da4e68fd842071ac192aa93dc09c9185af7e7d598 CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000 CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000 CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000 -CVE-2023-29815,0,0,b2eae5a9d28b68d854f53e61f1466bb75eb7be05b1159364fb38e6c41e10819f,2024-11-21T07:57:32.690000 +CVE-2023-29815,0,1,54dad311a1ec1a264294e3060385a6f5077ffc3a2954ca147f88d5436f80b641,2025-01-30T21:15:10.877000 CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000 CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000 CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000 @@ -223434,7 +223434,7 @@ CVE-2023-30111,0,0,ae639ee4dbb45cc529dd569295ef6283beb3098da5dab82c355bdd3331498 CVE-2023-30112,0,0,eb88d49610e14bb452be0cdc8abb09b062387d49578867ecc9f658123761c3a4,2024-11-21T07:59:48.637000 CVE-2023-3012,0,0,9b668710106159ca738a322b3cf3ca60bc39f1660572ac1a75fa4a3a7a6c2b75,2024-11-21T08:16:14.317000 CVE-2023-30122,0,0,cf1197ad825b0483d6b8203bdfaf9c646b0bc2395f7c3bbd304572d272957e5e,2025-01-29T17:15:24.350000 -CVE-2023-30123,0,1,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000 +CVE-2023-30123,0,0,74eca865bc948a86533b39002f306fafcb68a7a5107a6ae9888812e82a125bdf,2025-01-30T20:15:31.857000 CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000 CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000 CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000 @@ -223477,8 +223477,8 @@ CVE-2023-30199,0,0,f29f761dc02750e028aca8343aa3ac92342336f18e6c3f4c4724ff2bb8be3 CVE-2023-3020,0,0,dc6b0a3b052e0c37cf22c64ca8f4745b185c0203822cf010875cad2a22a94e3a,2024-11-21T08:16:15.523000 CVE-2023-30200,0,0,fb6b9c5a436448ae06419b546257db7987ffc421ea2ea2af3fac0b985d318608,2024-11-21T07:59:53.940000 CVE-2023-30203,0,0,db5e5cb3e727c16ca621fa367686a24b4a325fdb3b5ae291e095fa72773bca43,2025-01-29T21:15:19.083000 -CVE-2023-30204,0,0,84b81496405155a1e4b270d2b3945fb8f6cff24839d57d0372100bc234eda985,2024-11-21T07:59:54.240000 -CVE-2023-30205,0,0,94411d8885974287d109e5df893a6ff626175a36b0253832b634b59018d3dbe4,2024-11-21T07:59:54.377000 +CVE-2023-30204,0,1,d5ffcadcb8d15bfedbfb38f6fe262b7f90dac86d61a95305b0ddef65b3dbaa6f,2025-01-30T21:15:11.507000 +CVE-2023-30205,0,1,614d6f5b15d2f822c49fe7e35216e74c845bf51fc1f6080fd96b781b69d54905,2025-01-30T21:15:11.693000 CVE-2023-30207,0,0,e4e400d118227bc9bcc50b0f0195a26f7b5f119c4fb0fa579c8b46c178e9bc74,2024-11-21T07:59:54.520000 CVE-2023-3021,0,0,39083733feaf1ca9158e423c2c5c309ee67b60700ade907df5cb34181f493ad9,2024-11-21T08:16:15.660000 CVE-2023-30210,0,0,6c1b077c53cde49a468f6661ba3c7e006d0afd4e39b08c3e1f95f6a495153e87,2024-11-21T07:59:54.673000 @@ -223521,7 +223521,7 @@ CVE-2023-30282,0,0,6199bbb0fff6b877509d0886de3b68999859c9b5ce34636b44c7531255493 CVE-2023-30285,0,0,b017c76829843f812705e981d9e63efeb2edeb15c827ffda1a53fea998af3178,2025-01-10T17:15:11.410000 CVE-2023-3029,0,0,58c4f4735b5d302f2156f5d47abc0e2a3b0bad61864afaca5f7bb668ac9ae636,2024-11-21T08:16:16.747000 CVE-2023-30297,0,0,80d95eb10669043c6c7c71c4ea5a34d6ceb46a1b738615f09e959374780bd9ac,2024-11-21T07:59:59.137000 -CVE-2023-30300,0,0,e890e3ff6b42d2de8311bc8ad45d62bfa494e2f3577279edea119d2328c81f79,2024-11-21T07:59:59.290000 +CVE-2023-30300,0,1,384b34c8970c8d94d27211f584968a001e6158aadffb2a719513f04e0e593772,2025-01-30T21:15:11.870000 CVE-2023-30305,0,0,efcc6031cb842cec6a10873af5c5020bf7f98f4c36b8622da4831b343c2d0a30,2024-11-21T07:59:59.433000 CVE-2023-30306,0,0,c8f0f46b8ba8922a429dbfec91e18ff3a0965912d67d9956ce6e7220f019c740,2024-11-22T22:15:06.373000 CVE-2023-30307,0,0,087e9eab98b87d158cd636389adf77b228cd5ed4727022dd198802074c4f4fe8,2024-11-21T07:59:59.780000 @@ -223584,7 +223584,7 @@ CVE-2023-30400,0,0,12950301b15d2ff0df9404bed25a6b84a57d9a17ff834ac2eba356cba5785 CVE-2023-30402,0,0,efa5059955c4d7e3b68dacb1538cae5e0c524acca0015b8971b4926f93dbd6aa,2024-11-21T08:00:07.747000 CVE-2023-30403,0,0,6646a770c6966c90e080a74c4537c3ee2429ae4a97d239a9f77e37d12b09fa48,2025-01-30T17:15:16.387000 CVE-2023-30404,0,0,87b22d02f8d2dc3fb5adecb232d7bdadb45a7cec15c53d553846e4223dd2f9c5,2024-11-21T08:00:08.073000 -CVE-2023-30405,0,0,d308e1f015f226b1b626f7ff94eb00262640e4a5bad27494fff1cd9fe9039a81,2024-11-21T08:00:08.217000 +CVE-2023-30405,0,1,f7e4fa427c57bcf1c9c6861612ffcad1ae14994e8d0a25ac5c7acb06b73af467,2025-01-30T21:15:12.067000 CVE-2023-30406,0,0,fa9afd5bd076e3e8831acab2919a774ba44387bc923f37b2837294e8b8e09705,2024-11-21T08:00:08.373000 CVE-2023-30408,0,0,9c809e244a2ceda8f32503a1ce049bf7b134ed789f943a21ba335089c084de1f,2024-11-21T08:00:08.533000 CVE-2023-3041,0,0,5d9735759b6eb180a5aec85a6a9af513a610cae56f1554b261f6c6d4655aa049,2024-11-21T08:16:18.350000 @@ -223620,8 +223620,8 @@ CVE-2023-30450,0,0,e8abf2288be578f9aba31e86a7a71291da0ebac6855ef6c8dd30603a62411 CVE-2023-30451,0,0,8e73bc937560e2499ae7dd02dd63adee96d9b76893fb220c5930fcd72c859320,2024-11-21T08:00:12.673000 CVE-2023-30452,0,0,7cc813c03671747dfd20433bfdf987765f42d3d9636d86717f2f69bbf4b598eb,2025-01-23T16:15:28.487000 CVE-2023-30453,0,0,926bc7eb7d121418cfa67de0f19eae48d919bef0dc4029cb8db196fab44a2a95,2024-12-12T18:15:22.400000 -CVE-2023-30454,0,0,c6fadb94020df9aaf92dc893b8ce24b95889eb58aec92ff2ca0bcf4372297d2d,2024-11-21T08:00:13.123000 -CVE-2023-30455,0,0,67590854388925a6ee11408360c4660ec765b5d5fb3440442ef818dd0e0bb85d,2024-11-21T08:00:13.273000 +CVE-2023-30454,0,1,3fafbb3121fab4c133d0302016abe464ea1509fe7e4e59f512a22beb3dc1babd,2025-01-30T21:15:12.300000 +CVE-2023-30455,0,1,bb2ed26b995f4c7e22c1b6b92d8ddb92da99a13a854f4762cea43640b004fd91,2025-01-30T21:15:12.490000 CVE-2023-30456,0,0,582cc4837cac9e0c6425d36b5ca7cd4153d16811065c143c0f6c163ba2a87cb4,2024-11-21T08:00:13.423000 CVE-2023-30458,0,0,09555f36350c1c2d55bf95b2d5ae168b57fbc294feac451796d2b438bf429edb,2024-11-21T08:00:13.580000 CVE-2023-30459,0,0,1594b6a4d64fc4adace8fc7d42491da96f1bfb63eab0e0f9cc596f98b0207729,2024-11-21T08:00:13.730000 @@ -224375,7 +224375,7 @@ CVE-2023-31286,0,0,78567364971f63d5dc94c49ad0a4cb4faacaab1686439f1a823e21f28b851 CVE-2023-31287,0,0,3a03f62439a882d85b9a72ca261c059079bfd17741e815c49d4465abc1960857,2024-11-21T08:01:43.890000 CVE-2023-31289,0,0,b5289b010564c962b69e25a674ef9122b77cd431f84040e8589168ff372131e4,2024-11-21T08:01:44.020000 CVE-2023-3129,0,0,d664dde9f63c31c193279cc3e3c97a69882c532883740cc20c888b8e54853ef5,2024-11-21T08:16:31.393000 -CVE-2023-31290,0,0,cffcf74ec2fdf8c5b7fa9cc68f3500d69bea2adaf30ff3e096343990ee34cd3d,2024-11-21T08:01:44.153000 +CVE-2023-31290,0,1,54d0c58d31ebc2dfa3a1bae530350c0c41097e12539308fff3fde2e94b846481,2025-01-30T21:15:12.700000 CVE-2023-31292,0,0,1d2a6f0e823d77efda2534865fa074b4a97ddd71fe364113839cf71749e04d69,2024-11-21T08:01:44.307000 CVE-2023-31293,0,0,069c09646788d69fb7802dd78607017cdd7ec1d48e58ef379945478c23567200,2024-11-21T08:01:44.443000 CVE-2023-31294,0,0,6ba11e240ce7af8f8728e2ecc2c891acf96c500b00abbf0921cb215dfb990c90,2024-11-21T08:01:44.580000 @@ -224492,7 +224492,7 @@ CVE-2023-3148,0,0,9236ef71fc0458d505ab03b01d49be5b44ba8909a5ef5119004368313b8abe CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000 CVE-2023-31484,0,0,ac8044426721e93fc87d0e5d5467129d6b0022bd19bc1007e3e36549118fd8cb,2024-11-21T08:01:57.707000 CVE-2023-31485,0,0,d8b205f112088ed074b7d15996adcda6d085f8c031d20bf59e2e472a4c3a13c5,2024-11-21T08:01:57.940000 -CVE-2023-31486,0,1,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000 +CVE-2023-31486,0,0,d38250d2e093246198acd1201cbdb68b6bc49fb9b9e38744443377ce9de99ea6,2025-01-30T20:15:32.297000 CVE-2023-31488,0,0,94d2bf236ac6daa5715166465e0b7e10e06d184e0318c00b1cd3ef51756b85dd,2024-11-21T08:01:58.237000 CVE-2023-31489,0,0,bc328c2d0f93306e05e68d84815df5005bf7c9ceb3dd7621b7d0866ee9a28b65,2024-11-21T08:01:58.453000 CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549d2,2024-11-21T08:16:34.067000 @@ -243388,7 +243388,7 @@ CVE-2024-10022,0,0,ab83f849a016205a813821491cb51c85544a67e413305379de2e1bfd4a31c CVE-2024-10023,0,0,5b8d8edf9a844b7972623fe44d4aea076d5b42f40a729205390dae97ed207470,2024-10-21T13:14:37.300000 CVE-2024-10024,0,0,a2e50c196836e2a02faf1b4faaee4d9b40ca67c3c882116658a7e4828f4ee1ee,2024-10-21T13:15:01.730000 CVE-2024-10025,0,0,0e159e5b7f83ed3baac904fb63455340f13a4d77960b5067cf099ced0b349ce8,2024-10-18T12:52:33.507000 -CVE-2024-10026,1,1,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000 +CVE-2024-10026,0,0,1a54ab890af9dabc952d7d70dc78582b3aece933a18765ad9ec3bd4da0cf381e,2025-01-30T20:15:32.600000 CVE-2024-10027,0,0,2ce81bd167c32a3d01aeb267dfbd0bca6e3b397ce9c6e6baa5c31b253cd0d4b2,2024-11-08T19:01:03.880000 CVE-2024-10028,0,0,0796fbf5be7450f26989dd3e322b5d85f94909c55543905274765b89027cb4f3,2024-11-08T21:21:47.240000 CVE-2024-1003,0,0,86ca1680684d7f5c1f1b25eaafdbb92bc310c2a58aa6e811c7dcd01deebd374b,2024-11-21T08:49:34.143000 @@ -243879,8 +243879,8 @@ CVE-2024-1060,0,0,30e8ae85c484341766ca7dee2c575cc98f2671a1165107d5d27a56d9672b13 CVE-2024-10600,0,0,1588f7b76a375177b6b8778e578d8222171a047be7e445b41697af92165f60b0,2024-11-04T19:45:26.723000 CVE-2024-10601,0,0,2969748da0f7cf7d0d9603a0488fb632296f873a3a0b7ab6085037cc5349f21c,2024-11-04T19:45:45.603000 CVE-2024-10602,0,0,c915109d93366e27d5d2725dd7110022f25bb25a357ea875612a439aa00aa3b1,2024-11-04T19:46:22.830000 -CVE-2024-10603,1,1,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000 -CVE-2024-10604,1,1,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000 +CVE-2024-10603,0,0,6fce784118a8afc12a1cbdf4535e2e77dee1da9e5e1fc05c8262f652c564f994,2025-01-30T20:15:32.803000 +CVE-2024-10604,0,0,c4b1c4c6b40fe74688855caf21d8135ed0fe6d24471a771059646b7f825b6d05,2025-01-30T20:15:33.003000 CVE-2024-10605,0,0,9c4d2b3f5c9573445354fad5cf617a36da10f12735dc4eac88cc4ea22a030d7b,2024-11-05T16:22:08.017000 CVE-2024-10606,0,0,6b8aa1c124a8bd07d97b00841d43181d26fed96fe4b97b24267bdccee0185633,2024-11-23T05:15:05.223000 CVE-2024-10607,0,0,250026f787272e38f4463c472ef3fa91de5074ff5ae4f5010bbfc430ceadc741,2024-11-05T16:21:46.193000 @@ -244767,7 +244767,10 @@ CVE-2024-11605,0,0,60d00021c065e6f38e758db8986f6f41c042a104c692f051aa09c9422ba7d CVE-2024-11606,0,0,cec53aed2aa35dc5dcc09928013265f08303f051378a3304152c040cdd6a4f8b,2025-01-07T17:15:18.253000 CVE-2024-11607,0,0,64db1cb50de786964ba95a2d2de30c3c373b3627734b2fcf18c662efd5d3b19e,2024-12-27T15:15:09.637000 CVE-2024-11608,0,0,8ddbc230a8730b76ffe6955779ba3c4d90ea8f23edd3f564c2db516009c0d0dc,2024-12-09T18:15:22.580000 +CVE-2024-11609,1,1,54c05120181bbe5d026c1e91c4165767bdcaedcf5abe5cce3aa41c3ff6aeacdd,2025-01-30T21:15:13.163000 CVE-2024-1161,0,0,59404f907ebea7b8dd839befaa6ff35913219617a7e1db7c77652ef34247d4c1,2025-01-16T15:08:00.773000 +CVE-2024-11610,1,1,c802b71d58309a60621c4ba5c15f67dfafda5bd5bf39db94219018744e2dbed1,2025-01-30T21:15:13.303000 +CVE-2024-11611,1,1,b1272e810d8d420c6fae20c5fe47ecc25db508a92cd4fb3a203c9d8933606621,2025-01-30T21:15:13.450000 CVE-2024-11612,0,0,bb444eed2bab8dc9d7d3d2707a19c782bc9311cf8cab3a2875a904169993bb7a,2024-11-22T21:15:17.387000 CVE-2024-11613,0,0,7e86a7b71c3d95aae4dbcb0c03692293907b720ebfe581d24518da2d412862bf,2025-01-08T07:15:26.407000 CVE-2024-11614,0,0,7fc209ca70347672f57de5cba21effe4e1d493165b83e201eaf5da4b6f065fbc,2025-01-09T19:15:17.283000 @@ -245196,7 +245199,7 @@ CVE-2024-1208,0,0,3c4b0e7895c1837530e812c9d592f58958b18ef870d236a49969dfb3f5e669 CVE-2024-12082,0,0,d67c450c190c0364d4b144dcd382bc569f8e4f4f12ff2a960005828e083c85c7,2024-12-11T17:12:56.793000 CVE-2024-12083,0,0,d43543ed1a2c4c8cfbaff70b85f71ffc7dc15514475ec8e8bc46a80ffd753fb3,2025-01-14T01:15:09.267000 CVE-2024-12084,0,0,85dd725fc2f0b24c79e999378b1f0199fad5fe5d164b31609c57a84bcb434c0d,2025-01-15T15:15:10.537000 -CVE-2024-12085,0,0,a0d98fb431979f376125472a60db274f19d60a6b64ff4ab0286409d32e7ba632,2025-01-30T17:15:17.527000 +CVE-2024-12085,0,1,788c3ec9423047f08ea5b66503ee10816232f6b232d17e66884fde630208fb19,2025-01-30T22:15:08.410000 CVE-2024-12086,0,0,e5130c03152639985c3e2f822b45f241716bd573825b1ce309364a23fc10467b,2025-01-14T22:15:26.370000 CVE-2024-12087,0,0,083db16c2a7b9baa1b397fd2cd269bff2aa8f7c2646d1851d134f1f8a052e34a,2025-01-14T22:15:26.503000 CVE-2024-12088,0,0,789608af69629f4130f54998ea59694fde701c19a329a9d8093e26a51277e55d,2025-01-14T22:15:26.600000 @@ -245332,7 +245335,7 @@ CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 CVE-2024-12240,0,0,6672995b52813f98387098ac3b3013676e82d4cc5e92b1023b4a144f1eea1a77,2025-01-14T11:15:15.137000 CVE-2024-12247,0,0,ad117a7da5529073984608210b9ebf0c8357341e47d0f7a47c01f4275cf4ac25,2024-12-05T16:15:25.243000 -CVE-2024-12248,1,1,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000 +CVE-2024-12248,0,0,c8b02ea390d9cd4d4f577628dbd04dfb02e11738aa4f8e4025ea40fc4a63373e,2025-01-30T19:15:13.390000 CVE-2024-12249,0,0,e2547863ff0e51895fdd9ac079296565876947375b7269d971dfde5e35972170,2025-01-09T11:15:12.683000 CVE-2024-1225,0,0,1335eabc5dc5752fbd7f31a11bdeda2f1be9be2c21abaca809140eabb8940f2a,2024-11-21T08:50:05.673000 CVE-2024-12250,0,0,e5f748db33ee246e1110b31eaf24b071ff8e9ad960657a91bc37454c3187e14e,2024-12-18T04:15:07.657000 @@ -246139,7 +246142,7 @@ CVE-2024-13265,0,0,b50153d1795e3b59befc7c1df0d2d6441a951e42ef1ce3b27ccdff78e9e67 CVE-2024-13266,0,0,ae9ed5d6d4efb501aacb0e2cf1c7295f9e10ccdad8130d6b12c89c95eed905c0,2025-01-14T17:15:14.753000 CVE-2024-13267,0,0,15108bd27c21eab0c2a7ce0b2e4a90abbe641b3902c75a0df20fec2e532b85e3,2025-01-14T17:15:14.903000 CVE-2024-13268,0,0,ab2ca4df69353c6af407bf3f87301555d4bd9eb6134717d5cb44ff3bc0de1ef5,2025-01-09T20:15:35.577000 -CVE-2024-13269,0,0,15b723abdab3cac8f057c2a93357bfc122f6550e17e83fbff1dade6d5652d0de,2025-01-09T20:15:35.687000 +CVE-2024-13269,0,1,a0c61ccab76d132efe513a5a4a456b1965f80d3971b03da92de2924fedeeb544,2025-01-30T22:15:08.550000 CVE-2024-1327,0,0,33c0adc6d164d2527ed98cdbc1917c4fbc66104aec7ae664b0eb02e15371b5a7,2025-01-15T18:08:20.797000 CVE-2024-13270,0,0,e87c63bda0333ee4a66f449c899d74f2e08b74af6a5ebb363e5ef4b3e3167359,2025-01-09T20:15:35.790000 CVE-2024-13271,0,0,59799f40be37f28c79189be8aa28d2139d3ba52e710292e27d885484c5ab45c0,2025-01-09T20:15:35.910000 @@ -246180,8 +246183,8 @@ CVE-2024-13302,0,0,c2e2f829e272ce3710b30cde276e1b51b430dd27cc63cc0d3e8565746bc82 CVE-2024-13303,0,0,45400694ac4670f48d80d8a7e39a4bc849293c35e8276e2742f48056b9fcfa36,2025-01-10T18:15:20.910000 CVE-2024-13304,0,0,24b1a36018af16d753703a5b5b1bb932f9f36c2f21a7231aac95060bf05434cb,2025-01-10T18:15:21.263000 CVE-2024-13305,0,0,3a4cf301307578a6e63a4f0538c798b9e10f6efb81525d14d4ca11f02d0c6cd6,2025-01-10T17:15:16.820000 -CVE-2024-13308,0,0,628dfc7afada6f39009e3075b904110e0898bfe72715ceaf39a1a966cfc45777,2025-01-09T21:15:28.623000 -CVE-2024-13309,0,0,7804e59975687c811f41086ccb055124503b48f1f5cb86a86be5d217498799ec,2025-01-09T21:15:28.740000 +CVE-2024-13308,0,1,5a7c5de49dea6dce6146be04ca3299c64c19e3ab1de1461d50a35b802bb7ee20,2025-01-30T22:15:08.723000 +CVE-2024-13309,0,1,0b3b8b334a1de7768f2a2e87180e2cff3c33f0ede7bad89f9b0bac93a7d10749,2025-01-30T22:15:08.880000 CVE-2024-1331,0,0,b8018aa4d406613d3ec27aefa47c4e3b21af15db4ddfb753850f1de6f3ba1fdc,2024-11-21T08:50:21.027000 CVE-2024-13310,0,0,34b833dc43272c485330d8f4a3479ba2fe514cfb2fea7226b333743fa866e9aa,2025-01-09T21:15:28.867000 CVE-2024-13311,0,0,043082a8dd739b5eb445323387334add04ddcec723a1cf1ae43347104de3b9ea,2025-01-09T21:15:28.970000 @@ -246457,7 +246460,7 @@ CVE-2024-1484,0,0,9a32df126759987e5250b83dcafa91beffdf56c507b193272d399891f10765 CVE-2024-1485,0,0,a1102d636093aae5526e62d4563fc2a331d4ec97c0bcd4b7a9835d6f29d54493,2024-11-21T08:50:41.090000 CVE-2024-1486,0,0,94a421c2203bd3bbfc3e3f87675332dfca46e0ee2e1454f84651bf7b647d4382,2024-11-21T08:50:41.247000 CVE-2024-1487,0,0,4bf4dc233cedcf1304e22719e3f6a10f2632e690cb333bf8786ae34bb05e7089,2024-11-21T08:50:41.383000 -CVE-2024-1488,0,0,05fd1f5b51446658fa063dfafdb885da66cb82f65503a858653fb976e97b16a3,2025-01-24T06:15:26.913000 +CVE-2024-1488,0,1,bdde88c2dae24117dcff9e354ec8b5114157ed5561cc258eab2815d179ac3088,2025-01-30T22:15:09.037000 CVE-2024-1489,0,0,afea3aca1b285be7aec593bac44b1d70889e5ff452f20f2949bf1810002f41ac,2024-11-21T08:50:41.657000 CVE-2024-1491,0,0,f8c906d36296d24716d3f1699c8be966291b4ddbcb9b5f082cca20cf66fb517b,2024-11-21T08:50:41.773000 CVE-2024-1492,0,0,1639bcc1c5a688973fe7c2ddc64c02acd6aaac9cda8a0ad97ec52db83771b7b2,2024-11-21T08:50:41.923000 @@ -258836,7 +258839,7 @@ CVE-2024-3563,0,0,adbe59bd1d49de614b2ea4a992cfe827d7a619deaf1bf1464db4b2b89b108b CVE-2024-35630,0,0,d541a7211e4a4d6c5a2f20a343e8e95d9f10aa9cbeef960f44a29523803c201c,2024-11-21T09:20:32.267000 CVE-2024-35631,0,0,b2bbd1735567440b9b14ad520f237690a3057c6ed397900c04e1d91f83019b5f,2024-11-21T09:20:32.397000 CVE-2024-35632,0,0,8ac93b6b70685393e559dcc17c63c410cb875b3ae02f4c6fbe77b112a65c27ea,2024-11-21T09:20:32.550000 -CVE-2024-35633,0,1,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000 +CVE-2024-35633,0,0,d7644db9fa1d0b0d2e952ea33967366420ddcce410d59c8213023c0fefdb33df,2025-01-30T19:52:10.193000 CVE-2024-35634,0,0,25c1cdf095c30445149b468d7e95e6aed7e59b2a3eec6f8e0b3fe71e56cf4891,2024-11-21T09:20:32.793000 CVE-2024-35635,0,0,2ac54f88aa487a3c53c8e85ca3b7adc88898cc1636e05afea4e762250a08503a,2024-11-21T09:20:32.940000 CVE-2024-35636,0,0,e9db72b2bb839318f35abc14fee35d4b2e9afcebda20a56da5c23ce078615d5b,2024-11-21T09:20:33.070000 @@ -265531,7 +265534,7 @@ CVE-2024-44136,0,0,6f174c4211aefd4ed089ffc5069f9b8c0ec85bf908cf7d127360d8595626b CVE-2024-44137,0,0,d4f6436a74ca2949527dd50649d59762594e5936bfba7a01a6e8b64ce29142e0,2024-10-30T19:35:16.590000 CVE-2024-44139,0,0,227592f6930f5804ef7361e5c64b194003d6a9fbe8100b1944463ea300dd6852,2024-09-24T18:30:34.863000 CVE-2024-44141,0,0,cf418c986171e3bc9f6e94361ae23fe33ff672a5506240ca7f0249f80c1cacd9,2024-12-11T18:29:33.870000 -CVE-2024-44142,1,1,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000 +CVE-2024-44142,0,0,8e314cec4403216694641013c1f96b6f688f2b85f039c39572061c0028c5d370,2025-01-30T19:15:13.910000 CVE-2024-44144,0,0,9b76d7b551b1f0186bb586552a7b8b7528c49f9926c44e33ae408477bdfe743a,2024-10-29T21:35:14.290000 CVE-2024-44145,0,0,b5a7d8159d070a1738fbfcb4faf809263b03e283915c6233a643bc6179c97626,2024-12-12T19:10:46.387000 CVE-2024-44146,0,0,9fc3cf91a523a17011d8ddc92710ccca41ad98f894b85050d976b55965940506,2024-09-24T16:14:02.090000 @@ -267256,7 +267259,7 @@ CVE-2024-46963,0,0,a859b9e5f6b3e0fb9a390e0ac1d69993a48f6c4330c0e3f29a577b8ffe400 CVE-2024-46964,0,0,516d10df6478d71d107821ead9437fd7d5dc5eb20d9662b114242f44f50941fc,2024-11-12T16:35:19.933000 CVE-2024-46965,0,0,1066f06ee90db61e408bbe2d843509e64ad66e7a9a1562e4d7a7d1ae721e0df5,2024-11-12T17:35:09.427000 CVE-2024-46966,0,0,9cdd2da38a787da29e0b07f0d6dcd10da33561e25fc912ee27f59b8909bf77c4,2024-11-12T16:35:20.790000 -CVE-2024-4697,0,1,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000 +CVE-2024-4697,0,0,8e82abe27d6a35462bbbe0c449d2874070a3d828458d11fd360588d5ff83dd67,2025-01-30T19:43:10.207000 CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9eab6,2024-09-20T13:23:29.700000 CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46972,0,0,e19d7ffbd835a75458fdf16b6890ed1469688eeb0b4a5070c87028b8ff0ad2ab,2025-01-09T17:15:15.030000 @@ -272288,9 +272291,9 @@ CVE-2024-54152,0,0,64d47547e5307ed80a7f425b825ed1812b96ec6e10500fe8d7bfb0506a4a9 CVE-2024-54153,0,0,c29012def2c5ac24434214b7603f1646c45a2cdd2239c37ce825446301614236,2024-12-04T12:15:19.853000 CVE-2024-54154,0,0,76050c8799b790ecdccc98071593d36c99d7c13c97b41bc2ac908cace65d646b,2024-12-04T12:15:20.047000 CVE-2024-54155,0,0,16c7ad428747a68496c8d8073118d7a1fd49d9b325dffe11220faa0ccdf4be12,2024-12-04T12:15:20.190000 -CVE-2024-54156,0,0,1521b1a0fd39f5583feeda1b5748dd8268c43a64aeaf9d7cd843e09343fde576,2024-12-04T12:15:20.340000 -CVE-2024-54157,0,0,7977a0376cc458678287d7bc0e3bd127d398f022dc92eb660ddab27ca55beca1,2024-12-04T12:15:20.473000 -CVE-2024-54158,0,0,99ca6004d0064eb33285ff878f08d19b9a0bd1469f489ae6980279eee93eafce,2024-12-04T12:15:20.623000 +CVE-2024-54156,0,1,81c21f4d51f2ebbd7641443638ae29350bc0d803dc7655de8082c14d2dcfa440,2025-01-30T21:46:25.813000 +CVE-2024-54157,0,1,651aaab1ba3fa67919b2a83ef120e30379ceac97443b3f5f57e4b98ff3e217ee,2025-01-30T21:47:10.683000 +CVE-2024-54158,0,1,8c6dc67958b420fa6c8d095b96806595ddd0e8ce477f8baa35f7cadb7e0151dd,2025-01-30T21:50:32.770000 CVE-2024-54159,0,0,a6966b82b06dc6cc6ffe535670f7fe423d90e23d66a5791ea4c4b55b9827bb58,2024-12-03T15:15:12.097000 CVE-2024-5416,0,0,2cc8eb5abc95e0327999359a16ced825b9a25c50e0044d232fce1c6bda48c682,2024-09-26T14:37:59.290000 CVE-2024-5417,0,0,2c092c55b8a1a8c8890a1e4546beb75d8fbd37f20d02cbd8444692608bc2553d,2024-10-07T15:44:01.830000 @@ -273831,7 +273834,7 @@ CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000 -CVE-2024-57276,0,0,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000 +CVE-2024-57276,0,1,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000 CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 @@ -277776,12 +277779,12 @@ CVE-2025-0104,0,0,21c4318a0d99e7fa45fcf41d38940b721a051c25e3dcd31ab0543aa8393743 CVE-2025-0105,0,0,1d92b789c4ee5a1ce8b95be14f67c2ed638278c6036b1fd20d689cfe8ca07ce7,2025-01-11T03:15:22.317000 CVE-2025-0106,0,0,297e7d67cc0892af79dd6eab9f30b7cbc802b5a94f8e51453a83d44734601e5e,2025-01-11T03:15:22.490000 CVE-2025-0107,0,0,7d7cd1b21f8fb2e090759e9bfc5c26e45f105ad47403d57bcf7a1a7c6a786b02,2025-01-15T23:15:10.273000 -CVE-2025-0142,1,1,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000 -CVE-2025-0143,1,1,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000 -CVE-2025-0144,1,1,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000 -CVE-2025-0145,1,1,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000 -CVE-2025-0146,1,1,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000 -CVE-2025-0147,1,1,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000 +CVE-2025-0142,0,0,1abda10a5eada4193fe274562c17d232e8ca8c79a0709a64d249cdd64a883f20,2025-01-30T20:15:33.853000 +CVE-2025-0143,0,0,296248dfc8911afb81aba91a9155c349bbfc6c793c50a0f97328fecc5f67a13d,2025-01-30T20:15:34.050000 +CVE-2025-0144,0,0,beb7b312e9d023ff83a9190648ca8c0dd1a6406acec35769a36446e22b8014ca,2025-01-30T20:15:34.210000 +CVE-2025-0145,0,0,d5e8ce1643ab2424dd4c50d4dcdd6c8e0ad6e5b1aea57d7d46d4c5890c841d73,2025-01-30T20:15:34.547000 +CVE-2025-0146,0,0,0667e58df7061f5dd21d67dba7596996019fabb4824e8dc52013f1eb1eec1021,2025-01-30T20:15:34.907000 +CVE-2025-0147,0,0,3e8b25a8d80a15a2641c707ce901f8b885916c5ca52ca562a71e14d50f3a5060,2025-01-30T20:15:35.253000 CVE-2025-0168,0,0,e84dfab945ef13382a421d35864ab91df44d461052950e6960f163ecb3ef0659,2025-01-01T14:15:23.590000 CVE-2025-0170,0,0,189d0bf364a93d57ec260c3b6216a914d346455ba37daa3da83434c071198308,2025-01-16T02:15:27.043000 CVE-2025-0171,0,0,794beb23430fc32560ad8b14e91c70f576fc5b74a30bc3307d04a635424cf206,2025-01-02T18:15:21.173000 @@ -277832,7 +277835,7 @@ CVE-2025-0237,0,0,726b9fd4a1cc35feeb251f210c4adbb8387d0cfa8a7807bfe531c06c5d5e23 CVE-2025-0238,0,0,25dbf44aaff9981e33a49ac3143d2e91673102899f26dc07cf35f0cbe2b9b8b2,2025-01-13T22:15:14.917000 CVE-2025-0239,0,0,1372c31ba223568cd951d4698f35589535891c561ef4e423909537c35f403cb4,2025-01-13T22:15:15.057000 CVE-2025-0240,0,0,ef3a6d8c0e079e8738470ebcc85f8c6810fc9d47e51bebee036347d11413c427,2025-01-13T22:15:15.190000 -CVE-2025-0241,0,0,f609fcea9ea7559d4c69256019cabe3315eee4193ade298c5176418a8d1b2cf1,2025-01-13T22:15:15.330000 +CVE-2025-0241,0,1,a0bdcf70fd4da55c1667c939c86352d55f81eaf4e4e33ce9139ad56bc1c71ee5,2025-01-30T22:15:09.700000 CVE-2025-0242,0,0,8fd084f80d7f2c40909e904cf4af210f4c9950a52651432fdf9e9addd4031c69,2025-01-13T22:15:15.420000 CVE-2025-0243,0,0,e50730930ccff5df1662900646661e118cddb3593274bb28086fa9abd413c548,2025-01-13T22:15:15.560000 CVE-2025-0244,0,0,a007094477ee1c52bbc6ad80ad1856461cbdef97dbf9502d29b149d107af9f25,2025-01-08T16:15:37.520000 @@ -277993,6 +277996,13 @@ CVE-2025-0564,0,0,650024fd0623317926e582a4bc38450ac7a271a00a83ea4a9c09178300ec95 CVE-2025-0565,0,0,6d54c323cb03fbdc464fad55525c07932b33678b23db46f9285fc46354f35617,2025-01-19T06:15:06.820000 CVE-2025-0566,0,0,0c4672880628de41f7c45af060cc7b25efbd38a8957fdd01f169568312b347b3,2025-01-19T07:15:06.407000 CVE-2025-0567,0,0,b74c6df89c0fcb1255eef76d90ddfd33f5a9dfee00996fcba186fc7c7f150e7e,2025-01-19T08:15:06.637000 +CVE-2025-0568,1,1,8d0a05c8043bee98423ba6864a9bab1dd2831ab16af703e3c47395d083efbcb6,2025-01-30T21:15:13.587000 +CVE-2025-0569,1,1,6aa361cd183208e6f48d0af7ae70f952114c8b890907ec8fcbe80c72fbf6381b,2025-01-30T21:15:13.710000 +CVE-2025-0570,1,1,2f71d7720e6c338ca428f1b0f16342bc64b3d89cdaf10a0ad12618a14f673407,2025-01-30T21:15:13.830000 +CVE-2025-0571,1,1,5d206173b5fa262732ea2fca9cfca58cefc24b524f6ee30aeaf8ca6b0949fb5d,2025-01-30T21:15:13.960000 +CVE-2025-0572,1,1,1e050d3dc3737c3f353cd212470d11d19d2ca27c2b96469c09a08960b37a5471,2025-01-30T21:15:14.093000 +CVE-2025-0573,1,1,8b2b5adb09f895ff991fed750b57e2959c03ca9d9a490dc916c95f354740ed0f,2025-01-30T21:15:14.227000 +CVE-2025-0574,1,1,ce0c94ad105196a95d4a85b805b59b4914ea27c1e277b12dda1daa397236726b,2025-01-30T21:15:14.357000 CVE-2025-0575,0,0,03dc0a766dd40ef1508c8693499211717a20a0fac5daca493e9cc3db02b14fbc,2025-01-19T23:15:20.013000 CVE-2025-0576,0,0,0748bbaf647d6707eade27f8dc93756df57bac5912fbaf14160dda0b1ead7d0c,2025-01-20T00:15:16.320000 CVE-2025-0578,0,0,f37c1d0a7be8fd73d8bd509c7e4aac11e1c01571a42f10fb7d9157af68e7ed19,2025-01-20T02:15:18.913000 @@ -278014,7 +278024,7 @@ CVE-2025-0617,0,0,85ac8b1513a28e4252ed84928ab0ab641a8952008a852587e89f1b03f01e6a CVE-2025-0619,0,0,76104b7b24094ee59b4cec6d4f4ee7db8e2e97a6bfdfd21603079adfc8fdb2bd,2025-01-23T11:15:10.700000 CVE-2025-0623,0,0,341d910d0f0f4575e107592c92f38288f68e01fe716af21df488a6d82193e481,2025-01-21T17:15:16.817000 CVE-2025-0625,0,0,7f36541620787f4bb57811d2ab5017a08dd72bab5c190081458ac3e7009d06f3,2025-01-22T19:15:10.397000 -CVE-2025-0626,1,1,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000 +CVE-2025-0626,0,0,b95b3517a13a66c6bae56b5c7a375838e0f83067e69d901447ab670090da89fc,2025-01-30T19:15:14.010000 CVE-2025-0631,0,0,3196a9fbde6d9168d64fe97245fb465de3553c9c773b397433d0b7598697488d,2025-01-28T19:15:14.270000 CVE-2025-0635,0,0,48e9501b358d6daac6b23f86a2f36310ca1507ac697731ba1d1365d13a451552,2025-01-23T11:15:10.890000 CVE-2025-0637,0,0,527088f0979b18ce444b6ef69464399256b011e8d9eae0913ca1205a9c4503aa,2025-01-23T16:15:36.617000 @@ -278024,10 +278034,10 @@ CVE-2025-0650,0,0,663c6fb0447de5acea936c032379a880e4e49090359ea8a19f79bd3aea4faf CVE-2025-0651,0,0,98e32274420f8a5656f4a2c8f7df94f72b4c741ddf88cf485a3c74564694db6e,2025-01-22T18:15:20.363000 CVE-2025-0659,0,0,a3f0ecf6d7f28b7588d33ff468ced196ec3e2b7300202b748557cb9cf9f876c2,2025-01-28T16:15:40.360000 CVE-2025-0662,0,0,bc6e86ff659735808e41cf9ff8dd95196e371ffb0d943fcf675b74a5d300ebd8,2025-01-30T05:15:10.653000 -CVE-2025-0680,1,1,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000 -CVE-2025-0681,1,1,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000 +CVE-2025-0680,0,0,ec333cf56e54e10a72253f3b33aa12ac442fec49122e56aaca2c0fa65157ab4a,2025-01-30T19:15:14.147000 +CVE-2025-0681,0,0,b8363a650ef7fdaa5d28101486b8255e2b2a7fc158d1635f2fbff97adeaba420,2025-01-30T19:15:14.300000 CVE-2025-0682,0,0,92fd5473746c4976c6352d82859f2d6dd42876faa3743bd2fa1f5cfd951d9a04,2025-01-25T06:15:28.740000 -CVE-2025-0683,1,1,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000 +CVE-2025-0683,0,0,8c96ddbc6080430b0e948da9310a6801fe4a1e6fe9406e655f9134920e4dae2c,2025-01-30T19:15:14.460000 CVE-2025-0693,0,0,14192c50df5b152461c9d8412a1ed956f9746262f631bd7707b7658d21e54a87,2025-01-23T22:15:15.397000 CVE-2025-0695,0,0,70836bbbf6325136c9e0a957ced44b18d2c2228a6b15d655a939dfb6142b3b68,2025-01-27T11:15:11.087000 CVE-2025-0696,0,0,067c55df7ddd7d3450a8d9809198ef8633f7872bc632480e2c80e723c4cafb5b,2025-01-27T11:15:11.267000 @@ -278109,6 +278119,9 @@ CVE-2025-0871,0,0,24dddddb7292c73ee5114bcb016776d1fe668a27680ab7f838511f0d646009 CVE-2025-0872,0,0,2a97903a346db7626f149e531952c9a73336859fa952991f9ebb15445e299ad6,2025-01-30T16:15:30.737000 CVE-2025-0873,0,0,f96722cf650d777df13efd7b0f61fc08757016f39189f71415796b266e7ec0a6,2025-01-30T17:15:18.293000 CVE-2025-0874,0,0,6da7a8f87f2786d1b42e4f0c31d8a24660ad2dce7cac8549bf8e2ee9e365d7da,2025-01-30T18:15:33.753000 +CVE-2025-0880,1,1,7ab5ca29a799a8fac267066c2eb589d01834fa921e902d70d4517ec3592f8581,2025-01-30T21:15:14.487000 +CVE-2025-0881,1,1,f6d8aeab8275692b8ab74f77e788a17bc4f5e9922e816ca6e72b12616473f8e1,2025-01-30T22:15:09.950000 +CVE-2025-0882,1,1,a4fc441f84f917a5c60004573d3c20412d06b968e92fa39cb0a0be846d1c9a39,2025-01-30T21:15:14.820000 CVE-2025-20014,0,0,708b5660539e4ab2830a732991daead462d3c8df88b4205953edf58b017cb8b0,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 @@ -279278,7 +279291,7 @@ CVE-2025-24092,0,0,9182d2bd14456360ddd97d7de31dcf6654228ea7b89126369b3c5c054d65c CVE-2025-24093,0,0,3f6f51243a5ac658564583998d5988ce49d27677fb4c413db03a4c9b2dd0ea15,2025-01-28T16:15:41.847000 CVE-2025-24094,0,0,9752c4fcf0542c9a14c29e1c06a8a87f40d0c52a3267427d743fb5e9dc5aef3d,2025-01-30T18:17:08.090000 CVE-2025-24096,0,0,bc6af13ce18ffbaee061a39b643a737430849df914344499b977f4fe1613eb41,2025-01-30T18:16:40.440000 -CVE-2025-24099,0,0,20f7dc916a389edc92101fc45e85459d6fd6b507a4303a4de3fe6f8ee24eb249,2025-01-30T17:15:18.473000 +CVE-2025-24099,0,1,ae84459fb59861397fcfa19fe58321bea97795e963bc811d2e971534f0407179,2025-01-30T22:15:10.160000 CVE-2025-24100,0,0,d35ad28704e6b165a7814523e9ddab98d243bbac9edf72e469cfe41a8f6cfb09,2025-01-30T18:16:04.177000 CVE-2025-24101,0,0,dae89b1167004681c237272fea45914f96a54415fc2aa5c9187504f4af2012ba,2025-01-29T17:15:29.547000 CVE-2025-24102,0,0,27709925e34384324bf4c5617df8dd3339c2c366be8f6454a622120cea48a67f,2025-01-28T15:15:13.303000 @@ -279289,7 +279302,7 @@ CVE-2025-24107,0,0,a6cfe430786da61a82799ac1488a919055b479fc4fe81ab16f82560299f05 CVE-2025-24108,0,0,bb0a5bc48c4dd7d6d7190906e431796a1e5028444f7a13e38e07dbc67caf502c,2025-01-28T17:15:26.433000 CVE-2025-24109,0,0,e18d20f0f5bde6ebc7b6d46d58e1c12c70a45bfdfde42833a6a2af9ef10a02f4,2025-01-28T17:15:26.610000 CVE-2025-24112,0,0,73122401c6f0bff2db58ac2e4c8d3c7092fb0878620319286c89df67ac0aee54,2025-01-30T18:54:08.913000 -CVE-2025-24113,0,1,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000 +CVE-2025-24113,0,0,06e6fc9a2d4f031956069ec451e08e736a017280ec601264276e7994ad5e6595,2025-01-30T19:10:53.077000 CVE-2025-24114,0,0,41dfbc3389d2f3872b919168ecf2d8e3d41ab841e34b753245c022d9f84c5e21,2025-01-27T22:15:16.620000 CVE-2025-24115,0,0,4ee06b5245630f5df72b1f842156b340b5aa79d371e3d93606b60490bb5625de,2025-01-28T16:15:42.150000 CVE-2025-24116,0,0,e6ceba0096997558b2d5ca595ab37f9878cfa1b3b2e9029c7e5b0c8682e2229a,2025-01-27T22:15:16.803000 @@ -279362,25 +279375,25 @@ CVE-2025-24400,0,0,d4e33d3f64ab5857e07ca7edc1c70e091d835e180e9973f0447b96fc45e31 CVE-2025-24401,0,0,61fdb52a27a3fd9c35b206712217d25525cc5027272fe2bab11517220f296eb5,2025-01-23T16:15:41.050000 CVE-2025-24402,0,0,3418f6cf5d47b4d89538cc87e13ea06bddcc57e548cfa7657c6e36ff20730512,2025-01-23T16:15:41.190000 CVE-2025-24403,0,0,b2088ac01a9c55c649a445287155d64d27005e5dcd4113b43fe4eee61a530dc4,2025-01-23T16:15:41.333000 -CVE-2025-24456,0,0,6523f3c101f4627bc76fe98572471b61eebbe2b2db1478b5e2b49419a77df538,2025-01-21T18:15:18.320000 -CVE-2025-24457,0,0,8215739f2c45f2f128765b5c9586342100742ab36e76214e9002205ed3878a50,2025-01-21T18:15:18.520000 -CVE-2025-24458,0,0,03e16f621e1b9e4e70e73985609e6df9be85cc317385d52b463a59fae87ddc54,2025-01-21T18:15:18.697000 -CVE-2025-24459,0,0,c083202f8944227211ab4ec18f1b1811e261bceb2079bbb92a48c6e7c058d3bc,2025-01-21T18:15:18.890000 -CVE-2025-24460,0,0,91287787f4d848d8e28c04d17a6364c6b1da8dd244cdf6af640fa2b8371b6e01,2025-01-21T18:15:19.067000 -CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65dfd,2025-01-21T18:15:19.260000 +CVE-2025-24456,0,1,d9c9319558b4dc57fc03dad7b8a246937d533b449f10c003d5f195a9361f5e8b,2025-01-30T21:28:52.003000 +CVE-2025-24457,0,1,05da9f488d0dcdd3961130ee761713c1c134c5d7cd87b42c0364b434d3a85623,2025-01-30T21:31:24.150000 +CVE-2025-24458,0,1,8fdab3bff09e0d5a6505ed060bcf7556a504946ddbff2902aa6888f1df89808e,2025-01-30T21:35:05.127000 +CVE-2025-24459,0,1,257e6112464c1679ae0abd32e184bcf8f361e1385cb92f80002e53f6e2f87c39,2025-01-30T21:22:22.917000 +CVE-2025-24460,0,1,4f72eb3be22e4f1df5ebc3a0bd9e4b0215891e7379b9cb7c39c53c2299ad1aa4,2025-01-30T21:25:18.337000 +CVE-2025-24461,0,1,25f37a551c58c38f8a12f7c46f3328964394f6bf5bab9d552ab0758339b513f4,2025-01-30T21:26:17.583000 CVE-2025-24478,0,0,489807abc8b3ac20963ab9718a91a7aef5527f911d78441ab168e0bbd3662f38,2025-01-28T19:15:14.777000 CVE-2025-24479,0,0,5b17b976259e83197a8085e93f801f9d4ec374bab1cdd4bfcdb02db805fe2920,2025-01-28T19:15:14.910000 CVE-2025-24480,0,0,6175dc6a2dc51becbf31db587b185fc0cf5ca4083049b1eeaefe14ce192b439b,2025-01-28T19:15:15.033000 CVE-2025-24481,0,0,d4c5f694be1964c793671f83858574d39267f41102637d90efe71d5e986d8cd1,2025-01-28T21:15:18.520000 CVE-2025-24482,0,0,bffc5c2a6aec76e0e32e2e073e316933365710b3f1f42623c1fb53cca20472b6,2025-01-28T21:15:18.687000 -CVE-2025-24500,1,1,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000 -CVE-2025-24501,1,1,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000 -CVE-2025-24502,1,1,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000 -CVE-2025-24503,1,1,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000 -CVE-2025-24504,1,1,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000 -CVE-2025-24505,1,1,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000 -CVE-2025-24506,1,1,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000 -CVE-2025-24507,1,1,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000 +CVE-2025-24500,0,0,35190c317ddcce19d4aee8ee748c17d45f2476c9549f6a6b80f1e6eda5312f25,2025-01-30T19:15:14.600000 +CVE-2025-24501,0,0,25016f3b803dc8e09093f9516f3e0f21fda9167105445fb9cc37e2fe6c19edcb,2025-01-30T19:15:14.723000 +CVE-2025-24502,0,0,1eb316836513de80497e296ec6ea7bd00b7cff1ab9bf0070420a7499a20eab2e,2025-01-30T20:15:50.460000 +CVE-2025-24503,0,0,7584a07b3748c523d6c3eadf63ca15c07501165a1b0dce638379355412d9dc9a,2025-01-30T20:15:50.580000 +CVE-2025-24504,0,0,d2a2bec9c28d157a0b68c3cedeca7ffbdbb4dfa39cf9a567e098e1424f8e7f29,2025-01-30T19:15:16.967000 +CVE-2025-24505,0,0,bcb0d90a6d83572cd1c4650b0d17fa3f0e1466b11ba85158c5fa2c6f2c4fc5cd,2025-01-30T20:15:50.737000 +CVE-2025-24506,0,0,4aa7d5faac8a004ebe67dab09520b2fb3c0013e78b52aca36223b603926a2a29,2025-01-30T20:15:50.850000 +CVE-2025-24507,0,0,50d6927f61db4847e3d9a4b8c496706f34df535200780511fff92e4528acf764,2025-01-30T19:15:17.920000 CVE-2025-24527,0,0,8f5d99489f05ec903e1b0ba411b4f26945dcb60c4d1c8d36f935f4c612211f10,2025-01-29T17:15:29.873000 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 @@ -279532,7 +279545,7 @@ CVE-2025-24793,0,0,d4e07940239b9e00a0a69537d9f171e93d29bd100812c005125832500a710 CVE-2025-24794,0,0,2f11cb6d90041da254b8f99c352894c2b43558b53ed02d7114c4604602ab34d0,2025-01-29T21:15:21.397000 CVE-2025-24795,0,0,02b3fee7a40cc82ee8b1315243aa5224def5b0913e0f89e5c85904feb21dfca6,2025-01-29T21:15:21.533000 CVE-2025-24800,0,0,92ce9341d9d5dcab9ec4de59a19d838c194a1a5ea345070b5216d35b2e3823ef,2025-01-28T16:15:45.063000 -CVE-2025-24802,1,1,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000 +CVE-2025-24802,0,0,3d0dd73d8f8fb01b2266159815cf7c33b5253a3fd988ae894a9cd0d8e1bf6678,2025-01-30T20:15:51.010000 CVE-2025-24810,0,0,9aadcf7445dd03539c4634635be857a9e6e77ee72d1b60352718480c3867482c,2025-01-28T05:15:11.413000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24826,0,0,a7644a31e02355bb510bf7d19c7cfad2325be8f7fb1f39c773cd5bf91edd8ae9,2025-01-28T21:15:18.817000