From 38bd6d2a8b3f6d4ae77f357a5e8e1e3e65284cca Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 31 Jan 2025 03:04:13 +0000 Subject: [PATCH] Auto-Update: 2025-01-31T03:00:46.019537+00:00 --- CVE-2020/CVE-2020-119xx/CVE-2020-11936.json | 48 ++++++++++++ CVE-2022/CVE-2022-17xx/CVE-2022-1736.json | 29 +++++++ CVE-2022/CVE-2022-286xx/CVE-2022-28653.json | 21 +++++ CVE-2023/CVE-2023-00xx/CVE-2023-0092.json | 48 ++++++++++++ CVE-2024/CVE-2024-18xx/CVE-2024-1813.json | 54 +++++++++++-- CVE-2024/CVE-2024-19xx/CVE-2024-1991.json | 64 ++++++++++++++-- CVE-2024/CVE-2024-21xx/CVE-2024-2117.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-21xx/CVE-2024-2138.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-22xx/CVE-2024-2226.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-239xx/CVE-2024-23920.json | 21 +++++ CVE-2024/CVE-2024-239xx/CVE-2024-23921.json | 21 +++++ CVE-2024/CVE-2024-239xx/CVE-2024-23929.json | 21 +++++ CVE-2024/CVE-2024-23xx/CVE-2024-2305.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-23xx/CVE-2024-2325.json | 54 +++++++++++-- CVE-2024/CVE-2024-23xx/CVE-2024-2340.json | 54 +++++++++++-- CVE-2024/CVE-2024-23xx/CVE-2024-2341.json | 74 ++++++++++++++++-- CVE-2024/CVE-2024-23xx/CVE-2024-2342.json | 54 +++++++++++-- CVE-2024/CVE-2024-23xx/CVE-2024-2343.json | 68 +++++++++++++++-- CVE-2024/CVE-2024-34xx/CVE-2024-3423.json | 85 ++++++++++++++++++--- CVE-2025/CVE-2025-213xx/CVE-2025-21399.json | 14 +++- README.md | 48 ++++++------ _state.csv | 65 +++++++++------- 22 files changed, 1006 insertions(+), 133 deletions(-) create mode 100644 CVE-2020/CVE-2020-119xx/CVE-2020-11936.json create mode 100644 CVE-2022/CVE-2022-17xx/CVE-2022-1736.json create mode 100644 CVE-2022/CVE-2022-286xx/CVE-2022-28653.json create mode 100644 CVE-2023/CVE-2023-00xx/CVE-2023-0092.json create mode 100644 CVE-2024/CVE-2024-239xx/CVE-2024-23920.json create mode 100644 CVE-2024/CVE-2024-239xx/CVE-2024-23921.json create mode 100644 CVE-2024/CVE-2024-239xx/CVE-2024-23929.json diff --git a/CVE-2020/CVE-2020-119xx/CVE-2020-11936.json b/CVE-2020/CVE-2020-119xx/CVE-2020-11936.json new file mode 100644 index 00000000000..8fe51235afe --- /dev/null +++ b/CVE-2020/CVE-2020-119xx/CVE-2020-11936.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2020-11936", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-01-31T02:15:28.290", + "lastModified": "2025-01-31T02:15:28.290", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "gdbus setgid privilege escalation" + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.6, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://bugs.launchpad.net/ubuntu/+source/apport/+bug/1885633", + "source": "security@ubuntu.com" + }, + { + "url": "https://www.cve.org/CVERecord?id=CVE-2020-11936", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-17xx/CVE-2022-1736.json b/CVE-2022/CVE-2022-17xx/CVE-2022-1736.json new file mode 100644 index 00000000000..d7285cb88e7 --- /dev/null +++ b/CVE-2022/CVE-2022-17xx/CVE-2022-1736.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2022-1736", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-01-31T02:15:28.440", + "lastModified": "2025-01-31T02:15:28.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Ubuntu's configuration of gnome-control-center allowed Remote Desktop Sharing to be enabled by default." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://bugs.launchpad.net/ubuntu/+source/gnome-remote-desktop/+bug/1973028", + "source": "security@ubuntu.com" + }, + { + "url": "https://ubuntu.com/security/CVE-2022-1736", + "source": "security@ubuntu.com" + }, + { + "url": "https://ubuntu.com/security/notices/USN-5430-1", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28653.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28653.json new file mode 100644 index 00000000000..115093cb61c --- /dev/null +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28653.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2022-28653", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-01-31T01:15:08.727", + "lastModified": "2025-01-31T01:15:08.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Users can consume unlimited disk space in /var/crash" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.cve.org/CVERecord?id=CVE-2022-28653", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2023/CVE-2023-00xx/CVE-2023-0092.json b/CVE-2023/CVE-2023-00xx/CVE-2023-0092.json new file mode 100644 index 00000000000..9bf08d0527d --- /dev/null +++ b/CVE-2023/CVE-2023-00xx/CVE-2023-0092.json @@ -0,0 +1,48 @@ +{ + "id": "CVE-2023-0092", + "sourceIdentifier": "security@ubuntu.com", + "published": "2025-01-31T02:15:28.550", + "lastModified": "2025-01-31T02:15:28.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An authenticated user who has read access to the juju controller model, may construct a remote request to download an arbitrary file from the controller's filesystem." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@ubuntu.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "references": [ + { + "url": "https://github.com/advisories/GHSA-x5rv-w9pm-8qp8", + "source": "security@ubuntu.com" + }, + { + "url": "https://github.com/juju/juju/commit/ef803e2a13692d355b784b7da8b4b1f01dab1556", + "source": "security@ubuntu.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json index bcf4eb5b205..eae38fbc57f 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1813.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1813", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:19.973", - "lastModified": "2024-11-21T08:51:22.617", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:25:17.393", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:presstigers:simple_job_board:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.11.1", + "matchCriteriaId": "3BA27EF4-AF0A-45C2-8E6C-12C7EE5C7964" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3051715%40simple-job-board&old=3038476%40simple-job-board&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89584034-4a93-42a6-8fef-55dc3895c45c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3051715%40simple-job-board&old=3038476%40simple-job-board&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/89584034-4a93-42a6-8fef-55dc3895c45c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json index 1f6d3c95b49..b09aa5f540c 100644 --- a/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json +++ b/CVE-2024/CVE-2024-19xx/CVE-2024-1991.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1991", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:21.883", - "lastModified": "2024-11-21T08:51:45.033", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-31T01:32:27.643", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:metagauss:registrationmagic:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "5.3.1.0", + "matchCriteriaId": "5431F904-0597-4627-BD50-8286354EE517" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk//services/class_rm_user_services.php#L1205", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3049490/custom-registration-form-builder-with-submission-manager#file24", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/766e3966-157a-4db3-9179-813032343f76?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/custom-registration-form-builder-with-submission-manager/trunk//services/class_rm_user_services.php#L1205", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3049490/custom-registration-form-builder-with-submission-manager#file24", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/766e3966-157a-4db3-9179-813032343f76?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json index c8ee15c9d17..82a1184b9ee 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2117.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2117", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.177", - "lastModified": "2024-11-21T09:09:03.910", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:37:06.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.20.3", + "matchCriteriaId": "F9354981-E523-461C-A8DA-7116429C4915" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058940%40elementor&new=3058940%40elementor&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d7448a-b8a6-4b0b-92df-a15272fc56bf?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3058940%40elementor&new=3058940%40elementor&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c8d7448a-b8a6-4b0b-92df-a15272fc56bf?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json index 9f43a9d7142..5bbe6b85ee6 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2138.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2138", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:28.597", - "lastModified": "2024-11-21T09:09:06.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:41:07.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:crocoblock:jetwidgets_for_elementor:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.0.16", + "matchCriteriaId": "AA3E9B9B-E1C0-4564-8543-1C468DD78ECD" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3050010/jetwidgets-for-elementor", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f807b605-68a8-4340-a275-776eac0936fa?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3050010/jetwidgets-for-elementor", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/f807b605-68a8-4340-a275-776eac0936fa?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json index e46dcfb1a32..565c5443d3e 100644 --- a/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json +++ b/CVE-2024/CVE-2024-22xx/CVE-2024-2226.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2226", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:30.320", - "lastModified": "2024-11-21T09:09:17.873", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-31T01:45:28.230", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeisle:otter_blocks:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.5", + "matchCriteriaId": "A17730C4-688B-407E-A01B-30E3DF67967E" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3050429/otter-blocks", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3050429/otter-blocks", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/217d3148-d411-4fff-a4f6-d5d02ef207af?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23920.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23920.json new file mode 100644 index 00000000000..c818be1e48b --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23920.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-23920", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-31T01:15:09.483", + "lastModified": "2025-01-31T01:15:09.483", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the onboardee module. The issue results from improper access control. An attacker can leverage this vulnerability to execute code in the context of root." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1048/", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23921.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23921.json new file mode 100644 index 00000000000..17a8a3bf18a --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23921.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-23921", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-31T01:15:09.593", + "lastModified": "2025-01-31T01:15:09.593", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the wlanapp module. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1049/", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json b/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json new file mode 100644 index 00000000000..8f9dc6df70e --- /dev/null +++ b/CVE-2024/CVE-2024-239xx/CVE-2024-23929.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-23929", + "sourceIdentifier": "ics-cert@hq.dhs.gov", + "published": "2025-01-31T01:15:09.697", + "lastModified": "2025-01-31T01:15:09.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "This vulnerability allows network-adjacent attackers to create arbitrary files on affected installations of Pioneer DMH-WT7600NEX devices. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the telematics functionality. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-1044/", + "source": "ics-cert@hq.dhs.gov" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json index cdaa698cfb8..028ee1f253f 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2305.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2305", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:31.153", - "lastModified": "2024-11-21T09:09:28.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:48:22.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:brainstormforce:cards_for_beaver_builder:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.1.3", + "matchCriteriaId": "15C3215C-AD85-46A1-A8A8-61C63E99F6B5" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&old=3056277&new_path=/bb-bootstrap-cards/tags/1.1.3&new=3056277&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?old_path=/bb-bootstrap-cards/tags/1.1.2&old=3056277&new_path=/bb-bootstrap-cards/tags/1.1.3&new=3056277&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac0dfaac-cce6-45f7-ad5b-d7dcb66453bd?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json index 71e099a27ee..22d31126821 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2325.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2325", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:31.683", - "lastModified": "2024-11-21T09:09:30.457", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:53:16.193", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ylefebvre:link_library:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.6.7", + "matchCriteriaId": "11A75CE4-91F9-4DFC-94ED-172577DC7CD9" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3050134/link-library", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93af9cc-cd9a-4bbb-8cb1-bf45c59e469c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3050134/link-library", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b93af9cc-cd9a-4bbb-8cb1-bf45c59e469c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json index b4daecd6b2d..c0af07319a3 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2340.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2340", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:32.520", - "lastModified": "2024-11-21T09:09:32.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T01:57:32.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.11.7", + "matchCriteriaId": "EA3C3037-32CE-484C-951A-3DAAFA229C13" + } + ] + } + ] + } + ], "references": [ { "url": "https://avada.com/documentation/avada-changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://avada.com/documentation/avada-changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/8db8bbc3-43ca-4ef5-a44d-2987c8597961?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json index a8885f7b1b2..20bd4e5843a 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2341.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2341", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:32.687", - "lastModified": "2024-11-21T09:09:33.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T02:02:01.173", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.7.9", + "matchCriteriaId": "084F3A7F-71BB-4F17-945A-628A98465263" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4930b03-9142-464e-98ae-a910dfa46f2a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4930b03-9142-464e-98ae-a910dfa46f2a?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json index e7818c7bcaf..f6adc891af6 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2342.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2342", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:32.870", - "lastModified": "2024-11-21T09:09:33.223", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T02:04:01.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:nsquared:simply_schedule_appointments:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.6.7.9", + "matchCriteriaId": "084F3A7F-71BB-4F17-945A-628A98465263" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0dd466-a78a-4b79-b9bd-5363f69d9a4c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054815%40simply-schedule-appointments%2Ftrunk&old=3054636%40simply-schedule-appointments%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0c0dd466-a78a-4b79-b9bd-5363f69d9a4c?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json index 0bff7a9ae5a..c967415a957 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2343.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2343", "sourceIdentifier": "security@wordfence.com", "published": "2024-04-09T19:15:33.033", - "lastModified": "2024-11-21T09:09:33.350", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-31T02:08:29.417", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,82 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:theme-fusion:avada:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "7.11.7", + "matchCriteriaId": "EA3C3037-32CE-484C-951A-3DAAFA229C13" + } + ] + } + ] + } + ], "references": [ { "url": "https://avada.com/documentation/avada-changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://avada.com/documentation/avada-changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://gist.github.com/Xib3rR4dAr/55d41870c7ce0e95f454d00100bc10dc", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/87ca07ac-6080-45d7-a8f5-74a918adec43?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json b/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json index 14850438b37..9a7dce045e6 100644 --- a/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json +++ b/CVE-2024/CVE-2024-34xx/CVE-2024-3423.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3423", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-07T15:15:07.253", - "lastModified": "2024-11-21T09:29:34.370", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-31T01:22:52.200", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A5C774C8-8C38-4E34-B5D3-74872B5F672A" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-08.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259595", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259595", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.311601", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/thisissuperann/Vul/blob/Online-Courseware/Online-Courseware-08.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://vuldb.com/?ctiid.259595", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.259595", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.311601", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json index e36176057c1..0257120ef9b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21399", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-17T20:15:46.117", - "lastModified": "2025-01-17T21:15:11.283", + "lastModified": "2025-01-31T02:15:37.700", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -40,9 +40,19 @@ ] }, "weaknesses": [ + { + "source": "secure@microsoft.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", diff --git a/README.md b/README.md index 9fa5f893a00..e0a06c9d17f 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-31T00:56:11.048516+00:00 +2025-01-31T03:00:46.019537+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-31T00:15:20.607000+00:00 +2025-01-31T02:15:37.700000+00:00 ``` ### Last Data Feed Release @@ -27,41 +27,45 @@ Repository synchronizes with the NVD every 2 hours. Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) ```plain -2025-01-30T01:00:04.368798+00:00 +2025-01-31T01:00:04.356246+00:00 ``` ### Total Number of included CVEs ```plain -279570 +279577 ``` ### CVEs added in the last Commit -Recently added CVEs: `16` +Recently added CVEs: `7` -- [CVE-2023-6195](CVE-2023/CVE-2023-61xx/CVE-2023-6195.json) (`2025-01-31T00:15:08.697`) -- [CVE-2024-1211](CVE-2024/CVE-2024-12xx/CVE-2024-1211.json) (`2025-01-31T00:15:08.863`) -- [CVE-2024-23928](CVE-2024/CVE-2024-239xx/CVE-2024-23928.json) (`2025-01-31T00:15:09.030`) -- [CVE-2024-23930](CVE-2024/CVE-2024-239xx/CVE-2024-23930.json) (`2025-01-31T00:15:09.147`) -- [CVE-2024-23937](CVE-2024/CVE-2024-239xx/CVE-2024-23937.json) (`2025-01-31T00:15:09.257`) -- [CVE-2024-23962](CVE-2024/CVE-2024-239xx/CVE-2024-23962.json) (`2025-01-31T00:15:09.367`) -- [CVE-2024-23963](CVE-2024/CVE-2024-239xx/CVE-2024-23963.json) (`2025-01-31T00:15:09.483`) -- [CVE-2024-23968](CVE-2024/CVE-2024-239xx/CVE-2024-23968.json) (`2025-01-31T00:15:09.593`) -- [CVE-2024-23969](CVE-2024/CVE-2024-239xx/CVE-2024-23969.json) (`2025-01-31T00:15:09.703`) -- [CVE-2024-23970](CVE-2024/CVE-2024-239xx/CVE-2024-23970.json) (`2025-01-31T00:15:09.810`) -- [CVE-2024-23971](CVE-2024/CVE-2024-239xx/CVE-2024-23971.json) (`2025-01-31T00:15:09.920`) -- [CVE-2024-23973](CVE-2024/CVE-2024-239xx/CVE-2024-23973.json) (`2025-01-31T00:15:10.027`) -- [CVE-2024-24731](CVE-2024/CVE-2024-247xx/CVE-2024-24731.json) (`2025-01-31T00:15:10.137`) -- [CVE-2025-24336](CVE-2025/CVE-2025-243xx/CVE-2025-24336.json) (`2025-01-31T00:15:20.607`) -- [CVE-2025-24885](CVE-2025/CVE-2025-248xx/CVE-2025-24885.json) (`2025-01-30T23:15:07.993`) -- [CVE-2025-24886](CVE-2025/CVE-2025-248xx/CVE-2025-24886.json) (`2025-01-30T23:15:08.990`) +- [CVE-2020-11936](CVE-2020/CVE-2020-119xx/CVE-2020-11936.json) (`2025-01-31T02:15:28.290`) +- [CVE-2022-1736](CVE-2022/CVE-2022-17xx/CVE-2022-1736.json) (`2025-01-31T02:15:28.440`) +- [CVE-2022-28653](CVE-2022/CVE-2022-286xx/CVE-2022-28653.json) (`2025-01-31T01:15:08.727`) +- [CVE-2023-0092](CVE-2023/CVE-2023-00xx/CVE-2023-0092.json) (`2025-01-31T02:15:28.550`) +- [CVE-2024-23920](CVE-2024/CVE-2024-239xx/CVE-2024-23920.json) (`2025-01-31T01:15:09.483`) +- [CVE-2024-23921](CVE-2024/CVE-2024-239xx/CVE-2024-23921.json) (`2025-01-31T01:15:09.593`) +- [CVE-2024-23929](CVE-2024/CVE-2024-239xx/CVE-2024-23929.json) (`2025-01-31T01:15:09.697`) ### CVEs modified in the last Commit -Recently modified CVEs: `0` +Recently modified CVEs: `13` +- [CVE-2024-1813](CVE-2024/CVE-2024-18xx/CVE-2024-1813.json) (`2025-01-31T01:25:17.393`) +- [CVE-2024-1991](CVE-2024/CVE-2024-19xx/CVE-2024-1991.json) (`2025-01-31T01:32:27.643`) +- [CVE-2024-2117](CVE-2024/CVE-2024-21xx/CVE-2024-2117.json) (`2025-01-31T01:37:06.183`) +- [CVE-2024-2138](CVE-2024/CVE-2024-21xx/CVE-2024-2138.json) (`2025-01-31T01:41:07.187`) +- [CVE-2024-2226](CVE-2024/CVE-2024-22xx/CVE-2024-2226.json) (`2025-01-31T01:45:28.230`) +- [CVE-2024-2305](CVE-2024/CVE-2024-23xx/CVE-2024-2305.json) (`2025-01-31T01:48:22.557`) +- [CVE-2024-2325](CVE-2024/CVE-2024-23xx/CVE-2024-2325.json) (`2025-01-31T01:53:16.193`) +- [CVE-2024-2340](CVE-2024/CVE-2024-23xx/CVE-2024-2340.json) (`2025-01-31T01:57:32.613`) +- [CVE-2024-2341](CVE-2024/CVE-2024-23xx/CVE-2024-2341.json) (`2025-01-31T02:02:01.173`) +- [CVE-2024-2342](CVE-2024/CVE-2024-23xx/CVE-2024-2342.json) (`2025-01-31T02:04:01.137`) +- [CVE-2024-2343](CVE-2024/CVE-2024-23xx/CVE-2024-2343.json) (`2025-01-31T02:08:29.417`) +- [CVE-2024-3423](CVE-2024/CVE-2024-34xx/CVE-2024-3423.json) (`2025-01-31T01:22:52.200`) +- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-31T02:15:37.700`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 0b042b3c0ef..775002c15dc 100644 --- a/_state.csv +++ b/_state.csv @@ -147103,6 +147103,7 @@ CVE-2020-11932,0,0,469c5fbb874e2ce3c2977f7166bc05778bd5f48d50cce7d1c214a21caf5b5 CVE-2020-11933,0,0,0705c55ac12f2d731947a81e178dfba0120f93d678094caf5982aa9efe207ac5,2024-11-21T04:58:56.003000 CVE-2020-11934,0,0,ebd85d2258bb5cdec7587f2d2f93ff13d3181b4947718544e1f1e911edcfc192,2024-11-21T04:58:56.127000 CVE-2020-11935,0,0,dad03cea24f88294e961969a7fee1da6c6a47385b0aa1cd4e2877a928b5074e2,2024-11-21T04:58:56.233000 +CVE-2020-11936,1,1,e35f61986f41a3819206462fe309eb5bb8aa282ea551e775c265d99ed26a8387,2025-01-31T02:15:28.290000 CVE-2020-11937,0,0,4f409b356d4e057aab349a4272ed211e5f8cbcd0f027ea0abed7b2e6b9fd9ba2,2024-11-21T04:58:56.357000 CVE-2020-11938,0,0,5c5483f93c9cab0dd835b38d7dc1e8efb529f82c21062467bfa6fff780c5368a,2024-11-21T04:58:56.497000 CVE-2020-11939,0,0,cbfb0430f629647bd7fb8905d6160d59546c17c35d5b10f608b4ea3ed57e7605,2024-11-21T04:58:56.630000 @@ -189477,6 +189478,7 @@ CVE-2022-1732,0,0,5c84180368debfddb078d2e88011be71b8789550ba2d09197bda40674f1d9a CVE-2022-1733,0,0,4f31822d2de876be63d4783393248684c57681ad975ae959265ca0914c98faa8,2024-11-21T06:41:21.003000 CVE-2022-1734,0,0,33250dc450b207dfb92daec5e242e13cc7dc114dba3fd55de79449e1fc23d422,2024-11-21T06:41:21.163000 CVE-2022-1735,0,0,7d10478262f962b10f91b0fa0afb7932c65e74b875449c50ba648cea6719f0a1,2024-11-21T06:41:21.320000 +CVE-2022-1736,1,1,b0669468fc1b817761f0abf4802d39ebff6fc24ca4915d98da079ec2967858a5,2025-01-31T02:15:28.440000 CVE-2022-1737,0,0,0e3d75f5ba3296d07b3672893a9bafda724caf6ac2129455f810eb13e5fba8ea,2024-11-21T06:41:21.480000 CVE-2022-1738,0,0,a4d4d144e08d80faa4f263a38c61cc18149e6ee52a901860d803985521f1d5a8,2024-11-21T06:41:21.610000 CVE-2022-1739,0,0,cf997b425e6336e401050779d0718a1f58a45843ac1739817935fb7f7f04abc7,2024-11-21T06:41:21.720000 @@ -197330,6 +197332,7 @@ CVE-2022-2865,0,0,794baa87af15b0ea2a9065343d0946c5f462fbdf82f16fbe9e01d8b46a14e6 CVE-2022-28650,0,0,05627b5da76bdebde0bdca3bcdd754487a84abbe70f08eac04003233f01e38b6,2024-11-21T06:57:39.270000 CVE-2022-28651,0,0,ef67704b323ad53083204788c0fa9ed582969f6686754ef0f231443ad28defe7,2024-11-21T06:57:39.393000 CVE-2022-28652,0,0,6028c7eee3555d680f37a7dcfc11f0896d65315b71d174fdc84f276eff470b52,2024-11-21T06:57:39.520000 +CVE-2022-28653,1,1,6c3bf9647d3efe748345b13200760e973f574f0b56e1bea6efe240da454d57a8,2025-01-31T01:15:08.727000 CVE-2022-28654,0,0,ea07dcf35d2fa10ac051dfced437214661594eb15bc3e628b5c69dde3cb8a7f9,2024-11-21T06:57:39.657000 CVE-2022-28655,0,0,6b77792ec87f797aee68224d1bc6414a65e7c103ed9a59f3cfb492af4b19a47e,2024-11-21T06:57:39.837000 CVE-2022-28656,0,0,8db925d376d042656eb6a29d3eb9ef048b428a0ab972c11bd5092144607a22b8,2024-11-21T06:57:40.017000 @@ -213250,6 +213253,7 @@ CVE-2023-0088,0,0,d188407570451afd3a17ede76b506954b3342052eab7e267774fb3b2a709ef CVE-2023-0089,0,0,6c60b4af4ba253b8a4febd07150c06189513f24128db4ff7410488e1fad30c6d,2024-11-21T07:36:31.983000 CVE-2023-0090,0,0,c15c40d6751ee339ab64f5b40aa08a3f54bcdabd5f7800894c5e0a44b85ec207,2024-11-21T07:36:32.103000 CVE-2023-0091,0,0,46c0dab2e7d2216efa636bf9fbc629c5b6c2a3445fae33ad4f8cbb8e71e119c7,2024-11-21T07:36:32.227000 +CVE-2023-0092,1,1,2017fbf485855b4354e02e17959a06a195cdd64e2c666afb49be09c613e2f60a,2025-01-31T02:15:28.550000 CVE-2023-0093,0,0,607afe295d61919d7ead04ba44446a45208196287b6f9acca487fdf4e095524e,2024-11-21T07:36:32.343000 CVE-2023-0094,0,0,a89a17929970dc13f48dcdcd5ee44efd0ad1698543e99f1c3440861d97b08758,2024-11-21T07:36:32.463000 CVE-2023-0095,0,0,6dc8e2554f999fe037965d222c5f05c6cb586eb1f5bdcea4bf6058bcd182fc9d,2024-11-21T07:36:32.640000 @@ -241472,7 +241476,7 @@ CVE-2023-6190,0,0,8ed78538c4041525960b803e88198605546a55c3cf47128d1e30e8cf0cec0d CVE-2023-6191,0,0,674a3b71d2e03d1cc751fb32a048486d4c88546b883dd69f41cb5965fd00e87e,2024-11-21T08:43:19.497000 CVE-2023-6193,0,0,03fd5b3cb55751a3ff3471e4986ed4557dc70e8bb42417035f31e70fadacbbe5,2024-11-21T08:43:19.627000 CVE-2023-6194,0,0,59f670df72e72c8f09561909ca051857ec403afebd9ce05e440183cf16436235,2024-11-21T08:43:19.773000 -CVE-2023-6195,1,1,cc774157f11097de6d1e844dbcedff1f17e9f084a504b8a4ca0666d36630752b,2025-01-31T00:15:08.697000 +CVE-2023-6195,0,0,cc774157f11097de6d1e844dbcedff1f17e9f084a504b8a4ca0666d36630752b,2025-01-31T00:15:08.697000 CVE-2023-6196,0,0,72a55f844f4992430053e0719cd4d7fdeda22743f5a64c02a6af6c8bbee316cf,2024-11-21T08:43:19.917000 CVE-2023-6197,0,0,412bb2a2992bffef076d6449a6c0d1e887e4445ad93dcf75cb3ff71dba1c4130,2024-11-21T08:43:20.060000 CVE-2023-6198,0,0,36ef0c0269a26ece535846b9b762c2d5dfa12050e43dfd499c40199b7f6d148b,2024-11-21T08:43:20.190000 @@ -245223,7 +245227,7 @@ CVE-2024-12105,0,0,652104878b1388acf2a862591967482514a748c9cb01d37e99c6359ca0cc3 CVE-2024-12106,0,0,9e76ee608aca4c651df51a3d1911c7cd5490856624d29775a06f401fa9fe71c0,2025-01-06T16:54:14.560000 CVE-2024-12107,0,0,7da8659dc821ee4f071df4b42d3ae5a3881cc2b8cc55779739dc797df4a302eb,2024-12-04T11:15:05 CVE-2024-12108,0,0,a851d0a44f06acd627e09429b72e15713bd7cb0608174f612b61d76d8c8e9845,2025-01-06T16:51:11.320000 -CVE-2024-1211,1,1,32d530f65bf2c60dac8d5de9f0013a654064aec784500b24493db7e7928d63de,2025-01-31T00:15:08.863000 +CVE-2024-1211,0,0,32d530f65bf2c60dac8d5de9f0013a654064aec784500b24493db7e7928d63de,2025-01-31T00:15:08.863000 CVE-2024-12110,0,0,f266935beaa447960f1dea8d3421db64eefadfd0613c53fd8d2543de02327a47,2024-12-06T09:15:08.270000 CVE-2024-12111,0,0,94cbde89c1eb7b342ad5b2e1b90e676e3d9dc7b09262fa3ba8de5cb41e47a11b,2024-12-19T20:15:06.950000 CVE-2024-12112,0,0,675887d484c30a489c839813de06f4a2c0e83ee331233fc3bb15be475c6237ea,2025-01-08T04:15:06.683000 @@ -246761,7 +246765,7 @@ CVE-2024-1809,0,0,0695041dcd7996a752289634ae1652884b129f864a67876e9d511662212797 CVE-2024-1810,0,0,ef1b9d193b4b6ae88eae6ce0797e5ed9ebca91266d6d772b21365fa841ac4299,2024-11-21T08:51:22.260000 CVE-2024-1811,0,0,b058165d481733ff2f566034bd46cf5c38d757de178902f334844c3785c5239f,2024-11-21T08:51:22.387000 CVE-2024-1812,0,0,a54788c84ddbd2b50d7e20cec09804d60d8562b7f5ea4a3a44c80febe86baeb6,2024-11-21T08:51:22.507000 -CVE-2024-1813,0,0,af9f2bb3eb6bc51b4a215435f235cab2662f97c1f121ca2b9815918d864a5af4,2024-11-21T08:51:22.617000 +CVE-2024-1813,0,1,8a11f5408f56d3036b98d2d2767053da86d5d03b15379a1b6ebbb011fdc88c3a,2025-01-31T01:25:17.393000 CVE-2024-1814,0,0,b1f72ce435b20bd0e1ee07d579e48d7d435132109273eb1e21a4ad380ff59e20,2024-11-21T08:51:22.743000 CVE-2024-1815,0,0,7f45c65a4288b28c557236a804803550ac7f7bfe0122910ba9eed9d92210e1ba,2024-11-21T08:51:22.880000 CVE-2024-1816,0,0,fb2c71310049ea08362fe36bfa86864d1e43f918274976e175d670be0bdeca77,2024-11-21T08:51:22.990000 @@ -246929,7 +246933,7 @@ CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bc CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000 CVE-2024-1990,0,0,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000 -CVE-2024-1991,0,0,d5a6bde57be3916ed448846397b8321aa2019f60be0508a767d23c59db90aa0e,2024-11-21T08:51:45.033000 +CVE-2024-1991,0,1,e17e31758659ee5ba1f674468f604b336ea177778e5fd0e98e79413195a1da3d,2025-01-31T01:32:27.643000 CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000 CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000 CVE-2024-1994,0,0,2799a8fba4da98163d1c8a4201d87bd63ba559669844539136acb52787911a32,2024-11-21T08:51:45.320000 @@ -247962,7 +247966,7 @@ CVE-2024-21166,0,0,a6bd0bb0f14f87d2cb260b91d37d1eb7d306bf89d70257e59bc4b4cc9def7 CVE-2024-21167,0,0,432ec591febd00b127b82a752135eda1c54e57e24bfd3147b2b0c6e5e2008ae0,2024-12-05T21:40:35.573000 CVE-2024-21168,0,0,5fadf957fe7007e144cd8dcc270cf5ce3de12be645969eb83067715a9c5bd8ae,2024-12-05T21:40:25.147000 CVE-2024-21169,0,0,1f544ca6acd3e879097689406f06ebce769fe62e5c81b5c2af0ef227b367a6de,2024-11-21T08:53:55.117000 -CVE-2024-2117,0,0,4dc8becc80d43827dc23129a6337c22574d8832ac0e47b01d711c04a3d9ec761,2024-11-21T09:09:03.910000 +CVE-2024-2117,0,1,89ffb9ce686f74be9b52bd340e828f46f9a064c9853597ff90fcd49600cbbb01,2025-01-31T01:37:06.183000 CVE-2024-21170,0,0,36d3ccb648c24bcb8a4316c968fb01d1c7477a513721d71af5995cdf5d33228b,2024-11-21T08:53:55.247000 CVE-2024-21171,0,0,61b7882ff74299d4c34aa7d4392c360ac819414c7049ab797c7be620c6b6b39e,2024-11-21T08:53:55.370000 CVE-2024-21172,0,0,ff5d0eda037e06e7f32897640b26e512b78468cde367840023f94016b9cff32b,2024-10-21T12:59:49.070000 @@ -248163,7 +248167,7 @@ CVE-2024-21376,0,0,74365a6fe1ea03cb8bcca4b647804df584cc285554299561038c8bdb0cda1 CVE-2024-21377,0,0,d777e0faea661bcf5ad05a74be4dac22794aecdf9241895dff2da6d2b6b8afbc,2024-11-21T08:54:14.150000 CVE-2024-21378,0,0,08b6806b1a75a618830a2c8c05eb7191537ab5daf1f38ff5164da8dafcfd538f,2024-11-21T08:54:14.297000 CVE-2024-21379,0,0,4c561e0350e5a6bbd259a4e8babfa51198fef4e207ca5d304ab64c1cd9a5b834,2024-11-21T08:54:14.427000 -CVE-2024-2138,0,0,52a89346692b6636cd1668ae09391cf23923b189594fe541767af029c016c566,2024-11-21T09:09:06.643000 +CVE-2024-2138,0,1,2ffda663d7330a5f8ae0904a9494747f3a224fc2b9c9cb9ac62fe78f51fc7864,2025-01-31T01:41:07.187000 CVE-2024-21380,0,0,8da7eb3474cc099e42a759c029636cf81b2ddbff1e455ba3cd9a50aa2a07a211,2024-11-21T08:54:14.550000 CVE-2024-21381,0,0,d64ef6d978ecd563782354548f7f42add57e373ee4cd2a62663f79fa7dfca2c9,2024-11-21T08:54:14.680000 CVE-2024-21382,0,0,11ff97c23512fc49419b724e3c797aadd6cbe0714e2907f834de69f472993c08,2024-11-21T08:54:14.803000 @@ -248958,7 +248962,7 @@ CVE-2024-22256,0,0,993de2145831c7f61700fd0ab2fd95ca6c5116ee67bd38000c382e5007dbf CVE-2024-22257,0,0,0fada1e669b9a17b3b43a52e9806a718eecb3983eb74b613ee54514e72e21baf,2024-11-21T08:55:54.403000 CVE-2024-22258,0,0,eaf12a7c8ad5854401b0c00d5a13b7faba9eb9c686cffc7642b0b9f286c4d6d9,2024-12-05T21:15:07.530000 CVE-2024-22259,0,0,dbb569e509ea5651323d4048a88ab3ba6885052f60fe4cb85fc4c34cef61e1fc,2024-11-21T08:55:54.683000 -CVE-2024-2226,0,0,58148007a4d4ff50a71a1cc3bfe097f1a81059dfdb13ac32d0fd5b9aa0d8c69c,2024-11-21T09:09:17.873000 +CVE-2024-2226,0,1,e107cca46a2655e701e8c46100939a0066c75df49d6d2a8a3cb908f83c971a7b,2025-01-31T01:45:28.230000 CVE-2024-22260,0,0,7a7ec824f5ee06e50803ba498f9aef05f0816e9454ff00b22048fb01f9eeb0f0,2024-11-21T08:55:54.833000 CVE-2024-22261,0,0,2f3f327d5f00b5b399eeb14b1642972cb9f1a03fa2d26a05c05601b888eaa6cf,2024-11-21T08:55:54.960000 CVE-2024-22262,0,0,d1dae9c8bed10fc237c952b05c6b18a50635ff407c8788f5b94072234e0e55e1,2024-11-21T08:55:55.080000 @@ -249380,7 +249384,7 @@ CVE-2024-23033,0,0,3ac6629c5b401e92929ee396e66c086b06329f9bd4e0a5a005721cb9868c8 CVE-2024-23034,0,0,f4f664a4a31c484f7eed2bcd4ad32346a076a1dfba5bb52ec53f33d4f295c321,2024-11-21T08:56:51.800000 CVE-2024-2304,0,0,230462e62d4597d9526e82d1b5f4a2f18975cd9c4bc9f381b618660e1e44cfc7,2024-11-21T09:09:28.047000 CVE-2024-23049,0,0,123bfbcf3c065f85e1671e94c372b42e7730e61d2f549ac590a6713bc73df88a,2024-11-21T08:56:51.953000 -CVE-2024-2305,0,0,ebf585b0fc63d5aeb634f952383d1e0c14b5b4ef6ba4de8b432c53217b286d26,2024-11-21T09:09:28.173000 +CVE-2024-2305,0,1,8e03b8f2ed7cc707ba8b68648aaba53ab636fc8cf60b101c18404f02d1218f6c,2025-01-31T01:48:22.557000 CVE-2024-23052,0,0,f64915640578da4aa31f36b2448b98b95ef3ed79182c0b353ac064ff3a6c2d29,2025-01-16T17:53:25.507000 CVE-2024-23054,0,0,57c8ee13e5deea4252b00a79726f9264b2ea14e0ed94c41b033e36787c15e590,2024-11-21T08:56:52.347000 CVE-2024-23055,0,0,424171c81b8faebe79d8fa44169374c5df8b725bc8a3c3cfaa5dd80c008f24c8,2024-11-21T08:56:52.597000 @@ -249547,7 +249551,7 @@ CVE-2024-23246,0,0,dba86fcd1448c512e3001d37ec498b089b198c155206beb9371cc0d8180b4 CVE-2024-23247,0,0,c204ca7ef7979ea0603fec0bd8eddb1c65df637a5bcdac9a9a2ba060eb81fcf4,2024-12-06T01:58:51.233000 CVE-2024-23248,0,0,c48fd9ad2631eef3f53ac5adca0b91801108c15be181b815768304a228795f1c,2024-12-06T01:52:41.503000 CVE-2024-23249,0,0,5da154d890c56feee3aeb01a7ee9508a41a9ca6982e5c902a0c40bac654d6a2e,2024-12-06T01:51:51.123000 -CVE-2024-2325,0,0,453beb4b9b8d8aec78934ca4c38e62a6ce95c98d0294e5c2c907cd71bdb011e5,2024-11-21T09:09:30.457000 +CVE-2024-2325,0,1,e9d7a45ac74cb9e9f2d916c1beca5a8f9ee8a82216a382217b47300a50214cdf,2025-01-31T01:53:16.193000 CVE-2024-23250,0,0,e71404135f796bc9c7f5cde9739de15e0cada9132b6e03839ee534a79eb07fbc,2024-12-06T02:30:56.107000 CVE-2024-23251,0,0,1587640133a2f817ad30f95a94ba7bd8ca5859ce26e39d61bfc476489c905acc,2024-11-21T08:57:18.450000 CVE-2024-23252,0,0,14d67c7764d249aa5fb6c8bb08b3f6111a58e8166149c197fa34aac49c932454,2024-03-26T19:15:48.757000 @@ -249703,7 +249707,7 @@ CVE-2024-23396,0,0,3046ceaa908b73ab3dd595a52812030977739472b3a7f09aa9cadd5541ac4 CVE-2024-23397,0,0,2eb6252aeb61730c91465d754058b0008522b815ef66ad269db9e54267928aab,2025-01-01T00:15:38.550000 CVE-2024-23398,0,0,e88f9120927e9476413a926fb0b918880c7a2e031519af4bc9d0d9ceed8976f4,2025-01-01T00:15:38.607000 CVE-2024-23399,0,0,c5d39a21b30070b8372e260c55ce2bfb8562f41128ebd4c9761d8d6a1c092e11,2025-01-01T00:15:38.680000 -CVE-2024-2340,0,0,c5b40e0d2f54f8d895ab78d87ae8ef170b0cb883382e17c6998adcc28c738df7,2024-11-21T09:09:32.950000 +CVE-2024-2340,0,1,b708670974fb68f4db2179ff00ab23f9a7c04f08cf9b2664c3233e617e696330,2025-01-31T01:57:32.613000 CVE-2024-23400,0,0,c1c7fa9b24fc72031a84aaf751be0aa1d9207bcf72c8a5c077cb22cda9fc6a14,2025-01-01T00:15:38.750000 CVE-2024-23401,0,0,cf1e976858104bf7b85d5a96467fa5fdef66034253393db849eb3f4d24501cf2,2025-01-01T00:15:38.817000 CVE-2024-23402,0,0,8a47257cf8cf9bbe4ed1fcfa3fa826a35a1d95d9519082619e4e0d6a9abd64b2,2025-01-01T00:15:38.883000 @@ -249714,7 +249718,7 @@ CVE-2024-23406,0,0,6632d70cf63187e2d5db68b8be533d52d2a71c1a6a8bf883615c716b65dee CVE-2024-23407,0,0,e54b27f95f95e8b8a99f18855702286c4e1a12b5b3c3ddb6618856497b7f8530,2025-01-01T00:15:39.213000 CVE-2024-23408,0,0,8869056e91b99bceac4adb484bb24bc8dd9c9f436cc5088f317d8b038f75f01a,2025-01-01T00:15:39.287000 CVE-2024-23409,0,0,cc1cb3dfe5bb70f718153978ad3925f2626ffa6968c32e5d9d9a40bd7f076780,2025-01-01T00:15:39.353000 -CVE-2024-2341,0,0,27a8f5765cebc5ea370b34d6397b8dd45fa3b6ccad0be41b03ef456e1274f9f1,2024-11-21T09:09:33.090000 +CVE-2024-2341,0,1,e6fd41dd6461488d38a24bccb99f5e22ba326a663a2d761a5cd5988edd87d982,2025-01-31T02:02:01.173000 CVE-2024-23410,0,0,5045f508c9d245b3fd8d60012e1a58df0137c84c6e169586f2239396bed0a1ec,2025-01-01T00:15:39.410000 CVE-2024-23411,0,0,888f4db91a9816eb333443152b669ba8a17e49794eb6f6d5965f7ecd74a461d0,2025-01-01T00:15:39.470000 CVE-2024-23412,0,0,550760e96400b77f6a315acb5c566be08f9642548ff6d18e15331565b7095268,2025-01-01T00:15:39.533000 @@ -249725,7 +249729,7 @@ CVE-2024-23416,0,0,c26b1d059b352cfba2580ba9de4f2d9a7e2afa996413289605a061816c11e CVE-2024-23417,0,0,36a492d9bd4eb7bdaa571a950db8097ba7140fbbd8786f7d94eb400d6f61698f,2025-01-01T00:15:39.850000 CVE-2024-23418,0,0,b9a0039ce552f8561e56e92c3c42626636761c919712584962a0d55673bea1d2,2025-01-01T00:15:39.910000 CVE-2024-23419,0,0,6b5f4a05a471454df189ec43a000b6c92041cdac5504094ad6bd23f4be53e903,2025-01-01T00:15:39.970000 -CVE-2024-2342,0,0,2686d0d764b1cef6f46e8b8e7c1dd7ada4af34ce4c3fa49f721c6ef7016f045f,2024-11-21T09:09:33.223000 +CVE-2024-2342,0,1,5969e172bb17c16c2817e29023111094c71c743466e60a2465e365add63773f2,2025-01-31T02:04:01.137000 CVE-2024-23420,0,0,69afeb8db87b287a36d94b45bf19289154879c0b6414d14de6a7bb4afcc332b8,2025-01-01T00:15:40.037000 CVE-2024-23421,0,0,f6d475246274171fe2909ecd3714348684ae173bc256a02c767ef1fe49b09f4f,2025-01-01T00:15:40.100000 CVE-2024-23422,0,0,a6c4af7b91dae3c549126d461b022109b184bfd297970d0c36c6382149f2e3c0,2025-01-01T00:15:40.163000 @@ -249736,7 +249740,7 @@ CVE-2024-23426,0,0,d362a9499347a86c4013fac201077c7ee926840fd2665d5bd58a1b143e7c7 CVE-2024-23427,0,0,bf9b1ce4e8b60e120c9e8e79d50f5779ff56e34b8f6868aa7ac1516304982bf6,2025-01-01T00:15:40.477000 CVE-2024-23428,0,0,1e9ea1eb7ad430366e0f2732ebcc64571734d8c263746bcfd871d9b25c72630d,2025-01-01T00:15:40.543000 CVE-2024-23429,0,0,e8e828161cd5e2b7ef2fd65d37b548c14b34c00fffe254c543f5ebc5a00c341c,2025-01-01T00:15:40.607000 -CVE-2024-2343,0,0,ff9964481c43aa0f18599732f44e073db21b70998c79c5208b453b3e6a942b69,2024-11-21T09:09:33.350000 +CVE-2024-2343,0,1,32a6a2d66fb113d644a9c5d82a8edeb496ef12dfbddfcc64caa8414159e904a4,2025-01-31T02:08:29.417000 CVE-2024-23430,0,0,b245320d91535cd01f34459b21c02446d04b827eaf02e28147a3b5a9e4f699c7,2025-01-01T00:15:40.670000 CVE-2024-23431,0,0,d346c1ded25732c69b97411ec7e1a91f0fc1b1aacd8003918d973866cdc97754,2025-01-01T00:15:40.727000 CVE-2024-23432,0,0,4b0a62a7fc9b3de8555667118dad22468af386a34ff7b0bb5a5bd51c103c206e,2025-01-01T00:15:40.793000 @@ -250192,16 +250196,19 @@ CVE-2024-23917,0,0,87446e79af64f56ab4b2f0757fc8cfd7321e882a0255933c4f0f19299c37c CVE-2024-23918,0,0,b899df058c396303cc4d9dbbab88919628903240d3fbc9fd19e8667d12d0e55c,2024-11-15T14:00:09.720000 CVE-2024-23919,0,0,058e35e0621537e23cbd18e05aae6e013440d01fecbaaddd297d731639d19875,2024-11-15T14:00:09.720000 CVE-2024-2392,0,0,eeaf76ffa059802be448df469408e08c4579d4ec4b5263bd4359d00f105d8d03,2025-01-28T18:32:57.513000 +CVE-2024-23920,1,1,f99e25f33e56ffbd7288181b382b02b2bfd9552589b2c639cbf60b3479040b2d,2025-01-31T01:15:09.483000 +CVE-2024-23921,1,1,4ea4b618e36fc88ef24386e22737b92d45bbc65c24e79a1beac41ad8d94a7f0c,2025-01-31T01:15:09.593000 CVE-2024-23922,0,0,2d559582d23c0b1aa77c5c48b51f0b0c564ebc51a759834728fd4f27625943e0,2024-09-30T15:37:28.453000 CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2cf16,2024-10-03T18:07:35.977000 CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 -CVE-2024-23928,1,1,5411d9272c1a5a621d9f3d2e6ccb28ceb427a63dbc56730b74239818ce56f1d1,2025-01-31T00:15:09.030000 +CVE-2024-23928,0,0,5411d9272c1a5a621d9f3d2e6ccb28ceb427a63dbc56730b74239818ce56f1d1,2025-01-31T00:15:09.030000 +CVE-2024-23929,1,1,56123b9ce5553a7639a1aba360e38138070f2f5cd459a15243fa222c3f91e652,2025-01-31T01:15:09.697000 CVE-2024-2393,0,0,b6127d3f8197d098d229238d65ed3c274935d9588c7b7a15821e57a641aa69a9,2024-11-21T09:09:39.413000 -CVE-2024-23930,1,1,7c032c39b9a65ef6c02a997c6d0d3110786beb878ebc540d6c49d3b447bd601d,2025-01-31T00:15:09.147000 +CVE-2024-23930,0,0,7c032c39b9a65ef6c02a997c6d0d3110786beb878ebc540d6c49d3b447bd601d,2025-01-31T00:15:09.147000 CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000 CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000 CVE-2024-23935,0,0,8074757a7750aac4e40a15499625e0de0f941684b6e4e8032ec6635cd7c0aafb,2024-10-03T18:07:01.967000 -CVE-2024-23937,1,1,24af6bad61351de0dcfe24df81f30ce5cbb22e6232fcea12851a7e4859a990c3,2025-01-31T00:15:09.257000 +CVE-2024-23937,0,0,24af6bad61351de0dcfe24df81f30ce5cbb22e6232fcea12851a7e4859a990c3,2025-01-31T00:15:09.257000 CVE-2024-23938,0,0,5569f095c88d3edc91da7b05d4b47aad5d8c07d6eab7699149a618af2c5b094a,2024-10-03T17:29:28.230000 CVE-2024-2394,0,0,621d534b6e99ea3eb7663377d97ee0e05ad2be3959f632056cfe6794bf2d117f,2024-11-21T09:09:39.550000 CVE-2024-23940,0,0,06d04c2e3a7f29a0e7a62a5331ae3d9d5c7acce3a81c480978850a16e4f0b74a,2024-11-21T08:58:43.807000 @@ -250222,16 +250229,16 @@ CVE-2024-23958,0,0,6fe18b86fa35472f01534c3eeba14711dd9e2cdb206262a323b3a33e5af27 CVE-2024-23959,0,0,55515de9820dc00037a0b8188d9aae2673ee68b5d649634b981bc6ce6024af1f,2024-10-03T17:42:03.650000 CVE-2024-23960,0,0,cff56ab82ea9e077741b7c7712db67327c7a66944d1aacabc3102eca8aa98039,2024-10-03T18:06:26.457000 CVE-2024-23961,0,0,cddb82f65f7f594870e3234d43ec53693c26d34fff040eeedd46a915ad4dd550,2024-10-03T18:06:59.083000 -CVE-2024-23962,1,1,74681b850f1fc9fad5ded385cd4fa7d962da2f7e200b3b0e73a07785086473a7,2025-01-31T00:15:09.367000 -CVE-2024-23963,1,1,6108221548131f2f3e3765d1c26eaa8d41f1537f9c20c59cbfb9cc41211e5c05,2025-01-31T00:15:09.483000 +CVE-2024-23962,0,0,74681b850f1fc9fad5ded385cd4fa7d962da2f7e200b3b0e73a07785086473a7,2025-01-31T00:15:09.367000 +CVE-2024-23963,0,0,6108221548131f2f3e3765d1c26eaa8d41f1537f9c20c59cbfb9cc41211e5c05,2025-01-31T00:15:09.483000 CVE-2024-23967,0,0,7280cb7c94ec5dda172d5df2bf80662cc9068f65953193c91dccf565d7d9da83,2024-10-03T17:37:37.907000 -CVE-2024-23968,1,1,95298310eddb8597c0e66221e981a88d853baa7f2fc8e00d871d9a6d29ecf0ea,2025-01-31T00:15:09.593000 -CVE-2024-23969,1,1,18861054b5ffc1db58d21c09d8c9eb7a84d143d2dc35da378a87f9bab477594c,2025-01-31T00:15:09.703000 +CVE-2024-23968,0,0,95298310eddb8597c0e66221e981a88d853baa7f2fc8e00d871d9a6d29ecf0ea,2025-01-31T00:15:09.593000 +CVE-2024-23969,0,0,18861054b5ffc1db58d21c09d8c9eb7a84d143d2dc35da378a87f9bab477594c,2025-01-31T00:15:09.703000 CVE-2024-2397,0,0,5fb0197db4b3c4d2227b13547694e85857b7a4c74effd50b8a6745026ec33bdc,2024-11-21T09:09:39.813000 -CVE-2024-23970,1,1,89562f29d73cd9fd5fa39f13917218fe4c893d6c725cf64696f63b3f606d5cd5,2025-01-31T00:15:09.810000 -CVE-2024-23971,1,1,52f01954a7c5cb68a42e7813a33ad36ec91f4ececa14e67cc3b671e8be1b9a3e,2025-01-31T00:15:09.920000 +CVE-2024-23970,0,0,89562f29d73cd9fd5fa39f13917218fe4c893d6c725cf64696f63b3f606d5cd5,2025-01-31T00:15:09.810000 +CVE-2024-23971,0,0,52f01954a7c5cb68a42e7813a33ad36ec91f4ececa14e67cc3b671e8be1b9a3e,2025-01-31T00:15:09.920000 CVE-2024-23972,0,0,c1da4dfb8070c5982ab47e4270a0ccda6bc573b9715ff386ebc743af774de5bf,2024-09-30T15:37:30.903000 -CVE-2024-23973,1,1,9aeb316aeb64f2a02b0c2c201b7f456c16f6f79700cf9e84d54457faf3376693,2025-01-31T00:15:10.027000 +CVE-2024-23973,0,0,9aeb316aeb64f2a02b0c2c201b7f456c16f6f79700cf9e84d54457faf3376693,2025-01-31T00:15:10.027000 CVE-2024-23974,0,0,35a59c7b28e59857044701b56dc055f1b24022c784e66981040930f49ee8a096,2024-08-14T17:49:14.177000 CVE-2024-23975,0,0,3d9da3af337279e9b313ac08550c2e823f587b547ba35308d77261dd2e00a96d,2024-11-21T08:58:46.250000 CVE-2024-23976,0,0,0a3cf0bfcca01615b967f2d2997adff248a3f967097a8f4e588dad3de97db194,2025-01-23T19:52:58.893000 @@ -250616,7 +250623,7 @@ CVE-2024-24722,0,0,529073a94c0afc8e4c2b275941e85310bdd004590c069c0bb6a7f444192f5 CVE-2024-24724,0,0,1d4f547e29f1ac6cd7eb5ae81fd8b236270fe4c23ef6bd5d247bd14b860d3f45,2024-11-21T08:59:35.290000 CVE-2024-24725,0,0,d017b08edcbd2a3884154e1dbc0dbc1ac3aa94a44515a00866c71ade3dc58c6c,2024-11-21T08:59:35.513000 CVE-2024-2473,0,0,acadb547139f591a97806220ebdf2a3534557dbddc3fc15183d421387cd351e4,2024-11-21T09:09:49.860000 -CVE-2024-24731,1,1,82cd697dfd1151765ad73c776837b6734939ae00a1761c923cbd6fa960262cb5,2025-01-31T00:15:10.137000 +CVE-2024-24731,0,0,82cd697dfd1151765ad73c776837b6734939ae00a1761c923cbd6fa960262cb5,2025-01-31T00:15:10.137000 CVE-2024-24736,0,0,d0fa5e077e44be2d79b6fcbd911bf7ac67fb3df6bf0c252c9b605cc03f993ae3,2024-11-21T08:59:35.727000 CVE-2024-24739,0,0,6787b39ccf56a39b6b5f966ae1bc0cc7aab398904a033df39fc9b573881219e7,2024-11-21T08:59:35.887000 CVE-2024-2474,0,0,37d7ab7215e32fd563c4e70b124becb40537dfa1c8a597cea490413dbe83653a,2024-11-21T09:09:49.993000 @@ -257880,7 +257887,7 @@ CVE-2024-34223,0,0,c2ee839afb9b1fac1c90169923bdab548a7c7cf9533cc5507d2fca08bb6f0 CVE-2024-34224,0,0,3a60fcfa0164eec7a80099b3676c3554e933619cb6a29b591672b45bc0c440e9,2024-11-21T09:18:20.030000 CVE-2024-34225,0,0,6d2138de3835c9191c51c4afb4300d242b9779d66092f9c88507f5e324d1fce4,2024-11-21T09:18:20.260000 CVE-2024-34226,0,0,1d377f61cf795fbe00be67ffd9f00a82954a881e118fc5adc61c7c13a7e4cd17,2024-11-21T09:18:20.477000 -CVE-2024-3423,0,0,04c44e8c396e88e33e76b227756ab6e4a3cdb303568294582004d57706273469,2024-11-21T09:29:34.370000 +CVE-2024-3423,0,1,5c28f6a27e8c49f5d0774f94cea4e72250ac0f626cffdb04fd7d52cfa4e7c084,2025-01-31T01:22:52.200000 CVE-2024-34230,0,0,ee5efe3516751b032076977625757928f003fe090164432914314acde3d27151,2024-11-21T09:18:20.700000 CVE-2024-34231,0,0,29220a31577fead32a56d0eaaed07b40b7e0f50ecbc13725dd1aa6abfb3d2ca2,2024-11-21T09:18:20.947000 CVE-2024-34235,0,0,dab26bff88668dca45ccc233b8bf548c9cad07c0297c9b8098d31cd0ae0063e1,2025-01-22T15:15:12.900000 @@ -278332,7 +278339,7 @@ CVE-2025-21389,0,0,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 CVE-2025-21396,0,0,8fe692a379ce2414e6e0333af1d8968765358477dbdc34cfe813f989291fa433,2025-01-29T23:15:32.640000 -CVE-2025-21399,0,0,35cd7b1b1969accaedcde29eba1e481458b35a096143c28ca4c47fcddb55b1c9,2025-01-17T21:15:11.283000 +CVE-2025-21399,0,1,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 @@ -279361,7 +279368,7 @@ CVE-2025-24169,0,0,6d755845d64c6951c077fbd505366a52b470f5f801a7504189b5dfcb4650f CVE-2025-24174,0,0,be06ee7f489987d682aeeea47e1dd78afc2054cd3b573d5b857e79bdfbd28045,2025-01-28T16:15:44.490000 CVE-2025-24176,0,0,0a13e167281064295cb7d6ac3b662de69e357179cbe1fefabb03dbb784e50b69,2025-01-28T16:15:44.630000 CVE-2025-24177,0,0,7093231474cd37fc1206cb86983fb697c3827c42e0c7d917cda4d55518409c14,2025-01-30T16:26:45.687000 -CVE-2025-24336,1,1,1aa8b22c952431e7547e9cae53c4b88dde35cd11b44cdaca2c824f85347f12ef,2025-01-31T00:15:20.607000 +CVE-2025-24336,0,0,1aa8b22c952431e7547e9cae53c4b88dde35cd11b44cdaca2c824f85347f12ef,2025-01-31T00:15:20.607000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 CVE-2025-24354,0,0,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000 @@ -279567,5 +279574,5 @@ CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab9 CVE-2025-24882,0,0,a23ce05efaa4af8c3630627536762c229213516f16a0fddf8927088c78e2a99f,2025-01-29T18:15:47.570000 CVE-2025-24883,0,0,e4977be39a4935cccc31d44b4babca335570d7230803a869c62284a8184b38eb,2025-01-30T16:15:31.947000 CVE-2025-24884,0,0,a1ca36a099d9726efc182c133a664383454ee2f707a06a51fc353abfffeb9263,2025-01-29T21:15:21.667000 -CVE-2025-24885,1,1,6db9bb3eb3b2095c8c21eef287986cb79d8d13f16a086eb14d1d414a2f8264a4,2025-01-30T23:15:07.993000 -CVE-2025-24886,1,1,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000 +CVE-2025-24885,0,0,6db9bb3eb3b2095c8c21eef287986cb79d8d13f16a086eb14d1d414a2f8264a4,2025-01-30T23:15:07.993000 +CVE-2025-24886,0,0,22fe46ec70a40a868eba2ce8010e4edb050dca5246d72f260cb907446680300d,2025-01-30T23:15:08.990000