diff --git a/CVE-2023/CVE-2023-322xx/CVE-2023-32221.json b/CVE-2023/CVE-2023-322xx/CVE-2023-32221.json index 2678da74966..414b6e7dead 100644 --- a/CVE-2023/CVE-2023-322xx/CVE-2023-32221.json +++ b/CVE-2023/CVE-2023-322xx/CVE-2023-32221.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32221", "sourceIdentifier": "cna@cyber.gov.il", "published": "2023-06-12T21:15:22.737", - "lastModified": "2024-11-21T08:02:55.783", + "lastModified": "2025-01-04T00:15:06.207", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-116xx/CVE-2024-11624.json b/CVE-2024/CVE-2024-116xx/CVE-2024-11624.json index b1ef3ecfd45..2ef4862c954 100644 --- a/CVE-2024/CVE-2024-116xx/CVE-2024-11624.json +++ b/CVE-2024/CVE-2024-116xx/CVE-2024-11624.json @@ -2,16 +2,55 @@ "id": "CVE-2024-11624", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.030", - "lastModified": "2025-01-03T04:15:06.030", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:06.157", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "there is a possible to add apps to bypass VPN due to Undeclared Permission . This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe la posibilidad de agregar aplicaciones para omitir la VPN debido a permisos no declarados. Esto podr\u00eda generar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json b/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json new file mode 100644 index 00000000000..883ebe08324 --- /dev/null +++ b/CVE-2024/CVE-2024-117xx/CVE-2024-11733.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-11733", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-03T23:15:06.313", + "lastModified": "2025-01-03T23:15:06.313", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The The WordPress Popular Posts plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 7.1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wordpress-popular-posts/tags/7.1.0/src/Rest/ViewLoggerEndpoint.php#L70", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c38ac8d6-c6de-4be7-bf7b-198e085a0ad2?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json b/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json new file mode 100644 index 00000000000..02b17027116 --- /dev/null +++ b/CVE-2024/CVE-2024-122xx/CVE-2024-12237.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-12237", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-01-03T23:15:06.473", + "lastModified": "2025-01-03T23:15:06.473", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Photo Gallery Slideshow & Masonry Tiled Gallery plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.15 via the rjg_get_youtube_info_justified_gallery_callback function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to retrieve limited information from internal services." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3023", + "source": "security@wordfence.com" + }, + { + "url": "https://plugins.trac.wordpress.org/browser/wp-responsive-photo-gallery/tags/1.0.15/wp-responsive-photo-gallery.php#L3044", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/08e44434-8908-4c63-9e5b-9a8b387255d9?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json index 503613b3779..5b7796bd8f3 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43767.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43767", "sourceIdentifier": "security@android.com", "published": "2025-01-03T01:15:07.847", - "lastModified": "2025-01-03T01:15:07.847", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:06.627", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In prepare_to_draw_into_mask of SkBlurMaskFilterImpl.cpp, there is a possible heap overflow due to improper input validation. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En prepare_to_draw_into_mask de SkBlurMaskFilterImpl.cpp, existe un posible desbordamiento de pila debido a una validaci\u00f3n de entrada incorrecta. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/external/skia/+/796c2040f641bb287dba66c9823ce45e9f8b5807", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43768.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43768.json index 36486cbe553..7dabcab3c5a 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43768.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43768.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43768", "sourceIdentifier": "security@android.com", "published": "2025-01-03T01:15:07.923", - "lastModified": "2025-01-03T01:15:07.923", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:06.767", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In skia_alloc_func of SkDeflate.cpp, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En skia_alloc_func de SkDeflate.cpp, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/external/skia/+/b5543cb8c6b95623743016055220378efe73eb93", diff --git a/CVE-2024/CVE-2024-437xx/CVE-2024-43769.json b/CVE-2024/CVE-2024-437xx/CVE-2024-43769.json index 0c8d2361f3b..d57106d9480 100644 --- a/CVE-2024/CVE-2024-437xx/CVE-2024-43769.json +++ b/CVE-2024/CVE-2024-437xx/CVE-2024-43769.json @@ -2,16 +2,55 @@ "id": "CVE-2024-43769", "sourceIdentifier": "security@android.com", "published": "2025-01-03T01:15:08.003", - "lastModified": "2025-01-03T01:15:08.003", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:06.903", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In isPackageDeviceAdmin of PackageManagerService.java, there is a possible edge case which could prevent the uninstallation of CloudDpc due to a logic error in the code. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En isPackageDeviceAdmin de PackageManagerService.java, existe un posible caso extremo que podr\u00eda impedir la desinstalaci\u00f3n de CloudDpc debido a un error l\u00f3gico en el c\u00f3digo. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://android.googlesource.com/platform/frameworks/base/+/619ffc299bf33566ba6daee8301ee0fc96e015f4", diff --git a/CVE-2024/CVE-2024-470xx/CVE-2024-47032.json b/CVE-2024/CVE-2024-470xx/CVE-2024-47032.json index 6282a75db53..356b4682e15 100644 --- a/CVE-2024/CVE-2024-470xx/CVE-2024-47032.json +++ b/CVE-2024/CVE-2024-470xx/CVE-2024-47032.json @@ -2,16 +2,55 @@ "id": "CVE-2024-47032", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.137", - "lastModified": "2025-01-03T04:15:06.137", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.047", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In construct_transaction_from_cmd of lwis_ioctl.c, there is a possible out of bounds write due to a heap buffer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En construct_transaction_from_cmd de lwis_ioctl.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento del b\u00fafer de mont\u00f3n. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53834.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53834.json index 4421c06fc90..d6de649a35e 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53834.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53834.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53834", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.310", - "lastModified": "2025-01-03T04:15:06.310", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.190", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In sms_DisplayHexDumpOfPrivacyBuffer of sms_Utilities.c, there is a possible out of bounds read due to an incorrect bounds check. This could lead to remote information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En sms_DisplayHexDumpOfPrivacyBuffer de sms_Utilities.c, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53835.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53835.json index 38433eba32c..545d923300b 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53835.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53835.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53835", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.383", - "lastModified": "2025-01-03T04:15:06.383", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.333", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53836.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53836.json index 13a36e99a1c..e0418e933e8 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53836.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53836.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53836", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.470", - "lastModified": "2025-01-03T04:15:06.470", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.470", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In wbrc_bt_dev_write of wb_regon_coordinator.c, there is a possible out of bounds write due to a buffer overflow. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En wbrc_bt_dev_write de wb_regon_coordinator.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de b\u00fafer. Esto podr\u00eda provocar una escalada local de privilegios, siendo necesarios los privilegios de ejecuci\u00f3n del sistema. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53837.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53837.json index dd5d27f2174..a66567d016b 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53837.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53837.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53837", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.560", - "lastModified": "2025-01-03T04:15:06.560", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.620", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In prepare_response of lwis_periodic_io.c, there is a possible out of bounds write due to an integer overflow. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En prepare_response de lwis_periodic_io.c, existe una posible escritura fuera de los l\u00edmites debido a un desbordamiento de n\u00fameros enteros. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53838.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53838.json index 2d4c0d27870..3cc7df7ae71 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53838.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53838.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53838", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.650", - "lastModified": "2025-01-03T04:15:06.650", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.747", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Exynos_parsing_user_data_registered_itu_t_t35 of VendorVideoAPI.cpp, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En Exynos_parsing_user_data_registered_itu_t_t35 de VendorVideoAPI.cpp, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites incorrecta. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita la interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53839.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53839.json index 563fbf7b952..8f7075a4f97 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53839.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53839.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53839", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.727", - "lastModified": "2025-01-03T04:15:06.727", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:07.883", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In GetCellInfoList() of protocolnetadapter.cpp, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with baseband firmware compromise required. User Interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En GetCellInfoList() de protocolnetadapter.cpp, existe una posible lectura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la divulgaci\u00f3n de informaci\u00f3n local y comprometer el firmware de banda base. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53840.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53840.json index fea8af3a507..7d6601f1711 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53840.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53840.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53840", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.810", - "lastModified": "2025-01-03T04:15:06.810", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:08.020", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "there is a possible biometric bypass due to an unusual root cause. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "Existe la posibilidad de una omisi\u00f3n biom\u00e9trica debido a una causa ra\u00edz inusual. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53841.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53841.json index 6bb2eab63a4..48bc4ba611c 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53841.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53841.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53841", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.893", - "lastModified": "2025-01-03T04:15:06.893", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:08.153", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In startListeningForDeviceStateChanges, there is a possible Permission Bypass due to a confused deputy. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En startListeningForDeviceStateChanges, existe una posible omisi\u00f3n de permisos debido a un subordinado confundido. Esto podr\u00eda provocar una escalada local de privilegios sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-538xx/CVE-2024-53842.json b/CVE-2024/CVE-2024-538xx/CVE-2024-53842.json index 2ce0a13c0d2..ce93119fcce 100644 --- a/CVE-2024/CVE-2024-538xx/CVE-2024-53842.json +++ b/CVE-2024/CVE-2024-538xx/CVE-2024-53842.json @@ -2,16 +2,55 @@ "id": "CVE-2024-53842", "sourceIdentifier": "dsap-vuln-management@google.com", "published": "2025-01-03T04:15:06.980", - "lastModified": "2025-01-03T04:15:06.980", - "vulnStatus": "Received", + "lastModified": "2025-01-03T23:15:08.293", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In cc_SendCcImsInfoIndMsg of cc_MmConManagement.c, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation." + }, + { + "lang": "es", + "value": "En cc_SendCcImsInfoIndMsg de cc_MmConManagement.c, existe una posible escritura fuera de los l\u00edmites debido a una verificaci\u00f3n de los l\u00edmites faltante. Esto podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo sin necesidad de privilegios de ejecuci\u00f3n adicionales. No se necesita interacci\u00f3n del usuario para la explotaci\u00f3n." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], - "metrics": {}, "references": [ { "url": "https://source.android.com/security/bulletin/pixel/2024-12-01", diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json new file mode 100644 index 00000000000..6ce95fed461 --- /dev/null +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55896.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-55896", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-03T23:15:08.437", + "lastModified": "2025-01-03T23:15:08.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 contains improper restrictions when rendering content via iFrames. \u00a0This vulnerability could allow an attacker to gain improper access and perform unauthorized actions on the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180036", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json b/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json new file mode 100644 index 00000000000..01905b44219 --- /dev/null +++ b/CVE-2024/CVE-2024-558xx/CVE-2024-55897.json @@ -0,0 +1,44 @@ +{ + "id": "CVE-2024-55897", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-03T23:15:08.573", + "lastModified": "2025-01-03T23:15:08.573", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM PowerHA SystemMirror for i 7.4 and 7.5 \n\ndoes not set the secure attribute on authorization tokens or session cookies. Attackers may be able to get the cookie values by sending a http:// link to a user or by planting this link in a site the user goes to. The cookie will be sent to the insecure link and the attacker can then obtain the cookie value by snooping the traffic." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180036", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json new file mode 100644 index 00000000000..18a94165972 --- /dev/null +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0199.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0199", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-03T23:15:08.707", + "lastModified": "2025-01-03T23:15:08.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/Masamuneee/eff0a0865d54305faa78624e63172a92", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.290136", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.290136", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.473384", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-223xx/CVE-2025-22376.json b/CVE-2025/CVE-2025-223xx/CVE-2025-22376.json index f56fdc6df00..a0f44f392e6 100644 --- a/CVE-2025/CVE-2025-223xx/CVE-2025-22376.json +++ b/CVE-2025/CVE-2025-223xx/CVE-2025-22376.json @@ -2,7 +2,7 @@ "id": "CVE-2025-22376", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-03T22:15:07.917", - "lastModified": "2025-01-03T22:15:07.917", + "lastModified": "2025-01-03T23:15:08.897", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "In Net::OAuth::Client in the Net::OAuth package before 0.29 for Perl, the default nonce is a 32-bit integer generated from the built-in rand() function, which is not cryptographically strong." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "cve@mitre.org", @@ -22,6 +45,16 @@ "value": "CWE-338" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-338" + } + ] } ], "references": [ diff --git a/README.md b/README.md index 44fd937a41a..1e9460db074 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-03T23:00:21.059268+00:00 +2025-01-04T00:55:19.776186+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-03T22:49:49.463000+00:00 +2025-01-04T00:15:06.207000+00:00 ``` ### Last Data Feed Release @@ -33,42 +33,40 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275673 +275678 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `5` -- [CVE-2024-13129](CVE-2024/CVE-2024-131xx/CVE-2024-13129.json) (`2025-01-03T22:15:06.677`) -- [CVE-2024-56332](CVE-2024/CVE-2024-563xx/CVE-2024-56332.json) (`2025-01-03T21:15:13.550`) -- [CVE-2025-0198](CVE-2025/CVE-2025-01xx/CVE-2025-0198.json) (`2025-01-03T21:15:14.053`) -- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T22:15:07.917`) +- [CVE-2024-11733](CVE-2024/CVE-2024-117xx/CVE-2024-11733.json) (`2025-01-03T23:15:06.313`) +- [CVE-2024-12237](CVE-2024/CVE-2024-122xx/CVE-2024-12237.json) (`2025-01-03T23:15:06.473`) +- [CVE-2024-55896](CVE-2024/CVE-2024-558xx/CVE-2024-55896.json) (`2025-01-03T23:15:08.437`) +- [CVE-2024-55897](CVE-2024/CVE-2024-558xx/CVE-2024-55897.json) (`2025-01-03T23:15:08.573`) +- [CVE-2025-0199](CVE-2025/CVE-2025-01xx/CVE-2025-0199.json) (`2025-01-03T23:15:08.707`) ### CVEs modified in the last Commit -Recently modified CVEs: `19` +Recently modified CVEs: `16` -- [CVE-2022-27539](CVE-2022/CVE-2022-275xx/CVE-2022-27539.json) (`2025-01-03T21:15:07.173`) -- [CVE-2022-27541](CVE-2022/CVE-2022-275xx/CVE-2022-27541.json) (`2025-01-03T21:15:08.570`) -- [CVE-2023-27837](CVE-2023/CVE-2023-278xx/CVE-2023-27837.json) (`2025-01-03T21:15:11.333`) -- [CVE-2023-29160](CVE-2023/CVE-2023-291xx/CVE-2023-29160.json) (`2025-01-03T21:15:11.997`) -- [CVE-2023-29167](CVE-2023/CVE-2023-291xx/CVE-2023-29167.json) (`2025-01-03T21:15:12.217`) -- [CVE-2023-29498](CVE-2023/CVE-2023-294xx/CVE-2023-29498.json) (`2025-01-03T21:15:12.417`) -- [CVE-2023-29562](CVE-2023/CVE-2023-295xx/CVE-2023-29562.json) (`2025-01-03T21:15:12.693`) -- [CVE-2024-35365](CVE-2024/CVE-2024-353xx/CVE-2024-35365.json) (`2025-01-03T21:15:12.940`) -- [CVE-2024-36613](CVE-2024/CVE-2024-366xx/CVE-2024-36613.json) (`2025-01-03T21:15:13.140`) -- [CVE-2024-43077](CVE-2024/CVE-2024-430xx/CVE-2024-43077.json) (`2025-01-03T22:15:07.360`) -- [CVE-2024-43097](CVE-2024/CVE-2024-430xx/CVE-2024-43097.json) (`2025-01-03T22:15:07.503`) -- [CVE-2024-43762](CVE-2024/CVE-2024-437xx/CVE-2024-43762.json) (`2025-01-03T22:15:07.640`) -- [CVE-2024-43764](CVE-2024/CVE-2024-437xx/CVE-2024-43764.json) (`2025-01-03T22:15:07.783`) -- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T21:15:13.340`) -- [CVE-2024-56410](CVE-2024/CVE-2024-564xx/CVE-2024-56410.json) (`2025-01-03T21:15:13.723`) -- [CVE-2024-8811](CVE-2024/CVE-2024-88xx/CVE-2024-8811.json) (`2025-01-03T22:49:49.463`) -- [CVE-2024-9257](CVE-2024/CVE-2024-92xx/CVE-2024-9257.json) (`2025-01-03T22:07:42.553`) -- [CVE-2024-9665](CVE-2024/CVE-2024-96xx/CVE-2024-9665.json) (`2025-01-03T21:58:29.893`) -- [CVE-2024-9710](CVE-2024/CVE-2024-97xx/CVE-2024-9710.json) (`2025-01-03T21:36:39.877`) +- [CVE-2023-32221](CVE-2023/CVE-2023-322xx/CVE-2023-32221.json) (`2025-01-04T00:15:06.207`) +- [CVE-2024-11624](CVE-2024/CVE-2024-116xx/CVE-2024-11624.json) (`2025-01-03T23:15:06.157`) +- [CVE-2024-43767](CVE-2024/CVE-2024-437xx/CVE-2024-43767.json) (`2025-01-03T23:15:06.627`) +- [CVE-2024-43768](CVE-2024/CVE-2024-437xx/CVE-2024-43768.json) (`2025-01-03T23:15:06.767`) +- [CVE-2024-43769](CVE-2024/CVE-2024-437xx/CVE-2024-43769.json) (`2025-01-03T23:15:06.903`) +- [CVE-2024-47032](CVE-2024/CVE-2024-470xx/CVE-2024-47032.json) (`2025-01-03T23:15:07.047`) +- [CVE-2024-53834](CVE-2024/CVE-2024-538xx/CVE-2024-53834.json) (`2025-01-03T23:15:07.190`) +- [CVE-2024-53835](CVE-2024/CVE-2024-538xx/CVE-2024-53835.json) (`2025-01-03T23:15:07.333`) +- [CVE-2024-53836](CVE-2024/CVE-2024-538xx/CVE-2024-53836.json) (`2025-01-03T23:15:07.470`) +- [CVE-2024-53837](CVE-2024/CVE-2024-538xx/CVE-2024-53837.json) (`2025-01-03T23:15:07.620`) +- [CVE-2024-53838](CVE-2024/CVE-2024-538xx/CVE-2024-53838.json) (`2025-01-03T23:15:07.747`) +- [CVE-2024-53839](CVE-2024/CVE-2024-538xx/CVE-2024-53839.json) (`2025-01-03T23:15:07.883`) +- [CVE-2024-53840](CVE-2024/CVE-2024-538xx/CVE-2024-53840.json) (`2025-01-03T23:15:08.020`) +- [CVE-2024-53841](CVE-2024/CVE-2024-538xx/CVE-2024-53841.json) (`2025-01-03T23:15:08.153`) +- [CVE-2024-53842](CVE-2024/CVE-2024-538xx/CVE-2024-53842.json) (`2025-01-03T23:15:08.293`) +- [CVE-2025-22376](CVE-2025/CVE-2025-223xx/CVE-2025-22376.json) (`2025-01-03T23:15:08.897`) ## Download and Usage diff --git a/_state.csv b/_state.csv index a82b2a6a774..5882043717c 100644 --- a/_state.csv +++ b/_state.csv @@ -196418,10 +196418,10 @@ CVE-2022-27535,0,0,1cd6253a7592e69bce8f5422a0f47245fc510e8ea772b035a7451e9ed1d4f CVE-2022-27536,0,0,68d5018ea0b495266f2ee0d5eb27a828a98d13012d37fb7e54356414e829f58f,2024-11-21T06:55:54.037000 CVE-2022-27537,0,0,f9fe620e75010dd8c009107b59488ac897d990c050930c096c76d6907e67be7c,2024-11-21T06:55:54.200000 CVE-2022-27538,0,0,038809a6acf0fdd8065c85744209857483747d8b095257d7aa8ab4fb763ae904,2024-11-21T06:55:54.680000 -CVE-2022-27539,0,1,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000 +CVE-2022-27539,0,0,305343dc51cb29f32e5f8b5c0de7755277fc06188452fa8709ed65660d1fb348,2025-01-03T21:15:07.173000 CVE-2022-2754,0,0,5fd204098138c7c579a0e559edbbb117b8423f6089a27ae9bbe02e85b1b02437,2024-11-21T07:01:38.577000 CVE-2022-27540,0,0,7b937f21398b8778219a017044700af59f5e3b174221c511754c41d0c25a2e92,2024-11-21T06:55:55.787000 -CVE-2022-27541,0,1,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000 +CVE-2022-27541,0,0,63759ab83ad42605ce46899d88d69ab81bacd2fdcff23e3b2348c9128ac5d05d,2025-01-03T21:15:08.570000 CVE-2022-27544,0,0,97ae1750c0bbb6eb1b440ad74287f9286e451a76c0331131ed2e992416febf46,2024-11-21T06:55:56.463000 CVE-2022-27545,0,0,f9d013f4fcb59c90d804839c16351243550a2e96b6123a0a0202783eae7ae12e,2024-11-21T06:55:56.570000 CVE-2022-27546,0,0,320ed5ca83e4d364579d1d5a1bc45e960c5bf0f910433ed6485e80c2179e0b99,2024-11-21T06:55:56.677000 @@ -221460,7 +221460,7 @@ CVE-2023-27826,0,0,6347975b3ad6cd0a6c56e8ad212042e6480582857697baae9c7d72978fd34 CVE-2023-2783,0,0,096c3b26e537bed1ca5ddb3ac65f36398fc1d487c37d85c199430095b0e32907,2024-11-21T07:59:16.937000 CVE-2023-27830,0,0,31134275eb53f6f7a000d54b47d97c7e7c9a150ff8289e7f25052e8f6b4f75b8,2024-11-21T07:53:32.780000 CVE-2023-27836,0,0,30b937837ffa1713e4b2f825e29485760bfb12129ee96c2dc2625ffc70ca344b,2024-11-21T07:53:32.950000 -CVE-2023-27837,0,1,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000 +CVE-2023-27837,0,0,09ca7af765c2ff6927776c1eecc7d27a9e98a3793e382e704f3567fa1aeeb314,2025-01-03T21:15:11.333000 CVE-2023-2784,0,0,3beb45ba8d37afa28c5b710c953916c9a0cc09ed1f3ea22bda898c6b758d70ca,2024-11-21T07:59:17.050000 CVE-2023-27842,0,0,ff4319ffbaa6389afa0396471ae6b5a71fce4f1fe6e68640710e37a063b03c1c,2024-11-21T07:53:33.280000 CVE-2023-27843,0,0,b9d62937a262e9ac3f834c7160d689a0eba062e6de695ff9490a67ccc210c47d,2024-11-21T07:53:33.437000 @@ -222728,13 +222728,13 @@ CVE-2023-29157,0,0,e139a470842d9e5b9d6b09da86981de056cc51c8cf1ef74955e9869ec1f8a CVE-2023-29158,0,0,d93e1a8f6332e77a5b3ca2ca77ab8702fcdee0067fa37722a2ec00c716cd850d,2024-11-21T07:56:38.070000 CVE-2023-29159,0,0,cd911818f734775dab3175db6db6b98b2b6ea2654ed5bee8d236e6c77f00c323,2024-11-21T07:56:38.187000 CVE-2023-2916,0,0,27d1944ec651f5d060d75979b808931283d2f3099341e8c0d7dabfe85c912ba8,2024-11-21T07:59:33.867000 -CVE-2023-29160,0,1,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000 +CVE-2023-29160,0,0,90cdb364b9f59b891f577b51f1a47efe44108a1bb1f4b09369f322cf5f660038,2025-01-03T21:15:11.997000 CVE-2023-29161,0,0,5b1e47c04c48e3ea1336e82805801b0c1e10ade49f6d9266884d11fc74b88a63,2024-11-21T07:56:38.390000 CVE-2023-29162,0,0,fc28511a9719aa19e64a9b38fb6b29e7ab41ba9bfec25fae87ebdae7a06b9409,2024-11-21T07:56:38.497000 CVE-2023-29163,0,0,6fe755248c7818416bda58be22dd7bac179c1b8424232d05103993a92144726d,2024-11-21T07:56:38.597000 CVE-2023-29165,0,0,513a382e25d229a444bf0100c637a4c3c0cf34fbe4e610f1518192cfb01a884a,2024-11-21T07:56:38.713000 CVE-2023-29166,0,0,781d1c4cdc98c38865af67de3e342edcdaa26bab1d1d367be9bc1b6a262c4326,2024-11-21T07:56:38.820000 -CVE-2023-29167,0,1,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000 +CVE-2023-29167,0,0,50bbb020d2d5b15cdc81b400e0346114ca39038d0cdf9c0f42bad8ef9e761e0f,2025-01-03T21:15:12.217000 CVE-2023-29168,0,0,ce7a65b098bfe1db2cfe961b9e43bf6907bc45d619666ff5139f14b8bfc0b281,2024-11-21T07:56:39.030000 CVE-2023-29169,0,0,b1e43b6c91c4546837cc8ae5fbf5d45f4b0f577ebfea6d949e629653b0642587,2024-11-21T07:56:39.137000 CVE-2023-2917,0,0,53f93b220e6679003249d2250d092dbb4f1cbeaaee0e29556caf9766d81bb020,2024-11-21T07:59:34 @@ -223032,7 +223032,7 @@ CVE-2023-29492,0,0,6d699c439c5d8ded49fa6cb032f9de89a3509187577d5869add282334a403 CVE-2023-29494,0,0,b90d8ceeaef9906bc47b80cee9467055cedc2b0aec3c6d26d3bf34d2bba0b1cf,2024-11-21T07:57:10.290000 CVE-2023-29495,0,0,7dad3d0d134689f5f27d6c90d7fbacbcb08c849eae64453f5313d9b46f471707,2024-11-21T07:57:10.430000 CVE-2023-29497,0,0,275bcab71fa31aec3c61d00134fc188f3391177ede5a5f6c28eeb79ddddcfae6,2024-11-21T07:57:10.543000 -CVE-2023-29498,0,1,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000 +CVE-2023-29498,0,0,417c42363d496c93ed7d4765456e872dcdfbdf55653776a21f3143dd5b35c322,2025-01-03T21:15:12.417000 CVE-2023-29499,0,0,2039f92e848bda727c21c637c0c728fcf67f1b356f9be9a855b92af1487b4057,2024-11-21T07:57:10.807000 CVE-2023-2950,0,0,94be811c0c225a7d48b00d9c04d7ec06df07ac373a433760ce36652d9061d8fa,2024-11-21T07:59:37.900000 CVE-2023-29500,0,0,9566a3121b981ba012c5c86adc4c99589ab87eca50d6597b2c90f5856c8264c0,2024-11-21T07:57:10.947000 @@ -223093,7 +223093,7 @@ CVE-2023-2955,0,0,9c0e18923443b98b3624f6a20eb4112985b6c80a66e21eac353915004989ba CVE-2023-29550,0,0,e4f3c9ebf56266ae93a8b7654d890809fa02038cee320637c5e05da2e3b4034c,2024-11-21T07:57:16.793000 CVE-2023-29551,0,0,228f453bf40162e0ca56f9725a8243132d56c710990db765203fc98361e41d2b,2024-11-21T07:57:16.907000 CVE-2023-29552,0,0,581b98f26884acaa09a2e45c7906b5ad297c852b04af26ae94e2904276792077,2024-11-21T07:57:17.017000 -CVE-2023-29562,0,1,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000 +CVE-2023-29562,0,0,1ce691e8d9f6f5deb206e8ff10b9ec0045c33f0503241d0cacef281445620ccd,2025-01-03T21:15:12.693000 CVE-2023-29566,0,0,72613a9047e5b74b43c598afd3a5332b14dad8bfb67cbbb4132d5bdb7fd4eb17,2024-11-21T07:57:17.310000 CVE-2023-29569,0,0,e838e1f5bbabf47f4c66b50e6c41d8d01307a1cf9562ef1e35b62f66e5510cd1,2024-11-21T07:57:17.467000 CVE-2023-2957,0,0,a1631a9ecee9b51a2f65999ed32ce5f5f06e2698dd986aecf16ed77d51c874ca,2024-11-21T07:59:38.720000 @@ -224921,7 +224921,7 @@ CVE-2023-32218,0,0,f4668f6dec2ad787cba45f10fd52cbffde113c4295d5e52527a0a3bed9829 CVE-2023-32219,0,0,5016bb311111e2171cad0226da9875250b1431f46d617615133b7b54b63a5333,2024-11-21T08:02:55.563000 CVE-2023-3222,0,0,7d57eac9a2b5e14a32fbb1633baffee38ba9604df950673d8180481bf98f3795,2024-11-21T08:16:43.900000 CVE-2023-32220,0,0,7a8e9a38143bd8064ad289215094e013695d95e6076448cf1074f8c028ef2b55,2024-11-21T08:02:55.670000 -CVE-2023-32221,0,0,ea601fc168225037ab26ac2ed11558bbef2c8c782572003af5f24916723d9cd0,2024-11-21T08:02:55.783000 +CVE-2023-32221,0,1,1bb9ec77a45c6795dd7cc048448a8dd2a2768ee4ce6488cb5a868e5cc39185b0,2025-01-04T00:15:06.207000 CVE-2023-32222,0,0,628471b60fe838500aed372d2bdccfc395d9e95fc54bc2874983f952d5f04ce1,2024-11-21T08:02:55.893000 CVE-2023-32223,0,0,917c1b5258b903e7b790f68cd6060630779eb688b3bea354bbc98d7b17f4b584,2024-11-27T17:15:05.937000 CVE-2023-32224,0,0,7c5c385f9388cab92c949ae1ed149caba7d8c92dca8e737241ce6522dad13863,2024-11-21T08:02:56.113000 @@ -244502,7 +244502,7 @@ CVE-2024-11619,0,0,17535dfba9741d471fadae0fb91280b5ae16dfa5d4f7978c2708116e3a1ee CVE-2024-1162,0,0,3088f9ddfe31234409eeca0c6733f6625e00a303f5f7e9ffe94fe1a6782630d7,2024-11-21T08:49:56.270000 CVE-2024-11620,0,0,ead70690aa114308aae0c5f2f4d204a542be8af8676c2ad1b4207bb367ac689c,2024-11-28T11:15:48.533000 CVE-2024-11622,0,0,28607ca43edf19c5b150264789340f2f339c16fe9934fd58cd66cc9c45bc71df,2024-12-12T19:52:24.527000 -CVE-2024-11624,0,0,ffaf727b2fec9588d0225dcdd2218f3951c43d9f9a52eaef07026e9a1fa7747c,2025-01-03T04:15:06.030000 +CVE-2024-11624,0,1,2fbadf82b86c601ba5e3c164ddb11cdb07fbf96914b2d5fb97e205c966153970,2025-01-03T23:15:06.157000 CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2cea,2024-11-21T08:49:56.403000 CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 @@ -244602,6 +244602,7 @@ CVE-2024-11729,0,0,efdcf50f70e4aaed57e8feef0a7a962846d2881b2d7c26550ce5bf699f2f4 CVE-2024-1173,0,0,c4d4cdf7c6a3868eb9e98cb8ff74e2d000c2d6f84447d896138ac8342670c9eb,2024-11-21T08:49:57.650000 CVE-2024-11730,0,0,8b97f2620613ee8f1fad8f89fdaf2fb138dbc90ea591ed763e6c771986c201aa,2024-12-06T11:15:08.033000 CVE-2024-11732,0,0,6786f7c223dbf5c7abf2566386e4c9fbb35edf5a2ada6569df25893c7ff24b7c,2024-12-03T08:15:06.383000 +CVE-2024-11733,1,1,5fbecc5531d69a0d2ffc426edbd6573fb38d88d5bfbaa1a7120ba352ee22cf2b,2025-01-03T23:15:06.313000 CVE-2024-11737,0,0,82b4de15247bbd822a2abb2f56467686fd4a6957a6b87fe1370247ce71679d0b,2024-12-11T10:15:06.677000 CVE-2024-11738,0,0,f587c97dbd4b1ce8e0f6a611dd679c71e26fa6d4305ce8c0e3ca3797b0619379,2024-12-06T15:15:07.723000 CVE-2024-1174,0,0,6b46be4d722ab187c094170b7547b36656d9ec8ed90fcec0cd49c5c30bebda75,2024-11-21T08:49:57.790000 @@ -244940,6 +244941,7 @@ CVE-2024-12233,0,0,d89c9263a4f22f201b1dce8be51578aec307181a11a72f57d5d6a093a5589 CVE-2024-12234,0,0,25d3aa7d45ccf0539b66121de3bcd155bbef1f8925f8aad4f69521eed8a998f2,2024-12-10T23:25:36.387000 CVE-2024-12235,0,0,92689efaa37165c78224efb1efe409523be7fb3f3558d4576511504eb96aac91,2024-12-05T18:15:21.660000 CVE-2024-12236,0,0,390d11985338138a2913d618c1818ae388b2b2c32249174c40691687eabfe343,2024-12-10T15:15:07.147000 +CVE-2024-12237,1,1,f56cec9b9a8561960e0bd6e6b1543c245e67760db1999f8a3bac457cc9192e98,2025-01-03T23:15:06.473000 CVE-2024-12238,0,0,4bf6bf8d9d561e93dab20ec932a5f35fe4b6b4442d292c9962ed57407d619434,2024-12-29T06:15:05.487000 CVE-2024-12239,0,0,6402c790bc7203c11dca14fab5982d0c29c8034f8baef3a6d7c350a55d38d141,2024-12-17T03:15:06.710000 CVE-2024-1224,0,0,cbfbaa5b4f0e1c410530412d727d5bf58dfe126bd3d740f330bf5c6e93a0658e,2024-11-21T08:50:05.487000 @@ -245431,7 +245433,7 @@ CVE-2024-1311,0,0,01ebf083283fbdbf324aa4188b2056da81574dace6d1d37e23fa5b3fb17648 CVE-2024-13110,0,0,e4c3d49099bb33bcc7fe964c1285248d09f034b160a163d3fe86517eab3248ea,2025-01-02T14:15:06.240000 CVE-2024-13111,0,0,9810366fb45686c2113f1215d5c29bc6bc3772afbead961538a5f37f182e34f1,2025-01-02T17:15:08.223000 CVE-2024-1312,0,0,d16b3ecc82cd74d4071dc20055eab0a36b43013bc6757c1d62cda1a87b890d59,2024-11-21T08:50:18.020000 -CVE-2024-13129,1,1,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000 +CVE-2024-13129,0,0,9ca6456491ec5676f6b1be848e2f99ae604ad63b1a6f5bc3973f8c9dea216d3e,2025-01-03T22:15:06.677000 CVE-2024-1313,0,0,cad1078661641c2022e5f0188a431d9a70908db5ab4b61d98e0389abbba8b680,2024-11-21T08:50:18.207000 CVE-2024-1315,0,0,e1f16e3b2be06db6b65befc45bb21c6efb290182d3477c01a71033b0effe0c2a,2024-11-21T08:50:18.373000 CVE-2024-1316,0,0,ec6b544cc876a8479e8de890063434d877e95d2641a1a8c864b5c959e6dbfa7d,2024-11-21T08:50:19.090000 @@ -257742,7 +257744,7 @@ CVE-2024-35359,0,0,ebd79174dfb7ac257fb41388eea21839910657d0184b40fdf6359090d4089 CVE-2024-3536,0,0,f61f758feff8e86a26533bd96329f276bdabc00164a17283a9ca7edca8ea810e,2024-11-21T09:29:48.253000 CVE-2024-35361,0,0,ba078c8fe5aa2f3cfaede9b86bade7ec878c218d84d169b517462fabd4369970,2024-11-21T09:20:13.143000 CVE-2024-35362,0,0,c9ceca7447b8a557451b5967fa218d930b5f59694547d29930113b4859836719,2024-11-21T09:20:13.357000 -CVE-2024-35365,0,1,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000 +CVE-2024-35365,0,0,a26045c87b4e71a6df02377717030d5e23552eab779f5a833cbd0688a2eb325e,2025-01-03T21:15:12.940000 CVE-2024-35366,0,0,cce3847e362944647524f42f8c96161fb821767a34a431ba81a662d8d164730d,2024-12-03T14:15:20.107000 CVE-2024-35367,0,0,fc1999610d5647bdd337d9cd372630739a60d5b54ee387f6b863824ba4ed87b5,2024-12-02T17:15:10.680000 CVE-2024-35368,0,0,9627ef41704bb16e68693f5c6e18e4ed8b2de5952a37d343cc0e72735c6da4fd,2024-12-02T17:15:10.860000 @@ -258751,7 +258753,7 @@ CVE-2024-3661,0,0,11a579560faa5cc1a7695ecebefa36af8b143192151784b4c1d37ba82796f9 CVE-2024-36610,0,0,086f8f5b46926c0d5b801e2f18812ba0aac4c04dd5f1ff997c802b3134a682c8,2024-12-24T21:15:18.280000 CVE-2024-36611,0,0,8ae1129d2c6d7f04820dc25a51b35eeb79c0ea9714d3891bb92ee90d865f9805,2024-12-03T21:15:06.783000 CVE-2024-36612,0,0,2e5bae787232529157776124a9b65f7f3416dd8775c93aff3efc637bb8af407f,2024-12-02T17:15:11.420000 -CVE-2024-36613,0,1,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000 +CVE-2024-36613,0,0,5e0f7ef111e3993750bd6438d4abc44d38bd901ae1fa2a88c7ea99f930b7978c,2025-01-03T21:15:13.140000 CVE-2024-36615,0,0,c3893c90b5581100f420f26ee0ccf784458a2107b295d3c77defc3849a0f0672,2024-12-03T16:15:22.197000 CVE-2024-36616,0,0,296a4798d6d750743bea7f8c9bd5c284519a9999e91edf6d3d9b49bc20d67d94,2024-12-02T18:15:09.857000 CVE-2024-36617,0,0,f14a7d3b346fdf72174febe1311327593886e5ab37642fdc9a403f2c9c27d4e2,2024-12-02T18:15:10.270000 @@ -263385,7 +263387,7 @@ CVE-2024-43052,0,0,f688f09d75ea1280493efd246e06c860b66ffbaf35b8c8d551fb0708ef09b CVE-2024-43053,0,0,557eafb2a972c600f8cd1195cb2a7ab112336dd759ccf7035648b847cc40a102,2024-12-12T15:29:14.443000 CVE-2024-4306,0,0,a9d1ef0236802bb22bfceddb930f35a94054088f067df2c4e92b7fc4f2d8e7ec,2024-11-21T09:42:35.350000 CVE-2024-4307,0,0,e22b3a2ddde6a1bbbef551e8119df90fb59ea5e219b25194ed74d47d12720593,2024-11-21T09:42:35.467000 -CVE-2024-43077,0,1,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 +CVE-2024-43077,0,0,436199c7bc78c426e053544ac533eb5f0842ec0f88a5221b5654c71a46ceb900,2025-01-03T22:15:07.360000 CVE-2024-4308,0,0,0e250664b04e28b54467b76d750ca3dcd8282c1064f64a7674928da95814f098,2024-11-21T09:42:35.590000 CVE-2024-43080,0,0,cbdb75ee710ea05bfcc86299182b203ee944c795380cbed1c1ab4a87225ab537,2024-12-17T19:10:30.250000 CVE-2024-43081,0,0,8bed9f6165013dc4c983bb0dd11cd660d0d155d067474bbffbb46b60a90bbdd1,2024-12-17T18:56:04.590000 @@ -263401,7 +263403,7 @@ CVE-2024-4309,0,0,cf6d99d40224d9ea0048df61a24b0034afd2baf32b8f2402feb311af37805c CVE-2024-43090,0,0,bfb455ba3b27b8e5f909736d7638aa4c244eafab69b7641e19b79e78332f1fbf,2024-12-17T20:43:24.893000 CVE-2024-43091,0,0,18a7813067907079929e1aa7a03c2ea14a6eb858fe26b9c9489160580668468c,2024-12-17T20:35:58.717000 CVE-2024-43093,0,0,3f092629a0cce74f6f59bab52d6247e2ce3f3aaa2972aab5920268e0f2acfa91,2024-11-14T21:42:34.923000 -CVE-2024-43097,0,1,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 +CVE-2024-43097,0,0,004c4d6e0d21742822f66f64708df4b2724897f8929303b830f9e30aebcf9183,2025-01-03T22:15:07.503000 CVE-2024-43099,0,0,dd4c6171d90425754eb8c361c1c6555117a95d6bcad5f992f28ec42a1deec5f9,2024-09-14T11:47:14.677000 CVE-2024-4310,0,0,dd5cf151edf7d2cd055572eb00e97620ec8e8024a5783f50f0a1b0ae59db4b35,2024-11-21T09:42:35.913000 CVE-2024-43102,0,0,b6aa6225bd8ed19c424a914e97c361ac2900c128d3e8c90742dfa8fa3a85a13f,2024-11-21T09:35:00.713000 @@ -264009,11 +264011,11 @@ CVE-2024-43758,0,0,0f26a442661cf8c474cf15fed83c27096c39a987496f8728b4b680b80eec8 CVE-2024-43759,0,0,4270d1c80d4da61f734b4e2d0cec7cefaa5eece74e1d071a8d6c550e1b8941c2,2024-09-13T17:13:35.427000 CVE-2024-4376,0,0,54ab76d9fd6742e25c4ca941b8688277ccbde54c93ac0337a04e833897b0d9f6,2024-11-21T09:42:43.643000 CVE-2024-43760,0,0,0699b036c3a09290ea9d3ac93f3f512789df4a5bccdc81b41420a254e04019cc,2024-09-13T17:00:30.440000 -CVE-2024-43762,0,1,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 -CVE-2024-43764,0,1,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 -CVE-2024-43767,0,0,544837330e934fbd5665893a012e6ea136cc65551faeb81d27d6db256649d51f,2025-01-03T01:15:07.847000 -CVE-2024-43768,0,0,2a680b4666dbfb8855cfe115cfa668526d1408b554a74aebafb074e52b898e4c,2025-01-03T01:15:07.923000 -CVE-2024-43769,0,0,58a508b817a2419a010d84131e35f15b9d1d2e8f44fce65b53ae8e870eccbd1e,2025-01-03T01:15:08.003000 +CVE-2024-43762,0,0,b8dfe10bc41a54941c91e23f33f7c446be6ae8c1200d07b09e86c0c499c65832,2025-01-03T22:15:07.640000 +CVE-2024-43764,0,0,b8a70c9b4bf3da07474f063814c421df50a0a0e7358525550868f9c97beac2b0,2025-01-03T22:15:07.783000 +CVE-2024-43767,0,1,af155cf93cc328c05c081440c1f007ae01c3d33d1458fc2c3459ea52a0cc31d8,2025-01-03T23:15:06.627000 +CVE-2024-43768,0,1,d63d3ffccaf584eee421ee122021fb0ca8d78148254dd26c8ab21528b275e51d,2025-01-03T23:15:06.767000 +CVE-2024-43769,0,1,13983ee3cb62290dd1770f68b2a21cae6948e8a4eebfe4f723c6f963b63155be,2025-01-03T23:15:06.903000 CVE-2024-4377,0,0,9e469d2c6e38c9024d3118d881da3bdecf42eee078f84183253e0517e0cefe8c,2024-11-21T09:42:43.760000 CVE-2024-43772,0,0,63f7dc411da3ded034b2d2ffb4e0bad8e95b60c318b3d1e644db504bb5e5c6e9,2024-09-04T12:11:13.073000 CVE-2024-43773,0,0,826b7c5200d245cfd0c67f5d1708290c5274b8ea410b663d2bc4e8259de07c4c,2024-09-04T12:26:08.270000 @@ -266097,7 +266099,7 @@ CVE-2024-47029,0,0,dee30063661ea67866801cfb2ecb7654f2218f2ce68d1de08a24516b75279 CVE-2024-4703,0,0,8dae3b499efe136db7f398d4c41a1bfd4bf3b9aac5a043a02f530bb618a966e5,2024-11-21T09:43:24.660000 CVE-2024-47030,0,0,2dfbd4a7868cc0b2ce9fa4921a019a022ddf4de093912df68c067097e504d63d,2024-10-28T20:35:16.973000 CVE-2024-47031,0,0,9f628d7d133c819b06ff3de82f92bb7205005b4a410eced9d57c7a79d43f1b1d,2024-10-28T20:35:17.223000 -CVE-2024-47032,0,0,c7442eac99225f8e83b038eb1a35a3adc5f73c5ed83bb8881288208a5f506b92,2025-01-03T04:15:06.137000 +CVE-2024-47032,0,1,076184930f346804876fe8563cdb7177daeee4d33dda02193fbb41b28949d924,2025-01-03T23:15:07.047000 CVE-2024-47033,0,0,55edc3ae29717e555bfd0e3e7b6b8889d14495fe139b3a950485b7473e7a9dca,2024-10-28T17:57:30.110000 CVE-2024-47034,0,0,25c2ef9ecb4e73ca1fa8dabb5e685185efaa515e35621fde72c2d30b8491c723,2024-10-28T17:56:51.787000 CVE-2024-47035,0,0,a7a178fa9ebc80aea368dd0425eaa85245240ba008a832e23a0cba77ab278738,2024-10-31T00:05:18.113000 @@ -270627,16 +270629,16 @@ CVE-2024-53826,0,0,0b04b1b5846f39442507bbeb125d0ae4870d599699b329db9d8ecf7c2429b CVE-2024-5383,0,0,093acdd4201567d005275d52c1174349cc9fb95effb23b8b65de339d75e5f1d2,2024-11-21T09:47:32.963000 CVE-2024-53832,0,0,1b2ce5c4938b0e1ecf47a9786c83880b95c4a4c43364160d8ae6a9eea87843bf,2024-12-10T14:30:46.853000 CVE-2024-53833,0,0,83c2cd6c738c3b63237afc3b0a6973df3ebd3dd1be66df5ff62c4687f53f40a1,2025-01-03T04:15:06.227000 -CVE-2024-53834,0,0,95f824b0b20df943abd0cb3d475d26b1dc2d3fba585e091b536a3198607e6dcc,2025-01-03T04:15:06.310000 -CVE-2024-53835,0,0,a1cd0002f78945fcfeb24343b003794cf9ef09c52fa428c012cb7b469f05bb36,2025-01-03T04:15:06.383000 -CVE-2024-53836,0,0,1e0ff647b7d73bbae1146a38d8def42b43a2ce04fccf1bde2e572af18d4f066b,2025-01-03T04:15:06.470000 -CVE-2024-53837,0,0,22c83a1fa83f94b1accf37f58ddea874267ffadefc09a5121d07d6630619b5c5,2025-01-03T04:15:06.560000 -CVE-2024-53838,0,0,5a800c4c9a2319a3d123ac97e773b3bbeb257bc5749786382c54285e6a02c3ce,2025-01-03T04:15:06.650000 -CVE-2024-53839,0,0,e9203295f71f0456c08caa806e994cb13e5d7b534b2e0e475c5963a8d53c952b,2025-01-03T04:15:06.727000 +CVE-2024-53834,0,1,f772be6a6b7318016d93e00bbab730f9e5090ffcca9973fc1b51d0f863c6079d,2025-01-03T23:15:07.190000 +CVE-2024-53835,0,1,1738259f50e1a13907bddecfb4df1723018cc354975bc160261abe6109d648b3,2025-01-03T23:15:07.333000 +CVE-2024-53836,0,1,2cbfd30f09c54112dbd3816407bb73044cb7653f40cd6cff2fd0a50442342b4b,2025-01-03T23:15:07.470000 +CVE-2024-53837,0,1,f41af45311ad1bb885024e938f5dd0283c1cb94b0c08f83d203f8491fac68ffd,2025-01-03T23:15:07.620000 +CVE-2024-53838,0,1,392a823cc6a1952d1acd20e30cddfb92a6889451bd907c5666f408cbdfe8e068,2025-01-03T23:15:07.747000 +CVE-2024-53839,0,1,f65317495801cff20541ac718a9f26747a8df7faf061323c9d11e324e4d26033,2025-01-03T23:15:07.883000 CVE-2024-5384,0,0,8d376a2ca7902f4602c393c8e22120c83f3a08831ccd742c2d440f44affa2cad,2024-11-21T09:47:33.103000 -CVE-2024-53840,0,0,fd45d26350e6982c7cc334de85696b0442912dd4fdff65234ff9258cce036a54,2025-01-03T04:15:06.810000 -CVE-2024-53841,0,0,fe11be69b03118bc0d7bb6525bbe40e05a80d09ca9456ee9b0308de0a1f3f74b,2025-01-03T04:15:06.893000 -CVE-2024-53842,0,0,854e77d323c245e8752f72a677b4da1f2264d9d88ba6cda8173c9d7ada535690,2025-01-03T04:15:06.980000 +CVE-2024-53840,0,1,5a68e56ca18880b684acf85af94e13342de4c159ea66263c82861f03b2fcb290,2025-01-03T23:15:08.020000 +CVE-2024-53841,0,1,62ff2515a5c055bf7059847a5dc1f7cb41127e9f90e2360a3c63316668562633,2025-01-03T23:15:08.153000 +CVE-2024-53842,0,1,fbef0b0e07e65be6623298279f9a4f845fdf9f741f681b6904541542384fe4d2,2025-01-03T23:15:08.293000 CVE-2024-53843,0,0,c44c99ef4402ecef78ac8c1b113f8d73cb64b635f31482723ce78cbb921e8259,2024-11-26T00:15:07.430000 CVE-2024-53844,0,0,b0e1409716740a79089a588f0454ff38097ac555d54020c4c21a59c02d9d74a3,2024-11-26T19:15:31.463000 CVE-2024-53845,0,0,6016d80f197703cecce3c68f8c667ba88f504a297b5ec5a264d36bac2815592b,2024-12-12T02:15:29.087000 @@ -271312,7 +271314,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 -CVE-2024-55507,0,1,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000 +CVE-2024-55507,0,0,b1b3683e335ef1ef06b85193f76d2faa87feb69c749286244d6d7ec154c3df08,2025-01-03T21:15:13.340000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 @@ -271412,6 +271414,8 @@ CVE-2024-55888,0,0,2dd59816688a6ea0fa98f443aa3b9b64966d8d29cc6ba2efa912b5e16a3e3 CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db80bb,2024-12-13T21:15:13.483000 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 +CVE-2024-55896,1,1,58f855d897602f0ddd25272da3b6accb2a00ce40a285c9003204ef42399d7775,2025-01-03T23:15:08.437000 +CVE-2024-55897,1,1,965b449aed633549369e65253663c8ef0d14436fec1119cd03952115edc2e4cf,2025-01-03T23:15:08.573000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 CVE-2024-5591,0,0,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000 CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000 @@ -271669,7 +271673,7 @@ CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9 CVE-2024-5633,0,0,6153dcce403090a22c66747e4beff2cb4e82934f4fa355dae1f3e5bcdf5cc4ba,2024-11-21T09:48:03.483000 CVE-2024-56330,0,0,cc2469855b48dd40812f7fbbf009598abdbeb1081f50cb0a33dff8e3cf6f718e,2024-12-20T20:15:24.167000 CVE-2024-56331,0,0,56bb9f9373efee702b7689a46e1daacea45f4bf1b3344e95d6a09a02cb29916d,2024-12-20T20:15:24.337000 -CVE-2024-56332,1,1,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000 +CVE-2024-56332,0,0,1ca8b3e3c7310aca62a4b73a32a15bcab556c8d36748bd113633f34cfb638a59,2025-01-03T21:15:13.550000 CVE-2024-56333,0,0,fe45e753af8e2751ee1e363cda61187450051dec4bd66c266f1a6acfb0239817,2024-12-20T20:15:24.520000 CVE-2024-56334,0,0,dd145a89bec8d5c627af1aa8e241a3a3cc8f1f4441c2e387ed54258794c2f5a4,2024-12-24T17:15:09.760000 CVE-2024-56335,0,0,68042c7d7012ee80feaa30ed25472b1a3afe996d5346e3cfc0fb43c7dcee7c7c,2024-12-20T21:15:10.277000 @@ -271704,7 +271708,7 @@ CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c CVE-2024-56408,0,0,cd4b6b211e0a160b70acb972ac8ce8a8f58fca4bf287c8875ce7a1ecf63f672e,2025-01-03T19:15:12.533000 CVE-2024-56409,0,0,d99656fa69c650421ca8cbabcdd83e678caa5cfb8b9a6a9a68c5e4694cb43a45,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 -CVE-2024-56410,0,1,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000 +CVE-2024-56410,0,0,947e02e2c3f21927d299084b1a9e59d7ee26973dfb0ebd320064a45fbd7d954e,2025-01-03T21:15:13.723000 CVE-2024-56411,0,0,d520d39d2728c6661a63e679ea00870498cc041f14a81399120c6c5ace601ae5,2025-01-03T18:15:16.203000 CVE-2024-56412,0,0,7ed733bbffe237b9cbc747cbba38f4b908e9d7eb10b7d53914ac34ca4f2c496a,2025-01-03T18:15:16.380000 CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000 @@ -274697,7 +274701,7 @@ CVE-2024-8807,0,0,a3194d6f7254173351134c6667ba0ab69ff4954825d1b3258d592d08d98a97 CVE-2024-8808,0,0,97dc891df3d9a3e3e84cc6d2301fb4dbe91fc0ade39658278ca48e61412ce9b9,2024-12-20T17:46:19.670000 CVE-2024-8809,0,0,ddcec2f4533e074351604de84f4e1e1092a516d94554ae853c415169483cb0c2,2024-11-22T21:15:19.110000 CVE-2024-8810,0,0,4054bd11d0a58049adbca132e9cb8f89aa5e0709e583c7f8d6f2e3c10841c942,2024-11-08T19:01:03.880000 -CVE-2024-8811,0,1,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000 +CVE-2024-8811,0,0,efd1e1c7a12a1d68e4b8fbca926671ec65f16d85c01df729a2e729ed2aa509eb,2025-01-03T22:49:49.463000 CVE-2024-8812,0,0,b302d09d72bb26c6b8a77cc5743f5dc39c42e30907950ec8ee651ff959fb9767,2024-12-04T14:56:07.463000 CVE-2024-8813,0,0,3fdeb0e42e1f0b2ec132d72cdddab3a3e88fd6d1f776048bdf5fdfbe967da3ce,2024-12-04T14:56:03.620000 CVE-2024-8814,0,0,b7d91a5acc439f46e09af24d678f7610aaf43632fd42bfe8fa08f3612c8551d8,2024-12-04T14:55:59.677000 @@ -275050,7 +275054,7 @@ CVE-2024-9253,0,0,8deb45874f368402d2e8267bdd80d22218d667a369f413173fc1bab2f02e0c CVE-2024-9254,0,0,8ddbd67d95e607f435cddadf820f6b8a493bce024ad0e3a2a2fd3478d0537cfa,2024-11-29T18:17:31.663000 CVE-2024-9255,0,0,cebd6fb0e3bd38591c9ac35321c4111f3a938526041eb33febcdad00871c8366,2024-11-29T18:17:15.040000 CVE-2024-9256,0,0,3cca80ad6510af9986479b87828fe97955ba908cd307377d7659a0e4289380d2,2024-11-29T18:17:00.713000 -CVE-2024-9257,0,1,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000 +CVE-2024-9257,0,0,56d949a6b9532c08babf6ca3ed0f1bd04c0075ed5ddb6a7732235f8801d5cfb9,2025-01-03T22:07:42.553000 CVE-2024-9258,0,0,dfeacc96c4cbe2d903f9c98e056fc6af76a986a9830050ecfb795eca6832c408,2024-11-25T17:15:32.283000 CVE-2024-9259,0,0,8199f5373fafb1bc0110a9ab29f4a6bb990bedca0d1854f1f17c52cddd1870c9,2024-11-25T17:13:49.060000 CVE-2024-9260,0,0,fb15d05363604469725e6c13cee9e50285abd70981488963df56e48460b3435e,2024-11-25T17:16:40.663000 @@ -275365,7 +275369,7 @@ CVE-2024-9656,0,0,fe9df299e1627df8ed3d1b46925ce86dfb46c361033644f0c6f5f5d626358e CVE-2024-9657,0,0,d6a40760f79cba273a7653e656cf0460e958ee7ff325e76af903d63b399e35b9,2024-11-08T16:00:28.320000 CVE-2024-9659,0,0,61d80596c8eeece9a279644799e43a0096a680cf6e7f5012ddc6e840730623b6,2024-11-23T08:15:03.860000 CVE-2024-9660,0,0,604fbe7b326b0e24567d0c1c45833d32f6a2dfc816b9bf095d9b2fea052201c6,2024-11-23T08:15:04.033000 -CVE-2024-9665,0,1,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000 +CVE-2024-9665,0,0,6520201a8f38e50caaffa5b156dc56878fad06e9292eebdead6dbd51411251ff,2025-01-03T21:58:29.893000 CVE-2024-9666,0,0,6c38470f0d709ef8f8b86da6cc48d947838dc50ebd4f9c3888341c719b6a8f91,2024-11-25T08:15:10.943000 CVE-2024-9667,0,0,cd67020c0637f62cf6584504253f57e6151bc5b9ac2da6f70bd06c3cab478063,2024-11-08T15:27:25.697000 CVE-2024-9668,0,0,b123975089368f5aaa425cf98477e50260db5149c9b36255b367650786092773,2024-11-19T15:55:00.840000 @@ -275399,7 +275403,7 @@ CVE-2024-9705,0,0,d3e6e0cdfa50d1f44cfdccc6623bdd59d96e39c6b3b67c956a243ca7bda34d CVE-2024-9706,0,0,0990872c6794dc6bd9cf2f3c5fd27263b0ba4cad305032f2567799b99ef0e2f1,2024-12-06T09:15:08.727000 CVE-2024-9707,0,0,f20a21de398140b8d6cd9fa80d26368471f3c29d9493920f2122c5232d98d04a,2024-11-25T18:50:39.867000 CVE-2024-9708,0,0,f728686179ba13414752570ea9b9034e944845f8c6fd05717e98b48a3f80f48a,2024-11-25T19:59:31.110000 -CVE-2024-9710,0,1,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000 +CVE-2024-9710,0,0,7bbf75040646e84218057b076df46853b5b15199cb58878b75e4c1b0c9f87049,2025-01-03T21:36:39.877000 CVE-2024-9712,0,0,3c0025ed12da22fff31c874b55bf94d1f6bd79f9e74da0748a61a1382c7caa7b,2024-12-19T19:17:34.457000 CVE-2024-9713,0,0,eab37c74e5a6a8128766965a86c4f26e4851c463a4609ddef74e4502f569d29d,2024-12-19T19:16:28.340000 CVE-2024-9714,0,0,0f3ce79bd55096572e33f259d58ea23abd9525db69dd9124bf8561703c89aea5,2024-12-19T19:14:46.480000 @@ -275666,9 +275670,10 @@ CVE-2025-0176,0,0,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e6819 CVE-2025-0195,0,0,3a317c51726170702316fa33d45de8f3fef3184ae45ef5e02dd449cbd27af8d0,2025-01-03T18:15:17.317000 CVE-2025-0196,0,0,fb71521e255dd853610214509345a55ba2b3e12d37e32c94fc1c20cb4b643ab6,2025-01-03T19:15:12.793000 CVE-2025-0197,0,0,8050294c8ecdc49228ce7833915570638c5758146d0bd01628204a571b88b989,2025-01-03T20:15:28.873000 -CVE-2025-0198,1,1,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000 +CVE-2025-0198,0,0,968dd1b493127f8e631dd345bdaa3f8c9507ccd8a35d54e73951fabb2c2ecd77,2025-01-03T21:15:14.053000 +CVE-2025-0199,1,1,57de8d567970e2c3ac2428151686deec2058a3256dee56257a4a398a50eeca44,2025-01-03T23:15:08.707000 CVE-2025-21609,0,0,debac97612532639eda73000ed423c6055a43cea29689a043be2143f9409c2e8,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,91f58e52c41e26ee8c782751f380f5e6f82b9b51c281135ca06080d1bc5407a4,2025-01-03T17:15:09.290000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000 -CVE-2025-22376,1,1,41b448fcde4d9ad88cdc8d51c6f7ffc1e85de423001807db846fdb1c49d736b9,2025-01-03T22:15:07.917000 +CVE-2025-22376,0,1,5718c706cab54399c824e81247fa8725e0b2da3334acc9f4e812565255340de1,2025-01-03T23:15:08.897000