From 3f8d5a7be2bb27f2064e26a22fa606c3264c11ee Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 3 Jan 2025 17:03:49 +0000 Subject: [PATCH] Auto-Update: 2025-01-03T17:00:20.860601+00:00 --- CVE-2022/CVE-2022-316xx/CVE-2022-31635.json | 32 +++++++- CVE-2022/CVE-2022-316xx/CVE-2022-31636.json | 32 +++++++- CVE-2023/CVE-2023-13xx/CVE-2023-1323.json | 22 ++++- CVE-2023/CVE-2023-346xx/CVE-2023-34615.json | 32 +++++++- CVE-2023/CVE-2023-346xx/CVE-2023-34616.json | 32 +++++++- CVE-2023/CVE-2023-346xx/CVE-2023-34617.json | 32 +++++++- CVE-2023/CVE-2023-346xx/CVE-2023-34620.json | 32 +++++++- CVE-2023/CVE-2023-346xx/CVE-2023-34623.json | 32 +++++++- CVE-2023/CVE-2023-347xx/CVE-2023-34755.json | 32 +++++++- CVE-2023/CVE-2023-347xx/CVE-2023-34756.json | 32 +++++++- CVE-2023/CVE-2023-348xx/CVE-2023-34823.json | 32 +++++++- CVE-2023/CVE-2023-348xx/CVE-2023-34824.json | 32 +++++++- CVE-2023/CVE-2023-348xx/CVE-2023-34865.json | 32 +++++++- CVE-2023/CVE-2023-348xx/CVE-2023-34867.json | 32 +++++++- CVE-2023/CVE-2023-404xx/CVE-2023-40478.json | 86 ++++++++++++++++++-- CVE-2023/CVE-2023-404xx/CVE-2023-40479.json | 86 ++++++++++++++++++-- CVE-2023/CVE-2023-404xx/CVE-2023-40480.json | 86 ++++++++++++++++++-- CVE-2023/CVE-2023-516xx/CVE-2023-51634.json | 66 ++++++++++++++- CVE-2023/CVE-2023-516xx/CVE-2023-51635.json | 76 ++++++++++++++++- CVE-2024/CVE-2024-272xx/CVE-2024-27295.json | 64 ++++++++++++++- CVE-2024/CVE-2024-272xx/CVE-2024-27296.json | 72 +++++++++++++++-- CVE-2024/CVE-2024-282xx/CVE-2024-28238.json | 62 +++++++++++++- CVE-2024/CVE-2024-282xx/CVE-2024-28239.json | 84 +++++++++++++++++-- CVE-2024/CVE-2024-347xx/CVE-2024-34708.json | 76 +++++++++++++++-- CVE-2024/CVE-2024-347xx/CVE-2024-34709.json | 74 +++++++++++++++-- CVE-2024/CVE-2024-361xx/CVE-2024-36128.json | 74 +++++++++++++++-- CVE-2024/CVE-2024-398xx/CVE-2024-39895.json | 74 +++++++++++++++-- CVE-2024/CVE-2024-398xx/CVE-2024-39896.json | 74 +++++++++++++++-- CVE-2024/CVE-2024-417xx/CVE-2024-41780.json | 56 +++++++++++++ CVE-2024/CVE-2024-478xx/CVE-2024-47822.json | 48 ++++++++++- CVE-2024/CVE-2024-488xx/CVE-2024-48814.json | 29 +++++++ CVE-2024/CVE-2024-550xx/CVE-2024-55078.json | 25 ++++++ CVE-2024/CVE-2024-555xx/CVE-2024-55507.json | 21 +++++ CVE-2024/CVE-2024-55xx/CVE-2024-5591.json | 56 +++++++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56320.json | 90 +++++++++++++++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56321.json | 72 +++++++++++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56322.json | 90 +++++++++++++++++++++ CVE-2024/CVE-2024-563xx/CVE-2024-56324.json | 90 +++++++++++++++++++++ CVE-2024/CVE-2024-564xx/CVE-2024-56408.json | 82 +++++++++++++++++++ CVE-2025/CVE-2025-01xx/CVE-2025-0176.json | 12 ++- README.md | 52 +++++++++--- _state.csv | 84 ++++++++++--------- 42 files changed, 2153 insertions(+), 146 deletions(-) create mode 100644 CVE-2024/CVE-2024-417xx/CVE-2024-41780.json create mode 100644 CVE-2024/CVE-2024-488xx/CVE-2024-48814.json create mode 100644 CVE-2024/CVE-2024-550xx/CVE-2024-55078.json create mode 100644 CVE-2024/CVE-2024-555xx/CVE-2024-55507.json create mode 100644 CVE-2024/CVE-2024-55xx/CVE-2024-5591.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56320.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56321.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56322.json create mode 100644 CVE-2024/CVE-2024-563xx/CVE-2024-56324.json create mode 100644 CVE-2024/CVE-2024-564xx/CVE-2024-56408.json diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31635.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31635.json index 0316bb8b005..95f70f6211c 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31635.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31635.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31635", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-13T17:15:12.567", - "lastModified": "2024-11-21T07:04:53.830", + "lastModified": "2025-01-03T15:15:06.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-316xx/CVE-2022-31636.json b/CVE-2022/CVE-2022-316xx/CVE-2022-31636.json index 5925954d9f3..10ff59c1ef3 100644 --- a/CVE-2022/CVE-2022-316xx/CVE-2022-31636.json +++ b/CVE-2022/CVE-2022-316xx/CVE-2022-31636.json @@ -2,7 +2,7 @@ "id": "CVE-2022-31636", "sourceIdentifier": "hp-security-alert@hp.com", "published": "2023-06-13T17:15:12.640", - "lastModified": "2024-11-21T07:04:54.760", + "lastModified": "2025-01-03T15:15:08.580", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.1, "impactScore": 6.0 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.1, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-367" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-367" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-13xx/CVE-2023-1323.json b/CVE-2023/CVE-2023-13xx/CVE-2023-1323.json index 8910c458090..9a46b92a2a0 100644 --- a/CVE-2023/CVE-2023-13xx/CVE-2023-1323.json +++ b/CVE-2023/CVE-2023-13xx/CVE-2023-1323.json @@ -2,7 +2,7 @@ "id": "CVE-2023-1323", "sourceIdentifier": "contact@wpscan.com", "published": "2023-06-12T18:15:09.910", - "lastModified": "2024-11-21T07:38:55.407", + "lastModified": "2025-01-03T15:15:09.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34615.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34615.json index e9e152067c3..2c3202c2038 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34615.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34615.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34615", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.143", - "lastModified": "2024-11-21T08:07:26.823", + "lastModified": "2025-01-03T16:15:23.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34616.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34616.json index 229b3934ae0..9c1be7d20db 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34616.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34616.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34616", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.190", - "lastModified": "2024-11-21T08:07:26.973", + "lastModified": "2025-01-03T16:15:24.527", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34617.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34617.json index 9cbfde0fd00..46ea0f4fa27 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34617.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34617.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34617", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.233", - "lastModified": "2024-11-21T08:07:27.120", + "lastModified": "2025-01-03T16:15:24.740", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34620.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34620.json index 63de79f0dd6..1931fe87d35 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34620.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34620.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34620", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.277", - "lastModified": "2024-11-21T08:07:27.273", + "lastModified": "2025-01-03T16:15:24.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-346xx/CVE-2023-34623.json b/CVE-2023/CVE-2023-346xx/CVE-2023-34623.json index 6d5ff8072d5..a59c6d8162b 100644 --- a/CVE-2023/CVE-2023-346xx/CVE-2023-34623.json +++ b/CVE-2023/CVE-2023-346xx/CVE-2023-34623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34623", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.317", - "lastModified": "2024-11-21T08:07:27.437", + "lastModified": "2025-01-03T16:15:25.113", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34755.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34755.json index c351b5890bc..4e01f373e27 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34755.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34755.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34755", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.660", - "lastModified": "2024-11-21T08:07:34.057", + "lastModified": "2025-01-03T16:15:25.290", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-347xx/CVE-2023-34756.json b/CVE-2023/CVE-2023-347xx/CVE-2023-34756.json index 62c207f23ff..45ae27ba4e7 100644 --- a/CVE-2023/CVE-2023-347xx/CVE-2023-34756.json +++ b/CVE-2023/CVE-2023-347xx/CVE-2023-34756.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34756", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.707", - "lastModified": "2024-11-21T08:07:34.217", + "lastModified": "2025-01-03T16:15:25.463", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34823.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34823.json index 2ac1be5fa1f..b6a324ba0b4 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34823.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34823.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34823", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.750", - "lastModified": "2024-11-21T08:07:35.497", + "lastModified": "2025-01-03T16:15:25.640", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34824.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34824.json index ee30ccd6aee..07b85c66025 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34824.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34824.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34824", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.790", - "lastModified": "2024-11-21T08:07:35.637", + "lastModified": "2025-01-03T15:15:09.623", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34865.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34865.json index 38cd2a6a754..4705e543e2e 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34865.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34865.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34865", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T14:15:10.837", - "lastModified": "2024-11-21T08:07:39.150", + "lastModified": "2025-01-03T15:15:09.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-348xx/CVE-2023-34867.json b/CVE-2023/CVE-2023-348xx/CVE-2023-34867.json index 7c60d25e47b..32d00c57d33 100644 --- a/CVE-2023/CVE-2023-348xx/CVE-2023-34867.json +++ b/CVE-2023/CVE-2023-348xx/CVE-2023-34867.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34867", "sourceIdentifier": "cve@mitre.org", "published": "2023-06-14T16:15:20.277", - "lastModified": "2024-11-21T08:07:39.293", + "lastModified": "2025-01-03T15:15:10.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40478.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40478.json index ca4234977ab..c52af66ddf2 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40478.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40478.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40478", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:20.650", - "lastModified": "2024-11-21T08:19:33.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T16:34:16.067", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,76 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.10.94", + "matchCriteriaId": "94C6B573-5355-47EE-A262-E15AE88F8DDB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065649/Security-Advisory-for-Post-authentication-Buffer-Overflow-on-the-RAX30-PSV-2023-0002", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1163/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40479.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40479.json index 7c244d2492b..f2028ef208a 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40479.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40479.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40479", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:20.813", - "lastModified": "2024-11-21T08:19:33.773", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T16:35:43.653", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,76 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.9.92", + "matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1161/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-404xx/CVE-2023-40480.json b/CVE-2023/CVE-2023-404xx/CVE-2023-40480.json index 3ca99be4395..aead8bd3db0 100644 --- a/CVE-2023/CVE-2023-404xx/CVE-2023-40480.json +++ b/CVE-2023/CVE-2023-404xx/CVE-2023-40480.json @@ -2,8 +2,8 @@ "id": "CVE-2023-40480", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-05-03T03:15:20.987", - "lastModified": "2024-11-21T08:19:33.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-03T16:36:16.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,24 +71,76 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.9.92", + "matchCriteriaId": "9E718D58-EC6B-4500-AEE5-D3B6D6E8B06B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://kb.netgear.com/000065645/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2022-0360-PSV-2022-0361", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-23-1162/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json index 445e0cb3ac0..198d0db8ae3 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51634.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51634", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.050", - "lastModified": "2024-11-22T20:15:06.050", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:40:16.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -51,14 +73,50 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.12.100_hotfix", + "matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454" + } + ] + } + ] + } + ], "references": [ { "url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-583/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-516xx/CVE-2023-51635.json b/CVE-2023/CVE-2023-516xx/CVE-2023-51635.json index 0fd53cd373c..bfa95555a9c 100644 --- a/CVE-2023/CVE-2023-516xx/CVE-2023-51635.json +++ b/CVE-2023/CVE-2023-516xx/CVE-2023-51635.json @@ -2,8 +2,8 @@ "id": "CVE-2023-51635", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2024-11-22T20:15:06.167", - "lastModified": "2024-11-22T20:15:06.167", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:40:28.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ], "cvssMetricV30": [ { "source": "zdi-disclosures@trendmicro.com", @@ -49,16 +71,62 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:netgear:rax30_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.0.12.100_hotfix", + "matchCriteriaId": "37B657C4-72ED-4484-92DC-561EF7D8FB73" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:netgear:rax30:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EBC92B49-60E0-4554-BE7F-D2B5D6EF6454" + } + ] + } + ] } ], "references": [ { "url": "https://kb.netgear.com/000065928/Security-Advisory-for-Multiple-Vulnerabilities-on-the-RAX30-PSV-2023-0139", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.zerodayinitiative.com/advisories/ZDI-24-584/", - "source": "zdi-disclosures@trendmicro.com" + "source": "zdi-disclosures@trendmicro.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json index 901a1ae1bcd..7693bacf3ff 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27295.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27295", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-01T16:15:46.227", - "lastModified": "2024-11-21T09:04:16.080", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T15:57:16.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N", + "baseScore": 8.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 4.2 } ] }, @@ -49,16 +69,52 @@ "value": "CWE-706" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-706" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.8.3", + "matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-qw9g-7549-7wg5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json index 6f9fb9c9ff2..b5793623616 100644 --- a/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27296.json @@ -2,8 +2,8 @@ "id": "CVE-2024-27296", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-01T16:15:46.413", - "lastModified": "2024-11-21T09:04:16.197", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:14:03.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,64 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.8.3", + "matchCriteriaId": "A159A530-7A69-4C0E-AB88-AB8C74036DE4" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/a5a1c26ac48795ed3212a4c51b9523588aff4fa0", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-5mhg-wv8w-p59j", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28238.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28238.json index 73a7994feef..3abf5ba6716 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28238.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28238", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T21:15:59.297", - "lastModified": "2024-11-21T09:06:04.200", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:14:55.823", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 2.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.8, + "impactScore": 1.4 } ] }, @@ -53,16 +73,50 @@ "value": "CWE-598" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.10.0", + "matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-2ccr-g2rv-h677", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28239.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28239.json index ea434f70379..28998bff053 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28239.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28239", "sourceIdentifier": "security-advisories@github.com", "published": "2024-03-12T21:15:59.513", - "lastModified": "2024-11-21T09:06:04.327", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:17:32.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -49,32 +69,80 @@ "value": "CWE-601" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.10.0", + "matchCriteriaId": "1A284199-40D8-4833-A273-84ED86C5A82E" + } + ] + } + ] } ], "references": [ { "url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://docs.directus.io/reference/authentication.html#login-using-sso-providers", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://github.com/directus/directus/commit/5477d7d61babd7ffc2f835d399bf79611b15b203", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-fr3w-2p22-6w7p", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34708.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34708.json index b866b2ad00d..3850ad5bdcb 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34708.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34708.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34708", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:39:31.083", - "lastModified": "2024-11-21T09:19:14.427", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:19:08.750", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,24 +69,68 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.11.0", + "matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Mitigation", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/e70a90c267bea695afce6545174c2b77517d617b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-p8v3-m643-4xqx", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Mitigation", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-347xx/CVE-2024-34709.json b/CVE-2024/CVE-2024-347xx/CVE-2024-34709.json index ffab3ad8726..8225341eb37 100644 --- a/CVE-2024/CVE-2024-347xx/CVE-2024-34709.json +++ b/CVE-2024/CVE-2024-347xx/CVE-2024-34709.json @@ -2,8 +2,8 @@ "id": "CVE-2024-34709", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:39:31.547", - "lastModified": "2024-11-21T09:19:14.557", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:20:01.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 4.2 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-613" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-613" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.11.0", + "matchCriteriaId": "EE19D15A-1ADB-4207-8730-3EC25C39DE58" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/a6172f8a6a0f31a6bf4305a090de172ebfb63bcf", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-g65h-35f3-x2w3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json b/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json index 3d04fe19078..beacbbf94c7 100644 --- a/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json +++ b/CVE-2024/CVE-2024-361xx/CVE-2024-36128.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36128", "sourceIdentifier": "security-advisories@github.com", "published": "2024-06-03T15:15:09.547", - "lastModified": "2024-11-21T09:21:40.603", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:24:06.250", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-754" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.11.2", + "matchCriteriaId": "21D40FEA-DB7C-4E7F-80B2-D703E2271BAA" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/7d2a1392f43613094de700062aba168a9400dd3b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-632p-p495-25m5", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json index a372710da31..cb8205db18e 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39895.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39895", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T17:15:11.980", - "lastModified": "2024-11-21T09:28:31.113", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:29:09.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.12.0", + "matchCriteriaId": "A7FA42AF-B23C-44DD-A402-9382A4E30AF0" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/543b345695071c1de61a35004bd063fe59dba0c8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-7hmh-pfrp-vcx4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json b/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json index ed321e2aca8..1097a065bd2 100644 --- a/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json +++ b/CVE-2024/CVE-2024-398xx/CVE-2024-39896.json @@ -2,8 +2,8 @@ "id": "CVE-2024-39896", "sourceIdentifier": "security-advisories@github.com", "published": "2024-07-08T18:15:08.383", - "lastModified": "2024-11-21T09:28:31.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:30:43.367", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,24 +69,66 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.13.0", + "matchCriteriaId": "1C808521-9592-4730-A53F-CCBA4486C092" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://github.com/directus/directus/commit/454cb534d6ffa547feb11f4d74b932ae7368dae2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/directus/directus/security/advisories/GHSA-jgf4-vwc3-r46v", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json new file mode 100644 index 00000000000..2e424b7f34b --- /dev/null +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41780.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-41780", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-03T15:15:10.367", + "lastModified": "2025-01-03T15:15:10.367", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could \n\ncould allow a physical user to obtain sensitive information due to not masking passwords during entry." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180119", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json index db2240968fb..c2de4a56ab7 100644 --- a/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json +++ b/CVE-2024/CVE-2024-478xx/CVE-2024-47822.json @@ -2,8 +2,8 @@ "id": "CVE-2024-47822", "sourceIdentifier": "security-advisories@github.com", "published": "2024-10-08T18:15:31.170", - "lastModified": "2024-10-10T12:56:30.817", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-03T16:31:38.163", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.6, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 4.2, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.6, + "impactScore": 3.6 } ] }, @@ -51,10 +71,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:monospace:directus:*:*:*:*:*:node.js:*:*", + "versionEndExcluding": "10.13.2", + "matchCriteriaId": "995104A5-7032-4BC1-9E90-ABE8E13DC287" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/directus/directus/security/advisories/GHSA-vw58-ph65-6rxp", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json new file mode 100644 index 00000000000..771256973c2 --- /dev/null +++ b/CVE-2024/CVE-2024-488xx/CVE-2024-48814.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-48814", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-03T15:15:10.570", + "lastModified": "2025-01-03T15:15:10.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SQL Injection vulnerability in Silverpeas 6.4.1 allows a remote attacker to obtain sensitive information via the ViewType parameter of the findbywhereclause function" + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/SubZ3r0-0x01/7150f7cbc3b7d810adb221cae3d08fc8", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Silverpeas/Silverpeas-Components/pull/859", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Silverpeas/Silverpeas-Core/pull/1353", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json new file mode 100644 index 00000000000..e934438d9f3 --- /dev/null +++ b/CVE-2024/CVE-2024-550xx/CVE-2024-55078.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-55078", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-03T15:15:10.697", + "lastModified": "2025-01-03T15:15:10.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An arbitrary file upload vulnerability in the component /adminUser/updateImg of WukongCRM-11.0-JAVA v11.3.3 allows attackers to execute arbitrary code via uploading a crafted file." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/summerxxoo/8a0c9905feda6e192c10b860888afd26", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/summerxxoo/VulnPoc/blob/main/WukongCRM-11.0-JAVA%20-File%20upload%20across%20directories.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json new file mode 100644 index 00000000000..fb2515959af --- /dev/null +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55507.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-55507", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-03T16:15:26.027", + "lastModified": "2025-01-03T16:15:26.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue in CodeAstro Complaint Management System v.1.0 allows a remote attacker to escalate privileges via the delete_e.php component." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/CV1523/CVEs/blob/main/CVE-2024-55507.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json b/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json new file mode 100644 index 00000000000..2852ce14469 --- /dev/null +++ b/CVE-2024/CVE-2024-55xx/CVE-2024-5591.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-5591", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-03T15:15:10.813", + "lastModified": "2025-01-03T15:15:10.813", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM Jazz Foundation 7.0.2, 7.0.3, and 7.1.0 could allow a remote attacker to obtain sensitive information when a detailed technical error message is returned in the browser. This information could be used in further attacks against the system." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7180120", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json new file mode 100644 index 00000000000..6b07b9afe56 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56320.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-56320", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-03T16:15:26.180", + "lastModified": "2025-01-03T16:15:26.180", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GoCD is a continuous deliver server. GoCD versions prior to 24.5.0 are vulnerable to admin privilege escalation due to improper authorization of access to the admin \"Configuration XML\" UI feature, and its associated API. A malicious insider/existing authenticated GoCD user with an existing GoCD user account could abuse this vulnerability to access information intended only for GoCD admins, or to escalate their privileges to that of a GoCD admin in a persistent manner. it is not possible for this vulnerability to be abused prior to authentication/login. The issue is fixed in GoCD 24.5.0. GoCD users who are not able to immediate upgrade can mitigate this issue by using a reverse proxy, WAF or similar to externally block access paths with a `/go/rails/` prefix. Blocking this route causes no loss of functionality. If it is not possible to upgrade or block the above route, consider reducing the GoCD user base to more trusted set of users, including temporarily disabling use of plugins such as the guest-login-plugin, which allow limited anonymous access as a regular user account." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 9.4, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-285" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gocd/gocd/commit/68b598b97bd283a5a85e20d018d69fe86acf4165", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/releases/tag/24.5.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/security/advisories/GHSA-346h-q594-rj8j", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.gocd.org/releases/#24-5-0", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json new file mode 100644 index 00000000000..77909d4c372 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56321.json @@ -0,0 +1,72 @@ +{ + "id": "CVE-2024-56321", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-03T16:15:26.340", + "lastModified": "2025-01-03T16:15:26.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GoCD is a continuous deliver server. GoCD versions 18.9.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse the backup configuration \"post-backup script\" feature to potentially execute arbitrary scripts on the hosting server or container as GoCD's user, rather than pre-configured scripts. In practice the impact of this vulnerability is limited, as in most configurations a user who can log into the GoCD UI as an admin also has host administration permissions for the host/container that GoCD runs on, in order to manage artifact storage and other service-level configuration options. Additionally, since a GoCD admin has ability to configure and schedule pipelines tasks on all GoCD agents available to the server, the fundamental functionality of GoCD allows co-ordinated task execution similar to that of post-backup-scripts. However in restricted environments where the host administration is separated from the role of a GoCD admin, this may be unexpected. The issue is fixed in GoCD 24.5.0. Post-backup scripts can no longer be executed from within certain sensitive locations on the GoCD server. No known workarounds are available." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + }, + { + "lang": "en", + "value": "CWE-36" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gocd/gocd/commit/631f315d17fcb73f310eee6c881974c9b55ca9f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/releases/tag/24.5.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/security/advisories/GHSA-7jr3-gh3w-vjxq", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.gocd.org/releases/#24-5-0", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json new file mode 100644 index 00000000000..578c2aa1ef5 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56322.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-56322", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-03T16:15:26.480", + "lastModified": "2025-01-03T16:15:26.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GoCD is a continuous deliver server. GoCD versions 16.7.0 through 24.4.0 (inclusive) can allow GoCD admins to abuse a hidden/unused configuration repository (pipelines as code) feature to allow XML External Entity (XXE) injection on the GoCD Server which will be executed when GoCD periodically scans configuration repositories for pipeline updates, or is triggered by an administrator or config repo admin. In practice the impact of this vulnerability is limited, in most cases without combining with another vulnerability, as only GoCD (super) admins have the ability to abuse this vulnerability. Typically a malicious GoCD admin can cause much larger damage than that they can do with XXE injection. The issue is fixed in GoCD 24.5.0. As a workaround, prevent external access from the GoCD server to arbitrary locations using some kind of environment egress control." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/releases/tag/24.5.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/security/advisories/GHSA-8xwx-hf68-8xq7", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.gocd.org/releases/#24-5-0", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json b/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json new file mode 100644 index 00000000000..b72b484a887 --- /dev/null +++ b/CVE-2024/CVE-2024-563xx/CVE-2024-56324.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2024-56324", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-03T16:15:26.643", + "lastModified": "2025-01-03T16:15:26.643", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "GoCD is a continuous deliver server. GoCD versions prior to 24.4.0 can allow GoCD \"group admins\" to abuse ability to edit the raw XML configuration for groups they administer to trigger XML External Entity (XXE) injection on the GoCD server. Theoretically, the XXE vulnerability can result in additional attacks such as SSRF, information disclosure from the GoCD server, and directory traversal, although these additional attacks have not been explicitly demonstrated as exploitable. This issue is fixed in GoCD 24.5.0. Some workarounds are available. One may temporarily block access to `/go/*/pipelines/snippet` routes from an external reverse proxy or WAF if one's \"group admin\" users do not need the functionality to edit the XML of pipelines directly (rather than using the UI, or using a configuration repository). One may also prevent external access from one's GoCD server to arbitrary locations using some kind of environment egress control." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.1, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gocd/gocd/commit/410331a97eb2935e04c1372f50658e05c533f733", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/releases/tag/24.5.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/gocd/gocd/security/advisories/GHSA-3w9f-fgr5-5g78", + "source": "security-advisories@github.com" + }, + { + "url": "https://www.gocd.org/releases/#24-5-0", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json new file mode 100644 index 00000000000..f1cd9994c2d --- /dev/null +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56408.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2024-56408", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-03T16:15:26.773", + "lastModified": "2025-01-03T16:15:26.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PhpSpreadsheet is a PHP library for reading and writing spreadsheet files. Versions prior to 3.7.0, 2.3.5, 2.1.6, and 1.29.7 have is no sanitization in the `/vendor/phpoffice/phpspreadsheet/samples/Engineering/Convert-Online.php` file, which leads to the possibility of a cross-site scripting attack. Versions 3.7.0, 2.3.5, 2.1.6, and 1.29.7 contain a patch for the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:H/VA:N/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/commit/700a80346be269af668914172bc6f4521982d0b4", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/PHPOffice/PhpSpreadsheet/security/advisories/GHSA-x88g-h956-m5xg", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-01xx/CVE-2025-0176.json b/CVE-2025/CVE-2025-01xx/CVE-2025-0176.json index 2f003544db5..08cf9a7fe27 100644 --- a/CVE-2025/CVE-2025-01xx/CVE-2025-0176.json +++ b/CVE-2025/CVE-2025-01xx/CVE-2025-0176.json @@ -2,13 +2,17 @@ "id": "CVE-2025-0176", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-03T02:15:07.870", - "lastModified": "2025-01-03T02:15:07.870", + "lastModified": "2025-01-03T15:15:11.360", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used." + }, + { + "lang": "es", + "value": "Se ha encontrado una vulnerabilidad en code-projects Point de Sales y Inventory Management System 1.0. Se ha calificado como cr\u00edtica. Este problema afecta a algunos procesos desconocidos del archivo /user/add_cart.php. La manipulaci\u00f3n del argumento id/qty provoca una inyecci\u00f3n SQL. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse." } ], "metrics": { @@ -107,7 +111,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +144,10 @@ { "url": "https://vuldb.com/?submit.473347", "source": "cna@vuldb.com" + }, + { + "url": "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/README.md b/README.md index dda014c0348..ce37827eada 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-03T15:00:25.495310+00:00 +2025-01-03T17:00:20.860601+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-03T14:53:06.053000+00:00 +2025-01-03T16:40:28+00:00 ``` ### Last Data Feed Release @@ -33,26 +33,54 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -275644 +275654 ``` ### CVEs added in the last Commit -Recently added CVEs: `0` +Recently added CVEs: `10` +- [CVE-2024-41780](CVE-2024/CVE-2024-417xx/CVE-2024-41780.json) (`2025-01-03T15:15:10.367`) +- [CVE-2024-48814](CVE-2024/CVE-2024-488xx/CVE-2024-48814.json) (`2025-01-03T15:15:10.570`) +- [CVE-2024-55078](CVE-2024/CVE-2024-550xx/CVE-2024-55078.json) (`2025-01-03T15:15:10.697`) +- [CVE-2024-55507](CVE-2024/CVE-2024-555xx/CVE-2024-55507.json) (`2025-01-03T16:15:26.027`) +- [CVE-2024-5591](CVE-2024/CVE-2024-55xx/CVE-2024-5591.json) (`2025-01-03T15:15:10.813`) +- [CVE-2024-56320](CVE-2024/CVE-2024-563xx/CVE-2024-56320.json) (`2025-01-03T16:15:26.180`) +- [CVE-2024-56321](CVE-2024/CVE-2024-563xx/CVE-2024-56321.json) (`2025-01-03T16:15:26.340`) +- [CVE-2024-56322](CVE-2024/CVE-2024-563xx/CVE-2024-56322.json) (`2025-01-03T16:15:26.480`) +- [CVE-2024-56324](CVE-2024/CVE-2024-563xx/CVE-2024-56324.json) (`2025-01-03T16:15:26.643`) +- [CVE-2024-56408](CVE-2024/CVE-2024-564xx/CVE-2024-56408.json) (`2025-01-03T16:15:26.773`) ### CVEs modified in the last Commit -Recently modified CVEs: `7` +Recently modified CVEs: `30` -- [CVE-2021-43783](CVE-2021/CVE-2021-437xx/CVE-2021-43783.json) (`2025-01-03T14:52:50.143`) -- [CVE-2024-12694](CVE-2024/CVE-2024-126xx/CVE-2024-12694.json) (`2025-01-03T14:15:23.560`) -- [CVE-2024-12798](CVE-2024/CVE-2024-127xx/CVE-2024-12798.json) (`2025-01-03T14:15:24.370`) -- [CVE-2024-12801](CVE-2024/CVE-2024-128xx/CVE-2024-12801.json) (`2025-01-03T14:15:24.500`) -- [CVE-2024-45815](CVE-2024/CVE-2024-458xx/CVE-2024-45815.json) (`2025-01-03T14:53:06.053`) -- [CVE-2024-45816](CVE-2024/CVE-2024-458xx/CVE-2024-45816.json) (`2025-01-03T14:52:37.133`) -- [CVE-2024-46976](CVE-2024/CVE-2024-469xx/CVE-2024-46976.json) (`2025-01-03T14:52:32.863`) +- [CVE-2023-34617](CVE-2023/CVE-2023-346xx/CVE-2023-34617.json) (`2025-01-03T16:15:24.740`) +- [CVE-2023-34620](CVE-2023/CVE-2023-346xx/CVE-2023-34620.json) (`2025-01-03T16:15:24.927`) +- [CVE-2023-34623](CVE-2023/CVE-2023-346xx/CVE-2023-34623.json) (`2025-01-03T16:15:25.113`) +- [CVE-2023-34755](CVE-2023/CVE-2023-347xx/CVE-2023-34755.json) (`2025-01-03T16:15:25.290`) +- [CVE-2023-34756](CVE-2023/CVE-2023-347xx/CVE-2023-34756.json) (`2025-01-03T16:15:25.463`) +- [CVE-2023-34823](CVE-2023/CVE-2023-348xx/CVE-2023-34823.json) (`2025-01-03T16:15:25.640`) +- [CVE-2023-34824](CVE-2023/CVE-2023-348xx/CVE-2023-34824.json) (`2025-01-03T15:15:09.623`) +- [CVE-2023-34865](CVE-2023/CVE-2023-348xx/CVE-2023-34865.json) (`2025-01-03T15:15:09.823`) +- [CVE-2023-34867](CVE-2023/CVE-2023-348xx/CVE-2023-34867.json) (`2025-01-03T15:15:10.020`) +- [CVE-2023-40478](CVE-2023/CVE-2023-404xx/CVE-2023-40478.json) (`2025-01-03T16:34:16.067`) +- [CVE-2023-40479](CVE-2023/CVE-2023-404xx/CVE-2023-40479.json) (`2025-01-03T16:35:43.653`) +- [CVE-2023-40480](CVE-2023/CVE-2023-404xx/CVE-2023-40480.json) (`2025-01-03T16:36:16.097`) +- [CVE-2023-51634](CVE-2023/CVE-2023-516xx/CVE-2023-51634.json) (`2025-01-03T16:40:16.203`) +- [CVE-2023-51635](CVE-2023/CVE-2023-516xx/CVE-2023-51635.json) (`2025-01-03T16:40:28.000`) +- [CVE-2024-27295](CVE-2024/CVE-2024-272xx/CVE-2024-27295.json) (`2025-01-03T15:57:16.817`) +- [CVE-2024-27296](CVE-2024/CVE-2024-272xx/CVE-2024-27296.json) (`2025-01-03T16:14:03.593`) +- [CVE-2024-28238](CVE-2024/CVE-2024-282xx/CVE-2024-28238.json) (`2025-01-03T16:14:55.823`) +- [CVE-2024-28239](CVE-2024/CVE-2024-282xx/CVE-2024-28239.json) (`2025-01-03T16:17:32.100`) +- [CVE-2024-34708](CVE-2024/CVE-2024-347xx/CVE-2024-34708.json) (`2025-01-03T16:19:08.750`) +- [CVE-2024-34709](CVE-2024/CVE-2024-347xx/CVE-2024-34709.json) (`2025-01-03T16:20:01.927`) +- [CVE-2024-36128](CVE-2024/CVE-2024-361xx/CVE-2024-36128.json) (`2025-01-03T16:24:06.250`) +- [CVE-2024-39895](CVE-2024/CVE-2024-398xx/CVE-2024-39895.json) (`2025-01-03T16:29:09.890`) +- [CVE-2024-39896](CVE-2024/CVE-2024-398xx/CVE-2024-39896.json) (`2025-01-03T16:30:43.367`) +- [CVE-2024-47822](CVE-2024/CVE-2024-478xx/CVE-2024-47822.json) (`2025-01-03T16:31:38.163`) +- [CVE-2025-0176](CVE-2025/CVE-2025-01xx/CVE-2025-0176.json) (`2025-01-03T15:15:11.360`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 6b6f9e6a4db..72a7bdc71a7 100644 --- a/_state.csv +++ b/_state.csv @@ -184990,7 +184990,7 @@ CVE-2021-4378,0,0,74f6da3f33a7c118184c27d64759b3d770af0bc53ab336b374ba189ff85f99 CVE-2021-43780,0,0,1bfa3db9d94130ef24b2593e757aaf7121510a117571de0bff270a0cdd24ad47,2024-11-21T06:29:46.333000 CVE-2021-43781,0,0,83b5431bdd3e4f24307a6d5be3002e7c44252557aa22d5c0f2a1b6fa8d139a40,2024-11-21T06:29:46.457000 CVE-2021-43782,0,0,7c4869e5fc20cf7eb07405a14f392311fc327dfc5d31aef4373794d140731cb3,2024-11-21T06:29:46.593000 -CVE-2021-43783,0,1,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000 +CVE-2021-43783,0,0,23825690a236bdc2dd01fb30b9e53324e3e4b3ac6341e2bba6525b48b94186df,2025-01-03T14:52:50.143000 CVE-2021-43784,0,0,073ec769af326eddbd549dfc99ec29559882aff8249bd3d38a6dc118a67136cf,2024-11-21T06:29:46.873000 CVE-2021-43785,0,0,75d1cca129ea42ebb4fc89f19485476d7d4a2f72e66bec77a999aa5e33d0e46a,2024-11-21T06:29:47.030000 CVE-2021-43786,0,0,ae7238f3759020b8217e66fa8ae738ef36819e2d7b2254a6da7ac805cc1ab6b8,2024-11-21T06:29:47.163000 @@ -199832,8 +199832,8 @@ CVE-2022-31627,0,0,7988c7987107767faa26c91c4891892d0041cc614c7a6d1a3a06deb7caf95 CVE-2022-31628,0,0,ddf8d9d176ca572281725bcb1b547da70694f62f03744783ee8e12be7f37ea23,2024-11-21T07:04:53.293000 CVE-2022-31629,0,0,5ef862df04f8d255ed02bf719beeb80649437a92cf9e67e9f3f71844fbe16d82,2024-11-21T07:04:53.460000 CVE-2022-31630,0,0,048f94737739e9ec1f539180d01531111b8a9b6e3fb03b23f54e62135c59134e,2024-11-21T07:04:53.693000 -CVE-2022-31635,0,0,9fa1f7b2e398fb6b2c51f0cd924bed5570d7cfcb9e6000cb2f71c0fecd954d44,2024-11-21T07:04:53.830000 -CVE-2022-31636,0,0,3dde94b5af6733fb77f8357055347d897ee2984f52a5eb2f297bff7574e2bcce,2024-11-21T07:04:54.760000 +CVE-2022-31635,0,1,f33cce5b1e193c9081577f172af1b88917acd23104921caa053576c10bfcf687,2025-01-03T15:15:06.873000 +CVE-2022-31636,0,1,dc5d48671ff8c8359b8ab236feb93a3c4723a165b95081331578932b6b185c1e,2025-01-03T15:15:08.580000 CVE-2022-31637,0,0,7e118aefb900f1b8771bfb03c3f88a05095e573d84c8f798deca45c7a537e9d6,2024-11-21T07:04:55.353000 CVE-2022-31638,0,0,2059d84d26545dd04336453f64b35e323c5ddc67e0fdd01032a49e7d96e0e32b,2024-11-21T07:04:55.950000 CVE-2022-31639,0,0,2db9867db165c9710bd5f24a4058d245249a75be5ab8aab9a798192b24a8bc65,2024-11-21T07:04:56.547000 @@ -214374,7 +214374,7 @@ CVE-2023-1319,0,0,b368dbf8ee7ea09a72a801be40a1f8e95308556cc4f9a243194f9c5ced6a57 CVE-2023-1320,0,0,a1b35f71aa2c62d9c7c6e39c28e5aa6fb59975fffcfd2bebdd707399549f1c48,2024-11-21T07:38:55.037000 CVE-2023-1321,0,0,ab9e35fb4373d2e3f3e3c732b4d0efcb8c98ff72d0eee67c59bdea7b868c3bcd,2024-11-21T07:38:55.153000 CVE-2023-1322,0,0,e51cf09b9e0215f38e65994259e9cc7df053984344d2b0d3a36aba6bfcef650c,2024-11-21T07:38:55.277000 -CVE-2023-1323,0,0,d4cda04501884a75dcd9305573a74ca92050af41895470a71604635c3260a819,2024-11-21T07:38:55.407000 +CVE-2023-1323,0,1,982823bb59d32330f0a13e86fef0c7d44c0b9e06b6c23575f1cffc35d2f30647,2025-01-03T15:15:09.330000 CVE-2023-1324,0,0,8df1f393b710a69755021078a93585fd0e089e9aa03e35b99d882a23f469d2a3,2024-11-21T07:38:55.520000 CVE-2023-1325,0,0,0959d70918885d472cdc91efc9bd6dc4dd3a4b413a8c9a9ff5d155b9a97a3461,2024-11-21T07:38:55.627000 CVE-2023-1326,0,0,e664d40e1b3535debd60c2ea7ad030684484488a464e3231a5c07b56759bb56e,2024-11-21T07:38:55.740000 @@ -226948,12 +226948,12 @@ CVE-2023-34611,0,0,687b023253523d6e78594d20204e464b5b48f1822b7ada6e96002f20770ef CVE-2023-34612,0,0,d9562c519a29403cbf5df3cdef7fae0d47649a05b55ea20c1399dcd942ad2eab,2024-11-21T08:07:26.347000 CVE-2023-34613,0,0,0980ba4370da51c40e36e15c7829f03ca9eb6219138e5fca5c693b4dcbe6d730,2024-11-21T08:07:26.520000 CVE-2023-34614,0,0,cfc5c897e7b775196b47d21236ed0a510f788fe6f12193dfb910a564a3234725,2024-11-21T08:07:26.670000 -CVE-2023-34615,0,0,d0a1cdc98d7a33162618a17d005e7e5661243581da307e00efcedbd2769c575c,2024-11-21T08:07:26.823000 -CVE-2023-34616,0,0,8c3efff83061b386f95199185e7ff2006ee844f861264c96eeeed3285d91dfbd,2024-11-21T08:07:26.973000 -CVE-2023-34617,0,0,a406025411886c1efd2a867f88854d9e4ee21cd3c016dd803806fbabafdb6dd6,2024-11-21T08:07:27.120000 +CVE-2023-34615,0,1,c7f7a620070310271ec68b0c4f6b84fdb07c3e4647f34669639a2792700ad451,2025-01-03T16:15:23.910000 +CVE-2023-34616,0,1,3f8ab3b615eb5e2615351002ea9e99bf37d3130f5b0111bf2e24904c92119046,2025-01-03T16:15:24.527000 +CVE-2023-34617,0,1,7ca29ae5a0478a1651698f89316d2d918e35d5e4adefb7a7c7cbf3fdd95d9f86,2025-01-03T16:15:24.740000 CVE-2023-3462,0,0,4177db0cffdc2613ba002ba4d01507ab8e47e6dfa38809c372fa791238948542,2024-11-21T08:17:19.147000 -CVE-2023-34620,0,0,41e40bf172b6b1fa36d26fee77ee204f20fc5b943a5f298e29cf527a932b1805,2024-11-21T08:07:27.273000 -CVE-2023-34623,0,0,4803c558369a990f0e334156c10be25674dec139081968ff4ee6791af549c44c,2024-11-21T08:07:27.437000 +CVE-2023-34620,0,1,98a0155672d14828973b2182db5672affa676d339ad8cd7b89db373949a38754,2025-01-03T16:15:24.927000 +CVE-2023-34623,0,1,f8df0f0e9dde144d4b6f6069842c529376e77c80103dc857feeebe365f1193f0,2025-01-03T16:15:25.113000 CVE-2023-34624,0,0,ccb6b9c3240373aba7f518b106fb079f69bf4f22dad6c2d7f2ea4f5936bf3118,2024-11-21T08:07:27.583000 CVE-2023-34625,0,0,6c4b73c7e9e48fa3c20aa62115f9bf66d09a0cd82510154a4c28d19d705d3e2c,2024-11-21T08:07:27.740000 CVE-2023-34626,0,0,593591497027e767148eea3cc4f048b12753ab18a7094ecfb88edc2a0c3ef2b2,2024-11-21T08:07:27.927000 @@ -227007,8 +227007,8 @@ CVE-2023-34751,0,0,8682934644407bc06186deb0a81834cf5b8a5790b0dce10df459f9b510d0b CVE-2023-34752,0,0,615bea58318106ba6ad4032c7d4aa234fe3427b6716a974f8b74ffb6f76a0dde,2025-01-02T20:16:02.933000 CVE-2023-34753,0,0,b5cfd78eed4154500a7bc8867dbf749fd6af8b5c24d367aeff1fa2fc7eeeea27,2025-01-02T20:16:03.177000 CVE-2023-34754,0,0,12d97e4f9a13202971d428941c83713e5b8a6fa712854e15428501cc4f423d61,2025-01-02T20:16:03.420000 -CVE-2023-34755,0,0,ad9d976aebf6a13a4d8d5e030a5115982976ae2d5d58da0b6a7b2f2c1e146936,2024-11-21T08:07:34.057000 -CVE-2023-34756,0,0,073e07a7dff5c7ec8f546bc2d03a122938a7c9838ebc4eee7cf13f8662c523cd,2024-11-21T08:07:34.217000 +CVE-2023-34755,0,1,43bac1549910ba2f6b627492786c57aa3a6957cd30d83bcc27bb7ddef8551b02,2025-01-03T16:15:25.290000 +CVE-2023-34756,0,1,0e4bfc03184a4dfa953cf99cf05978f022073f98c83d01a9ba68e5cbfa001d63,2025-01-03T16:15:25.463000 CVE-2023-34758,0,0,0f68d6687c3ddce1fe46cc75662a62eeb29c0ad98d09a62e8cfac50bfc6c2c85,2024-11-21T08:07:34.370000 CVE-2023-3476,0,0,40618b39925a8749af57b51f48be9f8a0417a1d39f925ba493f541ee61e68c0b,2024-11-21T08:17:21.123000 CVE-2023-34761,0,0,3fe72814266bd2f80524fddb8c8dc6ef5b680196079b43a9740a275231cf8871,2024-11-27T15:15:23.460000 @@ -227022,8 +227022,8 @@ CVE-2023-34798,0,0,6cb910bdabdb3563f84fc57831ebcda7ba4c5ee7c3dd75bac8c3c8a80deff CVE-2023-34800,0,0,84bba67803e1bbd4ca8cc01710d354e93f725db60979993fa12a34f73c09acc2,2024-12-16T20:15:07.120000 CVE-2023-3481,0,0,b2741aa0f42f156d4fee2c27ab01bac08a1a34d5e3aebc870718d36773e447a7,2024-11-21T08:17:21.767000 CVE-2023-3482,0,0,4f17c87c8ca4abd9150a3bc0ff1634cb2b99e8f7558db4292a90748d3f170833,2024-11-21T08:17:21.910000 -CVE-2023-34823,0,0,40513740fed68e8e66396debac889f6fe387d9792eb250b68461072643b7caab,2024-11-21T08:07:35.497000 -CVE-2023-34824,0,0,e4d073d174f9fdc33a97086b24703d80ff2edaad6b0b9ee4e4e1f3e2c5b3ef9d,2024-11-21T08:07:35.637000 +CVE-2023-34823,0,1,1e9de38f8e622ec4466d8c92c24cb606d3f2863d1045f144021cdfe4dda4d37a,2025-01-03T16:15:25.640000 +CVE-2023-34824,0,1,8e4fa292c32a57ed3992fa7f05ed57c4210704d4df81723ebb6147791e46bd6b,2025-01-03T15:15:09.623000 CVE-2023-34829,0,0,90606f64ce5b5ca9675100d75480645a14da247f5a747da7b09b465e80b3a21f,2024-11-21T08:07:35.777000 CVE-2023-34830,0,0,a4fcb275f043fb8ed2760ef0bd7f458229c234d132492bbd6c8d154694ebfb22,2024-11-21T08:07:35.940000 CVE-2023-34831,0,0,0dcb3a46cbe2d1b958427e2d399be90a2edc8708839e27e80c4adebbfcb7ba62,2024-11-21T08:07:36.087000 @@ -227048,8 +227048,8 @@ CVE-2023-34853,0,0,70feac653c1a3e0280c311147207cd3241715d41c2d589d538290c8ad5f44 CVE-2023-34855,0,0,ed2d4fafbe7f3e29b520e4c4e02dbbd89bcceb1278797c9db1a2814214086320,2024-11-21T08:07:38.867000 CVE-2023-34856,0,0,5b8cbe97230089400a96eadea80d38522d82601855a90172d3f4628f04896660,2024-11-21T08:07:39.013000 CVE-2023-3486,0,0,abc053f556d927ed652b30757a723149ae17401e97e606b2df27c18fb326369a,2024-11-21T08:17:22.333000 -CVE-2023-34865,0,0,c5a5fb874ce2aca447fcacc736978473bcea77b22d754d7a55731face24ecb5e,2024-11-21T08:07:39.150000 -CVE-2023-34867,0,0,fe24c20d7c1400fa4fc3d53aa855c72d12d25069dbe88a5f89cead66f6917ea6,2024-11-21T08:07:39.293000 +CVE-2023-34865,0,1,5664f741f50b9dd84d8a823d0d45aa717e7a771e4cd4c434cbd609e47dd230ad,2025-01-03T15:15:09.823000 +CVE-2023-34867,0,1,d872eacd3a79936a24114ea3f5fbae16c925f5515098c538dbc7bbd6daf03d28,2025-01-03T15:15:10.020000 CVE-2023-34868,0,0,92b0ec0383014e453bbf7417e099295cbbcdf2d44918f01cec01543a8b0ae35a,2025-01-02T21:15:09.110000 CVE-2023-34869,0,0,2d9adb7a5a83bdfd361e6c52dc28b0a603bcbf433dad33be958254b4792bb51a,2024-11-21T08:07:39.570000 CVE-2023-3487,0,0,68f2d9850e4a5ab0061c1ce04bf451bb9af48b3d5b3f3bf94ac9eddc3348a24e,2024-11-21T08:17:22.477000 @@ -231383,10 +231383,10 @@ CVE-2023-40474,0,0,8bcf31ee98703f6fc473b5b6ae72ea5932cd0d7a0edeb156d4f8a182ea3c7 CVE-2023-40475,0,0,e7d21de9d238e03b562bffb12dea4211af06c007f197e91c21580975c3001720,2024-12-17T15:36:49.790000 CVE-2023-40476,0,0,11996ceeadcf3af41b049e3465605bce8a16f6312202891a8f139bbd867768f7,2024-12-16T19:54:51.870000 CVE-2023-40477,0,0,3eb17f110dd9fb587160e88cbd13f801056aec9679ec47603ce426a7e8166eb5,2024-11-21T08:19:33.483000 -CVE-2023-40478,0,0,a3fb7798a48b05b31de5b2b5faa9c0ac4380209160291014ad3f81dcf8ebbb85,2024-11-21T08:19:33.637000 -CVE-2023-40479,0,0,9449a8cd9cba1b475b9fcd0125f9e3c6bfe2290a23a474f03f0ce92e2999e00c,2024-11-21T08:19:33.773000 +CVE-2023-40478,0,1,97084c2b4ef249d0552a8d03d3aeb2ad91f2711483ab5979ff3e9704d86b18e3,2025-01-03T16:34:16.067000 +CVE-2023-40479,0,1,7f0b7df65d67216fffb5ab0177cffb527f0d01bdb735f0d704cd884d3711bd7a,2025-01-03T16:35:43.653000 CVE-2023-4048,0,0,bd3c0a6a74e525a4188379c0cec4f9ff604ba7beed0f7d9138ffb0338be5ac41,2024-11-21T08:34:17.790000 -CVE-2023-40480,0,0,4efee1a79cc821ccb88a4d78aeea1a295eedd1c2d0323ded2d957c890b5c67ce,2024-11-21T08:19:33.900000 +CVE-2023-40480,0,1,10ebc4f3bccbb6d1037d383855dd023033f7196e7c20e5b3471953d956cf0fca,2025-01-03T16:36:16.097000 CVE-2023-40481,0,0,fa8348a8b2829056d88eb01d408fdfa5a81faedfe3b8561775d453f6e46e33e8,2024-11-21T08:19:34.030000 CVE-2023-40482,0,0,6d046a3f66aee61e3b8e7abbf764cf14bb2baba7448ec56eaf8a254e6b52060a,2024-11-21T08:19:34.160000 CVE-2023-40483,0,0,3dd7719458b277c585be7d5acd46a05a3c44952981433bf675cb5f2efb0c0617,2024-11-21T08:19:34.293000 @@ -239340,8 +239340,8 @@ CVE-2023-5163,0,0,cf3b8b5134b9c3abc6194368c1f49f0d1625e7f19df09276fa37ea2ce1e8ae CVE-2023-51630,0,0,e515bb953de02671803c7419ad4aba130c7fe90ffc243cec72816fb33885b191,2024-11-21T08:38:31.540000 CVE-2023-51631,0,0,63990fafd7619988fcb9ea55cb59056aa18a7251357c83485d91833b03bb94e5,2024-11-21T08:38:31.683000 CVE-2023-51633,0,0,5bad642ed926588fb216d042d3401b2bfb81ffae216f273e0c12fbfc0d81c0ae,2024-11-25T14:09:45.733000 -CVE-2023-51634,0,0,27883d7e67092228d6aa2a406db34a5289535f972d6c3891bb3d4750bd14fe53,2024-11-22T20:15:06.050000 -CVE-2023-51635,0,0,58843e2cdd5a771a346cf4631dd15324cb9015f9b2e410b01bdd1c9022bea973,2024-11-22T20:15:06.167000 +CVE-2023-51634,0,1,24101bc2264cc1d448351081d51aca13350b240728cd6ffe57bce0b6bf8722d1,2025-01-03T16:40:16.203000 +CVE-2023-51635,0,1,ee4330766282efd840c60d0e4f3a92ff9e46233947ba1ea3659971c9610fc910,2025-01-03T16:40:28 CVE-2023-51636,0,0,064e8a3fd5ea55d58d985476470cd6b3909b601adaac084b871f121b88b13dd9,2024-11-21T08:38:31.923000 CVE-2023-51637,0,0,29910b96acccc169a530531b3226da84a2d56d602569491908f5d6d939690c9d,2024-11-21T08:38:32.047000 CVE-2023-51638,0,0,c47880b226fd2bb90e8785fb684e320705afc8c0487e8ff5fc296835b0d1191b,2024-11-22T20:15:06.283000 @@ -245174,7 +245174,7 @@ CVE-2024-12687,0,0,db582e783ba07ea03e34c560f3ce0d9a75e73c080a0914e89215bff58a3d2 CVE-2024-1269,0,0,afe5fa6f2789b35a14da593df22cde42ff88e5a3e5db5d1bb0de9d1e5a1f477a,2024-11-21T08:50:12.253000 CVE-2024-12692,0,0,1d91106e54d6f85d8fe7f405f127892c0e24f0eae3c87f0ec8b1a814419d86e2,2024-12-18T22:15:05.730000 CVE-2024-12693,0,0,4219fa495406cba63408dc60d8d04c757d304855f4c2222ea40cc821cfe89cc2,2024-12-18T22:15:06.293000 -CVE-2024-12694,0,1,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000 +CVE-2024-12694,0,0,9800fbc5ca389434bdda7fa0de83799fcd1088c52cf84f2bdcf95dc149b6c72f,2025-01-03T14:15:23.560000 CVE-2024-12695,0,0,4ca306137a37a04c18e8f4bd689ebfa86a34c8059c690369657387f43989e7dc,2024-12-18T22:15:06.523000 CVE-2024-12697,0,0,2459466c74ec5bec9acd976593eaf1864bd447490d29e2029863b77f5d045147,2024-12-21T07:15:09.587000 CVE-2024-12698,0,0,3d9cdcbe538ab50d5f6959e4225d81bf3f0e9f88aa4025e53f307853d2e0961c,2024-12-18T05:15:07.840000 @@ -245215,8 +245215,8 @@ CVE-2024-12791,0,0,00e274fb2644dd0737fedef7f600b72a2d7c4a341721b9f72cd4a6ccf93a5 CVE-2024-12792,0,0,9ff314747d32c9ea3d838ab15483ae4445fd607f5e8ea594662271d73f2273aa,2024-12-19T18:15:08.900000 CVE-2024-12793,0,0,e8bee7f66d85bfcf3f10183c2d9dfa3d7688defa0d4131b4b123d19eadde9daf,2024-12-19T18:15:09.403000 CVE-2024-12794,0,0,e3e22485049a6ee1730ef3f5b425634ab9957dffabfae691eb4315bcd5eacfae,2024-12-19T18:15:09.963000 -CVE-2024-12798,0,1,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 -CVE-2024-12801,0,1,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 +CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 +CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 CVE-2024-12814,0,0,9d88ed8035fdc2fe3c6fe32e0accb8f4976205d682521fcc6260cfe967c9dc43,2024-12-24T07:15:10.800000 CVE-2024-1282,0,0,e6b07825f0f3597687613e3a6164d0e157f6f527c33c61eb8d90ec07193bdec2,2024-11-21T08:50:13.520000 CVE-2024-12828,0,0,28c200a13b14baa13804e935d3333b64f6d1e673d0788df4553ec7bcec7ebadb,2024-12-30T17:15:07.717000 @@ -251803,8 +251803,8 @@ CVE-2024-27290,0,0,e6351e36fccf78750391be14824a1927d7d886c71914a08afcab3c0676cfe CVE-2024-27291,0,0,a17901c720fa960198c0b15c85cdc3abb819356f307d51b08722f19c95d7a841,2024-11-21T09:04:15.700000 CVE-2024-27292,0,0,0985bf46a0f580555a70e94b95028857bb5056e62cd8bc4114703d5e8c1fcfe6,2024-11-21T09:04:15.823000 CVE-2024-27294,0,0,6a08d12fccf8590c3ca84aea628a228836385e94246afbcc476ee85ad0c8233f,2024-11-21T09:04:15.950000 -CVE-2024-27295,0,0,60e38510c316500920e803e76acf06f06073392f7916f0308afe2d923b6ae60f,2024-11-21T09:04:16.080000 -CVE-2024-27296,0,0,a328b88bcbe71085033fdbf82b578b4fb4ef026c9720719e3d87bb6875f937f9,2024-11-21T09:04:16.197000 +CVE-2024-27295,0,1,62b63c8181e69fdf30bf5e9ea58e339ce340673603d1ccec39c0824328ff8081,2025-01-03T15:57:16.817000 +CVE-2024-27296,0,1,bc7f110c759f40dab70b917dec22fad4a370b676b33c49ffc610915e7181e1a5,2025-01-03T16:14:03.593000 CVE-2024-27297,0,0,0f08fd661388c47fad3b951d015108d74fd35f9d302b8c4a28976eae1f793c8b,2024-11-21T09:04:16.323000 CVE-2024-27298,0,0,fec5a39b802dd251f2972424edfe42a5be7f6a4ad28011a2651a8684a41ac677,2024-11-21T09:04:16.450000 CVE-2024-27299,0,0,58b851c72842f2e8403fc03c6554402704bf7407ab46f5c07daac470110fd702,2024-11-21T09:04:16.593000 @@ -252558,8 +252558,8 @@ CVE-2024-28234,0,0,598260d530e844b988103ffca1d1f3c6f915fb6f021808bfe5979b1152748 CVE-2024-28235,0,0,cdc7503ef9eef57590419e704ccd1f07cf4d641ea4c724f1352a9dd9c4d7e4be,2024-11-21T09:06:03.783000 CVE-2024-28236,0,0,dfd61e97fd2f4e8bda5301eb249a81bee1ced1010d8891ae6b2fc931094dc494,2024-11-21T09:06:03.913000 CVE-2024-28237,0,0,569dada874e3f7581ae75d30d37e9e64307f64b42ac921c76927978c59e7d5a6,2024-11-21T09:06:04.057000 -CVE-2024-28238,0,0,6e650c4d2b7375c8a7f19bd73b04a31568d3018d7ee0ecbb6f8a5fe2be122555,2024-11-21T09:06:04.200000 -CVE-2024-28239,0,0,fd52520639c751eaf3695f415d5a8dfa2e482fd2b9084c68458cf9d0a756a07b,2024-11-21T09:06:04.327000 +CVE-2024-28238,0,1,54e673a11dc58ef2f1ce67b17902858e9a639439ca947a54911f01e497b4cc07,2025-01-03T16:14:55.823000 +CVE-2024-28239,0,1,cad2389eb8ad3f3fc89b4de0deaf45f55e8417efae42f10b632472f86525ee21,2025-01-03T16:17:32.100000 CVE-2024-2824,0,0,f1bf8222502fdfe6970d6bec7f9f262cc2a23adafeaf181a033793e1be015aa2,2024-11-21T09:10:36.917000 CVE-2024-28240,0,0,1d428d023bd48128545dba37f6f90872853fbc7c073165d7f1b0ca929b5b270b,2024-11-21T09:06:04.470000 CVE-2024-28241,0,0,af70a7a3f1c8ad453a7e703a202ae77314c98f684c8e610de8ea1d5439e1f740,2024-11-21T09:06:04.617000 @@ -257315,8 +257315,8 @@ CVE-2024-34703,0,0,5892a518a91e3752956cd9b6773c4db7f64bf352c43d71d21b6eb4d07eca8 CVE-2024-34704,0,0,c4fe39355e2bf7bb9aae1e6e451bfcdbc010f8bb176eebca13f8fa686688ca5a,2024-11-21T09:19:13.967000 CVE-2024-34706,0,0,d0c3791947d477e90819454bb760b27da6fb369a2903ff66dea2de1ef14409aa,2024-11-21T09:19:14.113000 CVE-2024-34707,0,0,8117b5f46b7d87d017dd6d7af57dbcd9505bc5384d9d51272ef358098cb11bbd,2024-11-21T09:19:14.290000 -CVE-2024-34708,0,0,cd3a7288cd62e4cc6a1bc94640c2efee00db13f65360a5f0c1d87f912d94d5ce,2024-11-21T09:19:14.427000 -CVE-2024-34709,0,0,a81b19cf13c295f8ac7f0d7d64f2aeda1727b93f3121fe3107116480aa43652e,2024-11-21T09:19:14.557000 +CVE-2024-34708,0,1,b6103d931f8db49de80394f3b0543e5df8df422ea783f294484fc137bbb2ff8a,2025-01-03T16:19:08.750000 +CVE-2024-34709,0,1,4dd1030c3fb3e8cc330f2849a60862b197aa7ed76d8cc6aef7b0c90fdf00b844,2025-01-03T16:20:01.927000 CVE-2024-3471,0,0,983339385380d7e0fe02d202e79ae08c00f0de07eaad5185ebf307859c8224f9,2024-11-21T09:29:40.350000 CVE-2024-34710,0,0,05f4e9fcad99d59c221e6b73e2dd714053cd2db6f98c9291777c51b4e036ca01,2024-11-21T09:19:14.687000 CVE-2024-34712,0,0,cf5b325ebd7ddae90933e1bc277473f4d6cae9ff57c40754d15ebf6965ef4770,2024-11-21T09:19:14.830000 @@ -258373,7 +258373,7 @@ CVE-2024-36122,0,0,c2aeae4cdd255ad31a0a91d4f75c2d56ebaea85629207dfb3b6b08cdce139 CVE-2024-36123,0,0,45e0c155f62186c64c46952b4328748c9e767854861074a71eec439ec1778037,2024-11-21T09:21:40.213000 CVE-2024-36124,0,0,b2f1b33ef0b5e93fc83acbb1a2fbe3de1cc6cf9ae5da7ecc83042baff09f6425,2024-11-21T09:21:40.357000 CVE-2024-36127,0,0,561d1d555f02c12c62e6101b2b5f8e1ac7be4167f3cb4d3847f27be6b4d55188,2024-11-21T09:21:40.483000 -CVE-2024-36128,0,0,56a86cf8f6e8c0bb29093c33c603e0d166b756f9a18b43276348c2f1af75adbc,2024-11-21T09:21:40.603000 +CVE-2024-36128,0,1,64d86fd38de118293b58a480f45da6320c6fd14e64e3f37e62e29a7a0f9d73bd,2025-01-03T16:24:06.250000 CVE-2024-36129,0,0,a414b0d40e893b45eb51f44e9cb4982a419c0fcd2624d7b680f12108411f97bc,2024-11-21T09:21:40.733000 CVE-2024-3613,0,0,8c49e72e9406a68c2f73faacb5db14b0130a295cac3973946f145897d312d626,2024-11-21T09:29:59.410000 CVE-2024-36130,0,0,9bd62fb5b4532bcabdec214127241940c2a7b957ead8f80f15dfd2bb2b6b6945,2024-10-24T20:35:06.217000 @@ -261346,8 +261346,8 @@ CVE-2024-3989,0,0,282bf7f86f8761318f492d12462b4a7880646f788a5c46f5a9950ff45ab93c CVE-2024-39890,0,0,c8343a9ea929857fa8808b228cecd63b1ba5d3a8800dd45f74ea582669324b81,2024-12-03T16:15:22.483000 CVE-2024-39891,0,0,d58f87038cb3ffd0fb4168b343d5f8ee4baff33beca8f6f9422d319e2027df29,2024-12-20T16:15:33.687000 CVE-2024-39894,0,0,4d15c700ed33a6fff9b64954d229a1be2b3454cc61179df7b4861cbf0d66eb8c,2024-11-21T09:28:30.867000 -CVE-2024-39895,0,0,79b1682b2f59bb18a7dc4840f62c81c284b66c27bf648fc0d51dea0701c04f04,2024-11-21T09:28:31.113000 -CVE-2024-39896,0,0,a2699ea7e6d0ebc9a7291dc8637f19cb8c4cd9d16df7555a08584d611fd39290,2024-11-21T09:28:31.230000 +CVE-2024-39895,0,1,6c9f43bf2d5b14f7c195d7f27e8da55d0fdfce3c789ba8e50bd50c39978ed78d,2025-01-03T16:29:09.890000 +CVE-2024-39896,0,1,94854292dd96847b416ee3a98f9f2538650654ead9d516ca3f42ab04a45acc43,2025-01-03T16:30:43.367000 CVE-2024-39897,0,0,2556606fbcf0e7ba0936e5da490b4aa4283af8c4bc064dbc26051be7c494f614,2024-11-21T09:28:31.350000 CVE-2024-39899,0,0,5a1391f0b0d9dee2f37bbd1f62e59efe6b2b51d0e7e95d4354ecbbe7b3b6e4e2,2024-11-21T09:28:31.470000 CVE-2024-3990,0,0,880b625fb9042da3fa8f1d060a369624b509717179c95e3562e8f2ac6af76111,2024-11-21T09:30:51.623000 @@ -262433,6 +262433,7 @@ CVE-2024-41775,0,0,e5a5c3f0c9c2d797037bc42d58511f5d720ca3c68c1710b74d20237b76b1b CVE-2024-41776,0,0,645561281eaec0c17a46e435f182a12ad35f1dabfbd0f0ddaced797c0e2c28f4,2024-12-11T03:24:19.023000 CVE-2024-41777,0,0,cb9df48d95cae8457cf91a5abe10e277d5ade6df23da7cf8a2746d2d5ff22e8b,2024-12-11T03:22:46.490000 CVE-2024-41779,0,0,0cc2a488dd76e38c9c90720b0b2edfd5c9f34c5d2e2c40d451ec0bb49b764fc0,2024-11-22T12:15:18.987000 +CVE-2024-41780,1,1,5cdde677a719d9513a4aa8726b309126fd892ae2e7e61ab0cc3b4e0038c719ce,2025-01-03T15:15:10.367000 CVE-2024-41781,0,0,be645911c6dec68941643ffd681ea405f77903ad7fd076fcfc9ba888bf410899,2024-11-22T12:15:19.193000 CVE-2024-41784,0,0,834229de69197513aecb1da041f367a5c75a25616f354d789ef1d74c355b94ba,2024-11-20T14:35:10.117000 CVE-2024-41785,0,0,c467b2ed18d6a9ed7b192c7574b2e5d45ad6a298958e3a9159fbc19830c4ae2c,2024-11-18T17:11:56.587000 @@ -265409,8 +265410,8 @@ CVE-2024-45810,0,0,c349eedcf860e10c9363a6ba6fcea9627aa86b33877b6f7be1e36f4038c07 CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000 CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000 CVE-2024-45813,0,0,619ea264c0f4bf8105d5e60e8f340f4fd92c635a69072623ce613a02ad4402cc,2024-09-20T12:30:17.483000 -CVE-2024-45815,0,1,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000 -CVE-2024-45816,0,1,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000 +CVE-2024-45815,0,0,ee196dcedd236f2a24a6575a459a3aa300bd5e5292e7f61ddb47fe94cf48cd22,2025-01-03T14:53:06.053000 +CVE-2024-45816,0,0,fe9275b3c6dcb1da65c8ac58dbf5fd1b8ab3ee806ae9c3cfcae7aa57e5724fab,2025-01-03T14:52:37.133000 CVE-2024-45817,0,0,04338584e0c7a05d71a1be8997c9492e340dee2b5e7a9715004e750a41578782,2024-11-21T09:38:08.627000 CVE-2024-45818,0,0,5cedc682ef3f5d9445ff8b080f0381ba193ffd5453fd7d81f8a4faf06c5fa624,2024-12-31T19:15:46.603000 CVE-2024-45819,0,0,353a2de2c0eb71c70aa8fbb379f318bdfabc7180522e3350c949c90462cc13ca,2024-12-31T19:15:46.797000 @@ -266038,7 +266039,7 @@ CVE-2024-46970,0,0,47f126874782e42ba0255278170be39f81b73559fd27fec798ec0eacead9e CVE-2024-46971,0,0,13f5bf1ddf9e277ff0420700bae256c15735e36c1980e83ccf846d2d8d2585bf,2024-12-16T17:15:09.957000 CVE-2024-46972,0,0,0e34573fc20dd373f66d1b8ed3f8cb5899ffa098578c43ffb6dff5bb8ae5f7ed,2024-12-28T05:15:08.497000 CVE-2024-46973,0,0,5b1148979504edc8c412112d196fc9eb688dbc46ad7acc2c72e50589e8a1c99b,2024-12-28T17:15:07.420000 -CVE-2024-46976,0,1,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 +CVE-2024-46976,0,0,4b4725b042b8e303031ca8672630aa4c44d9489240e1be2826c29862d55b367d,2025-01-03T14:52:32.863000 CVE-2024-46977,0,0,fa1cd1ba8936d67d5921849fcc8f3d7b6f2a4d12d9e5b79d9c6367bb65d4c705,2024-10-31T14:15:05.870000 CVE-2024-46978,0,0,5ad4a14bdb0dcc622f405a376b5dff5a37cfd5b77f4a078b27e4c7705de4bf3c,2024-09-20T12:30:17.483000 CVE-2024-46979,0,0,490db2a65c2e0ed655ace5926e805008e6332771442746f4b78cb7ccfb47c4d8,2024-09-20T12:30:17.483000 @@ -266774,7 +266775,7 @@ CVE-2024-47819,0,0,1a39bf32e7c6b82a650954a5b0900e95e1d66c96c1e4e5b23991d0f535e5e CVE-2024-4782,0,0,69b6d7a01a2232b7cbf2c7215ed8752a1696f8fe397399bcac0eb145fbd6c00f,2024-08-19T13:00:23.117000 CVE-2024-47820,0,0,bfecf70d13c7a8f68f3c0cf587c2e722ee17961ccd2429ee24d46ee3b305c114,2024-11-19T21:57:56.293000 CVE-2024-47821,0,0,1ad5cc98b31fb97413a2af4b0b825f5fc2f8d897ba91f4430ae5ce2de36ae65e,2024-10-28T13:58:09.230000 -CVE-2024-47822,0,0,1c2a4ddb47d48e476a8d0de9eecc87b2f94c41cf32f5a5cb4227c426f23ec246,2024-10-10T12:56:30.817000 +CVE-2024-47822,0,1,112867ef61321fd31839857c8845308750c840249de62ae63bdb48f078a1ee72,2025-01-03T16:31:38.163000 CVE-2024-47823,0,0,336ac507480a6e31bc670e3eea63dd6c12b526e914a6141258cfa4b3d9c44b55,2024-10-10T12:56:30.817000 CVE-2024-47824,0,0,97bf5a27d2397e0f0377b54caf7f6a92074070c7778d6b1d1355aecbed8e7f6b,2024-11-21T17:15:17.650000 CVE-2024-47825,0,0,f2c70b114484b175f9d75f5ebb125aac926bd889413c3088b95d536b95e4823b,2024-12-19T15:59:27.760000 @@ -267231,6 +267232,7 @@ CVE-2024-48807,0,0,a763796bbe84709db2996b18e1ed107315b165fb8245eca95257cb100e859 CVE-2024-48809,0,0,89c64378ba71cdec8bda78ac432f0505d060e9c4a712bdefd0c0360dbcd52353,2024-11-06T19:33:54.977000 CVE-2024-4881,0,0,1c031fd2c38a767f783cce3b716ba92a0bccdca18b325ac245c51367e8857d89,2024-11-21T09:43:46.897000 CVE-2024-48813,0,0,531834e27f6a6bc0c9381cd9781162753c49dc1f29a9e6d0b2f2fb460ee278b0,2024-10-15T12:58:51.050000 +CVE-2024-48814,1,1,a57915293639cd2f22fd5536bfef2016bbd90a552c63261df4228ec0f44a246e,2025-01-03T15:15:10.570000 CVE-2024-4882,0,0,415f96cc42f39d5a62242781ac68568d1b60333c23c5a2a5227f986f314b970a,2024-11-21T09:43:47.037000 CVE-2024-48821,0,0,4896dd6ac80918ca5a6581c0f1374f01a9628402f48179089cf11ce291dadb67,2024-10-15T15:35:21.620000 CVE-2024-48822,0,0,118b043493af5b9e81bfea3d9d49d263053f84c00f596289e418351e3f2a583f,2024-10-15T15:35:21.887000 @@ -271239,6 +271241,7 @@ CVE-2024-55058,0,0,87b2026e0371667b97fc0d238239f420fb30954db814c22844fef43709f0f CVE-2024-55059,0,0,8104722ac1b347e422b015b1bcea370832dc93b077cc722f4435b9c43328db84,2024-12-18T16:15:14.560000 CVE-2024-5506,0,0,3a939cb8d1b19c0888bb3cd98071317aca0cf323e5a9cf329a9932ae18f6a99c,2024-11-21T09:47:50.193000 CVE-2024-5507,0,0,cabca8bddf4a6d02e76f27981f16e33bb9535f789d53e187a16cce78138edc2d,2024-11-21T09:47:50.337000 +CVE-2024-55078,1,1,46727a306da0a5074789ceec48cc91a7cb0ca2cd0e29ed08f6dbed84909b6912,2025-01-03T15:15:10.697000 CVE-2024-5508,0,0,115a25c08f43d4b8fec19f2a1d9db4d23c6ce2518b2cd0371fc64ad26ff5bfe0,2024-11-21T09:47:50.463000 CVE-2024-55081,0,0,bc880d1fb0754a9a047f5f48c261b5410277472979a1a968b8556724a801b088,2025-01-02T20:16:05.530000 CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2dd8,2025-01-02T20:16:05.813000 @@ -271306,6 +271309,7 @@ CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e87 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 +CVE-2024-55507,1,1,3410e0d0b3845a0cd40aba36f83a7ea891bcac62004b332bbef076c18ad78726,2025-01-03T16:15:26.027000 CVE-2024-55509,0,0,4a5021013466b75dc19dd985fac6f59929ccb3fafbd7ec75f16f4601bde3282f,2024-12-26T20:15:23.067000 CVE-2024-5551,0,0,7ca1b2f3592d8c197217d4f6bb2a217c73a396396bc14275921b16391f97198d,2024-11-21T09:47:54.770000 CVE-2024-55513,0,0,fedcaafc6e85e6bd74dcc7a40ecdf11b2568dda1579c04082d671c5acf74ed00,2024-12-18T16:15:14.720000 @@ -271406,6 +271410,7 @@ CVE-2024-55889,0,0,4fe80ccef310d79116a068c6ac228ca3c43ec868733cbb7b1340936879db8 CVE-2024-5589,0,0,f5444edd52a970169072d34e3475e47df466a0f4e4d6a1a900b9eeb8173a84e0,2024-11-21T09:47:58.880000 CVE-2024-55890,0,0,ed415926f81e15a00d962b0a92626356ed0642a3e51df83526b3e0e3894d9e2b,2024-12-13T18:15:22.373000 CVE-2024-5590,0,0,61c18480efc672e6d99b43c679013d2693f79c71f53844282e3c898145206740,2024-11-21T09:47:59.020000 +CVE-2024-5591,1,1,ff8d1cdc789b69475beac70a994291467b1640cdafedbde74dd787145239b1f1,2025-01-03T15:15:10.813000 CVE-2024-55917,0,0,1f325af2a96e8ad41709dbd189d0ddfc8263df5691046d9ed51f18d85360c21b,2024-12-31T17:15:09.140000 CVE-2024-55918,0,0,bbfbb68501d5d412b5390769769529160437a59c66144983bc4b57777cd87c8a,2024-12-17T20:15:23.140000 CVE-2024-55946,0,0,ee860e9442a82675ef2a6aea6f75151a8e2b4e394989e5ab5272bb86ce0df26e,2024-12-13T21:15:13.603000 @@ -271651,6 +271656,10 @@ CVE-2024-56317,0,0,8d6cb761ec1de8db3f8894652188d82bc1e600feec839db7f7746cdf2c5b1 CVE-2024-56318,0,0,4614542827deff1ff7fc917535aa016ec46ffc813ff98610f6d274ec4b4e2e50,2025-01-02T20:16:06.917000 CVE-2024-56319,0,0,28ca3f0845265026262f805138452dcd32240d1eb92a7bdb1a246f385a35fe7a,2024-12-31T20:16:08.380000 CVE-2024-5632,0,0,79535ded485ce0fc041702b30ef936da2f13ebaec98ccb0306c2826a8b572585,2024-11-21T09:48:03.353000 +CVE-2024-56320,1,1,bae4446e4245d0b06b53d8f40efab1d5a9f50a9a859ae46e9d1241e41ddbb40e,2025-01-03T16:15:26.180000 +CVE-2024-56321,1,1,e95cf21efdba501f429d99a45fef811d64afd3a69e9525f6a52b713e8fd6614d,2025-01-03T16:15:26.340000 +CVE-2024-56322,1,1,7ccae66170f5f9483185f36964e22a15902abb27bc7b07488fa188b4ebf1414e,2025-01-03T16:15:26.480000 +CVE-2024-56324,1,1,106f735083ffc8e3eaea10fa2f5c6734dba5457eeab47e6c2031359baf5b4e42,2025-01-03T16:15:26.643000 CVE-2024-56326,0,0,3ccfa47d9bea58f3625dc78a40f8b39f6e3cc587e1d87fa9c9f0a5fa86f60f49,2024-12-27T18:15:38.947000 CVE-2024-56327,0,0,fc2f9db0e9292714542fc861ea9d5ceb7274916f39c244431a521117db26612f,2024-12-20T18:15:31.083000 CVE-2024-56329,0,0,8fdf810f87f9e68d511be79347aafa1a2f560fbe7ecef214b0341e7d568b9acc,2024-12-20T20:15:23.987000 @@ -271686,6 +271695,7 @@ CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020b CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 +CVE-2024-56408,1,1,f0cdaa44b57f476b1b653c1dc57ebd44815b6ab51d9702e1be87b001e3637937,2025-01-03T16:15:26.773000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 CVE-2024-56413,0,0,80435b57c7c9048773680d783c015ac26d2a1a27538e161c950af9d463318406,2025-01-02T16:15:08.570000 CVE-2024-56414,0,0,b4af03f514aa1e91d591d44d03066c9da0634ab7a11c7f36aef3d99223087fa5,2025-01-02T16:15:08.693000 @@ -275640,6 +275650,6 @@ CVE-2025-0172,0,0,52d8e9b23781f72db93517107fba3a4dacce2fa0b9c1933202d67ec972e26c CVE-2025-0173,0,0,7e3fc99444e621658643e55cf01044b7a151c6ec6043aaa26a942f36cc25b7c0,2025-01-02T18:15:21.630000 CVE-2025-0174,0,0,9d66653b35dce22a5e13bcd4d218f8b859e23f7e6e6c85f7fc84bbc507e489f5,2025-01-03T02:15:07.480000 CVE-2025-0175,0,0,ac95c9697b04739d886090fb337a8da173389b48ecd5972d04d24955935380d8,2025-01-03T02:15:07.680000 -CVE-2025-0176,0,0,2a22ffa81ac729c3387660dd6a8fe5bfa9ef0ae8a6a4a9c7a653c15c3464b03c,2025-01-03T02:15:07.870000 +CVE-2025-0176,0,1,762135cafd60f24293f16082ad1fa3ab2ac7264ff4dd90fdc233deab7e68191b,2025-01-03T15:15:11.360000 CVE-2025-22214,0,0,e2cc6e4f91ccc0784ce6c5e7f203a7b7ecf1116a49ea9d5798e3ff93276eaeec,2025-01-02T04:15:06.277000 CVE-2025-22275,0,0,ae7bb36b063c3378386b214c3e5016593366cb52d21141261157b091c3ceba6a,2025-01-03T07:15:25.297000