diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json index aba11578e44..3831c05b10a 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19692.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19692", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.653", - "lastModified": "2024-11-21T05:09:19.700", + "lastModified": "2025-02-18T15:15:11.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json b/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json index d71b4f85836..bdae8fcd27b 100644 --- a/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json +++ b/CVE-2020/CVE-2020-196xx/CVE-2020-19693.json @@ -2,7 +2,7 @@ "id": "CVE-2020-19693", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:07.697", - "lastModified": "2024-11-21T05:09:19.843", + "lastModified": "2025-02-18T15:15:12.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json b/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json index 429fd045f0d..b3dbd8602c8 100644 --- a/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json +++ b/CVE-2021/CVE-2021-215xx/CVE-2021-21551.json @@ -2,8 +2,8 @@ "id": "CVE-2021-21551", "sourceIdentifier": "security_alert@emc.com", "published": "2021-05-04T16:15:07.867", - "lastModified": "2024-11-21T05:48:34.733", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T15:46:11.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -112,6 +112,7 @@ ], "configurations": [ { + "operator": "AND", "nodes": [ { "operator": "OR", @@ -119,9 +120,2850 @@ "cpeMatch": [ { "vulnerable": true, - "criteria": "cpe:2.3:a:dell:dbutil_2_3.sys:*:*:*:*:*:*:*:*", + "criteria": "cpe:2.3:a:dell:dbutil:*:*:*:*:*:*:*:*", "versionEndIncluding": "2.3", - "matchCriteriaId": "A06CEB22-3B35-4323-93E6-310AAEC4A8CC" + "matchCriteriaId": "2BFE61FD-9349-4AFA-847C-B1047D55770C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_14:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3BDD0F0-B3D1-45DC-B1CA-24F17C291B71" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_17_51m_r2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EB791FAB-8E62-4BA1-AC0D-D8F22E13861B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_area_51:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61BA47E8-DC8C-465B-AC52-956A003B80C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_asm100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C3128DD-9A90-4863-A693-A6D5E46B797E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_asm100r2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70AED9B9-FC76-41B0-AC24-2B51FF1E1EBC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m14xr2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39E33ACF-06D0-4F77-91D6-BD3F7A8B1363" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m15_r4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B084185F-1C0D-47D9-9F72-A79095462428" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m17xr4:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CA3FE0D-2ECB-49F7-A2A3-8C7927CF61D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:alienware_m18xr2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50DAADE9-D885-4C56-BCB5-FFAB10083A12" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:canvas_27:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B2B43435-21BA-4C2E-B8A0-E6BC90FC0F89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:cheng_ming_3967:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF88AED3-7C7B-4CAC-8D17-9A5427821E37" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3967:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA1096BA-28A8-4B1A-A5C7-1704A12E7636" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3977:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67FCCE7C-BAC7-43F2-B328-C3AFD80B6AF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9EDA1826-CCB2-48A6-B78E-CB608ED71B91" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C83A9845-DBEB-4D97-A9F3-71D0262D4A6F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F67DFB1E-0B6A-40A4-8F4C-7623E6841E98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:chengming_3991:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8E9396F-11FC-43BC-BE74-B5FA7954A0CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dock_wd15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F66DCD8A-17AA-4DB7-9AD1-46E04916EE66" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:dock_wd19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15124DF5-16F4-45FD-94CB-9DBBDA9D7944" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:embedded_box_pc_5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F7B2BE27-F109-4B11-8E8B-732A1AE3CC2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g15_5510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE6C4737-DAD8-4921-B65C-8D11669B730D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g3_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79C0E8D8-FE8F-4718-8837-8C8FCACDB095" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g3_3579:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2F440E47-2C2A-4EA2-A799-649A23145D51" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g3_3779:-:*:*:*:*:*:*:*", + "matchCriteriaId": "598A90E5-C7AE-4901-BD33-375F88CF09C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3B49A7E9-EA33-4614-B91D-465D32407BE3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5090:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2544FF74-2830-4B7C-BE87-064B971C19D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81A8617F-56B1-4998-98CC-FA8C1D3DE011" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5587:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4274911B-43DC-4827-AB0D-314ACCE5B26A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g5_5590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB9AA2CC-6E81-4987-A888-E82D2949EF3C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g7_7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7B6CD4-5129-46B5-8C72-6CE584F7FE9B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g7_7588:-:*:*:*:*:*:*:*", + "matchCriteriaId": "269CF69F-0633-461A-A265-AB9728C40DA3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g7_7590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "331F9E85-4F7F-4C28-A403-EE8D8476FC5E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g7_7700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20046D13-2EE4-438C-8C98-089D018ADD44" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:g7_7790:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE3DF41E-0328-4AE0-B755-8B6269185BE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:gaming_g3_3590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D53C50B8-3D5A-4FD5-AB09-8F8C3F6FCC1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_11-3162:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D23306D1-BA32-4393-AEDD-89AD7BDB475D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_1122:-:*:*:*:*:*:*:*", + "matchCriteriaId": "221FCB0D-A3C9-4687-8396-A84DCC1506AF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_1210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E39817A8-8EBF-48B0-A174-1F2C19A47FE0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_13_5370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D500CCE0-993C-4D7C-BA82-D2D267055221" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14-3452:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A6EC204-002B-48DD-9C9A-5DBD1536F5E0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14-5459:-:*:*:*:*:*:*:*", + "matchCriteriaId": "693781ED-61DF-4C57-AE29-01E830BF6728" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_5468:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DF4EEAE-C141-4F2D-9C53-5F7E08CEB3BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_7460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D57A8381-FCF3-4653-B641-7AA5C94424FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_gaming_7466:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BF2668D-A070-4FA8-B6C2-9932512B48C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_14_gaming_7467:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C11C44D0-3531-4609-96F5-CB2332FE970F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15-3552:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73FF1CA8-5833-4698-90A6-B0E6B8DF1AE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15-5559:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ABBB826A-CEB8-490D-BF71-DA407589DC7E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15-5565:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F055B37-7173-4DA6-8E67-126A8C5268F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_5566:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFCFD749-F8FE-46B3-84E4-83F737E20550" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_5567:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2DDB8068-4B68-4D28-B7BB-D83C69C99065" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_5582_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EF1426F3-1D02-4415-AB63-A96701135529" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_7560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BA89918-D451-47C5-82F8-BF5112B3C1CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_7572:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C474333D-9864-49F9-959F-7F73C74ABBF3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_gaming_7566:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91C84D56-6932-4606-88CD-DC8712F3C11A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_gaming_7567:-:*:*:*:*:*:*:*", + "matchCriteriaId": "37596285-E4B9-4329-A711-FDD5E162DD05" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15_gaming_7577:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CDC0DD5-5B55-4B0D-A7A9-8AC4FC742CA4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_1545:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F833B1D9-E7C0-49AC-9BD3-A2C95CD22E06" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_1564:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A47378B-4DE8-428B-8648-32E90EC1A97A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_15z:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C929623-1D34-4CE4-8F15-D1077389B54C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_17-5759:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89C39459-99B9-426F-994F-2F19359B09B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_17_5767:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F63BA91A-974C-4B24-A091-FE177675AB32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_20-3052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD8323A0-1591-4CE8-8B20-05E11007F2F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_2330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D2295D7-EB51-441A-B22F-354E71CA63EE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_24-3452:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BCC9A56F-450F-45D4-A604-23ED1B9E07CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_24-3455:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D81DB78C-FCCC-4620-BB02-21AAF9AEB54C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_24-5475:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CB3DC16-EA71-43F6-853C-430C8C08DFA2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3043:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF34E99D-51E6-4B22-B6EB-165C32368102" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3048:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89D9E1D5-CE39-46C0-8D80-AE09E9ABDCC2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3147:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74F6D5DC-6A40-4528-80E6-B6CD4E13D006" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3157:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F330408-80F1-4243-87E4-3EA0FFF81894" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3168:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB6ECB48-07E8-4B2A-B2EE-10AFD253445C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3252:-:*:*:*:*:*:*:*", + "matchCriteriaId": "520AF4C4-C348-4FB6-9F4C-F43AAA00CCE4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3268:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C032B99E-E74F-4064-9A41-9A1D8579E9E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3421:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9AEBD419-DA8D-4E42-82F1-6CD82FF7FD73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3437:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C739DF9-C010-43B8-84C0-4D83869ECD6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3442:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C84C80C-76B9-423D-908E-875B110CC9A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3443:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDF44E32-D9D5-4BDB-AB69-F476CEE06083" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6606A288-CF9B-4BB6-9DC9-C73AD5C0FAF7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3471:-:*:*:*:*:*:*:*", + "matchCriteriaId": "322317E7-B2CA-428F-A441-EC4F40E4E16F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6042A01C-7F09-4755-A0AA-03476C48DAC0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3481:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82624B4C-8B81-4293-B323-E39EF4C7446D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "38D1CF38-33AB-4938-B099-FA60DBEB7A10" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3493:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8DDD1B6-04D2-48CC-9CB8-559D648DD17D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "545AAE79-546D-4AA0-B1F9-EF24AB01CFD3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEDB4BFA-A1C8-4694-B410-9646DACC7E30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F16CA89-FCA4-474D-AFDA-F08231206E7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3537:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7126850-CCA2-4CF2-806E-371F2F744C45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3542:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D38626A-7BB5-4F29-B1D9-9DC3F755744E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3543:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B8620DB8-82BE-4799-A98E-F2DF7AB3E167" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35EEA72D-94E6-4AB1-83F7-4625681B482E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3581:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD9DAC31-8634-4D35-922A-616D966DC761" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3583:-:*:*:*:*:*:*:*", + "matchCriteriaId": "19338A85-279E-43A6-8250-AE8D02C30346" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3584:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2CF2850-1C50-4AF4-A9F1-E23A9B963FFE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FCA387F-3C3B-409C-B056-C42B0F98856A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3593:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E97105-F800-47FB-B5F9-1F6D80BF7EC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3646:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E90C7FBE-8A7F-4949-9290-E5B4BD048188" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3647:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD7F2508-9F83-4186-8A60-42336F5FBAAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3655:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63B5EC81-897C-4294-9B87-E96B1DF4AE9D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3656:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60EF6614-2134-48AA-9513-51CADEF66C5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3668:-:*:*:*:*:*:*:*", + "matchCriteriaId": "06E76A77-E526-496E-8612-C4973DB05476" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD1FCF7B-E38E-4E86-93FB-F5E985EDEC25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3671:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1C41220-EE21-4C3B-BEB2-F3A763DAEB25" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3780:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D448145A-3F54-4EFA-B37F-E498F93C3F4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3781:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE61F5A3-CC20-4604-9903-8C6A83CEAB2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3790:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A24DAE59-DE41-4AE0-9FC5-FC33DF7A608A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3793:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EFE0A634-BC88-4214-BE69-14E609AA2151" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3847:-:*:*:*:*:*:*:*", + "matchCriteriaId": "534A46FC-DD6F-41AA-A993-50C47D4208FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2DA9B9D-61DB-4F61-9CA8-2C11ECACAB80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3881:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC5C6CE0-7C16-4C1E-A68D-41734A34EE19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_3891:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AACCBF67-FAE8-4069-9C69-496C05800F7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4DC00A25-2106-47EB-BC4B-1BE882AEF023" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5301:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B71BAF6-D87F-4B46-B786-464EB0614A93" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5323:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25B86E0E-D14D-4F73-BBED-F9F523A8FA09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5348:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BDCE8388-B114-46D7-9826-31A31D07710D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF0ECBD8-7889-423F-8CD0-0CB46F15F101" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97536AF8-4648-4B29-B658-CA7E4998B16D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5400_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6419DD36-2021-45F4-8742-8917852BB063" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5400_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C53FB43-C16F-4F01-B540-D34A55D1CC0E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5F3CCF-1542-4441-BCEE-434C5F8D8D1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5402:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD2093F8-84E0-41C5-A4F8-2D928E892DA8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5406_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A54A9E1-2907-4C34-84C5-6845C7C5F900" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5408:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6BC9F04-7E3E-4E5D-A1AC-80AED4DCF7BF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5409:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2163D58E-1B2C-4A5F-B2AA-3B6B41D73849" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5423:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A09A31B-31F8-4E1D-8E73-158A586764EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5443:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEDD0AFB-1C3F-405A-8812-2AB45CD8D224" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5448:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3B944AC-E048-48A0-95A0-16AB53BB34C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4B8F925B-4D9C-4578-989A-2046363623EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5481_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26ED2743-9AC6-42DB-B97D-D417F0FCC1C5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5482:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A949966-CD03-48FC-B3FD-ABB924CFBCF1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5485_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "67AF4B93-4EF4-441A-B337-2679036ECF42" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96210A31-E71B-4330-91A8-1FC51B31CDFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5490_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CEF2570-6B09-4C23-8C60-A5EE25F2A759" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5491_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0CDAE1D-00B9-41C7-9E11-1D3451616EAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5491_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "342C1726-CB87-4D7A-8A7F-BD342E8C875D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5493:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5523FCFA-FE19-4218-9FFD-9F99CFC9F6ED" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5494:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FB7900B-EF7A-4CB5-A5AA-31BA5FC6F189" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5498:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5CC31973-8FAE-4B9A-B4EA-09F108A64FBD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C332988B-6771-47A7-9B17-F0435D269AF6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5502:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDEFE664-624C-46BF-A206-63863918F185" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5508:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AECB4588-B026-424F-BE6F-10AD791F11A8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5509:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34013CBF-0C0B-4A95-AA02-49A5C2DB7EE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "112FB9E6-94EB-466A-9B3D-5B98C8E23E2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C6E8593C-C758-4C42-BA52-F5C1FAFAADCD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5537:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AF5A920B-058E-46C1-BC3B-57BAFDF30CCF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5543:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22A9F819-A83E-40BD-9561-AEB8F55D7B9F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5548:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F1FA7934-D113-42B3-8EB9-4A7F688FC4E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70FA90D2-6A18-4D7E-ACE9-4DC16355FB95" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5576:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BFE4E4F7-C5F0-41B3-9B0D-5F2D2BAECAD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5577:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A03CB68-BFAC-470E-9E61-AC34622E8B55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0402872-3BBB-49B6-9868-9BBEB6D58324" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5583:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B7D2EDD-6654-4929-9890-25CD69D46E00" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5584:-:*:*:*:*:*:*:*", + "matchCriteriaId": "23E51148-A3F1-4303-8121-11FE246CC9CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D631AC1-55C7-4075-9C9C-80936CF8F8EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5591_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A91A6AE7-FF91-42DC-A84A-99F9F8895191" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5593:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BE41514-E3C4-4163-873F-4B167C0A966D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5594:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B05AF708-5D88-4C7F-8A2C-386B83AFB1DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5598:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F132B46-AA74-4474-8F33-56C074FD768D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5676:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0ECB9193-BF92-4A99-B1AA-02BD3C727DD8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96ABA2F0-ADFA-41E7-A89F-B0C3707C4A59" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5749:-:*:*:*:*:*:*:*", + "matchCriteriaId": "593BE114-96DD-43AE-B752-A60A55BA7C1C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_5770:-:*:*:*:*:*:*:*", + "matchCriteriaId": "446F85CB-1752-4C2D-AC6C-CD70AC9734CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_580s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "284A682E-0EC1-4EF9-813A-5C6A27C9FCFA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_620:-:*:*:*:*:*:*:*", + "matchCriteriaId": "817D531E-3D9D-48D5-86B0-98C349DBB719" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D314EF3F-388B-49B9-83A4-ED73FA851399" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_660s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8734AC26-C839-41C6-9DB5-0F52874DF246" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3886944-BD6C-4B7E-9008-0BD0D48BA4FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7300_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B23C9A78-9C41-4450-A062-22A649D5A2CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7306_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2CA96A1D-2D7C-41CE-872E-CA6122178A42" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7359:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A523B22-2A24-4C00-B183-17277D276B34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7368:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3A570D8-A9BE-4659-A992-4C7C7B0D9356" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "359576AF-ADB5-4363-92E9-BD1858C55035" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7386:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A309CA69-6340-4971-88D9-06FA297BD79B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F19B632-A9E9-4698-B26F-7E5C7E5003AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16791B3E-6AEC-4F66-8C14-F2AFBC71112C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7391_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C60CA2A-7C0D-4303-A9FA-002F174E40FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BCE42ED-EBC0-4EE6-834C-F26B51532648" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7437:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8DE6AFA-7C64-452E-95CC-68DA33E3EC3E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7472:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1F358875-D321-4744-B581-08F63121EFCC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84EFAEA2-9C26-44A2-83B8-DB6D5C158740" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "549752BA-96AC-44AA-9475-BA407396D577" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7500_2-in-1_black:-:*:*:*:*:*:*:*", + "matchCriteriaId": "80488BFB-A247-4094-AD45-1EAD307464CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7500_2-in-1_silver:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77601155-CAD6-4344-A6A4-2BE9F072EE7F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8877DD5-AE9A-452D-AF5F-9E59B9D6DF99" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7506_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AEC2DAA4-BBA4-45E3-B159-3FE6D16B1582" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "632FF07B-B56D-4298-BF84-5CE4F3F82DD8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7537:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2AF7230B-D53D-481D-A1D3-F338E030E166" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7548:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D907D1B1-8E1B-4D8D-9BA4-5945B784BE80" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7558:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A3E7F364-3799-42BD-AE84-78292A62D517" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7559:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75A02B79-EEBE-4889-B545-BBC42152CD29" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FAD0E06-C2F4-4F21-BDE2-3379D35C823A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7586:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F56A819-2DA6-41D8-A096-419C54F5B745" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5323421-C5F4-4253-8C5F-F904C08E637D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7590_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91F7F88A-BCCE-4FE8-9CF4-A01F67CE1AD4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7591:-:*:*:*:*:*:*:*", + "matchCriteriaId": "807295DE-B0A2-4DE8-9AF7-479D59A473FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7591_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D83418B-CE3B-48FD-90A9-F269D608F8D2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D312406-A010-4049-B49E-3B7BF3420386" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7706_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91CDEE19-3895-421E-9E1E-513C46D324B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD4F8F45-ACF0-4025-9950-981BCFB28E96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7737:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28AACE0C-34E3-4AEF-AB0B-F61395DDB931" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7746:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6F772D3A-5FE7-4728-94FE-DE568CE418C9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7786:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69679DBF-3940-48BA-9FA5-953A09E09539" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7790:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C2442FB-1089-4AA1-91D1-9D9ED1B36BB6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_7791:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4E5632C0-5606-44AC-A2A8-481CC01D705D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_one_19:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8EB54594-2029-4496-98D5-FFADA97D1C9E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:inspiron_one_2020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "96CE9519-965F-4212-B0E8-661714A76DE2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_12_7285:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE2F482E-9753-487D-B943-DB34CFEFA2AE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_12_rugged_extreme_7214:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DCD30F80-7517-4255-872F-558ABC9C3CE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_12_rugged_tablet_7212:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECF21A32-7199-41D5-A9C4-51CB09F69C5F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_14_rugged_5414:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5BB16B9E-5786-412E-B73F-C334CAD96CAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_14_rugged_extreme_7404:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B4ACD9F-0520-4AA7-AEA7-ECE66F3BF27F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_14_rugged_extreme_7414:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73C6914E-1943-4F8C-B3AB-0C448B0C9E2A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3120:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BA58AE06-C0CA-4385-8DCA-4354D9B77383" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3150:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1572D80-7941-47A4-8515-38EE39908A19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3160:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7655AF2-66FB-4938-BE95-6FF4B53EC8E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3180:-:*:*:*:*:*:*:*", + "matchCriteriaId": "895D6AD5-908B-489C-95D7-874914192722" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3189:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A72CD347-8420-4309-82A4-BC8F79DC04AB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3190:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8B4CC5BE-E3CB-4874-BAC6-3D37F1130EDF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3190_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BC8C54F3-D4F2-434C-B656-CF8D41DAF55C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEECB432-D5CF-4F26-905A-21B45BA4B9F3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3301:-:*:*:*:*:*:*:*", + "matchCriteriaId": "399D6E0E-73DB-459C-836F-23E438D2387D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "753308E6-AA09-4A33-AE68-57DE73B5A369" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3310_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2918A3FF-8A16-4797-8DC6-99EE686D13CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52B5397C-6646-4EF5-894A-156AB6704295" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3340:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B845B0CA-5865-49B4-923C-724DB650BD32" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8494F070-7280-47CD-A750-183C7EB3E03F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2F30B90-E9E9-46CD-BFB0-459FC8723ADD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BBD65603-294E-4164-98A5-118FE450F5D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE43298D-12EA-4D98-8025-ABB7BCD1FFF0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CCAC1D0B-6099-40E1-A8A4-493478569B5C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "31C78A9B-65B4-4213-9A96-4E57CFA5B195" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C087B85D-2F09-49E5-8BE9-DE724B7D5BFB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3460:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10419F2B-8A07-4C4E-BA88-5465137EC10E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3460_wyse_tc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEEFFF4E-7F10-4CF2-BFB3-CEA4328B9C76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB10D00C-D600-4DE6-A0AB-DEB9C4FCC436" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04009AD7-3BE3-4C94-8DBE-FD72879BD916" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3480_mobile_thin_client:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F23617BE-7027-4FD3-A9B1-C78D312CB11B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "393619AF-08ED-42B7-A0CF-B30AF00245A3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D518DFF0-ECB7-423B-990B-B1055AF976D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13CF7C33-6088-40DE-89D8-CB958C06F3D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C8FB1C2-A4B9-496F-927E-90D8B0085741" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A95D40B-D42C-449E-915C-83A21EEA496B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A13B996-2556-4899-8B7D-E3B1470445E9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3351403-5904-480C-B9E1-6A2DF39B7431" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_3590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1B63755-2294-4DDA-B307-9E1722440F4D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5175:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F69BD502-6FBA-4075-A427-2C0C546B3843" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5179:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CE04752-0600-46B5-B7CF-74E160C8FC3F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDF8914A-289C-46CF-AD36-C7B9B24314CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D77B20B-6FDB-4CB4-96CB-5A311891D13B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5280:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CD444B0-06AC-4115-9BD1-F65BF4E0D73E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5280_mobile_thin_client:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CE657AD-58ED-4E96-90F5-CE235D5D722E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5285:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4CC433AB-F63C-46B7-B208-33A65E400CC4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5285_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "484907B2-9719-42BE-B946-6E6E5BDD873A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5288:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B91BC7B8-1B63-4EE2-B855-93677363124C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5289:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C0DE99B6-291B-4AAB-BBF2-A0ADE238FCDD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62EA01E4-0ADF-4863-9AE3-A9995581201E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5290_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEB2E9C0-3EF7-4910-82A2-558AE08DC55C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01DB6216-3CF6-46C5-9592-4BACCF04130A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5300_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "184C0853-8EE9-4CDE-94E1-A1CA0CA0518D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8738FA-CC10-45DD-AF56-54983844490C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5310_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3450591B-8A2D-406A-97BE-6ACBB06BC1A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB9F1715-604A-4787-AED0-7ADE6D0464C6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA6BB99C-65CE-43D8-8034-F9844285747E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C7B6DD44-0D01-4737-A01A-FD5AA95D9809" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3EA011CD-DD28-42E2-92C8-6B48BDEC08B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5411:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5A8645F-E50A-4041-ACD2-B93D325E3AAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C7F6900-A1E1-4167-84FE-D1E8D70DF33F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3DAF60D4-BDA2-43ED-802D-CE3ACB548693" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3453B1A-9C28-4007-94FF-FF3C52D65B39" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5488:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3501A531-C8ED-4139-8AEC-48DABD80B006" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D53A797-D418-49C3-9FE6-C53C7ACF7982" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5491:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CACFA198-F3B1-4D9A-8A7B-7E678931DABE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5495:-:*:*:*:*:*:*:*", + "matchCriteriaId": "81726C4A-05FA-48B3-AB22-0DF5BEF5BA18" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F5EDBEF3-D117-4F6C-8373-FC744D327128" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18ED69A2-0B53-4B77-B65C-D6E291F17165" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35D7DBE7-4BD8-49F6-B844-F9F5CDE5BF76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5511:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C8D607D-A84D-439B-8CAE-1A2D0876EF69" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E2AC36F7-FC4B-4CA4-91F3-8337C8F34681" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FD13310-CCC0-490C-A959-42EF8EC41232" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB98E18A-D2C1-4522-A814-A1AA2C26F86D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5AC395D9-DA6C-45B5-85E5-7906FE487EBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_5591:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03543212-F226-48F9-971C-F33D9EE5442E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7200_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DEFCB976-EE09-4CD8-A927-47DA1840A2E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7210_2_in_1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "980072FB-7334-4D77-AD4C-BCB5799CC8CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7275:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8235A82F-173D-4C3E-B280-D702EA42E2EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7280:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D5D3133-9388-49CF-A85D-2247A4DD9C4C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7285:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5F15F433-B614-402F-90AC-805AFA0FA340" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7290:-:*:*:*:*:*:*:*", + "matchCriteriaId": "359A2878-C996-4FD2-9AB6-B33531E2F630" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DE30AD4-D03C-441A-A42F-9A488B5B86B4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFEDD8F7-2EF0-4A6F-9F51-60100D317BF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C96134C6-3187-4DE4-8598-428C3544EFFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B51432C0-5E02-4101-BC43-A0F18A6A2772" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82234546-AF33-45FC-BF50-2AA8FD38A5A1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A1786B67-E621-4B2B-848A-B0F442719E94" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7389:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0952C9F6-0AB7-4DEA-B6AA-76159A2F7C42" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D8C3716-4E1C-4D32-BC94-81D7FB838FFC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7390_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C127AF83-FC01-4774-9ADC-7DFA02C8237B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF84D171-D235-4705-9F4E-84189DB64798" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7400_2in1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC3E95BE-8145-4136-B354-5B77E01E66A5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D3B023F-99A9-49EF-90F9-13D83CA69293" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B9C08D4-AA20-4EB9-8FDF-615E60BA3B88" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA90466D-6AE9-4030-ACFF-033E75A39CBD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AD9A87-7D62-4566-A1B8-E843176E2E38" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C726402A-F84C-49F6-8F18-2340E74F1CB0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_9410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE3F01FD-FC66-4DA7-A041-976B0AFA370A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_9510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A3C6284-3A69-4388-842C-6AC3CD3A7706" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB6D4199-F0CF-4D9D-85F9-BA1256B2B3FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03CC0927-8E28-4143-82EC-31C0D1CB695E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DF8AC659-863C-4734-B65C-216986E8D64E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9B3358A6-B686-422E-9C25-010B863245E4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BA8273A-F00A-42BF-96FA-E2A2180FA134" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA4F743C-D715-433B-9F00-6712D0713A92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "214B56CD-52D0-4BED-B3A5-E7C602E6C95B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e5570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F62DF33-04FD-40FE-9ECD-BB6F23673D83" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BEE945ED-C1C0-4A1E-A404-E1CA9C3D2778" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F1FB1F6-C904-4816-9172-698FD60900E5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6320:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A3A47B0-3824-4309-A26F-1CF0100C9DFF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6330:-:*:*:*:*:*:*:*", + "matchCriteriaId": "035EF4E7-8323-489B-96BF-11C419834ED2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C8BDA3B-87C6-4F47-B396-CEA8DBBF640F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6430_atg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A1A940A-5765-4D70-834D-8FC0DC564487" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "63FF50DE-51F1-4080-9FC2-DA704FCDBB55" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FE6E5C6-92D1-469E-B96A-9BCFF6777418" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e6540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F337B91-FDCA-4B9A-9553-FCCCDDD14FEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7240:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5C22F2D-A59A-4F58-8CC8-CE0F7D8CD3AC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E4EF8D1-6886-4DC6-9FAB-D57E4B32D22B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C322F9F-6E7E-44E5-9E65-6CB71236A485" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7270_mobile_thin_client:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39C535D6-E133-432F-AA1D-1C92D48CF0E7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7270_wyse_tc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E53EAC0-C607-4633-AA18-6BE80E377FC3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39BE47D9-E59D-4473-8A70-00FC446B6663" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3251782A-482E-4861-A76F-BFA6FE5092CE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_e7470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA38826D-FEF8-4058-9FA8-6E2E6B504AE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_5420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C4CF1B5-7E5D-46A6-A8D1-D86DB5389560" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_5424:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41CCF0D3-6985-4EDB-8B77-3FBC33779068" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_7424:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0FE5447E-E1C3-42A6-A7F5-10D475FECAD0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_extreme_7424:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CAD319B-8534-443E-A8EA-55B5C82C9361" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_extreme_tablet_7220:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2788C26D-7B71-4C67-876E-F4646B01A214" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_rugged_extreme_tablet_7220ex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C9B34FB-8AAE-4CAE-AF91-769580687472" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:latitude_xt3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "258431D4-53E8-4513-8342-6B87E2C4172F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA22B0C-088B-4454-A33F-1C0A91F59608" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7F32B68E-B359-4FCE-9CFC-20CCDBA3C7A2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3011_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "240BD607-AEF3-4261-8A81-F244FAB06DD9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4780468-3D7B-4E94-B115-499770E6B891" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3030_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D5903C33-173C-4FB4-A1DA-A26D4DC4A516" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3040:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB620A3B-E840-40C5-9109-CAC5C91B7A34" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3046:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7780D311-43C0-422A-AAF6-56750E5ED7DA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE8D8EDD-C74F-4FA1-ACA0-6983CF786CEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3050_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1800145-904B-4A9A-BE62-02426AE394DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C84B357-B810-4431-B229-ADBF766D988F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "240AE36D-A7E9-46EF-A0C4-15E86B3D63A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0175705A-13B6-44D6-9F7A-CC32F0A68A03" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3090_ultra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F34E557A-A8D2-4764-BE75-419844CF2F0B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3240_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A828BF7F-1DFA-4E0F-BC38-AF28EEB1C08F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_3280_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "807F9ED8-8D8E-44E4-AAEC-A461FA5B7CC1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94D6466F-AE2F-42DB-8AB0-C21CEC5EE991" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5040:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86CC4D03-5AC1-437B-96CF-D20CC77A9AB9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93A865CE-6BEF-4741-8DD2-A3B555B9D9A4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5055:-:*:*:*:*:*:*:*", + "matchCriteriaId": "40119709-6CDB-4FA8-AF07-8A2CCAFC8C1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5055_a-serial:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69FA72CE-5D3A-41EC-9478-8AC6AD569040" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5055_ryzen_apu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "417ABF32-4364-4E6D-A301-FFEA9F246316" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5055_ryzen_cpu:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF4FF940-5FB5-435B-82CE-CA088EAB473E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0EB26A4C-FFB2-425C-B4E6-4E376F979994" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E246B558-D04C-45C4-9795-7B9E58FA9AE8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16234A2E-A3E0-487D-8415-2B5295E91CD6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5250_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32DA34FD-ACBA-4465-A7B9-D4EEE8DAF69E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5260_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE8463FA-3444-4DF9-8CAC-0E8021340220" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5270_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "812EA3ED-513D-4335-B37B-5E04663F700C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_5480_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EDA85BD-F78E-4406-A3F7-9440F0DDD1CA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "652076FC-8122-4CDF-A15F-523FDB3BD44A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84533BD1-3A0B-463D-A3CB-0B3DE816235E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7040:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4DA1CE7-7AD4-4FC9-9130-D1AB179E6BAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7050:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3F8E0A1-FA9A-4B6B-9877-65B7BEE8D9FD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7060:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7CA379B4-8FE9-447D-AE62-6AFD698BE57B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B67634FD-A401-47D0-8F87-1AEA94238C2F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7070_ultra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C493C060-57D6-4BBA-81D8-617B8E078DE7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7071:-:*:*:*:*:*:*:*", + "matchCriteriaId": "87CAB5AE-89FA-4E2A-BE0B-2282E2B56654" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7080:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CC8D3BF8-D39B-4137-AC10-79037CD2B1EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7090_ultra:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDA19F9C-B92A-45EA-AE74-32C34BBCEC38" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7440_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "542A60EE-07E8-43CD-B6DE-B4D55EE461C1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7450_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94C009D0-F008-441F-B19F-586FDB1E5777" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7460_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "98C4E803-DA3B-4F15-9BD3-990FC52201E1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7480_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C18C627-75FD-42A0-B5FD-AC8D966C5308" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7760_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07DFC7F0-8131-4E02-9376-5678C2ACED54" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7770_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D93B48A-C9FE-48DF-9896-13FF92582F43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_7780_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25C6AC82-7B4F-45AA-B207-226F01DCF543" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_780:-:*:*:*:*:*:*:*", + "matchCriteriaId": "26AA38ED-44CA-40D8-8991-0837CB7E43D3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_790:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A06EBB8E-4A7D-42D9-B8D9-0D7DD1C948CD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_9010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6E7B8A3C-8C52-4AEB-8E9E-4258278D1C60" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_9020:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FB61039-6055-4798-870D-7F1BB6A2F9E8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_9030_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C92E7E3F-6A73-4A3A-ADBA-F4291637F2BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_990:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1EBAA411-C42E-44E3-818F-3A951F2ECED7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_fx130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "85C57C7D-E4B2-47D9-9E59-2060F48667EC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_fx170:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE2D7E3E-9F85-46CD-90C9-E9E6671FFBE5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_xe2:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF7C25C2-F3F7-4A3C-888E-EECC9E8741E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:optiplex_xe3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB1ED511-F76B-4329-850E-8A5D7395F8FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_17_m5750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32047BDA-6B4F-4928-A521-6036656AE263" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3240_cff:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41312A25-C60D-4929-B498-A78C36C06A46" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3420_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC83315E-5529-4A4B-8A1A-212345995573" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3430_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2C92E715-ECB9-4D38-B5CD-DD0A56B78C96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3430_xl:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB52A881-13C4-44C4-98D0-A4F3F3007475" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3431_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44519A43-1645-47F7-86DA-4DFA5743C193" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3440:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35195BD5-3038-42F8-ABEF-E4B8220FABE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9DB69A94-BA02-4393-B256-68E34AD50110" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52677DF4-9C49-45DA-AECA-CDE168A77B27" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED4A7A76-AA0B-4F5C-9797-2DAE0D52A749" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E6E64C4D-04A7-448C-A87D-66CC8F74B4BD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3541:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA67FEED-A4C5-41E2-B523-E7BD2A0DA19E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "015CB358-E0AF-4989-B4AC-2100814EF131" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3551:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44961E7D-2003-4DC1-80D8-045A2A35C279" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13F6518B-DDE1-4167-80EE-B0F9B480BF17" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3620_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "88922FD3-80E6-4D3C-A7EB-4F5DBCB26B8C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3630_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "07F05370-BA22-4711-8D02-9D888108E164" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3640:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B84F6196-564F-4D1C-9C3D-E9E422DA4749" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3930_rack:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1BEC8FAE-1E4E-48A1-8570-5F7A6FE67701" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_3930_xl_rack:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8D285ED-95D9-4D23-A81A-BA78D052366A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE40F051-53DE-451C-ABFC-2695771A96DF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CBBFE522-7630-4BED-9B2C-2AC12CA693DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F71189EF-0E04-4A17-8B22-B51C533F8D4E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5530_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30622F6E-2F6D-482B-AA1E-65DA4A4B1679" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "676C75C4-1830-482C-B577-02B5E9B9A8C2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "953AC008-D651-4905-B07F-07CA83BD3932" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5720_aio:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D2B639A5-8322-4065-850E-F5DA959E453B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5820_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C2EC78F-36B6-4B73-96C9-EDC94F4CF4B2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_5820_xl_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC1655C3-D394-4C58-9DE5-93C41C49E15F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7510:-:*:*:*:*:*:*:*", + "matchCriteriaId": "659D0E86-F188-4A23-BBFD-A12B71EA5F73" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7520:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73DD5C64-A10A-42F9-8F31-EF27A85E2A89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FC7B2C87-ABAE-4935-B160-843B35556055" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7540:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3400683A-24F0-494E-89CC-782769F0A643" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A134E41A-5CAE-4380-AD5D-37C5DD87650B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "551C8B0E-06F8-4ECD-A4FB-8756D579B377" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7720:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41B4E127-666D-4F61-9F5B-F8D3E8645054" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "947CB46C-18CE-42D3-ADEB-82750EC6937B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E8171B-5C5A-4019-A68F-AE8A3C2E0608" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7750:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8224EBE9-B645-47A7-AEB2-563EA91B4D43" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7820_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E0C0F26-863C-4704-BA18-D484817010F7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7820_xl_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "278DCC27-592A-49D8-9238-4C42E742042A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7920_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DD977B9-8060-479B-9406-3B66D49C539E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_7920_xl_tower:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4321E45F-2959-4C8B-9DD5-332027B7EE1F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_m4600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C87C4A99-BB00-42B3-8D93-9BA5F536F9CC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_m4700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2397295B-3895-4306-A5CD-B12F551933CF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_m6600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9A249CFC-2473-45C7-A68D-4AF6345B28FF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_m6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6A99E3B1-0921-4B3C-B7FB-EEAB36C0FA28" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_r5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6CA2F8AB-C9BB-4093-B8BE-2431F4FA417C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t1700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB7F6D32-12D1-424A-851C-4E6BC43E5B70" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F66A357-C847-4E7A-81E8-0777EF984C6E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t3600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F45C5133-08F5-4F21-A720-94CE74306156" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3CF503CF-5183-4D86-8977-60B28FC7B7E3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t5500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "143E5BA6-0C6A-4C93-A649-D8E062959EF1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t5600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A5B5792-B91A-4019-9FF4-4D3FC63007F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t5610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E8E78147-23A6-494F-8EF0-28126AE4BD30" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t5810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C071F560-C13C-4D36-A7A1-63C9A919712D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE040702-C863-4049-9B99-7D11FBD57F09" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t7600:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0BFD8E3-158A-4768-B961-D99BB48D2DBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t7610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7D0DDD3-6753-4160-93CB-0B8E32E70F92" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t7810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D30A1AE0-49D9-4285-B013-7E863B25D052" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:precision_t7910:-:*:*:*:*:*:*:*", + "matchCriteriaId": "84B43CA8-0F28-498B-8471-26A610C39958" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:thunderbolt_dock_tb16:-:*:*:*:*:*:*:*", + "matchCriteriaId": "599DAEAA-C0D1-4242-8386-4629B92473A7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:thunderbolt_dock_tb18dc:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A5D832C4-B6A0-44B1-B76D-A74AC17013FE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_13_5370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E5174E9-0257-4907-8671-FD6527A6301C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14-3446:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9473D486-4AE2-4F46-B48C-E79CD48C12BB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14-5459:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4DCB431-0DA8-41FF-A66F-4D529C3A692B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14_3458:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15F39161-4AF7-4865-908F-D71650DEBD96" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14_5468:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E027DED5-A7E7-42BA-B3B0-CE8FB56A9854" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_14_5471:-:*:*:*:*:*:*:*", + "matchCriteriaId": "35FE1C01-C25E-4AFE-B901-7B1E61F9CCBE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_1450:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B17CC3C3-7B2F-4CA1-94AD-E9BC346DADE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_3561:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D3B9B077-BD1E-4D12-9506-A10BF6B49D3D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_5568:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C56A340-C06B-4129-A876-5DB471BA0172" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_7570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BF1A9C6-0BB8-4DBC-8736-B2BE7FC0D212" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_15_7580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "089423B4-E489-4AAD-ABFA-4961DFC26C97" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_1550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "196A0153-CEB8-44F3-80C1-312DFC847147" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_20_3052:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F192BC33-5DAE-4772-9358-A6C60C2F45EF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_20_3055:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C526DED-D5CC-40E2-B44D-AD86AF63DD1E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_220s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7D5CC3F3-FF7E-4DBC-9AB5-82C755EF588B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9BD36D8-338A-417E-B37F-F65909557D5D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_2521:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B7BBC34B-EE85-46EA-8616-F058F8E54627" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_260:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41DCB542-2F30-4113-83E5-B272019176E2" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_270:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC29B251-6B21-4AA2-925B-E786EE8BADA6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_270s:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97B2999D-BD1D-4E92-93AC-CFF58AEC829C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3010:-:*:*:*:*:*:*:*", + "matchCriteriaId": "10EAFA7C-5876-4145-A2DA-4C985441640F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9F7A326-0F81-4E47-970E-E286FC1AF55C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3252:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50944671-5067-46C2-959E-D6C056B74CAF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3267:-:*:*:*:*:*:*:*", + "matchCriteriaId": "055E575D-79A3-4052-8A59-CBE183998389" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3268:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76431D60-6BFC-4B08-AB1B-9B8EF2F9D68B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3400:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9259DBE3-15F8-4B6A-BB13-E237CBED3AB5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "32E6F198-9779-46C5-967F-88C2FD7BC2FC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8BB108A7-399E-4AF6-9A33-1213F871A2F8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3471:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A2E3E2F-11C1-4F1F-A144-D6282ACC284C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1FB4F9B4-B4B2-4247-9E5D-0FB872C79CE9" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3481:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FF874282-F528-4355-B172-22C90482EC78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F0B5B80-8A41-4573-99B2-12AA7FA0D518" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3491:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C9D55677-B8B2-4E95-8360-218031E94A45" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22E04CAA-9B25-48E6-B3A0-D34D8DF48A7A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95BAE528-C4F5-4FD6-995B-54FDB53D27F0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8250E5AB-36A5-4636-A7C3-46832DFBCD5A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3580:-:*:*:*:*:*:*:*", + "matchCriteriaId": "860A978D-7914-4E0A-9CF9-55B68E5630F6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3581:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02AAC7DD-0091-4272-90DE-D02E9AF0AFAB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3583:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA4553E-BFC0-4DCC-825C-93CA7E690DB7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3584:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0DED6DD1-EAF5-43CA-8F29-80EF4B4DF18C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25D3ECD7-0A36-4236-AAEC-625226631424" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3591:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AFB31340-0E5E-4E60-89A3-9836A4D26CEA" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3660:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0248B861-9A85-4163-ABCF-EE986203A951" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3667:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE6B6BF7-C554-4688-B7E4-835A7E2011F5" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3668:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05B16623-5270-4F14-A284-CF1B37FD422A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3669:-:*:*:*:*:*:*:*", + "matchCriteriaId": "059A976C-0D2B-46C9-9009-10574F9C09F1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3670:-:*:*:*:*:*:*:*", + "matchCriteriaId": "275EF2AF-EAD2-4A9D-AA73-C1BB271A6191" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3671:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7954F192-B82D-44F6-AD48-E2D350A7F792" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3681:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7FF05395-1792-462A-BA85-256E7F951776" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3690:-:*:*:*:*:*:*:*", + "matchCriteriaId": "676B04B8-54F0-4B9D-AE68-8BED256D62C4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "22BA921B-6844-4C70-8D9B-AA0C95991056" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3881:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B41F1157-1E5B-4C47-8BFF-4A42B0D59187" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8F07B8A8-BDA4-4C0F-A412-2E3DBB33C24D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E26BC11D-1A8C-416E-8349-9C839C92AF78" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE646340-F910-47AD-87F9-027EF4B34EF8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3900g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03947049-6AC7-4A2F-9182-3C7421013018" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3901:-:*:*:*:*:*:*:*", + "matchCriteriaId": "41808F8E-1591-40B4-8DE4-C0D79E34EAAE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3902:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5672E76-31AA-4B5C-A289-F352856C3EF4" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_3905:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AB1866AD-37AD-4102-A6C4-A67B7F578DDF" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15CED424-DA3B-4CC4-B48F-0A0E5F69F8B6" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5090:-:*:*:*:*:*:*:*", + "matchCriteriaId": "89616540-0DE7-456B-ADCD-2461EA1BD94E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB526CD4-92E5-4369-8EC1-BE74DC30C297" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5301:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64AEC33C-5110-43BC-9AAF-4F7D2EDE1F21" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A4B510D-DFB7-4470-8BEC-0858E14E7339" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "288D40F5-9545-4C79-AF41-8D32CD1CF07F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5401:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E30E708F-E413-4009-99E5-4041399390C3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5402:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6D61966-94CE-40C9-A16C-0F2356485EAC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DE4C6321-4C80-4610-A2BB-876468FDC0DB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5480:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAF2723F-9BE4-42BC-BDAF-22A72436A909" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5481:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B90DAA0-3F83-46CB-8D58-541E30761E89" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E5B6C82-53EE-4D51-8B6E-C59B0141E777" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5491:-:*:*:*:*:*:*:*", + "matchCriteriaId": "750F875E-21C7-4F7F-88F1-FA50B43CEC48" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5501:-:*:*:*:*:*:*:*", + "matchCriteriaId": "350FAB2C-A168-44E7-A464-14EBD6F3C1EB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5502:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FE0FA29A-7C7F-475D-AAF3-01EBE1458573" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5581:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5DA8B6A9-030B-4684-A92F-E69F781881D8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00F485E8-7121-4DD0-B2E5-655CABEA268A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5591:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7C34FCA8-1794-4978-94CA-9D1F0F3263B8" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5880:-:*:*:*:*:*:*:*", + "matchCriteriaId": "03863424-A27F-4717-974B-F2617132CC19" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_5890:-:*:*:*:*:*:*:*", + "matchCriteriaId": "00334301-73F3-465A-B612-4A6EB6A96DDB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_7500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E63887A2-0A76-4CAD-A1D8-6896B1AC3768" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:vostro_7590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C014D9C-0835-49F0-9493-7BECD1C4A189" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:wyse_5070:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F53D34DB-897A-430E-B05A-856EF03EC63E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:wyse_5470:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6C5B29FE-A8DC-4F6D-A370-0BB2A921D0B7" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:wyse_5470_all-in-one:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13B6A8AA-E424-4F07-B0F7-4418DCBEAD7D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:wyse_7040_thin_client:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05EA389F-39B8-4E4E-8FF6-96C05185C630" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_12_9250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3E83D8EC-D6EF-4F83-8B17-1A9986B27DE1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_7390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AAF1F0A4-F99B-4A36-A1E6-14D6CFC57A2E" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_7390_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "86E3311C-A971-4794-A08D-88EC3A4EC272" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9300:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01156707-85B0-4580-92DB-4158658C9C6B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9305:-:*:*:*:*:*:*:*", + "matchCriteriaId": "851DDAD4-4AF8-4B03-8E92-6D1D2DB81B57" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9310:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42741723-FB73-4E2A-B3FE-E301CCB08A98" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9310_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66B71475-5212-44B4-81BB-0F0D2CC816FB" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9343:-:*:*:*:*:*:*:*", + "matchCriteriaId": "01BA6BB7-FB6E-413B-8576-D0B79C5A943F" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9360:-:*:*:*:*:*:*:*", + "matchCriteriaId": "573AF858-3312-4470-AC6B-72E466C93859" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9365_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2B6E3AA-A803-4CD8-9305-2BE3EEEEF9B3" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "353FAC21-3AC5-4563-BEE7-7C5DCB1C7C76" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_13_9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12578E6A-CC34-42BF-997E-63DB8BA23290" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_15_9500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C3425631-E9E5-447E-AED9-1A3C46FD843C" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_15_9560:-:*:*:*:*:*:*:*", + "matchCriteriaId": "014B75C1-F12E-4ED0-9273-2861D98491D0" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_15_9570:-:*:*:*:*:*:*:*", + "matchCriteriaId": "56E733D8-57BC-4CF5-AD40-B08A8B848C14" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_15_9575_2-in-1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "129C0F2A-F75C-4C60-9A6C-63B96AF08CDD" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_17_9700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9CCAAEC8-7A39-403F-979F-AB8302E8385B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_27_7760:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1912106A-C139-4CE9-AF8B-20E6DA92EA7B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_7590:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9F5E46E-1839-4FCA-88EF-A06208973C1A" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_8700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "39983CB1-D623-4347-990F-D1D03A9813BC" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_8900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B09872A5-50B3-4E8A-A623-48DC381F344B" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_8940:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A77F8441-44E2-4BAC-8854-95DE4FBBAA2D" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_9350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "019583AE-F1FD-4BC1-B844-E37567A954DE" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_9530:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69D3909C-0FCB-48F7-852D-8B316D226A87" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_9550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3A23D13-1EFB-432F-B06B-571BD93929B1" + }, + { + "vulnerable": false, + "criteria": "cpe:2.3:h:dell:xps_one_2710:-:*:*:*:*:*:*:*", + "matchCriteriaId": "912F0A3A-CF3D-402F-ACD0-8B583A05B611" } ] } diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json index 3f422d43ed9..6c3de9c30b0 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2560.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2560", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.447", - "lastModified": "2024-11-21T07:01:15.113", + "lastModified": "2025-02-18T16:15:10.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -60,7 +80,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -70,6 +90,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json b/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json index ac60fee6b12..feda28e9a2d 100644 --- a/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json +++ b/CVE-2022/CVE-2022-25xx/CVE-2022-2561.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2561", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.517", - "lastModified": "2024-11-21T07:01:15.230", + "lastModified": "2025-02-18T16:15:11.030", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-274xx/CVE-2022-27493.json b/CVE-2022/CVE-2022-274xx/CVE-2022-27493.json index f1f81d3342e..35067316113 100644 --- a/CVE-2022/CVE-2022-274xx/CVE-2022-27493.json +++ b/CVE-2022/CVE-2022-274xx/CVE-2022-27493.json @@ -2,7 +2,7 @@ "id": "CVE-2022-27493", "sourceIdentifier": "secure@intel.com", "published": "2022-08-18T21:15:08.407", - "lastModified": "2024-11-21T06:55:50.167", + "lastModified": "2025-02-18T16:15:09.020", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-665" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json index 9a317fdf9c7..1f5d4bcc2eb 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28685.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28685", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.127", - "lastModified": "2024-11-21T06:57:44.447", + "lastModified": "2025-02-18T16:15:09.603", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json index eb04fa1d3e7..acb62febc90 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28686.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28686", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.217", - "lastModified": "2024-11-21T06:57:44.560", + "lastModified": "2025-02-18T16:15:09.843", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json index 0c0c9f22aac..72a416ab112 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28687.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28687", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.303", - "lastModified": "2024-11-21T06:57:44.670", + "lastModified": "2025-02-18T16:15:10.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json b/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json index 8391f849c3b..ed36b853e02 100644 --- a/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json +++ b/CVE-2022/CVE-2022-286xx/CVE-2022-28688.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28688", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.380", - "lastModified": "2024-11-21T06:57:44.780", + "lastModified": "2025-02-18T16:15:10.237", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-288xx/CVE-2022-28858.json b/CVE-2022/CVE-2022-288xx/CVE-2022-28858.json index 220a3f1349f..396035a9a12 100644 --- a/CVE-2022/CVE-2022-288xx/CVE-2022-28858.json +++ b/CVE-2022/CVE-2022-288xx/CVE-2022-28858.json @@ -2,7 +2,7 @@ "id": "CVE-2022-28858", "sourceIdentifier": "secure@intel.com", "published": "2022-08-18T21:15:08.513", - "lastModified": "2024-11-21T06:58:04.450", + "lastModified": "2025-02-18T16:15:10.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json index f514f3e37ff..48456f7f3a4 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2825.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2825", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.610", - "lastModified": "2024-11-21T07:01:45.653", + "lastModified": "2025-02-18T16:15:11.223", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-121" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-121" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json b/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json index f8f9bed9f1a..39bd86c70fd 100644 --- a/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json +++ b/CVE-2022/CVE-2022-28xx/CVE-2022-2848.json @@ -2,7 +2,7 @@ "id": "CVE-2022-2848", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.680", - "lastModified": "2024-11-21T07:01:48.140", + "lastModified": "2025-02-18T16:15:11.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -60,7 +80,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -70,13 +90,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-295xx/CVE-2022-29507.json b/CVE-2022/CVE-2022-295xx/CVE-2022-29507.json index c795e4bfa33..083c1927830 100644 --- a/CVE-2022/CVE-2022-295xx/CVE-2022-29507.json +++ b/CVE-2022/CVE-2022-295xx/CVE-2022-29507.json @@ -2,7 +2,7 @@ "id": "CVE-2022-29507", "sourceIdentifier": "secure@intel.com", "published": "2022-08-18T20:15:11.313", - "lastModified": "2024-11-21T06:59:13.363", + "lastModified": "2025-02-18T16:15:10.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-332xx/CVE-2022-33209.json b/CVE-2022/CVE-2022-332xx/CVE-2022-33209.json index 2f2d5f604b1..25f021f0d7a 100644 --- a/CVE-2022/CVE-2022-332xx/CVE-2022-33209.json +++ b/CVE-2022/CVE-2022-332xx/CVE-2022-33209.json @@ -2,7 +2,7 @@ "id": "CVE-2022-33209", "sourceIdentifier": "secure@intel.com", "published": "2022-08-18T21:15:08.687", - "lastModified": "2024-11-21T07:07:43.390", + "lastModified": "2025-02-18T16:15:11.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-20" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-344xx/CVE-2022-34488.json b/CVE-2022/CVE-2022-344xx/CVE-2022-34488.json index 2c6e95a7fef..974a1483b07 100644 --- a/CVE-2022/CVE-2022-344xx/CVE-2022-34488.json +++ b/CVE-2022/CVE-2022-344xx/CVE-2022-34488.json @@ -2,7 +2,7 @@ "id": "CVE-2022-34488", "sourceIdentifier": "secure@intel.com", "published": "2022-08-18T21:15:08.773", - "lastModified": "2024-11-21T07:09:40.533", + "lastModified": "2025-02-18T16:15:11.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-119" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json index 8264f037fa7..52273780294 100644 --- a/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json +++ b/CVE-2022/CVE-2022-347xx/CVE-2022-34713.json @@ -2,8 +2,8 @@ "id": "CVE-2022-34713", "sourceIdentifier": "secure@microsoft.com", "published": "2022-08-09T20:15:11.487", - "lastModified": "2024-11-21T07:10:02.083", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T15:06:15.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json b/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json index eda47d87d6a..1ea605079b1 100644 --- a/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json +++ b/CVE-2022/CVE-2022-369xx/CVE-2022-36969.json @@ -2,7 +2,7 @@ "id": "CVE-2022-36969", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:11.753", - "lastModified": "2024-11-21T07:14:10.820", + "lastModified": "2025-02-18T16:15:11.987", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json index 1bd92e407ee..7f81114b9f4 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37351.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37351", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.200", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:12.197", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json index a6846c6128e..d875b525ff8 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37352.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37352", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.293", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:12.407", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -60,7 +80,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -70,6 +90,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json index 48b1c1fd4b7..55f520659cc 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37353.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37353", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.373", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:12.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json index ebbb16b8a5b..aff5f50dd29 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37354.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37354", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.500", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:12.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json index 3bb62f352df..4be796a47c8 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37355.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37355", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.593", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.000", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -60,7 +80,7 @@ "weaknesses": [ { "source": "zdi-disclosures@trendmicro.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json index 70193450924..2c27a004b45 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37356.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37356", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.683", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json index 0d035856517..4238ad2bfcf 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37357.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37357", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.760", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.383", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json index 7f9952a7057..d1d35b47987 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37358.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37358", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.833", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.563", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json index 2607b32db8e..1c9ea564f5a 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37359.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37359", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:13.917", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json b/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json index 31b90382b01..c6cf6d9397f 100644 --- a/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json +++ b/CVE-2022/CVE-2022-373xx/CVE-2022-37360.json @@ -2,7 +2,7 @@ "id": "CVE-2022-37360", "sourceIdentifier": "zdi-disclosures@trendmicro.com", "published": "2023-03-29T19:15:14.010", - "lastModified": "2024-11-27T20:11:45.410", + "lastModified": "2025-02-18T16:15:13.940", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ], "cvssMetricV30": [ @@ -67,6 +87,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json index ecb8cc4f19f..7c41578c11e 100644 --- a/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json +++ b/CVE-2022/CVE-2022-379xx/CVE-2022-37969.json @@ -2,8 +2,8 @@ "id": "CVE-2022-37969", "sourceIdentifier": "secure@microsoft.com", "published": "2022-09-13T19:15:12.323", - "lastModified": "2024-11-21T07:15:28.000", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T15:05:07.903", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-389xx/CVE-2022-38922.json b/CVE-2022/CVE-2022-389xx/CVE-2022-38922.json index 6bf81a25348..3a66df2e3e0 100644 --- a/CVE-2022/CVE-2022-389xx/CVE-2022-38922.json +++ b/CVE-2022/CVE-2022-389xx/CVE-2022-38922.json @@ -2,7 +2,7 @@ "id": "CVE-2022-38922", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T15:15:18.777", - "lastModified": "2024-11-21T07:17:15.550", + "lastModified": "2025-02-18T16:15:14.143", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json index c698a78b2e6..58b98a6862a 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41049.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41049", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:19.567", - "lastModified": "2024-11-21T07:22:31.177", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T15:02:20.783", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json index 763a3f72a9d..023cb645227 100644 --- a/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json +++ b/CVE-2022/CVE-2022-410xx/CVE-2022-41080.json @@ -2,8 +2,8 @@ "id": "CVE-2022-41080", "sourceIdentifier": "secure@microsoft.com", "published": "2022-11-09T22:15:21.550", - "lastModified": "2024-11-21T07:22:34.373", - "vulnStatus": "Modified", + "lastModified": "2025-02-18T15:01:39.597", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json index a190cb58900..7006af2386f 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48221.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48221", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T15:15:08.717", - "lastModified": "2024-11-21T07:32:59.250", + "lastModified": "2025-02-18T15:15:12.600", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json b/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json index d7396bfef60..b42e62e46f1 100644 --- a/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json +++ b/CVE-2022/CVE-2022-482xx/CVE-2022-48222.json @@ -2,7 +2,7 @@ "id": "CVE-2022-48222", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-04T16:15:07.143", - "lastModified": "2024-11-21T07:32:59.403", + "lastModified": "2025-02-18T15:15:12.803", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json b/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json index 2e23326bd09..15bdc14c996 100644 --- a/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json +++ b/CVE-2023/CVE-2023-02xx/CVE-2023-0225.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0225", "sourceIdentifier": "secalert@redhat.com", "published": "2023-04-03T23:15:06.907", - "lastModified": "2024-11-21T07:36:46.750", + "lastModified": "2025-02-18T16:15:14.343", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,13 +36,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "secalert@redhat.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -52,6 +72,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-247xx/CVE-2023-24724.json b/CVE-2023/CVE-2023-247xx/CVE-2023-24724.json index f9659d006be..82b97d639b8 100644 --- a/CVE-2023/CVE-2023-247xx/CVE-2023-24724.json +++ b/CVE-2023/CVE-2023-247xx/CVE-2023-24724.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24724", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T22:15:07.023", - "lastModified": "2024-11-21T07:48:19.893", + "lastModified": "2025-02-18T15:15:13.037", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json index 6f096545087..afde0b0379c 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26830.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26830", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T16:15:07.507", - "lastModified": "2024-11-21T07:51:59.023", + "lastModified": "2025-02-18T15:15:13.227", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json b/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json index 00f9c77a251..fda76439947 100644 --- a/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json +++ b/CVE-2023/CVE-2023-268xx/CVE-2023-26858.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26858", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T20:15:07.397", - "lastModified": "2024-11-21T07:52:00.960", + "lastModified": "2025-02-18T15:15:13.423", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json index 1f4fdc7a957..61a19e49fe1 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26916.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26916", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T22:15:07.060", - "lastModified": "2024-11-21T07:52:03.453", + "lastModified": "2025-02-18T15:15:13.617", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-476" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-269xx/CVE-2023-26925.json b/CVE-2023/CVE-2023-269xx/CVE-2023-26925.json index e25b0a66e55..6cae6f1a19f 100644 --- a/CVE-2023/CVE-2023-269xx/CVE-2023-26925.json +++ b/CVE-2023/CVE-2023-269xx/CVE-2023-26925.json @@ -2,7 +2,7 @@ "id": "CVE-2023-26925", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.230", - "lastModified": "2024-11-21T07:52:04.800", + "lastModified": "2025-02-18T16:15:14.530", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-270xx/CVE-2023-27025.json b/CVE-2023/CVE-2023-270xx/CVE-2023-27025.json index 9bdd6831a26..2ebe4437f7f 100644 --- a/CVE-2023/CVE-2023-270xx/CVE-2023-27025.json +++ b/CVE-2023/CVE-2023-270xx/CVE-2023-27025.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27025", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-02T01:15:07.400", - "lastModified": "2024-11-21T07:52:12.293", + "lastModified": "2025-02-18T16:15:14.717", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-494" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-494" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27159.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27159.json index 7f28fff8245..7520fbf46f1 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27159.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27159.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27159", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.273", - "lastModified": "2024-11-21T07:52:23.917", + "lastModified": "2025-02-18T15:15:13.813", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-271xx/CVE-2023-27163.json b/CVE-2023/CVE-2023-271xx/CVE-2023-27163.json index 0c2ebdeef96..e5328822eb6 100644 --- a/CVE-2023/CVE-2023-271xx/CVE-2023-27163.json +++ b/CVE-2023/CVE-2023-271xx/CVE-2023-27163.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27163", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T20:15:07.477", - "lastModified": "2024-11-21T07:52:24.517", + "lastModified": "2025-02-18T16:15:14.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28503.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28503.json index 6a96c78eeb7..3bfc2987119 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28503.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28503.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28503", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.123", - "lastModified": "2024-11-21T07:55:14.880", + "lastModified": "2025-02-18T16:15:15.190", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28504.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28504.json index dea174f6244..3360f6c4409 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28504.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28504.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28504", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.170", - "lastModified": "2024-11-21T07:55:15.007", + "lastModified": "2025-02-18T16:15:15.373", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28505.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28505.json index 68bdb5b55ee..250f3c87c83 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28505.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28505.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28505", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.217", - "lastModified": "2024-11-21T07:55:15.137", + "lastModified": "2025-02-18T16:15:15.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28506.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28506.json index 74377e386ab..817d875b9bb 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28506.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28506.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28506", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.263", - "lastModified": "2024-11-21T07:55:15.257", + "lastModified": "2025-02-18T16:15:15.727", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28507.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28507.json index 303dfe3199e..1a7068059f5 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28507.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28507.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28507", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.307", - "lastModified": "2024-11-21T07:55:15.387", + "lastModified": "2025-02-18T15:15:14.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json b/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json index 5f07bdd512b..13ed3f4ca79 100644 --- a/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json +++ b/CVE-2023/CVE-2023-285xx/CVE-2023-28508.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28508", "sourceIdentifier": "cve@rapid7.com", "published": "2023-03-29T21:15:08.353", - "lastModified": "2024-11-21T07:55:15.517", + "lastModified": "2025-02-18T15:15:14.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29140.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29140.json index e1aca5871a7..9882e2a5550 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29140.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29140.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29140", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.503", - "lastModified": "2024-11-21T07:56:36.620", + "lastModified": "2025-02-18T16:15:15.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-291xx/CVE-2023-29141.json b/CVE-2023/CVE-2023-291xx/CVE-2023-29141.json index fe13f4d090c..2cdc0aa8d59 100644 --- a/CVE-2023/CVE-2023-291xx/CVE-2023-29141.json +++ b/CVE-2023/CVE-2023-291xx/CVE-2023-29141.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29141", "sourceIdentifier": "cve@mitre.org", "published": "2023-03-31T19:15:07.540", - "lastModified": "2024-11-21T07:56:36.747", + "lastModified": "2025-02-18T16:15:16.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "configurations": [ @@ -156,6 +186,14 @@ { "url": "https://www.debian.org/security/2023/dsa-5447", "source": "af854a3a-2127-422b-91ae-364da2661108" + }, + { + "url": "https://phabricator.wikimedia.org/T285159", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "tags": [ + "Issue Tracking", + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json b/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json index 517eb070517..86c633d028a 100644 --- a/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json +++ b/CVE-2023/CVE-2023-292xx/CVE-2023-29218.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29218", "sourceIdentifier": "cve@mitre.org", "published": "2023-04-03T21:15:07.237", - "lastModified": "2024-11-21T07:56:44.130", + "lastModified": "2025-02-18T15:15:14.460", "vulnStatus": "Modified", "cveTags": [ { @@ -39,6 +39,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -52,6 +72,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-400" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json index f0396d5b04a..1100fad626a 100644 --- a/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json +++ b/CVE-2024/CVE-2024-123xx/CVE-2024-12314.json @@ -2,20 +2,44 @@ "id": "CVE-2024-12314", "sourceIdentifier": "security@wordfence.com", "published": "2025-02-18T05:15:09.987", - "lastModified": "2025-02-18T05:15:09.987", + "lastModified": "2025-02-18T15:15:14.687", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting." + }, + { + "lang": "es", + "value": "El complemento Rapid Cache para WordPress es vulnerable al envenenamiento de cach\u00e9 en todas las versiones hasta 1.2.3 incluida. Esto se debe al complemento que almacena los encabezados HTTP en los datos en cach\u00e9. Esto hace posible que los atacantes no autenticados envenenen el cach\u00e9 con encabezados HTTP personalizados que pueden ser no depurados, lo que puede conducir a Cross-Site Scripting." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -45,6 +69,16 @@ "value": "CWE-524" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-524" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json b/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json new file mode 100644 index 00000000000..b2bca293148 --- /dev/null +++ b/CVE-2024/CVE-2024-136xx/CVE-2024-13689.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-13689", + "sourceIdentifier": "security@wordfence.com", + "published": "2025-02-18T15:15:15.547", + "lastModified": "2025-02-18T15:15:15.547", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The Uncode Core plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.9.1.6. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security@wordfence.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://support.undsgn.com/hc/en-us/articles/213454129-Change-Log", + "source": "security@wordfence.com" + }, + { + "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0a61e11-1137-4da0-8580-0a44300b1542?source=cve", + "source": "security@wordfence.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json b/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json index 27ace9a4ab8..c24af76539f 100644 --- a/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json +++ b/CVE-2024/CVE-2024-21xx/CVE-2024-2168.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2168", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-04T21:15:07.137", - "lastModified": "2024-11-21T09:09:10.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:14:41.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:online_tours_\\&_travels_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "034678D5-42ED-4076-964F-D89620540E75" + } + ] + } + ] + } + ], "references": [ { "url": "https://vuldb.com/?ctiid.255678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255678", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.255678", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.255678", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://www.yuque.com/mailemonyeyongjuan/nekc0f/uoobn101h48xv6ih", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json index 4245aa71c31..4bc0c460571 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2332.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2332", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-09T14:15:51.433", - "lastModified": "2024-11-21T09:09:31.410", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:17:02.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:online_mobile_store_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "690877F8-6E16-4F20-91D5-7E411FBB1365" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256283", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256283", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/vanitashtml/CVE-Dumps/blob/main/Blind%20SQL%20Injection%20Manage%20Category%20-%20Mobile%20Management%20Store.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256283", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256283", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json b/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json index 6a3a122feff..ff6ece4c598 100644 --- a/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json +++ b/CVE-2024/CVE-2024-23xx/CVE-2024-2393.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2393", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-12T13:15:50.023", - "lastModified": "2024-11-21T09:09:39.413", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:20:38.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:crud_without_page_reload\\/refresh:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "72AD257E-3756-476B-A44E-9596D320CAC7" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256453", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256453", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/CveSecLook/cve/blob/main/CRUD%20(Create%2C%20Read%2C%20Update%2C%20Delete)%20Without%20Page%20Reload%3ARefresh%20Using%20PHP%20and%20MySQL%20with%20Source%20Code%202/sql-1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256453", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256453", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json b/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json index 4db16f3361b..042b405814e 100644 --- a/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json +++ b/CVE-2024/CVE-2024-24xx/CVE-2024-2418.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2418", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-13T18:15:07.990", - "lastModified": "2024-11-21T09:09:42.670", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:22:50.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:mayurik:best_pos_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "A86D4E42-CD06-4E87-A2FE-378E9BABE3A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256705", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/ycxdzj/CVE_Hunter/blob/main/SQLi-6.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.256705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.256705", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json index 9819b0edb3c..921ac002b3f 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2553.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2553", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T04:15:07.073", - "lastModified": "2024-11-21T09:09:59.753", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:24:04.587", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ], "cvssMetricV2": [ @@ -76,46 +96,101 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:remyandrade:product_review\\/rating_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "154BF390-7979-405B-B58E-6FEFEDBED9A6" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257052", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.298886", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/CVE-2024-2553%20-%20Product%20Rating%20System%20-%20Cross-Site-Scripting.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://github.com/BurakSevben/CVEs/blob/main/Product%20Rating%20System/Product%20Rating%20System%20-%20Cross-Site-Scripting-1.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257052", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257052", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.298886", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2555.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2555.json index 7a2c4f90f1a..43ea5252640 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2555.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2555.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2555", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T07:15:05.803", - "lastModified": "2024-11-21T09:10:00.033", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T16:52:50.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257054", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/Peanut886/Vulnerability/blob/main/webray.com.cn/2024/Task%20Management%20System%20-%20multiple%20vulnerabilities.md#4sql-injection-vulnerability-in-update-adminphp", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257054", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257054", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2556.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2556.json index 1d0d72091f0..53e8ea6e320 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2556.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2556.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2556", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T08:15:05.997", - "lastModified": "2024-11-21T09:10:00.173", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T16:50:19.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,67 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:employee_task_management_system:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "B8451593-5BFE-47AE-90ED-3F288A20D516" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257055", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://github.com/tht1997/WhiteBox/blob/main/sourcecodesters/employee-management-system-php-attendance-info.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257055", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.257055", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json b/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json index 3dcf95cb48d..ada903610bc 100644 --- a/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json +++ b/CVE-2024/CVE-2024-26xx/CVE-2024-2690.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2690", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-20T10:15:11.250", - "lastModified": "2024-11-21T09:10:18.073", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:54:08.043", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:razormist:online_discussion_forum_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F1F9F37D-C115-4EC6-A1DD-FFB3869E79C0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wkeyi0x1/vul-report/issues/2", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257388", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/wkeyi0x1/vul-report/issues/2", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json index 4f9e5ba3ffc..d13d3ed6571 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2754.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2754", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-21T07:15:47.193", - "lastModified": "2024-11-21T09:10:26.530", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:56:54.550", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,30 +96,71 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:donbermoy:complete_e-commerce_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "511AE27B-E018-462D-83A9-DFF550393621" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/wkeyi0x1/vul-report/issues/4", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257544", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/wkeyi0x1/vul-report/issues/4", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257544", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257544", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json index 5801a03c527..140e5d1fa48 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2849.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2849", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-23T18:15:07.770", - "lastModified": "2024-11-21T09:10:40.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T16:57:52.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ganeshrkt:simple_file_manager_web_app:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "3077F229-94E7-49B4-9E8E-A44CB9702353" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/CveSecLook/cve/issues/1", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257770", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303123", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/CveSecLook/cve/issues/1", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257770", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257770", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.303123", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json b/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json index ed4401d1fd3..95d801532c8 100644 --- a/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json +++ b/CVE-2024/CVE-2024-29xx/CVE-2024-2930.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2930", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-27T00:15:07.870", - "lastModified": "2024-11-21T09:10:51.980", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-02-18T17:00:05.117", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:oretnom23:music_gallery_site:1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "60452D80-76E0-47AB-99D9-9CC1853CBCB2" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258001", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304234", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/xuanluansec/vul/blob/main/vul/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code/Music%20Gallery%20Site%20using%20PHP%20and%20MySQL%20Database%20Free%20Source%20Code.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.258001", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.258001", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.304234", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-311xx/CVE-2024-31144.json b/CVE-2024/CVE-2024-311xx/CVE-2024-31144.json index 50f0ce60c38..384c8a8fada 100644 --- a/CVE-2024/CVE-2024-311xx/CVE-2024-31144.json +++ b/CVE-2024/CVE-2024-311xx/CVE-2024-31144.json @@ -2,16 +2,43 @@ "id": "CVE-2024-31144", "sourceIdentifier": "security@xen.org", "published": "2025-02-14T21:15:15.107", - "lastModified": "2025-02-14T21:15:15.107", + "lastModified": "2025-02-18T15:15:16.050", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "For a brief summary of Xapi terminology, see:\n\n https://xapi-project.github.io/xen-api/overview.html#object-model-overview \n\nXapi contains functionality to backup and restore metadata about Virtual\nMachines and Storage Repositories (SRs).\n\nThe metadata itself is stored in a Virtual Disk Image (VDI) inside an\nSR. This is used for two purposes; a general backup of metadata\n(e.g. to recover from a host failure if the filer is still good), and\nPortable SRs (e.g. using an external hard drive to move VMs to another\nhost).\n\nMetadata is only restored as an explicit administrator action, but\noccurs in cases where the host has no information about the SR, and must\nlocate the metadata VDI in order to retrieve the metadata.\n\nThe metadata VDI is located by searching (in UUID alphanumeric order)\neach VDI, mounting it, and seeing if there is a suitable metadata file\npresent. The first matching VDI is deemed to be the metadata VDI, and\nis restored from.\n\nIn the general case, the content of VDIs are controlled by the VM owner,\nand should not be trusted by the host administrator.\n\nA malicious guest can manipulate its disk to appear to be a metadata\nbackup.\n\nA guest cannot choose the UUIDs of its VDIs, but a guest with one disk\nhas a 50% chance of sorting ahead of the legitimate metadata backup. A\nguest with two disks has a 75% chance, etc." + }, + { + "lang": "es", + "value": "Para obtener un breve resumen de la terminolog\u00eda de Xapi, consulte: https://xapi-project.github.io/xen-api/overview.html#object-model-overview Xapi contiene funcionalidad para realizar copias de seguridad y restaurar metadatos sobre m\u00e1quinas virtuales y repositorios de almacenamiento (SR). Los metadatos en s\u00ed se almacenan en una imagen de disco virtual (VDI) dentro de un SR. Esto se utiliza para dos prop\u00f3sitos: una copia de seguridad general de metadatos (por ejemplo, para recuperarse de una falla del host si el archivador a\u00fan est\u00e1 en buen estado) y SR port\u00e1tiles (por ejemplo, usar un disco duro externo para mover m\u00e1quinas virtuales a otro host). Los metadatos solo se restauran como una acci\u00f3n expl\u00edcita del administrador, pero ocurre en los casos en que el host no tiene informaci\u00f3n sobre el SR y debe ubicar el VDI de metadatos para recuperar los metadatos. El VDI de metadatos se ubica buscando (en orden alfanum\u00e9rico UUID) cada VDI, mont\u00e1ndolo y viendo si hay un archivo de metadatos adecuado presente. El primer VDI coincidente se considera el VDI de metadatos y se restaura desde \u00e9l. En general, el propietario de la m\u00e1quina virtual controla el contenido de las VDI y el administrador del host no deber\u00eda confiar en ellas. Un invitado malintencionado puede manipular su disco para que parezca una copia de seguridad de metadatos. Un invitado no puede elegir los UUID de sus VDI, pero un invitado con un disco tiene un 50 % de posibilidades de clasificarse antes que la copia de seguridad de metadatos leg\u00edtima. Un invitado con dos discos tiene un 75 % de posibilidades, etc." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", + "baseScore": 3.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.0, + "impactScore": 1.4 + } + ] + }, "references": [ { "url": "https://xenbits.xen.org/xsa/advisory-459.html", diff --git a/CVE-2024/CVE-2024-417xx/CVE-2024-41710.json b/CVE-2024/CVE-2024-417xx/CVE-2024-41710.json index bc216e5618d..6dcc5eb5b59 100644 --- a/CVE-2024/CVE-2024-417xx/CVE-2024-41710.json +++ b/CVE-2024/CVE-2024-417xx/CVE-2024-41710.json @@ -2,8 +2,8 @@ "id": "CVE-2024-41710", "sourceIdentifier": "cve@mitre.org", "published": "2024-08-12T19:15:16.850", - "lastModified": "2025-02-13T02:00:01.817", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T15:28:00.123", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -44,6 +64,16 @@ "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.", "cisaVulnerabilityName": "Mitel SIP Phones Argument Injection Vulnerability", "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-88" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,18 +85,450 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6970_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "D391B6ED-2FEF-43A3-8ECE-F42B79E1F9CD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6970:-:*:*:*:*:*:*:*", + "matchCriteriaId": "651C4A02-AE83-4D6E-B49F-D756DF8032F3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6940w_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "1BD5BE48-120F-4A09-96C8-1095E04C8D69" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6940w_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0BB4B3A-65F9-4726-938D-71B686BC13E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6930w_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "D1E36148-4C07-46E4-B99C-FD3D8EBF48F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6930w_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C5230BCB-800F-434D-9AAB-A35A7F87D356" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6920w_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "6DE5CF0D-7BF3-468E-9809-6A1417C6989F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6920w_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "663416FA-7F4F-45CA-A28F-3FF20214F20B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6920_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "E1D8483A-A448-416F-9918-B1D995616553" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6920_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8084E6D-1382-4785-9D01-0111A04B233A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6915_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "A04266DF-3E78-47DB-BAA5-E79FCB38974B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6915_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E3F279F8-83D8-4EEC-AA99-5EED398653E8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6910_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "91BCABB3-BA8D-41B8-953B-A33C7BFB332C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6910_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "412A5856-40B0-4633-B0F6-D87D3DB85BE5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6905_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "7B379EEB-2927-4A36-83A1-E7B4CB88F3E4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6905_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97CB43CD-3B53-4839-9AE4-67024A276305" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6940_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "1A3ED2A5-977E-4743-838F-62EE2A7A6837" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6940_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "05422EAF-9528-48CE-972C-9DF111F91570" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6930_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "4ECFE164-B4A2-44DC-B603-EF7C4E6F68F4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6930_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1837336E-7A1D-414C-B888-56350AF6C32A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6873i_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "66B0069E-B089-46B0-B1D7-C560A15FC26E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6873i_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3C298A98-C6CE-4AEB-AD9F-FFCFA1E865F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6869i_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "4415660E-385F-43DC-9F37-4C06AC7F052F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6869i_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "654554ED-253C-4928-92D0-92EADF5F4768" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6867i_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "645135A3-362E-4DBB-805C-49A6B21EB4C9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6867i_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4942E820-8103-4763-8715-F1301F233B05" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6865i_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "91CC349C-AFB9-418F-9425-0038E91EF7BC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6865i_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AAFF6ED-44F6-4D3B-99EA-0F8FE58EC34B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:mitel:6863i_sip_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "6.4.0.136", + "matchCriteriaId": "10E7483A-BFB0-4F2A-B5DF-43AD0A308F7B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:mitel:6863i_sip:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D7C6275-6DA1-4768-A331-5290E8CB64D0" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/kwburns/CVE/blob/main/Mitel/6.3.0.1020/README.md", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://www.mitel.com/support/security-advisories", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.mitel.com/support/security-advisories/mitel-product-security-advisory-24-0019", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-467xx/CVE-2024-46740.json b/CVE-2024/CVE-2024-467xx/CVE-2024-46740.json index f644d109aec..a5ca6afdb04 100644 --- a/CVE-2024/CVE-2024-467xx/CVE-2024-46740.json +++ b/CVE-2024/CVE-2024-467xx/CVE-2024-46740.json @@ -2,8 +2,8 @@ "id": "CVE-2024-46740", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-09-18T08:15:03.377", - "lastModified": "2024-09-20T18:34:08.163", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-18T16:15:17.540", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json b/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json index 9a9d51bcec5..a27ede3f10a 100644 --- a/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json +++ b/CVE-2024/CVE-2024-500xx/CVE-2024-50090.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50090", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-05T17:15:06.477", - "lastModified": "2024-11-12T21:41:16.620", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-18T16:15:17.740", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json b/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json index d7309c90160..a04733b8bda 100644 --- a/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json +++ b/CVE-2024/CVE-2024-502xx/CVE-2024-50282.json @@ -2,7 +2,7 @@ "id": "CVE-2024-50282", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T02:16:30.540", - "lastModified": "2025-01-24T16:15:37.570", + "lastModified": "2025-02-18T16:15:17.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-530xx/CVE-2024-53061.json b/CVE-2024/CVE-2024-530xx/CVE-2024-53061.json index 75da7391bd5..2d109cb3ceb 100644 --- a/CVE-2024/CVE-2024-530xx/CVE-2024-53061.json +++ b/CVE-2024/CVE-2024-530xx/CVE-2024-53061.json @@ -2,8 +2,8 @@ "id": "CVE-2024-53061", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-11-19T18:15:25.997", - "lastModified": "2024-11-22T17:51:45.817", - "vulnStatus": "Analyzed", + "lastModified": "2025-02-18T16:15:18.113", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-191" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-191" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-531xx/CVE-2024-53192.json b/CVE-2024/CVE-2024-531xx/CVE-2024-53192.json index 82de53684c3..340549a9a78 100644 --- a/CVE-2024/CVE-2024-531xx/CVE-2024-53192.json +++ b/CVE-2024/CVE-2024-531xx/CVE-2024-53192.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53192", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T14:15:26.780", - "lastModified": "2024-12-27T14:15:26.780", + "lastModified": "2025-02-18T16:15:18.313", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: clk: clk-loongson2: Se corrige un desbordamiento de b\u00fafer potencial en el acceso a miembros de la matriz flexible El miembro de la matriz flexible `hws` en `struct clk_hw_onecell_data` est\u00e1 anotado con el atributo `counted_by()`. Esto significa que cuando se asigna memoria para esta matriz, el _contador_, que en este caso es el miembro `num` en la estructura flexible, se debe establecer en el n\u00famero m\u00e1ximo de elementos que la matriz flexible puede contener, o menos. En este caso, el n\u00famero total de elementos para la matriz flexible se determina mediante la variable `clks_num` al asignar espacio de mont\u00f3n a trav\u00e9s de `devm_kzalloc()`, como se muestra a continuaci\u00f3n: 289 struct loongson2_clk_provider *clp; ... 296 for (p = data; p->name; p++) 297 clks_num++; 298 299 clp = devm_kzalloc(dev, struct_size(clp, clk_data.hws, clks_num), 300 GFP_KERNEL); Por lo tanto, `clp->clk_data.num` debe establecerse en `clks_num` o menos, y no superar `clks_num`, como es el caso actualmente. De lo contrario, si los datos se escriben en `clp->clk_data.hws[clks_num]`, la instrumentaci\u00f3n proporcionada por el compilador no detectar\u00e1 el desbordamiento, lo que provocar\u00e1 un error de corrupci\u00f3n de memoria en tiempo de ejecuci\u00f3n. Solucione este problema estableciendo `clp->clk_data.num` en `clks_num`." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/02fb4f0084331ef72c28d0c70fcb15d1bea369ec", diff --git a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json index d805582f18f..729e62713af 100644 --- a/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json +++ b/CVE-2024/CVE-2024-537xx/CVE-2024-53704.json @@ -2,7 +2,7 @@ "id": "CVE-2024-53704", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-09T07:15:27.203", - "lastModified": "2025-01-09T15:15:18.640", + "lastModified": "2025-02-18T15:15:16.290", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -22,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", - "baseScore": 9.8, - "baseSeverity": "CRITICAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H", + "baseScore": 8.2, + "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", "availabilityImpact": "HIGH" }, "exploitabilityScore": 3.9, - "impactScore": 5.9 + "impactScore": 4.2 } ] }, diff --git a/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json b/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json index e98f5ce5c06..0c74537d75d 100644 --- a/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json +++ b/CVE-2024/CVE-2024-561xx/CVE-2024-56180.json @@ -2,16 +2,43 @@ "id": "CVE-2024-56180", "sourceIdentifier": "security@apache.org", "published": "2025-02-14T14:15:32.267", - "lastModified": "2025-02-14T17:15:16.317", + "lastModified": "2025-02-18T15:15:16.500", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "CWE-502 Deserialization of Untrusted Data at the eventmesh-meta-raft\u00a0plugin\u00a0module in Apache EventMesh master branch without release version on windows\\linux\\mac os e.g. platforms allows attackers to send controlled message and remote code execute\u00a0via hessian deserialization rpc protocol. Users can use the code under the master branch in project repo or version 1.11.0 to fix this issue." + }, + { + "lang": "es", + "value": "CWE-502 La deserializaci\u00f3n de datos no confiables en el m\u00f3dulo de complemento eventmesh-meta-raft en la rama maestra Apache EventMesh sin versi\u00f3n de lanzamiento en plataformas Windows\\Linux\\Mac OS, por ejemplo, permite a los atacantes enviar mensajes controlados y ejecutar c\u00f3digo remoto a trav\u00e9s del protocolo RPC de deserializaci\u00f3n hessiana. Los usuarios pueden usar el c\u00f3digo en la rama maestra en el repositorio del proyecto o la versi\u00f3n 1.11.0 para solucionar este problema." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "security@apache.org", diff --git a/CVE-2024/CVE-2024-565xx/CVE-2024-56557.json b/CVE-2024/CVE-2024-565xx/CVE-2024-56557.json index 95a5075b5bc..810bb0df0c2 100644 --- a/CVE-2024/CVE-2024-565xx/CVE-2024-56557.json +++ b/CVE-2024/CVE-2024-565xx/CVE-2024-56557.json @@ -2,7 +2,7 @@ "id": "CVE-2024-56557", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:14.520", - "lastModified": "2024-12-27T15:15:14.520", + "lastModified": "2025-02-18T16:15:18.597", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: iio: adc: ad7923: Se corrige el desbordamiento de b\u00fafer para tx_buf y ring_xfer El AD7923 se actualiz\u00f3 para soportar dispositivos con 8 canales, pero el tama\u00f1o de tx_buf y ring_xfer no se increment\u00f3 en consecuencia, lo que provoc\u00f3 un posible desbordamiento de b\u00fafer en ad7923_update_scan_mode()." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://git.kernel.org/stable/c/00663d3e000c31d0d49ef86a809f5c107c2d09cd", diff --git a/CVE-2024/CVE-2024-566xx/CVE-2024-56642.json b/CVE-2024/CVE-2024-566xx/CVE-2024-56642.json index 89463efcb77..4f1e0f06ab0 100644 --- a/CVE-2024/CVE-2024-566xx/CVE-2024-56642.json +++ b/CVE-2024/CVE-2024-566xx/CVE-2024-56642.json @@ -2,13 +2,13 @@ "id": "CVE-2024-56642", "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "published": "2024-12-27T15:15:23.930", - "lastModified": "2025-02-11T16:15:46.650", + "lastModified": "2025-02-18T16:15:18.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_net_stop() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer" + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\ntipc: Fix use-after-free of kernel socket in cleanup_bearer().\n\nsyzkaller reported a use-after-free of UDP kernel socket\nin cleanup_bearer() without repro. [0][1]\n\nWhen bearer_disable() calls tipc_udp_disable(), cleanup\nof the UDP kernel socket is deferred by work calling\ncleanup_bearer().\n\ntipc_exit_net() waits for such works to finish by checking\ntipc_net(net)->wq_count. However, the work decrements the\ncount too early before releasing the kernel socket,\nunblocking cleanup_net() and resulting in use-after-free.\n\nLet's move the decrement after releasing the socket in\ncleanup_bearer().\n\n[0]:\nref_tracker: net notrefcnt@000000009b3d1faf has 1/1 users at\n sk_alloc+0x438/0x608\n inet_create+0x4c8/0xcb0\n __sock_create+0x350/0x6b8\n sock_create_kern+0x58/0x78\n udp_sock_create4+0x68/0x398\n udp_sock_create+0x88/0xc8\n tipc_udp_enable+0x5e8/0x848\n __tipc_nl_bearer_enable+0x84c/0xed8\n tipc_nl_bearer_enable+0x38/0x60\n genl_family_rcv_msg_doit+0x170/0x248\n genl_rcv_msg+0x400/0x5b0\n netlink_rcv_skb+0x1dc/0x398\n genl_rcv+0x44/0x68\n netlink_unicast+0x678/0x8b0\n netlink_sendmsg+0x5e4/0x898\n ____sys_sendmsg+0x500/0x830\n\n[1]:\nBUG: KMSAN: use-after-free in udp_hashslot include/net/udp.h:85 [inline]\nBUG: KMSAN: use-after-free in udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n udp_hashslot include/net/udp.h:85 [inline]\n udp_lib_unhash+0x3b8/0x930 net/ipv4/udp.c:1979\n sk_common_release+0xaf/0x3f0 net/core/sock.c:3820\n inet_release+0x1e0/0x260 net/ipv4/af_inet.c:437\n inet6_release+0x6f/0xd0 net/ipv6/af_inet6.c:489\n __sock_release net/socket.c:658 [inline]\n sock_release+0xa0/0x210 net/socket.c:686\n cleanup_bearer+0x42d/0x4c0 net/tipc/udp_media.c:819\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nUninit was created at:\n slab_free_hook mm/slub.c:2269 [inline]\n slab_free mm/slub.c:4580 [inline]\n kmem_cache_free+0x207/0xc40 mm/slub.c:4682\n net_free net/core/net_namespace.c:454 [inline]\n cleanup_net+0x16f2/0x19d0 net/core/net_namespace.c:647\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xcaf/0x1c90 kernel/workqueue.c:3310\n worker_thread+0xf6c/0x1510 kernel/workqueue.c:3391\n kthread+0x531/0x6b0 kernel/kthread.c:389\n ret_from_fork+0x60/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:244\n\nCPU: 0 UID: 0 PID: 54 Comm: kworker/0:2 Not tainted 6.12.0-rc1-00131-gf66ebf37d69c #7 91723d6f74857f70725e1583cba3cf4adc716cfa\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014\nWorkqueue: events cleanup_bearer" }, { "lang": "es", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json new file mode 100644 index 00000000000..ee87703bae9 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57045.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57045", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T15:15:16.677", + "lastModified": "2025-02-18T15:15:16.677", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the D-Link DIR-859 router with firmware version A3 1.05 and earlier permits unauthorized individuals to bypass the authentication. An attacker can obtain a user name and password by forging a post request to the / getcfg.php page." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/D-Link/DIR-859/ACL%20bypass%20Vulnerability%20in%20D-Link%20DIR-859.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.dlink.com/en/security-bulletin/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json new file mode 100644 index 00000000000..3d8c20f7653 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57046.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57046", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T15:15:16.783", + "lastModified": "2025-02-18T15:15:16.783", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the Netgear DGN2200 router with firmware version v1.0.0.46 and earlier permits unauthorized individuals to bypass the authentication. When adding \"?x=1.gif\" to the the requested url, it will be recognized as passing the authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/Netgear/DGN2200/ACL%20bypass%20Vulnerability%20in%20Netgear%20DGN2200.md", + "source": "cve@mitre.org" + }, + { + "url": "https://www.netgear.com/about/security/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json new file mode 100644 index 00000000000..5622792777c --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57049.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57049", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T15:15:16.890", + "lastModified": "2025-02-18T15:15:16.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the TP-Link Archer c20 router with firmware version V6.6_230412 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory. When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/archer%20c20/ACL%20bypass%20Vulnerability%20in%20TP-Link%20archer%20c20.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json new file mode 100644 index 00000000000..5456df7fa22 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57050.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57050", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-02-18T15:15:16.977", + "lastModified": "2025-02-18T15:15:16.977", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57725.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57725.json index d4aba928ccd..68f251a9db1 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57725.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57725.json @@ -2,13 +2,17 @@ "id": "CVE-2024-57725", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T16:15:34.360", - "lastModified": "2025-02-14T21:15:16.033", + "lastModified": "2025-02-18T15:15:17.067", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in the Arcadyan Livebox Fibra PRV3399B_B_LT allows a remote or local attacker to modify the GPON link value without authentication, causing an internet service disruption via the /firstconnection.cgi endpoint." + }, + { + "lang": "es", + "value": "Un problema en Arcadyan Livebox Fibra PRV3399B_B_LT permite que un atacante remoto o local modifique el valor del enlace GPON sin autenticaci\u00f3n, lo que provoca una interrupci\u00f3n del servicio de Internet a trav\u00e9s del endpoint /firstconnection.cgi." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.1, + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 2.5, - "impactScore": 2.5 + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2024/CVE-2024-577xx/CVE-2024-57778.json b/CVE-2024/CVE-2024-577xx/CVE-2024-57778.json index 03ae85d24d9..5a94b23d952 100644 --- a/CVE-2024/CVE-2024-577xx/CVE-2024-57778.json +++ b/CVE-2024/CVE-2024-577xx/CVE-2024-57778.json @@ -2,13 +2,17 @@ "id": "CVE-2024-57778", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T16:15:34.453", - "lastModified": "2025-02-14T21:15:16.373", + "lastModified": "2025-02-18T15:15:17.207", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in Orbe ONetView Roeador Onet-1200 Orbe 1680210096 allows a remote attacker to escalate privileges via the servers response from status code 500 to status code 200." + }, + { + "lang": "es", + "value": "Un problema en Orbe ONetView Roeador Onet-1200 Orbe 1680210096 permite a un atacante remoto escalar privilegios a trav\u00e9s de la respuesta del servidor del c\u00f3digo de estado 500 al c\u00f3digo de estado 200." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.1, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", - "availabilityImpact": "NONE" + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" }, - "exploitabilityScore": 2.5, - "impactScore": 2.5 + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json b/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json index 159827e682d..83c0d11e1d4 100644 --- a/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json +++ b/CVE-2024/CVE-2024-579xx/CVE-2024-57970.json @@ -2,13 +2,17 @@ "id": "CVE-2024-57970", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-16T04:15:21.843", - "lastModified": "2025-02-16T04:15:21.843", + "lastModified": "2025-02-18T15:15:17.343", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "libarchive through 3.7.7 has a heap-based buffer over-read in header_gnu_longlink in archive_read_support_format_tar.c via a TAR archive because it mishandles truncation in the middle of a GNU long linkname." + }, + { + "lang": "es", + "value": "libarchive hasta 3.7.7 tiene una sobrelectura de b\u00fafer basada en mont\u00f3n en header_gnu_longlink en archive_read_support_format_tar.c a trav\u00e9s de un archivo TAR porque gestiona incorrectamente el truncamiento en el medio de un nombre de enlace largo GNU." } ], "metrics": { @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 4.0, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.5, + "impactScore": 1.4 } ] }, @@ -45,6 +69,16 @@ "value": "CWE-126" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-126" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json index e515aad5d47..c829fac6070 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7591.json @@ -2,7 +2,7 @@ "id": "CVE-2024-7591", "sourceIdentifier": "security@progress.com", "published": "2024-09-05T18:15:06.480", - "lastModified": "2025-02-17T17:15:09.300", + "lastModified": "2025-02-18T16:15:19.110", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -108,6 +108,10 @@ } ], "references": [ + { + "url": "https://insinuator.net/2024/11/vulnerability-disclosure-command-injection-in-kemp-loadmaster-load-balancer-cve-2024-7591", + "source": "security@progress.com" + }, { "url": "https://support.kemptechnologies.com/hc/en-us/articles/29196371689613-LoadMaster-Security-Vulnerability-CVE-2024-7591", "source": "security@progress.com", @@ -115,10 +119,6 @@ "Patch", "Vendor Advisory" ] - }, - { - "url": "https://url.us.m.mimecastprotect.com/s/m_v3CkRgEgSz2vDGUQi8HGPtBQ?domain=insinuator.net", - "source": "security@progress.com" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-12xx/CVE-2025-1298.json b/CVE-2025/CVE-2025-12xx/CVE-2025-1298.json index 7af09a5d4c6..3821254fd70 100644 --- a/CVE-2025/CVE-2025-12xx/CVE-2025-1298.json +++ b/CVE-2025/CVE-2025-12xx/CVE-2025-1298.json @@ -2,16 +2,43 @@ "id": "CVE-2025-1298", "sourceIdentifier": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", "published": "2025-02-14T08:15:30.877", - "lastModified": "2025-02-14T08:15:30.877", + "lastModified": "2025-02-18T15:15:18.007", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover." + }, + { + "lang": "es", + "value": "Una vulnerabilidad l\u00f3gica en la aplicaci\u00f3n m\u00f3vil (com.transsion.carlcare) podr\u00eda generar riesgo de apropiaci\u00f3n de cuenta." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, "weaknesses": [ { "source": "907edf6c-bf03-423e-ab1a-8da27e1aa1ea", diff --git a/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json b/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json index 68e131e394e..de2095bd9fb 100644 --- a/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json +++ b/CVE-2025/CVE-2025-13xx/CVE-2025-1358.json @@ -2,13 +2,17 @@ "id": "CVE-2025-1358", "sourceIdentifier": "cna@vuldb.com", "published": "2025-02-16T20:15:07.990", - "lastModified": "2025-02-16T20:15:07.990", + "lastModified": "2025-02-18T15:15:18.157", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability classified as problematic was found in Pix Software Vivaz 6.0.10. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way." + }, + { + "lang": "es", + "value": "Se ha detectado una vulnerabilidad clasificada como problem\u00e1tica en Pix Software Vivaz 6.0.10. Esta vulnerabilidad afecta a c\u00f3digo desconocido. La manipulaci\u00f3n conduce a cross-site request forgery. El ataque puede iniciarse de forma remota. El exploit se ha hecho p\u00fablico y puede utilizarse. Se contact\u00f3 al proveedor con anticipaci\u00f3n sobre esta revelaci\u00f3n, pero no respondi\u00f3 de ninguna manera." } ], "metrics": { @@ -59,7 +63,27 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", @@ -118,6 +142,16 @@ "value": "CWE-862" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json index fa2e6e2d4ed..5cbb27c1b2f 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21401.json @@ -2,20 +2,44 @@ "id": "CVE-2025-21401", "sourceIdentifier": "secure@microsoft.com", "published": "2025-02-15T00:15:27.163", - "lastModified": "2025-02-15T00:15:27.163", + "lastModified": "2025-02-18T15:15:18.357", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Microsoft Edge (Chromium-based) Security Feature Bypass Vulnerability" + }, + { + "lang": "es", + "value": "Vulnerabilidad de omisi\u00f3n de funciones de seguridad en Microsoft Edge (basado en Chromium)" } ], "metrics": { "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", @@ -45,6 +69,16 @@ "value": "CWE-601" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-601" + } + ] } ], "references": [ diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json new file mode 100644 index 00000000000..df9f0e989af --- /dev/null +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21702.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2025-21702", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-02-18T15:15:18.530", + "lastModified": "2025-02-18T15:15:18.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\npfifo_tail_enqueue: Drop new packet when sch->limit == 0\n\nExpected behaviour:\nIn case we reach scheduler's limit, pfifo_tail_enqueue() will drop a\npacket in scheduler's queue and decrease scheduler's qlen by one.\nThen, pfifo_tail_enqueue() enqueue new packet and increase\nscheduler's qlen by one. Finally, pfifo_tail_enqueue() return\n`NET_XMIT_CN` status code.\n\nWeird behaviour:\nIn case we set `sch->limit == 0` and trigger pfifo_tail_enqueue() on a\nscheduler that has no packet, the 'drop a packet' step will do nothing.\nThis means the scheduler's qlen still has value equal 0.\nThen, we continue to enqueue new packet and increase scheduler's qlen by\none. In summary, we can leverage pfifo_tail_enqueue() to increase qlen by\none and return `NET_XMIT_CN` status code.\n\nThe problem is:\nLet's say we have two qdiscs: Qdisc_A and Qdisc_B.\n - Qdisc_A's type must have '->graft()' function to create parent/child relationship.\n Let's say Qdisc_A's type is `hfsc`. Enqueue packet to this qdisc will trigger `hfsc_enqueue`.\n - Qdisc_B's type is pfifo_head_drop. Enqueue packet to this qdisc will trigger `pfifo_tail_enqueue`.\n - Qdisc_B is configured to have `sch->limit == 0`.\n - Qdisc_A is configured to route the enqueued's packet to Qdisc_B.\n\nEnqueue packet through Qdisc_A will lead to:\n - hfsc_enqueue(Qdisc_A) -> pfifo_tail_enqueue(Qdisc_B)\n - Qdisc_B->q.qlen += 1\n - pfifo_tail_enqueue() return `NET_XMIT_CN`\n - hfsc_enqueue() check for `NET_XMIT_SUCCESS` and see `NET_XMIT_CN` => hfsc_enqueue() don't increase qlen of Qdisc_A.\n\nThe whole process lead to a situation where Qdisc_A->q.qlen == 0 and Qdisc_B->q.qlen == 1.\nReplace 'hfsc' with other type (for example: 'drr') still lead to the same problem.\nThis violate the design where parent's qlen should equal to the sum of its childrens'qlen.\n\nBug impact: This issue can be used for user->kernel privilege escalation when it is reachable." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://git.kernel.org/stable/c/647cef20e649c576dff271e018d5d15d998b629d", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/b6a079c3b6f95378f26e2aeda520cb3176f7067b", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/e40cb34b7f247fe2e366fd192700d1b4f38196ca", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-217xx/CVE-2025-21703.json b/CVE-2025/CVE-2025-217xx/CVE-2025-21703.json new file mode 100644 index 00000000000..a6233205a45 --- /dev/null +++ b/CVE-2025/CVE-2025-217xx/CVE-2025-21703.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-21703", + "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", + "published": "2025-02-18T15:15:18.633", + "lastModified": "2025-02-18T16:15:20.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch->q.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops->qlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses ->qlen_notify() to maintain its active list." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://git.kernel.org/stable/c/1f8e3f4a4b8b90ad274dfbc66fc7d55cb582f4d5", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/6312555249082d6d8cc5321ff725df05482d8b83", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/638ba5089324796c2ee49af10427459c2de35f71", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + }, + { + "url": "https://git.kernel.org/stable/c/839ecc583fa00fab785fde1c85a326743657fd32", + "source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json b/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json new file mode 100644 index 00000000000..8718b6efaad --- /dev/null +++ b/CVE-2025/CVE-2025-222xx/CVE-2025-22207.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-22207", + "sourceIdentifier": "security@joomla.org", + "published": "2025-02-18T16:15:20.467", + "lastModified": "2025-02-18T16:15:20.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improperly built order clauses lead to a SQL injection vulnerability in the backend task list of com_scheduler." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security@joomla.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://developer.joomla.org/security-centre/958-20250201-core-sql-injection-vulnerability-in-scheduled-tasks-component.html", + "source": "security@joomla.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json b/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json index 7bb0340703c..9d5778678dd 100644 --- a/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json +++ b/CVE-2025/CVE-2025-255xx/CVE-2025-25530.json @@ -2,7 +2,7 @@ "id": "CVE-2025-25530", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-11T20:15:39.327", - "lastModified": "2025-02-11T20:15:39.327", + "lastModified": "2025-02-18T16:15:20.723", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,42 @@ "value": "Vulnerabilidad de desbordamiento de b\u00fafer en Digital China DCBI-Netlog-LAB Gateway 1.0 debido a la falta de verificaci\u00f3n de longitud, que est\u00e1 relacionada con el almacenamiento de informaci\u00f3n de configuraci\u00f3n de control parental. Los atacantes que aprovechen esta vulnerabilidad con \u00e9xito pueden provocar que el dispositivo de destino remoto se bloquee o ejecute comandos arbitrarios." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], "references": [ { "url": "https://gist.github.com/XiaoCurry/570a765f6812b8c53d35f623ee701b19", diff --git a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json index 5b2741dd875..a7d5c289f8e 100644 --- a/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json +++ b/CVE-2025/CVE-2025-258xx/CVE-2025-25897.json @@ -2,8 +2,8 @@ "id": "CVE-2025-25897", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-13T16:16:49.790", - "lastModified": "2025-02-13T16:16:49.790", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-02-18T15:00:36.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -15,11 +15,79 @@ "value": "Se descubri\u00f3 una vulnerabilidad de desbordamiento de b\u00fafer en TP-Link TL-WR841ND V11 a trav\u00e9s del par\u00e1metro 'ip' en /userRpm/WanStaticIpV6CfgRpm.htm. Esta vulnerabilidad permite a los atacantes provocar una denegaci\u00f3n de servicio (DoS) a trav\u00e9s de un paquete manipulado." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tp-link:tl-wr841nd_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60843636-698C-4000-84CB-9D441601EDE2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tp-link:tl-wr841nd:v11:*:*:*:*:*:*:*", + "matchCriteriaId": "0B6B17A5-94C4-4B4C-998A-B0B7B7FADB21" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/2664521593/mycve/blob/main/TP-Link/BOF_in_TP-Link_TL-WR841ND-V11_3.pdf", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json index a741f8323c5..4c02a65a809 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25990.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25990", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.320", - "lastModified": "2025-02-14T21:15:16.913", + "lastModified": "2025-02-18T15:15:18.790", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross Site Scripting vulnerability in hooskcms v.1.7.1 allows a remote attacker to obtain sensitive information via the /install/index.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Cross Site Scripting en hooskcms v.1.7.1 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente /install/index.php." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.1, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", - "scope": "UNCHANGED", + "userInteraction": "REQUIRED", + "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.5, - "impactScore": 2.5 + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json index f676b61be60..90ae9d0fe59 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25994.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25994", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:21.953", - "lastModified": "2025-02-14T20:15:37.390", + "lastModified": "2025-02-18T15:15:18.923", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "SQL Injection vulnerability in FeMiner wms wms 1.0 allows a remote attacker to obtain sensitive information via the parameters date1, date2, id." + }, + { + "lang": "es", + "value": "La vulnerabilidad de inyecci\u00f3n SQL en FeMiner wms wms 1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s de los par\u00e1metros date1, date2, id." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", - "baseScore": 5.1, - "baseSeverity": "MEDIUM", - "attackVector": "LOCAL", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", - "confidentialityImpact": "LOW", - "integrityImpact": "LOW", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.5, - "impactScore": 2.5 + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json b/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json index fe723df3d6f..91fd587a1dd 100644 --- a/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json +++ b/CVE-2025/CVE-2025-259xx/CVE-2025-25997.json @@ -2,13 +2,17 @@ "id": "CVE-2025-25997", "sourceIdentifier": "cve@mitre.org", "published": "2025-02-14T17:15:22.117", - "lastModified": "2025-02-14T19:15:14.903", + "lastModified": "2025-02-18T15:15:19.063", "vulnStatus": "Received", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory Traversal vulnerability in FeMiner wms v.1.0 allows a remote attacker to obtain sensitive information via the databak.php component." + }, + { + "lang": "es", + "value": "La vulnerabilidad de Directory Traversal en FeMiner wms v.1.0 permite a un atacante remoto obtener informaci\u00f3n confidencial a trav\u00e9s del componente databak.php." } ], "metrics": { @@ -18,20 +22,20 @@ "type": "Secondary", "cvssData": { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", - "baseScore": 7.3, + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, "baseSeverity": "HIGH", - "attackVector": "LOCAL", + "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "availabilityImpact": "LOW" + "integrityImpact": "NONE", + "availabilityImpact": "NONE" }, - "exploitabilityScore": 2.5, - "impactScore": 4.7 + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/README.md b/README.md index 401922e4a6e..837b3b8d2a9 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-02-18T15:01:16.063065+00:00 +2025-02-18T17:01:33.653463+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-02-18T14:59:38.510000+00:00 +2025-02-18T17:00:05.117000+00:00 ``` ### Last Data Feed Release @@ -33,46 +33,52 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -281636 +281644 ``` ### CVEs added in the last Commit -Recently added CVEs: `2` +Recently added CVEs: `8` -- [CVE-2025-1269](CVE-2025/CVE-2025-12xx/CVE-2025-1269.json) (`2025-02-18T14:15:28.513`) -- [CVE-2025-1414](CVE-2025/CVE-2025-14xx/CVE-2025-1414.json) (`2025-02-18T14:15:28.670`) +- [CVE-2024-13689](CVE-2024/CVE-2024-136xx/CVE-2024-13689.json) (`2025-02-18T15:15:15.547`) +- [CVE-2024-57045](CVE-2024/CVE-2024-570xx/CVE-2024-57045.json) (`2025-02-18T15:15:16.677`) +- [CVE-2024-57046](CVE-2024/CVE-2024-570xx/CVE-2024-57046.json) (`2025-02-18T15:15:16.783`) +- [CVE-2024-57049](CVE-2024/CVE-2024-570xx/CVE-2024-57049.json) (`2025-02-18T15:15:16.890`) +- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-02-18T15:15:16.977`) +- [CVE-2025-21702](CVE-2025/CVE-2025-217xx/CVE-2025-21702.json) (`2025-02-18T15:15:18.530`) +- [CVE-2025-21703](CVE-2025/CVE-2025-217xx/CVE-2025-21703.json) (`2025-02-18T15:15:18.633`) +- [CVE-2025-22207](CVE-2025/CVE-2025-222xx/CVE-2025-22207.json) (`2025-02-18T16:15:20.467`) ### CVEs modified in the last Commit -Recently modified CVEs: `33` +Recently modified CVEs: `87` -- [CVE-2022-46169](CVE-2022/CVE-2022-461xx/CVE-2022-46169.json) (`2025-02-18T14:51:04.277`) -- [CVE-2023-50167](CVE-2023/CVE-2023-501xx/CVE-2023-50167.json) (`2025-02-18T13:43:27.293`) -- [CVE-2024-12797](CVE-2024/CVE-2024-127xx/CVE-2024-12797.json) (`2025-02-18T14:15:27.107`) -- [CVE-2024-1696](CVE-2024/CVE-2024-16xx/CVE-2024-1696.json) (`2025-02-18T13:43:18.590`) -- [CVE-2024-22011](CVE-2024/CVE-2024-220xx/CVE-2024-22011.json) (`2025-02-18T13:42:57.540`) -- [CVE-2024-24275](CVE-2024/CVE-2024-242xx/CVE-2024-24275.json) (`2025-02-18T13:44:28.043`) -- [CVE-2024-24276](CVE-2024/CVE-2024-242xx/CVE-2024-24276.json) (`2025-02-18T13:44:14.953`) -- [CVE-2024-27218](CVE-2024/CVE-2024-272xx/CVE-2024-27218.json) (`2025-02-18T13:42:34.137`) -- [CVE-2024-27227](CVE-2024/CVE-2024-272xx/CVE-2024-27227.json) (`2025-02-18T13:42:12.110`) -- [CVE-2024-27229](CVE-2024/CVE-2024-272xx/CVE-2024-27229.json) (`2025-02-18T13:42:04.037`) -- [CVE-2024-27237](CVE-2024/CVE-2024-272xx/CVE-2024-27237.json) (`2025-02-18T13:41:56.553`) -- [CVE-2024-37601](CVE-2024/CVE-2024-376xx/CVE-2024-37601.json) (`2025-02-18T14:15:27.900`) -- [CVE-2024-37603](CVE-2024/CVE-2024-376xx/CVE-2024-37603.json) (`2025-02-18T14:15:28.070`) -- [CVE-2024-57241](CVE-2024/CVE-2024-572xx/CVE-2024-57241.json) (`2025-02-18T14:15:28.237`) -- [CVE-2024-57905](CVE-2024/CVE-2024-579xx/CVE-2024-57905.json) (`2025-02-18T13:40:32.897`) -- [CVE-2024-57906](CVE-2024/CVE-2024-579xx/CVE-2024-57906.json) (`2025-02-18T13:40:18.470`) -- [CVE-2024-57907](CVE-2024/CVE-2024-579xx/CVE-2024-57907.json) (`2025-02-18T13:40:05.290`) -- [CVE-2024-57908](CVE-2024/CVE-2024-579xx/CVE-2024-57908.json) (`2025-02-18T13:39:42.783`) -- [CVE-2024-57909](CVE-2024/CVE-2024-579xx/CVE-2024-57909.json) (`2025-02-18T13:39:06.190`) -- [CVE-2024-57912](CVE-2024/CVE-2024-579xx/CVE-2024-57912.json) (`2025-02-18T13:38:39.953`) -- [CVE-2024-57916](CVE-2024/CVE-2024-579xx/CVE-2024-57916.json) (`2025-02-18T13:38:31.347`) -- [CVE-2024-57919](CVE-2024/CVE-2024-579xx/CVE-2024-57919.json) (`2025-02-18T13:38:22.377`) -- [CVE-2025-24032](CVE-2025/CVE-2025-240xx/CVE-2025-24032.json) (`2025-02-18T14:15:28.770`) -- [CVE-2025-25898](CVE-2025/CVE-2025-258xx/CVE-2025-25898.json) (`2025-02-18T14:59:38.510`) -- [CVE-2025-25901](CVE-2025/CVE-2025-259xx/CVE-2025-25901.json) (`2025-02-18T14:57:24.510`) +- [CVE-2024-2849](CVE-2024/CVE-2024-28xx/CVE-2024-2849.json) (`2025-02-18T16:57:52.660`) +- [CVE-2024-2930](CVE-2024/CVE-2024-29xx/CVE-2024-2930.json) (`2025-02-18T17:00:05.117`) +- [CVE-2024-31144](CVE-2024/CVE-2024-311xx/CVE-2024-31144.json) (`2025-02-18T15:15:16.050`) +- [CVE-2024-41710](CVE-2024/CVE-2024-417xx/CVE-2024-41710.json) (`2025-02-18T15:28:00.123`) +- [CVE-2024-46740](CVE-2024/CVE-2024-467xx/CVE-2024-46740.json) (`2025-02-18T16:15:17.540`) +- [CVE-2024-50090](CVE-2024/CVE-2024-500xx/CVE-2024-50090.json) (`2025-02-18T16:15:17.740`) +- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-02-18T16:15:17.927`) +- [CVE-2024-53061](CVE-2024/CVE-2024-530xx/CVE-2024-53061.json) (`2025-02-18T16:15:18.113`) +- [CVE-2024-53192](CVE-2024/CVE-2024-531xx/CVE-2024-53192.json) (`2025-02-18T16:15:18.313`) +- [CVE-2024-53704](CVE-2024/CVE-2024-537xx/CVE-2024-53704.json) (`2025-02-18T15:15:16.290`) +- [CVE-2024-56180](CVE-2024/CVE-2024-561xx/CVE-2024-56180.json) (`2025-02-18T15:15:16.500`) +- [CVE-2024-56557](CVE-2024/CVE-2024-565xx/CVE-2024-56557.json) (`2025-02-18T16:15:18.597`) +- [CVE-2024-56642](CVE-2024/CVE-2024-566xx/CVE-2024-56642.json) (`2025-02-18T16:15:18.770`) +- [CVE-2024-57725](CVE-2024/CVE-2024-577xx/CVE-2024-57725.json) (`2025-02-18T15:15:17.067`) +- [CVE-2024-57778](CVE-2024/CVE-2024-577xx/CVE-2024-57778.json) (`2025-02-18T15:15:17.207`) +- [CVE-2024-57970](CVE-2024/CVE-2024-579xx/CVE-2024-57970.json) (`2025-02-18T15:15:17.343`) +- [CVE-2024-7591](CVE-2024/CVE-2024-75xx/CVE-2024-7591.json) (`2025-02-18T16:15:19.110`) +- [CVE-2025-1298](CVE-2025/CVE-2025-12xx/CVE-2025-1298.json) (`2025-02-18T15:15:18.007`) +- [CVE-2025-1358](CVE-2025/CVE-2025-13xx/CVE-2025-1358.json) (`2025-02-18T15:15:18.157`) +- [CVE-2025-21401](CVE-2025/CVE-2025-214xx/CVE-2025-21401.json) (`2025-02-18T15:15:18.357`) +- [CVE-2025-25530](CVE-2025/CVE-2025-255xx/CVE-2025-25530.json) (`2025-02-18T16:15:20.723`) +- [CVE-2025-25897](CVE-2025/CVE-2025-258xx/CVE-2025-25897.json) (`2025-02-18T15:00:36.487`) +- [CVE-2025-25990](CVE-2025/CVE-2025-259xx/CVE-2025-25990.json) (`2025-02-18T15:15:18.790`) +- [CVE-2025-25994](CVE-2025/CVE-2025-259xx/CVE-2025-25994.json) (`2025-02-18T15:15:18.923`) +- [CVE-2025-25997](CVE-2025/CVE-2025-259xx/CVE-2025-25997.json) (`2025-02-18T15:15:19.063`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 03d775592c5..1a0e0a7dc30 100644 --- a/_state.csv +++ b/_state.csv @@ -151187,7 +151187,7 @@ CVE-2020-16306,0,0,3233b6147a505da27746f4a780af25be6c5775b185dccf805f17869c6d486 CVE-2020-16307,0,0,906010918ff0850051577978de90c20a14d44237732b35efca66371c292d3a7f,2024-11-21T05:07:09.237000 CVE-2020-16308,0,0,3c7a8b43105d832158ec3830eee12125cdf5f91f8246c6f7551233190e1a4a50,2024-11-21T05:07:09.393000 CVE-2020-16309,0,0,ff7ea3d61683514ad0ab3015c05b199b45add138e38e430eb46fb4e16ae8116c,2024-11-21T05:07:09.543000 -CVE-2020-1631,0,1,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000 +CVE-2020-1631,0,0,199632964333578737f6cee0cb69696ac403c5882fc31d3e767776c973555131,2025-02-18T14:59:06.660000 CVE-2020-16310,0,0,12e2025a2688c34de3d74cab5125780b6cb8f1b79f2a6da42ce3ec0b8f469b52,2024-11-21T05:07:09.697000 CVE-2020-1632,0,0,fd0c48a346d41dbf0fb5f3e5aedc97dd61bdc0c8156f7a2a29fe512af0d36440,2024-11-21T05:11:02.687000 CVE-2020-1633,0,0,5785256e47c495316522942ae01cc6f822d34b04d5b40e21349533ac5f5e9c55,2024-11-21T05:11:02.837000 @@ -152555,8 +152555,8 @@ CVE-2020-1968,0,0,8dd45388ec44ac321a681ada3d189da03e0f02708f423eea3f20161ccd817f CVE-2020-19682,0,0,de66eb60c1808d6e5a0bb64c9eacab68989f40295ec6db0a880e367b55f61674,2024-11-21T05:09:19.373000 CVE-2020-19683,0,0,cc3ef760683550ca9495211e2f4f0c869863e6903472df986067de653efaf561,2024-11-21T05:09:19.530000 CVE-2020-1969,0,0,bd9f49a98ad543d77a8214d913e1ed1b4f56591bd018723df14a8a068726c075,2023-11-07T03:19:39.247000 -CVE-2020-19692,0,0,7ee790d853fb0759f8d6d656fa7b5c311f39ebde27c2bdeff11b7958e0f8af43,2024-11-21T05:09:19.700000 -CVE-2020-19693,0,0,857ecae3028e4bfb3989cece11683e673294d2da88b958689f6dbb2231dd4d61,2024-11-21T05:09:19.843000 +CVE-2020-19692,0,1,7f260c96d75c5b443b8b872dec4e302f255477d0bc310cff7fb517ff9145de12,2025-02-18T15:15:11.590000 +CVE-2020-19693,0,1,b5d87c0147e22c028906f5d67dcc40149f4eb9751f0a63d25b7fdebd9080d03d,2025-02-18T15:15:12.407000 CVE-2020-19695,0,0,6115879a09e501e85f4fc63634f821fab295f3df0873d88cdc944342d793ab21,2025-02-14T20:15:31.860000 CVE-2020-19697,0,0,90559cd46229e821328de13f626f88775e66d3af88432331bf51bc30bdc19a21,2025-02-14T20:15:32.023000 CVE-2020-19698,0,0,9d802db7209a05d363679e7d8885308fb5c287656ebeae027c922fbbca980adf,2025-02-14T19:15:11.397000 @@ -166537,7 +166537,7 @@ CVE-2021-1901,0,0,b4e439599e636bd2af3f4917af437f418f3102e0c7a63069310a81adcf8a4e CVE-2021-1903,0,0,d39f8f46801673020c5fbf3ea01fae62f95ab502fce8796c85a54991fed2fd38,2024-11-21T05:45:22.487000 CVE-2021-1904,0,0,736c70e50ad0301f8658a558129e85f2c3820d51a12d0cb07c0e689d67b51d07,2024-11-21T05:45:22.860000 CVE-2021-1905,0,0,372125f83a874275be00c1ffa8da76d54507cb820495157f0730c4f460e930e9,2025-01-29T20:15:27.953000 -CVE-2021-1906,0,1,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000 +CVE-2021-1906,0,0,f1d0547a62f7facb3a112f19302d470e01e5a89418134d75f46f7d2868390f53,2025-02-18T14:58:38.243000 CVE-2021-1907,0,0,8faafa9970a3672f067ece059b551bd2adc47cbf8ba4f75421ae6f6b8c30f6d5,2024-11-21T05:45:24.550000 CVE-2021-1909,0,0,09b73ecdef2f380acd80f25a5da214cc33c77d1e8af71d49aad377ad62e8a0d2,2024-11-21T05:45:24.763000 CVE-2021-1910,0,0,a6374620334700cdcae2f54d499d65ec2bbdf4b8d8dd71d334a216c6c2c176fe,2024-11-21T05:45:25.270000 @@ -168097,7 +168097,7 @@ CVE-2021-21548,0,0,e80187ad2950a294a09661ea49be95505d3f571dbd9ab97003d898e1d0358 CVE-2021-21549,0,0,5a72c9373b5f3678521b4794d922020eae70ef71ec64d4a07514540bc3837529,2024-11-21T05:48:34.457000 CVE-2021-2155,0,0,eb4c03a926d31556ec740f7b42e3a4a271a44933a2669c0de73d97afb2830623,2024-11-21T06:02:29.657000 CVE-2021-21550,0,0,7b689bab33a09088da87dc915a31847831a8baf8d2382c09a29233f12dce427b,2024-11-21T05:48:34.590000 -CVE-2021-21551,0,0,0eaf22df3069b557a145e0bf22ceae51d7293de54f89854908f0541af0fed9c7,2024-11-21T05:48:34.733000 +CVE-2021-21551,0,1,b45157399bbce6f0b6f63538ebd2b85806e1b1b0d0faf9004d161d9f773c7558,2025-02-18T15:46:11.177000 CVE-2021-21552,0,0,f6ecc9c2646156934a1124feca474788bf8777a4ccb7dc9918b5dcb68da8dbf7,2024-11-21T05:48:34.887000 CVE-2021-21553,0,0,767ebd1895f45e230d4b3fbd59734888f2385fa2c2212ab406a048c3362d69f4,2024-11-21T05:48:35.023000 CVE-2021-21554,0,0,46e432f9c20f997faef495d3f022ea7b2c24aa5b671ef6c0fc7280bc0f7d926d,2024-11-21T05:48:35.170000 @@ -176565,7 +176565,7 @@ CVE-2021-32644,0,0,48326864e3c31b32f0a2a40c894f4c5b136a56d07940984e0dd5cc5d1fc98 CVE-2021-32645,0,0,9ccb448ef4de54166b4a9bb78f7bf78b88ec7ed02e5d39b6aaf9d53721c1c7e6,2024-11-21T06:07:26.863000 CVE-2021-32646,0,0,8b20a03ce7ae582704f08e6c885ebaac0c533a1c8e4c47c8c7120f9c4abe2385,2024-11-21T06:07:26.993000 CVE-2021-32647,0,0,c99a9247f5a69d1d18fc3868b9feddd2d5c1cfa057b7d5e9eeb861f20cdb1970,2024-11-21T06:07:27.147000 -CVE-2021-32648,0,1,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000 +CVE-2021-32648,0,0,2dcd533b2d5dfae53b2d1b298491b864e44d73017248a7387cc4137926632b0c,2025-02-18T14:48:55.537000 CVE-2021-32649,0,0,ec6446253c3390080ce76cfe06ab7e81e042190c48d349c3bbe41d3582775742,2024-11-21T06:07:27.430000 CVE-2021-32650,0,0,d5f4ce6dfd3368853beb539f2091f1046487c5cbc12b94f90a4301791365a1eb,2024-11-21T06:07:27.550000 CVE-2021-32651,0,0,cbadacd8e821828cc3ee8a01abf2792bbd8d05e094c35e440cf4cdd8ff657d70,2024-11-21T06:07:27.657000 @@ -181494,7 +181494,7 @@ CVE-2021-3914,0,0,587d3c5496a3894f3bee9050cac22e88e23c870c5f08774001d16b01d73514 CVE-2021-39140,0,0,0d9122e27f2e8ed15d337a2299d703bde300b1bfc5641e6a2d94398671530bde,2024-11-21T06:18:40.777000 CVE-2021-39141,0,0,308173be0e42d3b05e3159d40259ea4c33203fe28aebec15c3e70290187fba0a,2024-11-21T06:18:41.053000 CVE-2021-39143,0,0,ffd9d8fa28b7e55b36ad11f211caff12c1dd3699acec6a9366db77a7d01be1df,2024-11-21T06:18:41.313000 -CVE-2021-39144,0,1,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000 +CVE-2021-39144,0,0,c07818c89b74aa188807fe5a9ff0259cd764d6c6dd17d0bf936fee7a941edb65,2025-02-18T14:47:16.960000 CVE-2021-39145,0,0,9062191979151d36b337ca921b5d90e49dc062b4974dde4e6e8076a6ae806f74,2024-11-21T06:18:41.880000 CVE-2021-39146,0,0,a68f99bfb9c34ab239930244698e1dfe09b229ea585fcfca9e82690b53f706d2,2024-11-21T06:18:42.123000 CVE-2021-39147,0,0,c59b801126c107f7229606315684ca5bddd626cafdf34772e7610770cf359be9,2024-11-21T06:18:42.353000 @@ -181583,7 +181583,7 @@ CVE-2021-39222,0,0,71610020ce9e67dc6940837aefe504acf8a8d9fdb64ff351427e97a92ab7a CVE-2021-39223,0,0,5c82a3350e48ddcff666b93be9d4046e000db4dacdb95c195e7d0a6ac4994a66,2024-11-21T06:18:56.700000 CVE-2021-39224,0,0,0dbf7b0b7c0bfb5a2d9503d6d8b25452b69229fa68d356a1f3ea08c1eb5c6037,2024-11-21T06:18:56.860000 CVE-2021-39225,0,0,0657e7f09b5d865111d8be38a777e243b614f6eb04392640f272b6c40ad1c8e4,2024-11-21T06:18:57.023000 -CVE-2021-39226,0,1,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000 +CVE-2021-39226,0,0,8f5b383c5a1b4edaefcf29c875a1af7a57ef26e606fb88396216b3f688a78c9b,2025-02-18T14:53:42.247000 CVE-2021-39227,0,0,b565dd80d12e5fc792bf53c83afbb0df18396a7f4bd06f4abb75f6be489edf81,2024-11-21T06:18:57.397000 CVE-2021-39228,0,0,f36eb8db813850239f055aaec343d16d3f88b3e91fadb62dd009ee0ffa13b3fe,2024-11-21T06:18:57.560000 CVE-2021-39229,0,0,19d99295ac275c3a2907f9ccafd6f9fcd679acf6e78619f479c455440e3594c8,2024-11-21T06:18:57.723000 @@ -183276,7 +183276,7 @@ CVE-2021-41273,0,0,99397a929c92479c9f01da437507d101a5bf50eb4f748f5c7c67a12a6baaa CVE-2021-41274,0,0,7158857e7d9becd3b84392aa0da7e34d2226b9ffe9aeee343c59c3868ee024e3,2024-11-21T06:25:56.540000 CVE-2021-41275,0,0,3a49ec4bc6781140610890599c8c13b510fa22785ea728e600da8381edd2a293,2024-11-21T06:25:56.670000 CVE-2021-41276,0,0,77b0bd73bf0cb70e85934ea984c04179674e78ac11807816d660704623492517,2024-11-21T06:25:56.823000 -CVE-2021-41277,0,1,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000 +CVE-2021-41277,0,0,e4746b3101fd550dfe9277a8558b6273afecba8bc38256e2836b1747212860bc,2025-02-18T14:44:41.687000 CVE-2021-41278,0,0,12082549d8e21ddc5cfe62e6f0a9abd13e7d3cdf0888335bc0d75510b76033a0,2024-11-21T06:25:57.203000 CVE-2021-41279,0,0,08dbaadaa38da000bb5a66fa4874a7c1582995ca6d179537b3e54f5f561379fd,2024-11-21T06:25:57.340000 CVE-2021-4128,0,0,a7ff56c7d35e301b0a6c7f5571b37ed5026ab961314fd66e1ee36016b813b933,2024-11-21T06:36:57.697000 @@ -194265,7 +194265,7 @@ CVE-2022-24812,0,0,ba1810f3f8f684688400e185ebc7233835c3ff6495510564b8dac490202d0 CVE-2022-24813,0,0,877de67ab2140b2965630d6b87135eaf6ace0d62798d255eaaad903269f6f716,2024-11-21T06:51:09.340000 CVE-2022-24814,0,0,842db0f91ff63ac21bda327b9c3901d7b44f013aad2b3062d150a0c3eda475d7,2024-11-21T06:51:09.463000 CVE-2022-24815,0,0,27e7266001f871c48274f931037b93d1533250e699e309d319783ba507b69571,2024-11-21T06:51:09.587000 -CVE-2022-24816,0,1,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000 +CVE-2022-24816,0,0,548394469212ab8dd5d5a99accfa84c02b97d8208378247e330ae82c106d4eae,2025-02-18T14:50:35.940000 CVE-2022-24817,0,0,a9b66571183a48bb0e197f3de17073db6b3e8acb18975114b7691755a44c848d,2024-11-21T06:51:09.863000 CVE-2022-24818,0,0,a1ec3bb9985bb733a04420f18fd769587d8bdd5026fd3de5f563672d821e2f49,2024-11-21T06:51:09.987000 CVE-2022-24819,0,0,2c88a72c04bc40dc0e3ecd356f74d1b49fc751aa38ec58544ec9cfabe9b06b80,2024-11-21T06:51:10.110000 @@ -194906,7 +194906,7 @@ CVE-2022-25596,0,0,e20895499b50f257835b5cef4ccb445e059a896f4752a079569605fe5e1a9 CVE-2022-25597,0,0,eaf37006afa9b701597a13e86a6a8b9dcd23db62b468f93a19bc35ac7c3bdc9a,2024-11-21T06:52:24.670000 CVE-2022-25598,0,0,71bd9180efa2a8b6c83e3b611fbc1013a1ddce4691267feb04933d7262365773,2024-11-21T06:52:24.793000 CVE-2022-25599,0,0,b2500cb798c90f66522b41c69e71517db2f6434ee5e39ea15b171e36b340a1fb,2024-11-21T06:52:24.917000 -CVE-2022-2560,0,0,1395889ddce333b10cee723a7ebfe84b1b4f3ba67cdf63ffb9404e0442b026ba,2024-11-21T07:01:15.113000 +CVE-2022-2560,0,1,76499e3463de56f9dfdde31f5da65b99e4e8dda3455c16cb790a47b23dffd960,2025-02-18T16:15:10.817000 CVE-2022-25600,0,0,495b4f6c50a3d5cda10e78d5d8ebcc64b109954b157fc78da0e3a2ad57d29580,2024-11-21T06:52:25.050000 CVE-2022-25601,0,0,3dbf007ef693de272e8034005f728c29b9ddfaba0684d5643181ce0cd9f79fb5,2024-11-21T06:52:25.193000 CVE-2022-25602,0,0,42071c67cba7690029535ff818083bdd303016e39e645999fd4f9bcbe45b73f2,2024-11-21T06:52:25.333000 @@ -194917,7 +194917,7 @@ CVE-2022-25606,0,0,f88974541eb3aa3a839095fe8d26a0574cfc401492b671fc89527187563cd CVE-2022-25607,0,0,4315807fe55335037587ad4704a9d2df0c06852be854f37614ed33a9c7d8034e,2024-11-21T06:52:25.970000 CVE-2022-25608,0,0,5a9acd8289576bd8a115f40e2c67e4376263bf0971af6ae43e6f89e05a419f1a,2024-11-21T06:52:26.110000 CVE-2022-25609,0,0,599de89a5a011caeba847a172dec58ccd9b1ee3d45d7b41cf184df65b49da5e7,2024-11-21T06:52:26.233000 -CVE-2022-2561,0,0,96b65e85c790b29d4938c07cd065406f1ab3b5bc53fe483cf86a12fe38a6754b,2024-11-21T07:01:15.230000 +CVE-2022-2561,0,1,cf9fbb69422957338b663b01a457a426c4f28047f792f9304090478a6cd296f4,2025-02-18T16:15:11.030000 CVE-2022-25610,0,0,63b2067f59f7d4a1932ce97af52643e33bc4cb7a351d7eead5f7bd19e7a96fd1,2024-11-21T06:52:26.353000 CVE-2022-25611,0,0,642a5ed9c9d3e03bed247169366e2e3d0121a3af4fb9988816db035e26288f0d,2024-11-21T06:52:26.477000 CVE-2022-25612,0,0,6585fbc0b1fc2637237fd46922b6d370aff096201ee86368ec9c334416ab691b,2024-11-21T06:52:26.593000 @@ -196438,7 +196438,7 @@ CVE-2022-2749,0,0,7aa26a0c23dc155071b3059a24689083204379ce2615654a58696d67869e26 CVE-2022-27490,0,0,caa845b0bc3c21e72ec430c1bb91d0947629956b0eead13ce1096d9d7ae094cd,2024-11-21T06:55:49.757000 CVE-2022-27491,0,0,8a7d2a569689762339050e1db2eba7ddc2305665c61fafc0e8565e91ee3fb10b,2024-11-21T06:55:49.903000 CVE-2022-27492,0,0,ced91e0048ca7c83b66693a736c13d17d779d0f9b27c488111d6615fa1e551b6,2024-11-21T06:55:50.043000 -CVE-2022-27493,0,0,ac4b52c241a158cf2e1e484102384f85fb35c448f1c8cee955f31b0620840c35,2024-11-21T06:55:50.167000 +CVE-2022-27493,0,1,574b83e21bd3e183e90bfdb529f2c8e271fcb46c3853eec91fb6a4fd3817419b,2025-02-18T16:15:09.020000 CVE-2022-27494,0,0,b5e4c7775e0d6176d23b0fb12b6a970b96dbce2c8884f72b3a008868b3622bc6,2024-11-21T06:55:50.290000 CVE-2022-27495,0,0,71ecb2cc76801c85c8467f4395a420002118e2b27be3cfb1821a32679e396cc2,2024-11-21T06:55:50.420000 CVE-2022-27496,0,0,525472f4d923f606f377ed6195861e6894790651b972bda97b2d24b4e96f84ab,2024-11-21T06:55:50.550000 @@ -197043,7 +197043,7 @@ CVE-2022-28246,0,0,42e72399563b8c397b24f5e80e1002917bc453725243f9a631a46b8760810 CVE-2022-28247,0,0,d91e41860bc8e908ac7755fa918ae493c1b0e1029ea2b2056474b9de3bf43e07,2024-11-21T06:57:01.847000 CVE-2022-28248,0,0,4c158f114b85533d8f8f6dbcc7d56eb3e048d749afb1c18f2771c4bc03f575d0,2024-11-21T06:57:01.967000 CVE-2022-28249,0,0,a59055a5419ab6c55b17a30346ba204a34fc7fccc3398b4f67e692bb248781fe,2024-11-21T06:57:02.090000 -CVE-2022-2825,0,0,584e963cdfe23de28b0e2b3a20e87ba68cf56e0e1cb8bd0ed82ef7365edb8bc1,2024-11-21T07:01:45.653000 +CVE-2022-2825,0,1,40f70f6e9293a0a2adb70eb6f87e41444a7b7795afc5d1a781898b0c3c230f18,2025-02-18T16:15:11.223000 CVE-2022-28250,0,0,283a2e1a389e53f2a177db94792d609666d9596289fd137bbe4f4bdbc75daba8,2024-11-21T06:57:02.223000 CVE-2022-28251,0,0,32e68a13357ce7ffa3e0f8f15098c1b43fe63e6e04e7216ae09a4d7571dcb7bb,2024-11-21T06:57:02.350000 CVE-2022-28252,0,0,c1c1a9374bea5d81dab884e8cfdf3684b057f64cc61c4a729c7d851db38a852a,2024-11-21T06:57:02.483000 @@ -197225,7 +197225,7 @@ CVE-2022-28471,0,0,22daddaeedef7bf9aab39f3549190b2978c74d629d8530f5d0fe76defac80 CVE-2022-28477,0,0,e71a98c918c772ec3dfb27061456e47f05943a8f0537c4c7b6c2b43844e0347d,2024-11-21T06:57:24.360000 CVE-2022-28478,0,0,8d9bda9a2e1a2e9d91bb3cc6c0b2ec7e8233af87753711810fc4eb8554a71ad1,2024-11-21T06:57:24.503000 CVE-2022-28479,0,0,bf3ccfb37fd50246d1ee97aa4ea7efaf57fa4c4e5539490bf2c40fe8021ca895,2024-11-21T06:57:24.650000 -CVE-2022-2848,0,0,f58d1269d8a1dc55ebd4269c7f409207ae8d9a0cb217ff16ba4866d81df6b361,2024-11-21T07:01:48.140000 +CVE-2022-2848,0,1,15aac2bbc76a073ca891b3e3ba3f9fb9bf9e09c4d3707e4aa233f2752b51e5d3,2025-02-18T16:15:11.440000 CVE-2022-28480,0,0,e54d1704695ba9f75944951bfd24a58836e23ddb8fee804a7b42639257c1adc9,2024-11-21T06:57:24.790000 CVE-2022-28481,0,0,17953b88e80bda6244bb3c037dfcaee26ba958ace6634f14c6cd34c20e8e36e9,2024-11-21T06:57:24.937000 CVE-2022-28487,0,0,adbca582fe216ceea0244fed85d992720694ffad6c331fdf3b6d541c21b44d1c,2024-11-21T06:57:25.087000 @@ -197267,7 +197267,7 @@ CVE-2022-28550,0,0,d61aae6d6abf9b6a8a86235902813f696840ff6a6a4b80d0018dbdfdb7131 CVE-2022-28552,0,0,bf6b5f3af9c90093dcbe6a1e6758e74be069a7d6a399928ec5c61d8d6a467586,2024-11-21T06:57:30.483000 CVE-2022-28556,0,0,0507dc57a0de99a07253c9db2a03990e18b0a50af78ad25d1f7cd400d397b6ee,2024-11-21T06:57:30.647000 CVE-2022-28557,0,0,4926cd7b8eadd04d6c5fc52348cef453ebb742155b50f1e177062444932a671a,2024-11-21T06:57:30.793000 -CVE-2022-2856,0,1,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000 +CVE-2022-2856,0,0,854658bea9df630851fc34fdf92df0c3500c0944d8a2cdb7300480bf99d3ef64,2025-02-18T14:43:46.130000 CVE-2022-28560,0,0,e4b562b74d9cdbf01bd96ffaeba2fe191d5510688ed63ab34991480eb886b49c,2024-11-21T06:57:30.927000 CVE-2022-28561,0,0,518c19fe66b4e09bc9800bc1acea302b3504c0f43ee73ab2e30472e903ec5797,2024-11-21T06:57:31.067000 CVE-2022-28568,0,0,beb032e0c658d78fbcbcb904731866c4eac85eb53ad4d016a962c9ad42c8eec9,2024-11-21T06:57:31.207000 @@ -197379,10 +197379,10 @@ CVE-2022-28681,0,0,b8f43a20c2b57f6a0047369d1b230ed63c65321a6161ac4f8a31ae69a945d CVE-2022-28682,0,0,bcb0dd1ae49198f8c0556b2624b0e12d2675714cdc534d6a7c47a01283a9b4f7,2024-11-21T06:57:44.080000 CVE-2022-28683,0,0,816d2a1520e8e5feb91adc57ce7b5e8c27cb3af115756c8d55ddd45d4976a7f8,2024-11-21T06:57:44.193000 CVE-2022-28684,0,0,9dc7594b3784884140b568f0f3dc9b301f745444d48b4d2178b9170bf14bdfe3,2024-11-21T06:57:44.340000 -CVE-2022-28685,0,0,152fc0fbd8ee18c7230c5f3d5d704d88647ba8dbb768dee591dcc5b94526108f,2024-11-21T06:57:44.447000 -CVE-2022-28686,0,0,fc5a8d3981233b0aa83c78ccd20ad35a64d3a864fee4217312c9452af1d74508,2024-11-21T06:57:44.560000 -CVE-2022-28687,0,0,7e8679b0cab2bfb90c67e0195d85678c882fbade624a2fdf1685f8430d9cff7b,2024-11-21T06:57:44.670000 -CVE-2022-28688,0,0,83a2d67d6cbd25bab7067bc2117992af15ed92b2d338438f593120b785052340,2024-11-21T06:57:44.780000 +CVE-2022-28685,0,1,13fdb21feec95cfcf189f49dfca8222824884ec433e23637260407a27e43da2b,2025-02-18T16:15:09.603000 +CVE-2022-28686,0,1,cebc1c945513cb1513b6df344dcd83d493529699cb43e1a8063801dc36e15a7b,2025-02-18T16:15:09.843000 +CVE-2022-28687,0,1,cea133e37c0d577f02bf1101ea517f348ecd561600f39ac93e5ef05a72fe43d0,2025-02-18T16:15:10.037000 +CVE-2022-28688,0,1,55c73171fec355065b988971451e8c5b848b33b671f4f0c66ded8fff4eeeea1b,2025-02-18T16:15:10.237000 CVE-2022-28689,0,0,4edf7f56430cc28a3558cb1cd6b706bef48e22bf9a07b07fb6c8e6a850c09772,2024-11-21T06:57:44.890000 CVE-2022-2869,0,0,a6c41e2e21e8e9f4dc93eb0145cd5fd437c35477a6c25e9b79b4ec21715ae9b8,2024-11-21T07:01:50.573000 CVE-2022-28690,0,0,4e56822b4ca0b82e0ba605af45b9bee55966330e5871f1dc9b7083b71a61e0d7,2024-11-21T06:57:45.003000 @@ -197546,7 +197546,7 @@ CVE-2022-28854,0,0,4d1c220322567ff9f4708969d7d10eb6959c2e153abb29c60fad9cd137da4 CVE-2022-28855,0,0,bf12e5d75021f7d2d78ab47b552c3ab814362b0a565c0ae025e8b59ea8cc14af,2024-11-21T06:58:04.083000 CVE-2022-28856,0,0,97b5cb854c42e2bba4bec2f848d8712db4c9642ef906b4e7ec288909a1b2f958,2024-11-21T06:58:04.200000 CVE-2022-28857,0,0,5a8fdec603118a8974a915694450f8aa4b6b3ba53be0b982bbbdbf1bfe0eb3cb,2024-11-21T06:58:04.323000 -CVE-2022-28858,0,0,d23efb5965bfe49f553eb87aa86ee83508daff6ac4e655ac793d8b70ce1506a3,2024-11-21T06:58:04.450000 +CVE-2022-28858,0,1,9e7e73d449279aab38a9df1761b011f1b66cfa107d24ed8c9c98f0221de31ce3,2025-02-18T16:15:10.440000 CVE-2022-28859,0,0,a02312803b54899a0654f8646f9d712bf9ef577e625f0fe5c5597df0c05b7184,2024-11-21T06:58:04.560000 CVE-2022-2886,0,0,28abfd9bb6d6a1fe516db20229db64e5d00f417a56ab77e71cb1ddbabe24ffa6,2024-11-21T07:01:52.320000 CVE-2022-28860,0,0,4d02378e35e0791603644de01c1793437119d0059fb13a48a51bed20a880b488,2024-11-21T06:58:04.703000 @@ -198099,7 +198099,7 @@ CVE-2022-29503,0,0,fe6627b1984ed177ece5e234f18079d6f3fc74ce3b11a4bd045d18a306497 CVE-2022-29504,0,0,22a099b727838bb2a7351196b16a44e93ae2bd9429da35a97f193aa24f9c461f,2023-11-07T03:46:02.927000 CVE-2022-29505,0,0,359fae353ad08726f4eb696e09d2ad139e0df88243f5d6fd78bf52cc106df861,2024-11-21T06:59:12.817000 CVE-2022-29506,0,0,3962b51c5c27127830a629454b32828486786c50629dfc167ed1a3c071df6910,2024-11-21T06:59:12.933000 -CVE-2022-29507,0,0,27dd9000741eeff9b850bf513c99acf1a13f8ab0cd1f28379608570939c0aa0f,2024-11-21T06:59:13.363000 +CVE-2022-29507,0,1,945b58f924585e3341e2c3d1e885edf8373ff44b156db3427d9d9620e3f37437,2025-02-18T16:15:10.620000 CVE-2022-29508,0,0,029dbe6b5c8453a90a1bede64abc7355dcd4eee2e86a4c637313c074f5e8cda3,2024-11-21T06:59:13.490000 CVE-2022-29509,0,0,28be0bb8f6027f6a3f64d19fc3df6f9375536374635311b07102c0cc08182e76,2024-11-21T06:59:13.617000 CVE-2022-2951,0,0,0a2ab5f8c78419f2afab990815bc7f66b5f4d6d9104075eb34ffa8066ce52a9b,2024-11-21T07:01:58.693000 @@ -201225,7 +201225,7 @@ CVE-2022-33205,0,0,ad8faf3876c0077e3cb7d3d6e29faf9b902785a9eceab895247358a4f738f CVE-2022-33206,0,0,e32e9be49b2eb2c4208bef01f53fd6d8a5f6271a592dbd0c7b2725f0c3f9d4ba,2024-11-21T07:07:42.970000 CVE-2022-33207,0,0,e4e6e0d2c508d1fdcbf5089ac279cd3000758bacc2fa3199bf3036006f634fc2,2024-11-21T07:07:43.093000 CVE-2022-33208,0,0,2a6f2df46feca332d01a82d64766bae5ecf7c98e1aa88ac96cab3c28dffdb603,2024-11-21T07:07:43.217000 -CVE-2022-33209,0,0,0ebe2a6927b6f5e61b49a2061f18eb644565905c802cd81be878ea0c883c4bef,2024-11-21T07:07:43.390000 +CVE-2022-33209,0,1,8ef77cad81932fd6188fdadf89d706a5a1ae5b860bd89c91721b6ba1ecb1e7b8,2025-02-18T16:15:11.617000 CVE-2022-3321,0,0,0b6f40cf08d2d5ed5e532a099454d95b632accf8c53ec46ef50e3d2a8b5fa145,2024-11-21T07:19:17.507000 CVE-2022-33210,0,0,2696f6298e82345893f2e01081ffb8df669d3082c9469855a36269a3df50848a,2024-11-21T07:07:43.520000 CVE-2022-33211,0,0,827df58dbc8d588d3b82af3e9575085e665db249aae05c37ee62cd1a91ffe7c2,2024-11-21T07:07:43.700000 @@ -202092,7 +202092,7 @@ CVE-2022-34484,0,0,3f533b42daa5e7fd1f916268062039bde8318359b70f5d96545b1be970c41 CVE-2022-34485,0,0,cf1c5fe8184d6bbd2a9c1cd4bc47ae63f9b901e1b67c37ad6be7e135040e3c02,2024-11-21T07:09:40.087000 CVE-2022-34486,0,0,73a71e1f77d0db95faf44d581ebc7697f58e47daa52f286b1737b58b52030cc1,2024-11-21T07:09:40.210000 CVE-2022-34487,0,0,6ce1ccea025a4a271a03bc9f211e020097976ad6b82aba7dc5230a69f3b14d2a,2024-11-21T07:09:40.343000 -CVE-2022-34488,0,0,df94e6a2937bc515a012a3a51a6b4d140e9fa6af146bcf4274b8888dd95ebce5,2024-11-21T07:09:40.533000 +CVE-2022-34488,0,1,5bd7380e268f73f286ab4df14ba1a4022f5c04a59282ab2c65a94c6700b0d5c6,2025-02-18T16:15:11.813000 CVE-2022-3449,0,0,0388ee85291cdb5d5e1be71b8006e97d902b56f4af3c11559fb4a756ab252692,2024-11-21T07:19:32.820000 CVE-2022-34491,0,0,6187ed181d7b674a78943e3d774b41de94989ca40b50c2995c2fe8e77a783692,2023-11-07T03:48:43.663000 CVE-2022-34494,0,0,8444dd94d30d9fcb0438cd24fba1ee60981ff98fc80786b17183be67509bd0c9,2024-11-21T07:09:40.703000 @@ -202257,7 +202257,7 @@ CVE-2022-3471,0,0,495d0e8dcc7168cf73d6752bd352dc355254512638404907315f8c8587cf20 CVE-2022-34710,0,0,873660d048e28a149e24e157bf627764663cd5072c4620ae24c67a19668c7527,2024-11-21T07:10:01.627000 CVE-2022-34711,0,0,c44da15e9a9f787ffdb3f343336e0d67972465f3cc3917d88950889394348c41,2024-11-21T07:10:01.790000 CVE-2022-34712,0,0,b3b95e93f77b00695ba541618424625a617fac2c395c356b58b85959b0196871,2024-11-21T07:10:01.950000 -CVE-2022-34713,0,0,c213befcfa76bf61c530a8d956ecc8d9bc6f1dacfc62577512f94aa0ad7e8731,2024-11-21T07:10:02.083000 +CVE-2022-34713,0,1,2f94f2d82dff054953e34a660855d92ec8337c2f9a6efa036d564437fb454930,2025-02-18T15:06:15.647000 CVE-2022-34714,0,0,cd7847bb81aa6cee536f4b993097e8160f3dd670d1c0e9f6376413be64c73e46,2024-11-21T07:10:02.283000 CVE-2022-34715,0,0,1a6430359b7e294a3661adff75f8cbcd008524c0b3380f11bf12898f184ac7f2,2024-11-21T07:10:02.580000 CVE-2022-34716,0,0,823de494d6afe6089e979b6e89b590f446004ca2a60a6ac4e68b91b576e3ce40,2024-11-21T07:10:02.710000 @@ -204223,7 +204223,7 @@ CVE-2022-36965,0,0,0ca23e8ac16cb88858e1fe0eb569827b54b6cfc7d3aeecce850c21cf96b18 CVE-2022-36966,0,0,fccbf34c70f1f2f8ada911a76c54bfb7636a8f0bb16cef989a57c4cc9e296b6c,2024-11-21T07:14:10.403000 CVE-2022-36967,0,0,3ece16c6a6e55181708868bbad5290d8849bd16a56f97d5755153213a266ceea,2024-11-21T07:14:10.527000 CVE-2022-36968,0,0,f423ae7f2d865457f2551156d8fb7595788a1b7c0617aa72595eafd6ad4f563f,2024-11-21T07:14:10.677000 -CVE-2022-36969,0,0,0afc5bff7d868422a124dbab056241ca446f34a21466cf8be80c181b0c15e773,2024-11-21T07:14:10.820000 +CVE-2022-36969,0,1,f9de56edb316c33ae9002ada5cbf6c225a11c92e9932b9c8ffe5dbb24be9fcb2,2025-02-18T16:15:11.987000 CVE-2022-3697,0,0,2f8b38c5a7b1843fbd9fd8a8a356e31179919e604675a74b4f7d9b071a38d1ee,2024-11-21T07:20:03.293000 CVE-2022-36970,0,0,cb3c9c8a4054905fdd0c810ac8bf9d3add8718beb8c8c6fa550ec3a3d4370b03,2024-11-21T07:14:10.953000 CVE-2022-36971,0,0,9a126f8836db514d07730137b1743a7c1da7b8e3225a7872e1dc3a89ae49569b,2024-11-21T07:14:11.087000 @@ -204513,17 +204513,17 @@ CVE-2022-37348,0,0,839121da509d7997c32a937a2927f2a149c85a419aa5334432df88972878e CVE-2022-37349,0,0,be4c38fe75bdf20aeed9cb31e90b4ed76bbc7c21e042d700d48481bc68a7343f,2024-11-27T20:11:45.410000 CVE-2022-3735,0,0,6a3a0d98c65ef51e5e82db93717d565b35d58fd0d38d66a0856b2386409b0e4d,2024-11-21T07:20:08.103000 CVE-2022-37350,0,0,2b8c3c24a3100b5d8e15e20e8e0d1fc730171430393e497c152d93645d5758fe,2024-11-27T20:11:45.410000 -CVE-2022-37351,0,0,01046383c63ecf3dcc1b2b62eb931a1f970df41eff31fac963f42608f4cb1c03,2024-11-27T20:11:45.410000 -CVE-2022-37352,0,0,29811d70e67480c5ae6a50339f8ef1bf240f637c50ac7705b92155c4af9bc847,2024-11-27T20:11:45.410000 -CVE-2022-37353,0,0,d958d9c5f95a2d12b6554f350242c837b759201154e0df2070ac95e71520c8d8,2024-11-27T20:11:45.410000 -CVE-2022-37354,0,0,8c5f73e4710d71187ccd4bb2f5e35a9d35fa3991ad2444f7906c5eeb2926a2d9,2024-11-27T20:11:45.410000 -CVE-2022-37355,0,0,3f06165ac7692aa506dc379953c4d15c71f9fb28aeb9043edfccfb2990d973c1,2024-11-27T20:11:45.410000 -CVE-2022-37356,0,0,ed207f6de49f0f97073773917886fafd7c7e26add21498c5a152314e65b3cbba,2024-11-27T20:11:45.410000 -CVE-2022-37357,0,0,8f75ea8a83bcdcea506d766db7c6bf4a84f454444778e425a0ae209cbb47077d,2024-11-27T20:11:45.410000 -CVE-2022-37358,0,0,14fc86776ec261982cd92d8f6f23258a89a481a4bdc8a1bf8dede56a6bcb2b7e,2024-11-27T20:11:45.410000 -CVE-2022-37359,0,0,a20a29eab6e9d892f6e71ac600e5d128cf2387332a5597df1fe5874ab1dbd08c,2024-11-27T20:11:45.410000 +CVE-2022-37351,0,1,d5b8044a97760d6c3234d0a8fd27735626dfde61898efd736ea6515abb08e21e,2025-02-18T16:15:12.197000 +CVE-2022-37352,0,1,f61c84cce450042b8c3be2e1dac417a8c1d9f399e47918172cadaab2818d7e42,2025-02-18T16:15:12.407000 +CVE-2022-37353,0,1,8a685d2101ee9c996c0441515374084c6315df48869471bc8b533638c837669b,2025-02-18T16:15:12.613000 +CVE-2022-37354,0,1,76831841e61d25ac28d8d2d714ad74be6c1f83759ad1c4fdd8f4a96b207cf21d,2025-02-18T16:15:12.807000 +CVE-2022-37355,0,1,aac48491f25019390b2ebcae75dd23911f9273182a607c612c75f13b1d8a9c53,2025-02-18T16:15:13 +CVE-2022-37356,0,1,f85d6dc20ac1d33a6f06b49f45e0e101ac386f9508c0a853de0ee1142b5987f4,2025-02-18T16:15:13.190000 +CVE-2022-37357,0,1,c6aa4356d882113ccf9068f91803a778fd76dc9bc9b24c6f11dc3eeeca46c767,2025-02-18T16:15:13.383000 +CVE-2022-37358,0,1,248c48d7aae1d619d41ba5f9aad6790a3a8578110c35c90b6c7480cdbec9b559,2025-02-18T16:15:13.563000 +CVE-2022-37359,0,1,8e1d405058a35dad2fc42f0173eb2d5d81acb1529bee17e71ece202f651d9586,2025-02-18T16:15:13.747000 CVE-2022-3736,0,0,dd1289d0aeed63a5c6b3760a10b956fb9d3fddd85d529817d7d1f2e9a1ed6ea9,2024-11-21T07:20:08.243000 -CVE-2022-37360,0,0,fa0b960e795ad937f8501f34b4600d6c81a3181c1334aecb059bd02691b1a87c,2024-11-27T20:11:45.410000 +CVE-2022-37360,0,1,90e9b2914e31243dff9f80f7d72ff9db2f0e855d0d259f42c3dd7f02da1e65f0,2025-02-18T16:15:13.940000 CVE-2022-37361,0,0,3ba217ae52772213ee60da4f905ed8e862327f9b6db9244049f77d49ebc5aa06,2024-11-27T20:11:45.410000 CVE-2022-37362,0,0,c03ac04d696b68b10b811ec3825b2727875f9968ad246df0c4439e546ab54bdb,2024-11-27T20:11:45.410000 CVE-2022-37363,0,0,e48d1b5269159bc30e4686ce829dddc03df755715a821c209d4f3f893da32be1,2024-11-27T20:11:45.410000 @@ -204856,7 +204856,7 @@ CVE-2022-37965,0,0,7382339f174de9fdc4b84849a25276f93f4cba28d66c4e02be65e6c4c9a26 CVE-2022-37966,0,0,e7ca4037eaa67c01820375a90d40ed51c66c9acd2b7e40a9f1ea8dc246ba3edb,2025-01-02T22:15:09.867000 CVE-2022-37967,0,0,f583f9211879c0c61033a7b05dcaffc689e2c7f204c11c47debf243169222056,2025-01-02T22:15:10.010000 CVE-2022-37968,0,0,6a79a831585dfc274b8d06497d20b84f4f0f567a45a9c981f18e711d1714e0cd,2025-01-02T22:15:10.143000 -CVE-2022-37969,0,0,730c88e6266ce922e60fc7a16119f2527fd7c0c5bd8ada716eb5a9782c859004,2024-11-21T07:15:28 +CVE-2022-37969,0,1,9d1eadc38cb0600b3949309c7df5f942430e24319949aadeb5b16b38a5e317b3,2025-02-18T15:05:07.903000 CVE-2022-3797,0,0,1d258bd702d02d61f24422c553d0aeb93ad0a41da7597475f19b3996eb769180,2024-11-21T07:20:15.157000 CVE-2022-37970,0,0,e7f565127a61644046a05135c4956f50b7b6d230fb402b297bf3685c102bf1dc,2025-01-02T22:15:10.263000 CVE-2022-37971,0,0,3eed1a5f28bd8db707e5862d22ffbad5d063c63f776130157ef9ee169fa1c3c9,2025-01-02T22:15:10.393000 @@ -205622,7 +205622,7 @@ CVE-2022-38902,0,0,0bd5ef2dfe8316484f8c6d7482b1c583413e4573c37fdf89a96403f325086 CVE-2022-3891,0,0,2be78a92b98d47adb36fc65d0ff218706c484f069fbfa886887fecec474e9b83,2024-11-21T07:20:27.710000 CVE-2022-38916,0,0,a11d9ae396e5442a1e1b83293983e520978271a6b8ff587580e4509a9a60d827,2024-11-21T07:17:15.400000 CVE-2022-3892,0,0,d95718c65c426e5ff39e6f74427991f85da1cec4cb39d5907cab3ebcddf469de,2024-11-21T07:20:27.833000 -CVE-2022-38922,0,0,804a32ee2520431a69ab5983d5d036a74ac60d2b655bdb43d23b49f311cd8acb,2024-11-21T07:17:15.550000 +CVE-2022-38922,0,1,75f26da8291c19cb45af748b522f8547a93a4d05875ae6104d4bc55adad5e809,2025-02-18T16:15:14.143000 CVE-2022-38923,0,0,49de48be827439aad30a1200f1f3b4997a55bea4b903a7990aec70cc1069ef83,2025-02-14T20:15:32.203000 CVE-2022-38928,0,0,6b98a5bb7c0fa08033d7aaa0d401c575e5bf6c62505e34d5677b96483eb9fdf9,2024-11-21T07:17:15.873000 CVE-2022-3893,0,0,169977ea85d0f87efc6cc15872f3136d1ff5790f1b49d91b9e93fa4cc18a8375,2024-11-21T07:20:27.953000 @@ -207183,7 +207183,7 @@ CVE-2022-41044,0,0,94f3c64acf4be3fb4c2844eb836cb9f0d7aed4cede614dc2097e5d01b05fb CVE-2022-41045,0,0,2c7746ae8e1e932b2d88ac880d0098f2cc0f1b86f29deb55d7d9973c6c689257,2024-11-21T07:22:30.670000 CVE-2022-41047,0,0,6a0ae7ce4562257b0d603bd01b91f8be796bd6f172a32ffa93b6cd11cdc35e85,2024-11-21T07:22:30.820000 CVE-2022-41048,0,0,480414d14aca950b2941a5ecf68dabd47716cb3806071b62a04418f97fdf5db2,2024-11-21T07:22:30.990000 -CVE-2022-41049,0,0,27884c116a645ce71f62becbe9f35ff894f2a2ed0e0b2acece8df2240db3a921,2024-11-21T07:22:31.177000 +CVE-2022-41049,0,1,8ccee6a4917e04d77593cb07a5fd9144c6398eed50a20a486b4ea7c3222555d4,2025-02-18T15:02:20.783000 CVE-2022-4105,0,0,cd1b56dce82e30d11c9a21d18fca44a3e88c77944c888fa8e763622943817a5d,2024-11-21T07:34:35.557000 CVE-2022-41050,0,0,b9a7da6a62895ac068765a81a1753cf10ca24d8496ba063a3fb037f63af3ecb4,2024-11-21T07:22:31.310000 CVE-2022-41051,0,0,91f5c37a632e3e8c803acf4d44cacf6e6914c78e08e48fffc960383c791cc77d,2024-11-21T07:22:31.457000 @@ -207209,7 +207209,7 @@ CVE-2022-41077,0,0,40acf21e5d76581c02e04050471af0c498e2c168e60da0536ead36041499f CVE-2022-41078,0,0,2bafa7e567944ce69e58f4c25c11be178f784c5f8aeb892c2b58f2f3bc426e0e,2024-11-21T07:22:34.130000 CVE-2022-41079,0,0,226beff0a0449274137ca66ab8a5694f69e2b49a84a389ce8d639337340d6ade,2024-11-21T07:22:34.253000 CVE-2022-4108,0,0,4b6180818dff675ced472f940bd0b464feeeeb032cb6c0c8e734baf2e6447102,2024-11-21T07:34:35.857000 -CVE-2022-41080,0,0,118ce96839b1c410d17219d24a9d8f3d5178ee213eae751c931efd6882bfa0af,2024-11-21T07:22:34.373000 +CVE-2022-41080,0,1,987a4355dd6232181614c40bc7e1e10b52030675824cde8d31a0a3a176504754,2025-02-18T15:01:39.597000 CVE-2022-41081,0,0,d0874d67097784f240ef5603929486a06b5db95fbe7ad1c71a8ac3dcd5aa4c31,2025-01-02T22:15:23.300000 CVE-2022-41082,0,0,b6b4e5125804eda18b18c5254fdf07d51e04e80e78d97f6677c805c3c481e123,2025-02-04T18:15:32.070000 CVE-2022-41083,0,0,084626592c64929d07344eea7c6ab3a7ea5ad5e5f3c0d8564ea600c205440078,2025-01-02T22:15:23.427000 @@ -210983,7 +210983,7 @@ CVE-2022-46165,0,0,b52f4e59ab87d9ef826d1b1aa91e6a7d2ddf200190d4f26766b76124199a2 CVE-2022-46166,0,0,12dbb8116693845af5bad0761e01ce8e5a1e7215ce1813d4f82e11aaf281dd95,2024-11-21T07:30:14.600000 CVE-2022-46167,0,0,9fbc7368e3aa4e77dec66e0cd263dbe6cd1e49e34d7c4d09dd2bdc23ec0be5dd,2024-11-21T07:30:14.737000 CVE-2022-46168,0,0,cfb90e24d3dcc101412afd836697be794033b1f4d9d566f7537a84c49dad0fbf,2024-11-21T07:30:14.850000 -CVE-2022-46169,0,1,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000 +CVE-2022-46169,0,0,cc6863e9c9f18d1f46be0c3464d80c247423311d32e3951d519550cc252696a0,2025-02-18T14:51:04.277000 CVE-2022-4617,0,0,8ebdc24048b2debd57a0848e54b1493c0fac1e5b4a06e75da5ac8ae75c06b81d,2024-11-21T07:35:36.497000 CVE-2022-46170,0,0,7d0728aad33cc4004748812cc2b8df0d4850c877dc0ccd5269efed0d41cc4c76,2024-11-21T07:30:15.103000 CVE-2022-46171,0,0,b44f4ea344bc0e6f16aab325e032b48c286c83d7bf551fdc6b86ced5865dcaba,2024-11-21T07:30:15.227000 @@ -212326,8 +212326,8 @@ CVE-2022-48217,0,0,2db66377450a2693874a7822c694ae856a4d238b3dbbf8a1729f58effc577 CVE-2022-48219,0,0,1e0a9254f8a4ff75cfb5e8f8a9952b48af204b78dbe1ccd97aec4e82c9b9b99d,2024-11-21T07:32:58.903000 CVE-2022-4822,0,0,a8a8a99a2c91e4fc7dd77404d27c148186c734ac4ebee8234ff1ebbbe394bdae,2024-11-21T07:36:00.857000 CVE-2022-48220,0,0,663550da87924a5a0cd6886dfeb55c8611229593a43699dc627b6c59762a7035,2024-11-21T07:32:59.083000 -CVE-2022-48221,0,0,e232e59ba0cd20bf6c005d06a45b36104abcb33181d532af807e9266804a61cd,2024-11-21T07:32:59.250000 -CVE-2022-48222,0,0,3cbf04f924f0a6ee5bf4ecd6da512b69b1636dddc89b2a892e8fd831d8f6c35c,2024-11-21T07:32:59.403000 +CVE-2022-48221,0,1,8e2b6ae95b56c1ec354dd13a73e6f16c93f2d3bfd4f5ac2a77c5adbba4615406,2025-02-18T15:15:12.600000 +CVE-2022-48222,0,1,672326fbe2ac7aba88e52da31832fdd5a20e47d0b8342cf0cad6c4633e11be9b,2025-02-18T15:15:12.803000 CVE-2022-48223,0,0,27d6b67daff3b23e83f3b18569807a955e5a339f08da09cf3478a30845e757f3,2025-02-14T18:15:22.503000 CVE-2022-48224,0,0,94b36feb3339eccc317c82f96017e292429a84f2f92b12839aa24a95d48e2890,2025-02-14T18:15:22.703000 CVE-2022-48225,0,0,70a21bc233df7974e16705f02ad67bbb6b9de8ee1683ad1cefccc4ef0a022d21,2025-02-14T18:15:22.903000 @@ -213404,7 +213404,7 @@ CVE-2023-0220,0,0,e05dc53e7df0257b386411675d30bf07fe2878de7c6c26b2206eb3f6c3f230 CVE-2023-0221,0,0,552fdbf9cca2c0cc2192330242786d81d481672178c2df7f8d811d4075e7deb6,2024-11-21T07:36:46.403000 CVE-2023-0223,0,0,f970018ad447d52f5c4c73db31e1dc382548828a36a7df9a5f4ce6851743b9e5,2024-11-21T07:36:46.520000 CVE-2023-0224,0,0,3bae8323d50ead6a758de985f14ad7ccb408e4655e031f23a9a22291bd0e9c0a,2024-11-21T07:36:46.640000 -CVE-2023-0225,0,0,de83a7dc23a66cd5eda61299e05b2326fbf82eff1268c3e59540b7822737412e,2024-11-21T07:36:46.750000 +CVE-2023-0225,0,1,e31f29a502870083ccc588a402d4bc9ec6b9a09f8b4092501aa4bbe9fae91e85,2025-02-18T16:15:14.343000 CVE-2023-0227,0,0,98a0f994aabc24f9a79e73d465c96d5502c3570a3ffff65f257adc1edbd461f5,2024-11-21T07:36:46.873000 CVE-2023-0228,0,0,9e2493b74d39b6f51d9410a3ab073ec81fa70112a7384534844033d57893c83b,2024-11-21T07:36:46.990000 CVE-2023-0229,0,0,fb261a30595573a793aa1d77c8cb8f9434bafd28eb0b25d2dc7aae445478442e,2024-11-21T07:36:47.110000 @@ -219080,7 +219080,7 @@ CVE-2023-24709,0,0,95724b3cdd469490b5d656e22c325de29d60ac897a910128b841653f99d55 CVE-2023-2472,0,0,5b068f2698671e693c1ba4453c6de14a4f23024ba22de1ed71b24f9a54d16713,2025-01-08T16:15:28.610000 CVE-2023-24720,0,0,6b8bed746e2c0ccf07d91fd8c0cf084ef06296dda35fea10ff93f652dde8ce24,2025-02-11T20:15:32.117000 CVE-2023-24721,0,0,713c683cf74d5b07e827992264dc10f34b57246cabaf877eef720bd3ce53e5b3,2025-02-11T16:15:32.340000 -CVE-2023-24724,0,0,25b2f3661e924d48bc1909de4c38b51b3f69798503f675a779ee4c18e399a64f,2024-11-21T07:48:19.893000 +CVE-2023-24724,0,1,05a88cd95e33a4726ae4f06c87ceb395258f4b7f4993ae98d8cca6d83f32f84b,2025-02-18T15:15:13.037000 CVE-2023-24726,0,0,50947bf9030f1be550b36be9e40cf29480ad3420c4490b8a419b75411ce1452f,2024-11-21T07:48:20.050000 CVE-2023-24728,0,0,78f9f3fd11f088d15e352f0731d33cd001c053f50bcad2715a6ad0f3de54c7a8,2024-11-21T07:48:20.197000 CVE-2023-24729,0,0,4c489d287c9812b2fd170bc5a0633aff9d1e8593ae8341a0ee1391c7ee6a9e06,2024-11-21T07:48:20.353000 @@ -220806,7 +220806,7 @@ CVE-2023-26822,0,0,962ffff9470d823e1ee37e85ddd889c14bbf8c919a0b61f3b268dbcf52cf8 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 CVE-2023-26829,0,0,71868b4f394c052ce5116670118792d9ee7b0b9eef37549e7082cbaae0b0a680,2024-11-21T07:51:58.887000 CVE-2023-2683,0,0,6321281989e28a431315c290991dffbeb4f9ce891d32e039908e243de9f291c5,2024-11-21T07:59:04.673000 -CVE-2023-26830,0,0,a416682310687f6038d561d31260ca35b08ac5632ed77570568e55f17d7dc4c9,2024-11-21T07:51:59.023000 +CVE-2023-26830,0,1,683ce7c3beff509b5543a502bd9fd65955fa34b1bc868ad726700b30fe133648,2025-02-18T15:15:13.227000 CVE-2023-26839,0,0,e18b17b8b760de23c33835c07c5d11b0e19565942bcd80c3f25ae67fe72322fd,2025-02-04T15:15:16.863000 CVE-2023-2684,0,0,d4da490eebef562874c85cc5dae74b568240f925b5edf3f8b53ae8cd615e419e,2024-12-11T17:15:12.467000 CVE-2023-26840,0,0,27acaf922b69b6992f500098b5872bb52dcfbe739ea23f9608c96f7dd5c40136,2025-02-03T19:15:10.427000 @@ -220822,7 +220822,7 @@ CVE-2023-26852,0,0,92473505fbecdaca1afc72f8b22055c72b6a07c64a2c882c9140469f3f369 CVE-2023-26855,0,0,72a6531eb988dcf5d74667601b0db11debc7ecc9d10fec80ea6b5e15cf8baf25,2025-02-13T16:15:39.787000 CVE-2023-26856,0,0,bdf472bd0bc53b7d5acfe01fdb6a149a576f0180ff8a4f241faf4d19028918fd,2025-02-13T16:15:39.953000 CVE-2023-26857,0,0,e21e327f166ccc2afbd4492ef259c134b672585fcbee5ca9e205c0ce8e68a712,2025-02-13T16:15:40.150000 -CVE-2023-26858,0,0,f09034118f8dcaf7e10aa34738ff0e5feddaaa675e607be064cb131bbbadf4b2,2024-11-21T07:52:00.960000 +CVE-2023-26858,0,1,faf3b84a327b91b11bb5f976dc43b4d6846a8075d326d47528ed907e28e1cf49,2025-02-18T15:15:13.423000 CVE-2023-26859,0,0,a179140c87ebd4b86459c9ecbb765889c33de21f0da40c45371354b42d1fc8ca,2024-11-21T07:52:01.090000 CVE-2023-2686,0,0,b0249e40da84fca5e5393ccc5f3eb8ae24ec76d0f3735f9ce1e6cb23621be6b7,2024-11-21T07:59:05.023000 CVE-2023-26860,0,0,e65324dc2f0817d7039700acdb97e67ce3e2cd765240c766ea61aa993b7bb5a5,2025-02-11T17:15:19.957000 @@ -220843,7 +220843,7 @@ CVE-2023-2691,0,0,cdad972a5b1dab057475eceea91b8b4e4026bc1b9e8ac8399b2c1d0f44fa14 CVE-2023-26911,0,0,3c699ec1125fd44557b4cc318bbc724cc49305c037cd57a71dc1c77604421632,2024-11-21T07:52:02.973000 CVE-2023-26912,0,0,cc82d907f2264644f2eb78c39d7d27bf176738b96b7b283566a267dc32dd9582,2024-11-21T07:52:03.133000 CVE-2023-26913,0,0,daf6e3585a7ed0249ea37f260c167a69001cd51ef355afc64cddc00b14b53f37,2024-11-21T07:52:03.300000 -CVE-2023-26916,0,0,527513a0c9844af104e4d4417b495bc36f57a6328181592ae5b696e463e7568c,2024-11-21T07:52:03.453000 +CVE-2023-26916,0,1,52b077727d939243051208ac43aa37f3e6caa024c4d543367793dd5cb31c6890,2025-02-18T15:15:13.617000 CVE-2023-26917,0,0,194a99a53507a39df42526194e8d2506a79a7f17d25af812d6883f6f110580ce,2025-02-11T16:15:36.753000 CVE-2023-26918,0,0,d35475953c7452a05db300575f9a8df61ae7e6e990c6789633f144b55663e74c,2025-02-07T16:15:34.957000 CVE-2023-26919,0,0,4852cc825b9bf426194bb68dc7846d6ee8ce33eba0abc35e296663c7cb884d89,2025-02-11T18:15:25.377000 @@ -220853,7 +220853,7 @@ CVE-2023-26921,0,0,0f6469eadd7b8eb1f25a21780332e58a4e7f037340a8bae8275d286b01ef6 CVE-2023-26922,0,0,02af78d8a0c587f11e4592b06a8425852d45b4b655dc1315ad9511e2b0477b7e,2024-11-21T07:52:04.360000 CVE-2023-26923,0,0,a32f0d476b87c565247b808c5771feae62c9104227b5b4c6c5968c4b92a3a400,2024-11-21T07:52:04.503000 CVE-2023-26924,0,0,7cb11a4c9ca77e95624c2ca9eebda8330e0095c5863e0c412e6b45d03fb2efd1,2024-11-21T07:52:04.640000 -CVE-2023-26925,0,0,60cd794f6ec5fd430e9a06390ff60f215a425a8b1ed6c515e21ffcf1ee0e2aa0,2024-11-21T07:52:04.800000 +CVE-2023-26925,0,1,9909c8c7b93b9251f87152292293ede34c98fb010204ed84730aa6d5bd687892,2025-02-18T16:15:14.530000 CVE-2023-2693,0,0,63e3f6a21dbf47f13e9b9a150880a4fe740c6c2f1f979959b365464cba000e79,2024-11-21T07:59:05.913000 CVE-2023-26930,0,0,b2fbe64d3a5b0a40857304c5801b3c2cefb7ecf91b0c92157e84a0e74b934da4,2024-11-21T07:52:04.953000 CVE-2023-26931,0,0,1f8040f802c66b9da260204c76dbdf8565875b00e25f3822fb6071b5f692c826,2023-11-07T04:09:44.150000 @@ -220918,7 +220918,7 @@ CVE-2023-27019,0,0,6ae87986cd7cb7c06ebb70007c3caccf5a8f318951fb08179c2547d9bef2a CVE-2023-2702,0,0,89db1f202b02a106932fedf9649fa2fe945911614dd941a764165f7605194bcf,2024-11-21T07:59:07.040000 CVE-2023-27020,0,0,2fd3363eea0280fba0331e4ff9991d28a4ed9e5bab08dd6ea65a0c6a12f1c3fa,2025-02-12T17:15:15.087000 CVE-2023-27021,0,0,31dc1993cf2235b941a85a3fd10f67604bc4fc88f219aaabbc3c3a1713a02d6e,2025-02-12T17:15:15.277000 -CVE-2023-27025,0,0,df08cdd42c2b6826389279ebc90283d3ef76ee78cbcc3012cc6fc8e1b5db5686,2024-11-21T07:52:12.293000 +CVE-2023-27025,0,1,88a8b7825ec2badc1c3157c1cc019bd293aee046f60ee013450cfe3bc87d7baa,2025-02-18T16:15:14.717000 CVE-2023-2703,0,0,3609292fde1d1aacb0aa8f87f677168f34fca1193c36d1529bad688fb28841da,2024-11-21T07:59:07.153000 CVE-2023-27032,0,0,e875dabdae70d3bc01bc804badd0a6e9f298cc4e0ef121b744f83395d9fc6ad0,2025-02-10T16:15:33.903000 CVE-2023-27033,0,0,563e9a589bd884d69713b9513c0ef1e92d34512120fc6cc7fb93b1c346976b4d,2025-02-12T17:15:15.500000 @@ -221002,12 +221002,12 @@ CVE-2023-2715,0,0,9fed0daeff41969bcf8004121ebe76307716264f4dbd86f501f34cf8e41f2a CVE-2023-27150,0,0,a7fb341ea935be349b83ec099c5ae048f809619dabe8dcfb854a9f1420730b42,2024-11-21T07:52:23.410000 CVE-2023-27151,0,0,6ca0ff73b2619a50944c698fbea13cb7d8caa108a58ea5dea5afc824bff683f7,2024-11-21T07:52:23.580000 CVE-2023-27152,0,0,b7060ca5f8d33052be20d58629e10c78d1ac35d9cb5c9bde5643340fccf09668,2024-11-21T07:52:23.777000 -CVE-2023-27159,0,0,ed3c8efb78f3f61973976ac04610d200354f14273f04b8df2acff972768a5b28,2024-11-21T07:52:23.917000 +CVE-2023-27159,0,1,8a3caa8c77d336a6494d769b7fc3c07c9e059e0a758d024941edd96385f97de6,2025-02-18T15:15:13.813000 CVE-2023-2716,0,0,c75f06874d7c6c43f410fe356c1ef7bc0209b04427c5c0e8715f03873d4fb142,2024-11-21T07:59:09.430000 CVE-2023-27160,0,0,122547e8abe049817524df44380b58496ff0f4900946923a4a9fcaa6baf0882b,2024-11-21T07:52:24.060000 CVE-2023-27161,0,0,c1c225c9c880e409b8a8480b7b198b4a1a1c9251b029153c521538f7810295fc,2024-11-21T07:52:24.213000 CVE-2023-27162,0,0,e4cb3c54985d114e1cae604477a240a9090b16c645a117ec58340d339263a972,2024-11-21T07:52:24.363000 -CVE-2023-27163,0,0,6d5a553efc2c4772c2731dbd7d4c3f96573ca7165ec12a29399961cd83791c24,2024-11-21T07:52:24.517000 +CVE-2023-27163,0,1,9c101eb5654766d13e0254c345cf17aee1d3261a77ddc2387286e3f4d41516ca,2025-02-18T16:15:14.970000 CVE-2023-27164,0,0,92ebbb8e2a47cbcbbfb56a213309c52630a9aa5e012b6519949b14cf38a80c99,2024-11-21T07:52:24.667000 CVE-2023-27167,0,0,3ce9a2589b54172eace8e138ec0b8e990fb54060e9678beb0dda03b6727ed36e,2024-11-21T07:52:24.820000 CVE-2023-27168,0,0,f5ed98440bf9c281464a4cf0da65aedc7cda805ca2bf7d5ca1abd326046c72cf,2024-11-21T07:52:24.970000 @@ -222224,12 +222224,12 @@ CVE-2023-2850,0,0,c555fba69c2f5ce171fcaefcbd101aa2733a50819ad9a4570d1194b3fa6064 CVE-2023-28500,0,0,ef554dc6eafe9b1ca470603250cc7f8eed745ad3b97dafe91430386f3a7630aa,2024-11-21T07:55:14.447000 CVE-2023-28501,0,0,915fb292fd9e9e841d488a9ff0fe13831c600d84db3c831b1a27305ff6fdf198,2024-11-21T07:55:14.620000 CVE-2023-28502,0,0,933001f4d8faea1f30dedab9736e82dc5cddfa1df039fae2b2e18dba0615f73a,2024-11-21T07:55:14.753000 -CVE-2023-28503,0,0,a153edde766ab2aaaf086940269be326049896bfb8851fc97b89197844fd7807,2024-11-21T07:55:14.880000 -CVE-2023-28504,0,0,336fc14d831ebb5fc3d6a25d410331f167608e13edd24193bfa14a692876f46a,2024-11-21T07:55:15.007000 -CVE-2023-28505,0,0,110cdb8cd9aa97df861cde46631afed0090be8054dd0a61fea0232b31b7b2847,2024-11-21T07:55:15.137000 -CVE-2023-28506,0,0,74895b01b79845872de6371e2cfc0b390f8b252d345ff6aaa42207d24d9deaa1,2024-11-21T07:55:15.257000 -CVE-2023-28507,0,0,22a104259aca37459be6603394f9e2524454870e2f2422af5c456268ab7d045e,2024-11-21T07:55:15.387000 -CVE-2023-28508,0,0,c2e45e9f637d398bbf5369775f4ddab8686b240d35b965a8540d3402da80356d,2024-11-21T07:55:15.517000 +CVE-2023-28503,0,1,ff2bba0e5777e730f90ca8f0e544cf2c6d75016afc60de3ffdc18e9d2b007df8,2025-02-18T16:15:15.190000 +CVE-2023-28504,0,1,54b5a4a021f46a0551ce9880d88717dccae938637a077d64f2d63dad7b26b5da,2025-02-18T16:15:15.373000 +CVE-2023-28505,0,1,ecfef376552e2183b2a6f5ccfd9a97b196085414f8f6d785b7f4fb8c1bf70b30,2025-02-18T16:15:15.550000 +CVE-2023-28506,0,1,005acd927aca933902f81b5fa86d88a73ac9182ea956fd928728a7e41e2fed74,2025-02-18T16:15:15.727000 +CVE-2023-28507,0,1,e16a2c80507923fe6466b7e09864d6601b35d8e6ebecbd5619c8aa58b1953d59,2025-02-18T15:15:14.060000 +CVE-2023-28508,0,1,f897bf5ede43331bf490f3d7435ddb3131128bd40ce2e27290b464509aa2cee4,2025-02-18T15:15:14.280000 CVE-2023-28509,0,0,d23369db7fab213305e6bcfd0b61e4ffebc8e0434cf6bcc1004e350f64272b38,2024-11-21T07:55:15.647000 CVE-2023-2851,0,0,7ba8f792fc3fa0e1fc66d41c7883c06fdc98e4bafbc9a4acc1539e5335343ae7,2024-11-21T07:59:25.183000 CVE-2023-28512,0,0,bc046f04a34eb8e9b06ac8b0a405f5510b39eacef271407f3f356b209b2ed0e4,2025-01-29T21:26:57.827000 @@ -222814,8 +222814,8 @@ CVE-2023-29134,0,0,397a9f3e630dbbabdab5793eee6ca6dd65adb77983cd6c4b14455eac5113f CVE-2023-29137,0,0,8076322fcc6d24a14b3a1dde3c14cbc7205520ab126c340729f53f8dfab2206a,2025-02-14T20:15:33.563000 CVE-2023-29139,0,0,8549dc3f6f4453f97357e5aef512d14ab36f212b91bd2c5ca685ffb348e7ddcd,2025-02-14T20:15:33.733000 CVE-2023-2914,0,0,b44613314f82717d0cb07c8662342f435f1919f2f997ab416019a0eadc037663,2024-11-21T07:59:33.587000 -CVE-2023-29140,0,0,e37b2af112e53eb00d357840dab905310269c4f245e078006ee7da3ccf653a8a,2024-11-21T07:56:36.620000 -CVE-2023-29141,0,0,8f00ca5028fdfdd9df63b5aaf847276a11fba856fdd44524eb23c0edf9c3eb37,2024-11-21T07:56:36.747000 +CVE-2023-29140,0,1,f55a3fbd92333404306e7231f610a5637cfd0c078560aeff8973f3d1cf076b42,2025-02-18T16:15:15.893000 +CVE-2023-29141,0,1,5295db62e89c184f386036d95e68902d72b5432991a79960e34002d4d2572d06,2025-02-18T16:15:16.077000 CVE-2023-29145,0,0,2961314236d2b789a8b41726374be1039bbc4eada89dd8156c01a599cd18d0c9,2024-11-26T21:15:05.140000 CVE-2023-29147,0,0,62dd7bd508b09705269e39c2a8db89cc977afed2c82ae7757e77685a008b53d4,2024-11-26T20:15:20.657000 CVE-2023-2915,0,0,3f1befa9a6331bf62ad4a30f9fde7b09d800ce08ab88ac02a2d9fbd0654f64ff,2024-11-21T07:59:33.727000 @@ -222887,7 +222887,7 @@ CVE-2023-29213,0,0,0659d2886cd4363f793e4197b39a7b9d1e21e8f6c5ccf0df28d873a06e45c CVE-2023-29214,0,0,d695ebe20fd00d2f656f330ff8760ed69ae973785d1517327ff89cd4d04f9abc,2024-11-21T07:56:43.730000 CVE-2023-29215,0,0,1c36bb444821ace92da838cb3ef17e921a87b502ec0676faabef0901c0dabc0a,2025-02-13T17:16:17.720000 CVE-2023-29216,0,0,1e95092c16d53f0529738b1c70a171f74070a0c064e3c012922a63c29a4037fa,2025-02-13T17:16:17.877000 -CVE-2023-29218,0,0,16a49299f067929867c61ed96a879b1b62717ef738078058071c4b05f94e5421,2024-11-21T07:56:44.130000 +CVE-2023-29218,0,1,3652a7dff068d019905f63b4de3ade0f5e1e9781c786e870980f715d4361105f,2025-02-18T15:15:14.460000 CVE-2023-2922,0,0,6b3cd96fa545989db321db97c7346e47d72663d6eea89a4b0a7fcb4be798cc72,2024-11-21T07:59:34.243000 CVE-2023-2923,0,0,1785972f4d67cc8f83c3ca06db4e8914d84b21d5ccc07e0e55911e9b5fccfc46,2024-11-21T07:59:34.390000 CVE-2023-29234,0,0,e385146e4d7c4c78d2e9cb7adbf33a377f9e20552e4901285521032e1cede747,2025-02-13T17:16:18.023000 @@ -238623,7 +238623,7 @@ CVE-2023-50162,0,0,5dfe10d61702489d0fe770232e2bd40333b6e078026813bfcffc569401e1c CVE-2023-50164,0,0,8287e2c775d003ea8c29bab77ea8774ab6378fa22173ac3c8e2b13cc1c7db123,2025-02-13T18:15:49.103000 CVE-2023-50165,0,0,f0f9c7ccf1e457e83f559bc213e758a4620263a795313eb97cd9fa622da413fe,2024-11-21T08:36:35.660000 CVE-2023-50166,0,0,0dcbea6361437caef094634aee7c12a95fcd6fe10938ebb89131abbf42b409e6,2024-11-21T08:36:35.803000 -CVE-2023-50167,0,1,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000 +CVE-2023-50167,0,0,ccd6c241106be26cb9b4d66bcbf303ef2afb42ac4c132eb3aae0f40c4896e64d,2025-02-18T13:43:27.293000 CVE-2023-50168,0,0,60c753e6d9fd36b5cbfba1d153ccf65b95f4faa13dcf59a244a5f02f851df528,2024-11-21T08:36:36.050000 CVE-2023-5017,0,0,71c6d4356e7fa788acf558b2e295dd7c9023f504871cad9a613399738594215d,2024-11-21T08:40:53.930000 CVE-2023-50170,0,0,35e958ca9e1e87a9a58954076b33cef095d0c7756fd04b778caa16ac161183d0,2024-02-14T18:15:46.610000 @@ -245574,7 +245574,7 @@ CVE-2024-1231,0,0,b14e8b0a07bc5ec367647c5978c3a1256f30a8a16700580e77b0e0e8d9654f CVE-2024-12311,0,0,3af6eab31cd30d4c0065a32bdb34b2964678187eb437151de7a1f6c0c5de09e2,2025-01-06T14:15:08.153000 CVE-2024-12312,0,0,81d22bd123230bacbdc2896ec02614f9266db15df91f1b6305d0718b6052467b,2024-12-12T07:15:10.090000 CVE-2024-12313,0,0,f89dcbc889465a7c3dbcd85f625c342b4a0907147c3b92e03163b2cc2948077f,2025-01-07T05:15:17.853000 -CVE-2024-12314,0,0,c20827041d848ecbf5686ded1fb9a73197d9fdbafadd7d83946334d083c7cb2f,2025-02-18T05:15:09.987000 +CVE-2024-12314,0,1,c3752972466cca307bd35c84eef94c7242b54d78ea2bb12694801d320e65e43a,2025-02-18T15:15:14.687000 CVE-2024-12315,0,0,7515fa7554c61b93e76895b43c863ec546b100360ca8461bec95776b4fc48d0f,2025-02-12T15:15:12.527000 CVE-2024-12316,0,0,eca8691c5b3893d514ca6edc1aa6f96dd65d6266b3ab54367da0968d84fc6712,2025-01-22T17:16:27.977000 CVE-2024-1232,0,0,0724dcbb02c95ade7614aaa3e49113b53bf4da94f0e9ec3c91efd2f39f26e0e2,2024-11-21T08:50:07.030000 @@ -245978,7 +245978,7 @@ CVE-2024-12791,0,0,ca87ba886f5289e1e8c19015d3d8fc3c978db86f9d300a7f44c7143ee4b7a CVE-2024-12792,0,0,2f49d07cb189e8abf573658d63830eb2a6eac4f064c5f29dff915dff35ec0407,2025-01-06T15:28:27.857000 CVE-2024-12793,0,0,2902a16bfecddc21a8d8d04e8f0997250ef373c3635003ef32f9127592c72540,2025-01-06T15:16:15.037000 CVE-2024-12794,0,0,1f45437b8b28f90cd480ff6b28049ee2f0d50b6e09b9de7825840b2430eeb83b,2025-01-06T14:40:23.127000 -CVE-2024-12797,0,1,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 +CVE-2024-12797,0,0,37d94d86ee2d2a854a82f8f41be43eae56989884a8c784c7ddde1cdee47aa139,2025-02-18T14:15:27.107000 CVE-2024-12798,0,0,5bd2c8c2d17a4f0af35e3d86ea1aab510b9864bd24d1725787e693a4849fe677,2025-01-03T14:15:24.370000 CVE-2024-12801,0,0,0e0d6365f891eca7b68a17e99dee519237772ad2d2b9b95e05e08c492aa73c2f,2025-01-03T14:15:24.500000 CVE-2024-12802,0,0,8f19e7a7cb329c26f5998e730d7f453cd46482968ebb674eef2b4e7f0f5bf48e,2025-01-09T15:15:14.683000 @@ -246709,6 +246709,7 @@ CVE-2024-13681,0,0,be24051b53da6911bff00c852db57b208df86bc968babb1536de5487be531 CVE-2024-13683,0,0,60466d727e6596c848a3b384eab039ecd16e7bfc142b0f259b6e51a93695759b,2025-02-05T17:18:36.090000 CVE-2024-13684,0,0,40f905038d5fa7555de5181028fa41153678ad0c3f5a58f630a868dcfb14cb33,2025-02-18T05:15:18.050000 CVE-2024-13687,0,0,0bb37ef6a8e3ccf2122a39c9ab998f2d6a038a6c8ba655818034cfc1a0dd838f,2025-02-18T05:15:18.273000 +CVE-2024-13689,1,1,580ed5bdddc877a6b1d4ec6f1abe3105a7f67f812d85021b3af64f6e62676730,2025-02-18T15:15:15.547000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 CVE-2024-13691,0,0,dbaddf29c695a5aecaf0a1e812721c1de01d2629eac9277f2ffc1cf7addc558f,2025-02-18T11:15:11.430000 CVE-2024-13692,0,0,c15da23d6ed0ab7d3c8d65227d9f5ae572ff0b187eacb9c29e601068c08e9870,2025-02-14T06:15:20.140000 @@ -247071,7 +247072,7 @@ CVE-2024-1692,0,0,5fa0283571cfae8981e25dc13b8f934367b33cb6ea11e8e0322c3f47d4b7ac CVE-2024-1693,0,0,85dfb1783111a4af6d6e255e664bea0a4079aa4a5e8289750dc03e9681499a21,2024-11-21T08:51:06.053000 CVE-2024-1694,0,0,1ad1c113a0675747298a00caec017307a26a01e7bc61dba367bdee9ea6f88f87,2024-12-26T16:09:24.467000 CVE-2024-1695,0,0,1c5d560e9ce5c3fae0cb5230e680f68a2aeca2413e77781d5be99ab374e41559,2024-11-21T08:51:06.360000 -CVE-2024-1696,0,1,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000 +CVE-2024-1696,0,0,b8fc89b73f740d8c7dfc648b26251e8328585557d3aa9d517b3eb14bcbcc97d2,2025-02-18T13:43:18.590000 CVE-2024-1697,0,0,f131d35e4f7611988b22435f02c9fc35e30a8eef8e240c6cd7db41a7ee40e06c,2025-02-13T16:48:38.990000 CVE-2024-1698,0,0,a3817713801dcdd2b6948f039ebd5bf82047ee39d455ae9db40460bcb81f0e4a,2024-11-21T08:51:06.797000 CVE-2024-1700,0,0,8f0d5e25a0ed37b6b76a334cde88576835fdff98665e5fcb2bc1cf5f764f3feb,2025-02-12T16:58:29.373000 @@ -248883,7 +248884,7 @@ CVE-2024-21676,0,0,3127fbecbfae79d2f7f29e20d66e088e41b4c966ba7bc8eb69c82cce01bc6 CVE-2024-21677,0,0,9adc47e0832427eda7364295840a597f011ad6c45d28360ab29cc481ff9d8819,2024-11-21T08:54:50.897000 CVE-2024-21678,0,0,de0bfe83eb9b0a3d9a232ae0fdbb876adc0e4e74ded929e735ea965a744e60bc,2024-11-21T08:54:51.023000 CVE-2024-21679,0,0,2048f2c30821e4fc7f65b5afa24a1dc9e951f3f1b6500cadc21e31d98886d595,2025-01-01T00:15:07.267000 -CVE-2024-2168,0,0,3461f696aab79988d4e87234d76a778efc4506b3056dd37de5dffa764a6ba6a7,2024-11-21T09:09:10.260000 +CVE-2024-2168,0,1,1cebe73f3011b978a5288004a4a6b31a8a0e94ae0fa75e68fba72d9bfbe47d64,2025-02-18T16:14:41.327000 CVE-2024-21682,0,0,8bb61947984cae5bb4520771f49e37995b50b5ebd67c790b545e94a6039060bf,2024-11-21T08:54:51.163000 CVE-2024-21683,0,0,f5a6630dd449ad6c1549a5117dca58d9063b2c9d1934eb6fa8180f2b576fba50,2025-01-01T00:15:07.317000 CVE-2024-21684,0,0,4b2333e2512707190c29988a522c4ec0439292c692042fe9b25ab7fda6a4930b,2024-11-21T08:54:51.503000 @@ -249160,7 +249161,7 @@ CVE-2024-22008,0,0,aa29cf9cc02bfddd9d70a5ca3303a493c82c32aece5905ff426753d2df23c CVE-2024-22009,0,0,356c7b90ddcb01019496a7866c880a1ee380480011d91dbf0c14c877bad8c3ed,2024-11-21T08:55:22.223000 CVE-2024-2201,0,0,26eadb7aa2f5722f347c0f2e386bd97079dbdb8be46da7a582f3531a892ffe48,2025-01-09T17:15:12.423000 CVE-2024-22010,0,0,24c05b548507772309ac4d10c2109cc2ada2f5baf0cb1151b04e10f65fa40a11,2024-11-21T08:55:22.450000 -CVE-2024-22011,0,1,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000 +CVE-2024-22011,0,0,9bc18b453be47e216401d6af1ed57ea87c0e9782fda2337bb2c19d4945951174,2025-02-18T13:42:57.540000 CVE-2024-22012,0,0,7eaf97c43b8b09cc15e070e27a86dff00382532a39ca334b0b4081cfb62c637a,2024-11-21T08:55:23.300000 CVE-2024-22013,0,0,a1461319ead98423ad6fc0d646b9a33f399dadfb288cdf43b0101e5946e736ce,2024-11-06T21:35:02.500000 CVE-2024-22014,0,0,4cfec9b3d2520e43390c367346e4fcec3fa28706e41a48543905fc5c1d8c3d45,2024-11-21T08:55:23.560000 @@ -250060,7 +250061,7 @@ CVE-2024-23315,0,0,6630af8c3795df27efd4f30522cf209ebe403cba299e266ba12f2fc3668aa CVE-2024-23316,0,0,f991e4d2bfc533226809c990c7070963c80c9a8181a0ab46cecdef9ea8914294,2024-11-21T08:57:29.393000 CVE-2024-23317,0,0,e6b9da68990e4912ca91ef806a26a48f43c274564774fe76fbd2dacd1f40fbb3,2024-11-21T08:57:29.543000 CVE-2024-23319,0,0,cb939b1af27706b0b9d965b80fff3b0b48221e1917b0fb384d70e0953046b7a0,2024-11-21T08:57:29.683000 -CVE-2024-2332,0,0,304de721ecdbe8cab233056d0e153a006f00a79af5e1adc8c9aeb46c3b898c39,2024-11-21T09:09:31.410000 +CVE-2024-2332,0,1,22fcecd0efe7e826547c745f5884287caa655cdd7bc975f499fc3e660dc05509,2025-02-18T16:17:02.050000 CVE-2024-23320,0,0,5358fceafc65b7c895824a066eb3639945e8b03f1c69910f4d447f806474bf37,2025-02-13T18:17:01.897000 CVE-2024-23321,0,0,7682ed0399d43e472433618b8bab56c7d3c04a20e5f559c1c72b10263abb2d72,2025-02-13T18:17:02.573000 CVE-2024-23322,0,0,0cedd9112f57f1ccea80b0ceb4198f638a5950e1d187eb161d7d108eeb3da784,2024-11-21T08:57:30.260000 @@ -250642,7 +250643,7 @@ CVE-2024-23923,0,0,2b299af07539c6b04589d5f4cb78313212c713b14e6f4111f325ca8810b2c CVE-2024-23924,0,0,465231a82fd4648306cddbdcd0ef7925a0538a8b613742d6302b13e6441b1caf,2024-10-03T18:06:54.180000 CVE-2024-23928,0,0,aa893d0bd03b0fc4eec222c87d3670cc0bd053b0b68fc8887badbad0acd19fb1,2025-01-31T17:15:13.030000 CVE-2024-23929,0,0,f24b814b1ed24e572e44263ae81453a6c749c950d9f79f981f97ff46f8081fe5,2025-01-31T17:15:13.177000 -CVE-2024-2393,0,0,0458f4543c8a844640151e34e9bc015928e878b95038e499e97f09aef67aa751,2024-11-21T09:09:39.413000 +CVE-2024-2393,0,1,e1f7416afb0d3dd6d4e614fbf7a14456c46925ea34c7eaf87ef76f8addbeb770,2025-02-18T16:20:38.263000 CVE-2024-23930,0,0,df289dfecd334ee530f5e32c563493e2769f96df68cc173a7e05a2e4c1e28769,2025-01-31T16:15:33.767000 CVE-2024-23933,0,0,6e0264d60bdca018c9852dbb20a796ffa59d13b4560a2a230bcb40ba87c1d7f2,2024-09-26T13:32:55.343000 CVE-2024-23934,0,0,80818e972c45e9652109b7b905947a778f340b3ef02b81b47452ca83bbb4bebf,2024-09-26T13:32:55.343000 @@ -250780,7 +250781,7 @@ CVE-2024-2416,0,0,ab5105a0d1f1343d53be03ce7b47733d31cfcee441fdb5367e61df3fe9b2d2 CVE-2024-24160,0,0,e19b8014b49c30329495072f174bac90c20d64ed22c36b21f9d4c3477741d674,2024-11-21T08:59:00.147000 CVE-2024-24161,0,0,f9d18845134ef760f5c37bfd6a74b031ec414e86bfd2197e0d2d8955f1e8440e,2024-11-21T08:59:00.290000 CVE-2024-2417,0,0,6199531f9155a880d068e24eef822b1edbcb6c4893517372b5d25764e9bf03fa,2024-11-21T09:09:42.537000 -CVE-2024-2418,0,0,154509dd2d91315c00067f4186c9636530cc59e8e86ab27eb13226ae6ce7d6ef,2024-11-21T09:09:42.670000 +CVE-2024-2418,0,1,a754a85317d98b9c2f5e469fa90178131735d4897cc7aa17f5aaf089859f272f,2025-02-18T16:22:50.640000 CVE-2024-24186,0,0,07767a469bb9f886899dec5f70186dd871757234273491c05682334a187b13be,2024-11-21T08:59:00.440000 CVE-2024-24188,0,0,c6ea63f8b5a602ecddf385c0ed8349db234fffb3df07bfe2900c73a158dad28d,2024-11-21T08:59:00.590000 CVE-2024-24189,0,0,8654f184d124e38bd222b249f6ecbca50375bc780d645047f0c354a41c91f111,2024-11-21T08:59:00.740000 @@ -250818,8 +250819,8 @@ CVE-2024-24266,0,0,b01052a1d09473422313197c1d95155ec7dc292e2d5aa99b904a2b4b6a5b2 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 CVE-2024-24272,0,0,5864839a910b3cf34f75bdf7fd1f937bb6e6ec5b97bf46e24e0cf397dc23313c,2024-11-21T08:59:05.650000 -CVE-2024-24275,0,1,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000 -CVE-2024-24276,0,1,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000 +CVE-2024-24275,0,0,85f5f76d7e951dd3ac871aa39ada852d2b9d4f9859dbe692fdf3826cf400b8e3,2025-02-18T13:44:28.043000 +CVE-2024-24276,0,0,f3a2e533b91285f6b58821f0074c07a3597320547cc12da610308b69c50c7577,2025-02-18T13:44:14.953000 CVE-2024-24278,0,0,62e4079d8511e44535a226dec446bd678ad9a0c3d8dc7ab8542623f0eb72e8b1,2024-11-21T08:59:06.080000 CVE-2024-24279,0,0,3c4f04c26cb85f0333fe6d1f13856ff9faa25dcc02100f20c125ebce26e32793,2024-11-21T08:59:06.313000 CVE-2024-2428,0,0,2471580c23f3bb37c64f9417f5557d913d5acf37363d1d2bcff51f8dd06d13f6,2024-11-21T09:09:44.007000 @@ -251661,20 +251662,20 @@ CVE-2024-25526,0,0,65dd892c17e24b21c743b2957fe12a5da977f57606051a8d155e608c03a52 CVE-2024-25527,0,0,2feec88a1a9765ad44469f5aec4158d93cab6f4269704036d841801342c53cda,2024-11-21T09:00:57.100000 CVE-2024-25528,0,0,dd2239ad068e7da7d722a64493efa5e226739bdacd085ed884b938c870e36392,2024-11-21T09:00:57.247000 CVE-2024-25529,0,0,8f10be39f9da45d79933953178d2cdb7ce2e7a6a31718f75640d627862035de2,2024-11-21T09:00:57.463000 -CVE-2024-2553,0,0,574625102f38d8b2819cc74581faca98e0492649008616ccf5e43d086bdb38f9,2024-11-21T09:09:59.753000 +CVE-2024-2553,0,1,0428c7caac4c14b66d42abc7e2c263763f56e7b075b21c530f6512b1c928cc0b,2025-02-18T16:24:04.587000 CVE-2024-25530,0,0,bad1dceeff66963138afb5c427403d06fa9f9506913610f53b9d36432779c8c6,2024-11-21T09:00:57.667000 CVE-2024-25531,0,0,7566a3a5b4b76b898f0d21a259cb6c08a99d40a16aabd4e9e1b49acc0e799b6d,2024-11-21T09:00:57.887000 CVE-2024-25532,0,0,879b9ad4d2b1e39a1e1dd7a52ebaa5a9a18e705e9acd54875e736198e26fb1a7,2024-11-21T09:00:58.100000 CVE-2024-25533,0,0,a5571190d8ae1edce6fb036db178d91c19debdb8ca0e08d6186d18e2ecd0ad98,2024-11-21T09:00:58.313000 CVE-2024-2554,0,0,e205e9f72b72219de437b4511d9094a43e4fe790b95a7f65bbd3f50b303b2486,2024-11-21T09:09:59.897000 CVE-2024-25545,0,0,f63725e164070cc7f9aa69b32e1a33bf2cfbc32fe50065463242eb8374c7b6e3,2024-11-21T09:00:58.537000 -CVE-2024-2555,0,0,ca30b0e0943c5e8180a8434458a5fd7575e43e7d110383aabef1392203068ca9,2024-11-21T09:10:00.033000 +CVE-2024-2555,0,1,e08bf02feccbcc8b6fca6136ddfd134c56db00a278d54bd0b5e0f814b0b4e4e4,2025-02-18T16:52:50.603000 CVE-2024-25551,0,0,650440c21f088bef59f5c6a3697f7b30ab533966a389f6fad3ff6f66329da998,2024-11-21T09:00:58.770000 CVE-2024-25552,0,0,c29492323c9c7ee00969f36b8fb3dece7caae4dcab3dbfec3c6b1f51d7fb887c,2024-11-21T09:00:58.990000 CVE-2024-25553,0,0,d425d147501fa8006dbadf60a3ee6d0e30ea870822653a9e9b85ebafb1bf219a,2024-03-01T08:15:37.950000 CVE-2024-25554,0,0,5ebde31c21d4e190368d0ea561a226f998eab9ab1a3ffbf4889f3384c5f1c9da,2024-03-01T08:15:38.107000 CVE-2024-25559,0,0,d15ef6a8292ff4e3cc5d05413efc5a3e9dcb2e2f4913411a9a6afc4ea649c703,2024-11-21T09:00:59.190000 -CVE-2024-2556,0,0,8b07973e8f6662324da1b1c114f86aae4f8bb1f4ae0d6ebd9100cba43f42f425,2024-11-21T09:10:00.173000 +CVE-2024-2556,0,1,f4c80da7407f04757bd46e076f7f4e3a185b6829aa0c1e9a0fee27adafa78c35,2025-02-18T16:50:19.370000 CVE-2024-25560,0,0,7b2f14a389c4855e094fced0bf47660aa6960a07e134b3de37af09c260a2b69b,2024-11-21T09:00:59.380000 CVE-2024-25561,0,0,dea1d7704dde6d0a5306f95f9d4da9e3b9249ef4c0186b054ad470185ea987be,2024-09-12T18:50:32.413000 CVE-2024-25562,0,0,a56e4e3ba7171dbd525020e765b8f1e1293c9793670b4770b9e6bb6db8c89d53,2024-08-31T03:40:47.857000 @@ -252781,7 +252782,7 @@ CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c CVE-2024-26897,0,0,99a4a65c4d2cf2952c1beef32b5c14c24ca683dfde6ce0996f5012d6d08130fd,2024-11-21T09:03:19.780000 CVE-2024-26898,0,0,59064cab5402bdde52c986a7bd49e55f19dd21c4edcf6601694e90d218d8ee73,2024-11-21T09:03:19.907000 CVE-2024-26899,0,0,b25c468fdd9a5dde607d7e60e93a4f4378e05bbaed78a1b87031bd334bf1cf78,2024-11-21T09:03:20.160000 -CVE-2024-2690,0,0,cb8394cf256eaae4e0bb95e296623bc5e9883d493c3bc191cade85f8fd8f451e,2024-11-21T09:10:18.073000 +CVE-2024-2690,0,1,f54be296cda9442e3719694faf713502364bcd62ae99daa0e6de3ce951368fba,2025-02-18T16:54:08.043000 CVE-2024-26900,0,0,89eb36b4021cc9aa920b6f52a26d6c2b349256cf670208b8b8832bd853f9efc2,2024-11-21T09:03:20.300000 CVE-2024-26901,0,0,ce718d6c1afabba164002b2247fbc0f74d9cb4434a3cc5019738d6e3fcfac2ba,2024-11-21T09:03:20.453000 CVE-2024-26902,0,0,3fd3400946dbfe9fc533be7b14f34ebccba35c6430809af9d495947e583d5c1e,2024-11-21T09:03:20.690000 @@ -253119,7 +253120,7 @@ CVE-2024-27212,0,0,ba6ac2978608ea5e95e94f7932eca5276e492bf0fcda3b79f7be081479dfa CVE-2024-27213,0,0,bb511fb44d4483a7707788f536ad64bdc9a8594fdee0dce6ab02d022f44ae314,2024-11-21T09:04:07.233000 CVE-2024-27215,0,0,60ef065eae63cf58718fd9a5d80dfa62c007813e270493517bc98a19fcefe594,2024-02-21T18:15:52.060000 CVE-2024-27217,0,0,76d41e0e3916c24a8c24a0421c8f0968b4192e387bc204f8fff17479f7e3e830,2025-01-02T19:06:49.003000 -CVE-2024-27218,0,1,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000 +CVE-2024-27218,0,0,c0b38b5dbd20812da47d5d97dba90b30a82e78f00e080d8f2e3dc9bad44346a4,2025-02-18T13:42:34.137000 CVE-2024-27219,0,0,64fc14d2c6214ae020a4c11c5e324b56f94237d828a38470eb29489f4c925efb,2024-11-21T09:04:07.683000 CVE-2024-2722,0,0,7b34b92b1820e8907773aa608ebf1b7330f60309554be8d7fc4928ec6e6f3d0d,2024-11-21T09:10:22.503000 CVE-2024-27220,0,0,4ee101d4577b781f601dfca4d5026ead710e942a600f8f26b9599978224cc5ac,2024-11-21T09:04:07.860000 @@ -253129,9 +253130,9 @@ CVE-2024-27223,0,0,283aa61b55edbc74ad1b108ccc338916be832878191513c86027a30e87f58 CVE-2024-27224,0,0,f785a013141b3d88fe26f11eac326de71e5d58c27726e6d6328a3f861f1bfcdb,2024-11-21T09:04:08.610000 CVE-2024-27225,0,0,09e49698c9a5c022210712dd10e1d0392406285f87c4d4a3f5574c148892ac7e,2024-11-21T09:04:08.790000 CVE-2024-27226,0,0,a5963d92e9ea85b556096a52b0a9289d918ed9fee8ba2ef854c2a1108a6a54c0,2024-11-21T09:04:08.973000 -CVE-2024-27227,0,1,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000 +CVE-2024-27227,0,0,77e2a1b627b3a876149a8ff85ff382b736360e43652d5fdceb4239bbe0ea7a2c,2025-02-18T13:42:12.110000 CVE-2024-27228,0,0,b015f77b7ec0412dfb6dba543414b6afdc595b6c02c5d40e9d5be360ead7b9ea,2024-11-21T09:04:09.280000 -CVE-2024-27229,0,1,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000 +CVE-2024-27229,0,0,841bc7dfbb4cad247276c26e9c35d972ce7b9730d58ac8950f4804ee624e235a,2025-02-18T13:42:04.037000 CVE-2024-2723,0,0,ae749859053deab54f1af8cf5abbdefb6fa5ba1e20954b45c5715c5f7d42fb41,2024-11-21T09:10:22.623000 CVE-2024-27230,0,0,78e9bd9e2c0907ca1c981c8beba804336d022bca05746a737f5416b2b442320c,2024-11-21T09:04:09.573000 CVE-2024-27231,0,0,19d5ac148910226bb4bbd48296cc9f834a38fa4de11caec34b12e61952df2cce,2024-11-25T16:15:12.423000 @@ -253140,7 +253141,7 @@ CVE-2024-27233,0,0,619ec8955cdc02f44102a12e814b0558d5d674c6696f24a4298c3a1d2ebf1 CVE-2024-27234,0,0,7ad82767be5d7562c531c72087745b5f3d61bf551f09b828a0cb7c43f3329dd4,2024-12-06T18:15:24.243000 CVE-2024-27235,0,0,3e083ba47672f5a9a66e2f592f80e1bde1f776f355cb98370a18d600a4e49510,2024-11-21T09:04:10.320000 CVE-2024-27236,0,0,083d53dc8fe91cd487b10aeb9c6da4a6bdeee728f3cc27aa3cf72f5eca128aa7,2024-11-21T09:04:10.503000 -CVE-2024-27237,0,1,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000 +CVE-2024-27237,0,0,ac0400b6ee9ea5955b25e431a177f0fc97c4b8a0248ca5fc2a4deff582e27a93,2025-02-18T13:41:56.553000 CVE-2024-27238,0,0,fe88808798faeacf6f7100006a129c0a58c7fb8fbcd6919e990121b7aef0f8e9,2024-11-21T09:04:10.813000 CVE-2024-2724,0,0,f551676e299f586d67b27ce123cbe8352eb7a13a032292943b2fee5618827406,2024-11-21T09:10:22.760000 CVE-2024-27240,0,0,d650a7e06f4d6460cad71c00b429cb1a64a7e40765adeb3308fca39f292601fc,2024-11-21T09:04:10.943000 @@ -253392,7 +253393,7 @@ CVE-2024-27530,0,0,c97aacf77b892ac56a4dc1aa81533416df2a035271ce715380578673eab04 CVE-2024-27532,0,0,9f0aec5ca15522830fc73ae5aa06182b31976dd61b4748273dd5b794326183c6,2024-11-19T21:35:05.417000 CVE-2024-27536,0,0,c377b0d21fbb5c7de68c4946896ec2f8ec67ef0d39bad02515cbb41c44d1bebd,2024-04-23T22:15:07.037000 CVE-2024-27537,0,0,3cbe9bcef09fe4fba870050d9e0c130363a525b398fa9371487301911d20249d,2024-04-23T22:15:07.087000 -CVE-2024-2754,0,0,7d8d4f5a2d4f72cb98a0a5ce1488f82fcaee7d8e42d70a3878c3fdc55b64191f,2024-11-21T09:10:26.530000 +CVE-2024-2754,0,1,f140b41aa53fbf6da0848ed003e2956f3ebbfb41a25f4725ef2371f5e6a35873,2025-02-18T16:56:54.550000 CVE-2024-27558,0,0,29db5a13608bb797a92629c9ce33c296f606c134c5e4938eb8a0ccaf5895c0db,2024-11-21T09:04:44.013000 CVE-2024-27559,0,0,71c1073ce70c0a5981360edceff2e9e6fee7537870ee9d7f5743c89a522a485f,2024-11-21T09:04:44.220000 CVE-2024-2756,0,0,a5e32d8741cc26d296895613cf08c20905d9f2aa36e0d7124d341861eb8226fa,2025-02-13T18:17:57.060000 @@ -254063,7 +254064,7 @@ CVE-2024-28458,0,0,385ea8b6fe8386a730f9d9ec753012f4fee3e0df928948a71e162020d8f72 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2847,0,0,eb3e3360556b68d794af1ae08995717641c6898e210d72f26e5d317c83eadaaf,2024-11-21T09:10:40.053000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 -CVE-2024-2849,0,0,80bbcec0e80b63db2644b6fb7139b90a8664f7a4ff1e3076cb89ee2bdc2f8e32,2024-11-21T09:10:40.303000 +CVE-2024-2849,0,1,b781d1db4ca087a28951b4b33976b64e85895536411670722d7577d4c6b63e42,2025-02-18T16:57:52.660000 CVE-2024-2850,0,0,ddfa8db4983f18c60701e96d4942ce6f6bb96a73c28f0cc400ac097ced2a3a5d,2024-11-21T09:10:40.440000 CVE-2024-2851,0,0,f1913ee0996b40befd8b28b4cfd22ff585e0781b3db3dfac02bb2a05a881b3ea,2024-11-21T09:10:40.600000 CVE-2024-28515,0,0,8635dd87ea8a3a499809e352c5b7ec934d36b0555af2f64334f2b2acfc4f6a01,2024-11-21T09:06:24.533000 @@ -254669,7 +254670,7 @@ CVE-2024-2929,0,0,4ab03801341de2f1465119f603393aeaba3d1ad5748ae5cae0a50616399524 CVE-2024-29291,0,0,011f8488ffac815fc965cf07e1d05d94882b32dd339c3222247d202650b0be1a,2024-11-21T09:07:55.147000 CVE-2024-29292,0,0,00ea6bc4c302c327c3044fa68f8f423ad9fef8aef7e6a4e9a713883b77891c38,2024-11-27T17:15:10.383000 CVE-2024-29296,0,0,831ce2ec626a36a66b1383a816d653550dc19f16f98ff950995d327391a02479,2024-11-21T09:07:55.420000 -CVE-2024-2930,0,0,6664f147975063a07dcc29c53c207c9ea3b0aed5e2de65f4ee1816ba878242e1,2024-11-21T09:10:51.980000 +CVE-2024-2930,0,1,238cd69f670566e1da09828c2344e755e710e55c00ffa65a462cdefa17cc700d,2025-02-18T17:00:05.117000 CVE-2024-29301,0,0,0b8fa97e724a0f2d24e37ca1a4df5c4ca78204e3fd2679571d5516d23f066114,2024-11-21T09:07:55.647000 CVE-2024-29302,0,0,a396970a1bfb9e586dae33dbbabcbcf0c71d859b9e4ecbbb9f7753a6e28b7a9f,2024-11-21T09:07:55.880000 CVE-2024-29303,0,0,d06549f14e9cda2e75b85b1c6ae9ba33f16a0dcc3d18f7cf7ea9a575fe2c0e15,2024-11-21T09:07:56.093000 @@ -255994,7 +255995,7 @@ CVE-2024-31140,0,0,8d4feb999561527fd03ad2e67dd311029f29e7334774d14942143f4dc9376 CVE-2024-31141,0,0,d3e6234dd5f7853dd5cc5624c4460d246120bc3e8971c692c1eba3ffde4baa26,2025-01-31T15:15:12.987000 CVE-2024-31142,0,0,f0e25bdb8c8839bef9c14d66586bad0c1ebbce2b2125a4db27230c001518faa1,2024-11-21T09:12:55.110000 CVE-2024-31143,0,0,4790e02a9527ae34971a6ec375e16b193baf2e8575d041b48c7869872729bd6c,2024-11-21T09:12:55.220000 -CVE-2024-31144,0,0,0da39fc58fadd919fbb3c54e78b2ad673d11fbf4b9dd11741c5f891c34e967b0,2025-02-14T21:15:15.107000 +CVE-2024-31144,0,1,27a5393bd8842a69656663a336180c002b70f462f45ce2ade6ba3fb63880e732,2025-02-18T15:15:16.050000 CVE-2024-31145,0,0,f3ca8145921f17e384184f2a401130163f6a98a09ec4c0f02db53b87f0633d0f,2024-11-21T09:12:55.410000 CVE-2024-31146,0,0,f936f8b5375e47cb092f8aa6bf5893d1570fca2bfcf5c7722e061d7922c4e65a,2024-11-21T09:12:55.600000 CVE-2024-3115,0,0,024eb87cadd8b40aad338eb052d3545e6328aa34b164f2cfa51cbda6bfdbee78,2024-11-21T09:28:56 @@ -261074,9 +261075,9 @@ CVE-2024-3758,0,0,1181488ec82078110f1699579a12bafb88b2d59c08c0cadc1f8d0743c817c9 CVE-2024-3759,0,0,46624cef16e7230998500889df497f9ac3c7ef0f50d3eb513c1782b48bf6fa49,2025-01-02T19:03:20.700000 CVE-2024-3760,0,0,1d331199efa43ca30991198616569b583e4d5745c28ba3fbbb6d72d78d13e12a,2024-11-18T22:02:15.053000 CVE-2024-37600,0,0,ddbcae7fbc14a550ac4bc4a22e786b186115bf006884f2010b7cd244187382eb,2025-02-14T21:15:15.253000 -CVE-2024-37601,0,1,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000 +CVE-2024-37601,0,0,9758513d4834e753d56226c5e1cacdab7d0f74df736599d38c2f6e920a2f613c,2025-02-18T14:15:27.900000 CVE-2024-37602,0,0,934094d1652387cd6cb593774a29211d0c4504a54d153666b3c5ff6e041950ec,2025-02-14T17:15:15.447000 -CVE-2024-37603,0,1,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000 +CVE-2024-37603,0,0,7b1644f9379e1f6ace8c13ff278b5cde8bb3d3b7fdf7427518fb549d8f47232c,2025-02-18T14:15:28.070000 CVE-2024-37605,0,0,fb11c6ec5c9451d0fce3b495eefe0ce37a1a8006db99445feeb56f6a0d8feffd,2024-12-17T18:15:22.377000 CVE-2024-37606,0,0,c23e13fa4f81bf586aa65db6e3fff01a9663acc134fa0dd95dc5e03eb97a040f,2024-12-17T18:15:23.083000 CVE-2024-37607,0,0,8deda97648c5ef6da6da35c94a7a01dc1d7b58245833491e93a1544a6a0717f3,2024-12-17T18:15:23.343000 @@ -264046,7 +264047,7 @@ CVE-2024-41707,0,0,a3d7b79aeb6433d50f291b767e35dfd30d5dd12d277a3c66604231c335206 CVE-2024-41708,0,0,445b65b3721f3d8f292337791cbf935557797b1033365e761cbc9951f26720b4,2024-09-26T14:35:13.827000 CVE-2024-41709,0,0,2cc1be93865d85286340548125958805b824c1daf6221d632f91b966c6c7e81d,2024-11-21T09:33:01.840000 CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000 -CVE-2024-41710,0,0,b2646ae91df501710cbb001f176f9aebe73d77fcfa56108df2a061c06367e83e,2025-02-13T02:00:01.817000 +CVE-2024-41710,0,1,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000 CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000 CVE-2024-41712,0,0,2f73817818761739ebd31e3092aab4346b1ccc796b65799081ae94b063a67a15,2024-10-23T21:35:05.607000 CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000 @@ -267677,7 +267678,7 @@ CVE-2024-46737,0,0,3ee0b00f46177dd2e3466e1a5953938cc8fa9136f768d3d578bb135b417c3 CVE-2024-46738,0,0,d194bba9468d71cf8cb190e63cfdaff20aa02ce1a672ea5f9529f704abdc7079,2024-09-20T18:35:04.373000 CVE-2024-46739,0,0,d205af77e24ab1326a75221d3af9b7b3b23426f178d16d2d86739cbf44af5584,2024-09-20T18:34:29.957000 CVE-2024-4674,0,0,c78832d047e3b643eaebb0eafa9c8550e597c99fc5040f942eff298210cabe1a,2024-11-21T09:43:21.190000 -CVE-2024-46740,0,0,fb8bdbed16eb197f8cd7c7e64523a2ac5097b982e7119d6bcd3057213c03f398,2024-09-20T18:34:08.163000 +CVE-2024-46740,0,1,f3cf7a1cb956f7a2c7d7e6990fc54e0386248e09abb927170aa60b8743f7fc32,2025-02-18T16:15:17.540000 CVE-2024-46741,0,0,09ed688b4e4a53d400e039f005d8e90ff80aabd957af947df6953f4926024947,2024-09-20T18:33:27.960000 CVE-2024-46742,0,0,e4d9f0987a00835c8bd748f38250c558eb8edfed3f4f73ca7bbb79f2a8e020c8,2024-09-20T18:32:34.303000 CVE-2024-46743,0,0,b288832ee6d9c1844cb85119e621151e5809ad63298328c3c8489107631c2c24,2024-09-20T18:32:11.827000 @@ -270203,7 +270204,7 @@ CVE-2024-50087,0,0,95d447f6a3e5e9775f53a0aac1fc1d8bc3fd599edf42d3ca061af2094ebd2 CVE-2024-50088,0,0,83a7a5adff7f3483f34508e6fe25dee9016d86cd5e803da2007d8e3925e20cd7,2024-11-01T16:05:44.403000 CVE-2024-50089,0,0,5a88dd8feee0f8dc71f033c863dd49e2c59b663323260d047a7a9dacd5a71d02,2024-12-12T16:15:43.107000 CVE-2024-5009,0,0,2a7f1a61c4ffe3ca1ccb9712403aacf784aadd4f5cfd32895abd79408baca925,2024-11-21T09:46:46.377000 -CVE-2024-50090,0,0,ece231635574952850a8a7cafcbb4c2ad2a3187a224874e6aed563866f68fa20,2024-11-12T21:41:16.620000 +CVE-2024-50090,0,1,b5d118883ae2a075a773a8abb27764bfe656c1915eaf2e89a5c58d42a2a84f45,2025-02-18T16:15:17.740000 CVE-2024-50091,0,0,1cb67bb828a90348a73a47095c7317641327edd2ebb55312c01ecfbc931cad87,2024-11-12T21:44:39.210000 CVE-2024-50092,0,0,8323f00a1fe325c784efe7c468f127281c29668dbe20794e7154d6c8e52c9fc7,2024-11-13T00:40:23.183000 CVE-2024-50093,0,0,6179b05561fba7cfa8e5286e363f283cb3de5666a14724b7b49f82dfcf76c0ed,2024-11-08T16:49:33.143000 @@ -270412,7 +270413,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000 CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000 CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000 -CVE-2024-50282,0,0,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000 +CVE-2024-50282,0,1,a18aaa4d9c56a7b792aa668609a3693693842b73f1319cca3f63e3a5b5584f28,2025-02-18T16:15:17.927000 CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000 CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 @@ -272276,7 +272277,7 @@ CVE-2024-53058,0,0,a8028d3d287474ecf90a26d70790957c2683a9b9f2fe3dc113a472bf0e206 CVE-2024-53059,0,0,8de9209182f62b1c8cde1232ceb4dd684e6406c51ee4bf910cb88c16872e7f77,2024-12-03T20:57:20.747000 CVE-2024-5306,0,0,6337c3272526323f63fae57a5b84d48fae4f8a9830fd7394fefa4365a042d105,2024-11-21T09:47:23.970000 CVE-2024-53060,0,0,74149c196c1f12bc509412b9719ff439b70d14439885b53f5abe3e06b85b5596,2024-12-03T20:49:04.903000 -CVE-2024-53061,0,0,6bfb33181350cd4c9af27d4c991c8f4d2296790e1921bf746f7816f409205ec3,2024-11-22T17:51:45.817000 +CVE-2024-53061,0,1,3f3710a4f90ffd2cdcd03ef4626770b2408a5fbec497576b6679fa5d5efde367,2025-02-18T16:15:18.113000 CVE-2024-53062,0,0,e2e51fc1a396224017bf00dfccc16b8ddb176bd1ee88f9b39b170be10d48afa8,2024-11-22T17:47:43.337000 CVE-2024-53063,0,0,b251f5112338fa265fd20d9a681270ad6498dd980da29c09c9f66a7a029f3aa6,2024-11-25T21:08:23.697000 CVE-2024-53064,0,0,49b7807eb411df809f5f195d068c447b8770736f74653af5c13ce45d1d5bac54,2024-11-25T21:05:52.863000 @@ -272418,7 +272419,7 @@ CVE-2024-53188,0,0,87bab49dbc3d18e6d91d22cbed039a405ce14263e56845387115216180a2f CVE-2024-53189,0,0,7db5b520eec87b3d5cf3a4268bb96f973425e7266589752714a0bff057fca02c,2024-12-27T14:15:26.400000 CVE-2024-53190,0,0,153fa3f9259ec5968429531d7a41d372c24290865137d294e4746b162c77afe4,2024-12-27T14:15:26.530000 CVE-2024-53191,0,0,ab633ea293d90a9c139efda5afaef33c6071f53aa9f4d2b47925752d6bb90931,2025-01-31T16:00:01.843000 -CVE-2024-53192,0,0,e8827c0a12c1ed7067fbeef26e856b81373011b74742175a86819343dd916ee6,2024-12-27T14:15:26.780000 +CVE-2024-53192,0,1,7f07a134a8b5b31f722552e3f9310d84dc06bc43a45fe02a415c4b339ce4b412,2025-02-18T16:15:18.313000 CVE-2024-53193,0,0,b333bf0a1ebcc5426b07d57cfd07b6541896ac5e32b864e7f63c26ca6841dd6d,2024-12-27T14:15:26.897000 CVE-2024-53194,0,0,9b3c6499c47db7a3faff7ac9925971ccc55eb1886170e79f1466f6516399f844,2025-02-11T16:15:41.640000 CVE-2024-53195,0,0,40822fada027fbaf05987cc9ce8f2e124b2f2431fd5b4c0d0b70ffbb4d2daafa,2024-12-27T14:15:27.137000 @@ -272660,7 +272661,7 @@ CVE-2024-5370,0,0,48c7315107625a479797e074526b223c8b52af346ac3d015ac5eeb0155616f CVE-2024-53701,0,0,1a2bc4566eec18c70c1090c86f62c17b18dd370d9f36bbeea87f735f0b867519,2024-11-29T06:15:07.327000 CVE-2024-53702,0,0,df4acdecd1eceade8b04c1e8f2d0208a2fb87f2140d6e9f86d0b91986c09f3f5,2024-12-05T16:15:26.077000 CVE-2024-53703,0,0,fb9cc5fb637d3f614eb88b1748740fd2dceb8edefd36486bf6555b6ace1738fb,2024-12-05T15:15:11.270000 -CVE-2024-53704,0,0,646c05bf19a8b546c4b27150a74eade3fe883efa2fa4dd38843e1e36cfbef051,2025-01-09T15:15:18.640000 +CVE-2024-53704,0,1,ea9d5a987657b3006054c783a63425772026bf58d4e6daa2a4625dbb969a9b56,2025-02-18T15:15:16.290000 CVE-2024-53705,0,0,cb2aece8a5d68261ccbbe06bdcbef5f15dc8b4b71fbf212b281c5c2102470ea9,2025-01-09T15:15:18.800000 CVE-2024-53706,0,0,df37bc87068a5b2ce03429b7e89276c6f6c8ca589f496366856bc396d49be328,2025-01-09T16:16:21.743000 CVE-2024-53707,0,0,4163d5321b4bf42492ee17d3e3420b9e06f0f632230aa0e5ae79c446b00e1993,2024-12-02T14:15:13.323000 @@ -273965,7 +273966,7 @@ CVE-2024-56174,0,0,3281f470ed49ef5807bf603f02908731fff1047853105938ff5649e5ffd7e CVE-2024-56175,0,0,22a48fcf93fd39d784b2031be3d0660428d6c59d54d025f00f9098a9f5f6144b,2024-12-18T15:15:13.723000 CVE-2024-56178,0,0,9564968521bb8f5c11b766d9cc78936576e1fac39bcc14d058711ca02bbf4325,2025-01-28T20:15:51.173000 CVE-2024-5618,0,0,d2d97c727c060ec84f3174901af9ab7b075641151198c4f29457077453fd0cc0,2024-11-21T09:48:01.670000 -CVE-2024-56180,0,0,859a0a214e880c431d953ea42b93fc75dbc38729b9f116959536aa113f3fa28e,2025-02-14T17:15:16.317000 +CVE-2024-56180,0,1,3a1561e3486ac1bb040fb6a34e878854d4f9896bca194a84398b4784453d60f5,2025-02-18T15:15:16.500000 CVE-2024-5619,0,0,847b29035ced8b12638c0c9edc7633e1fcbe758edecd5717d697d3abb49553ce,2024-11-21T09:48:01.807000 CVE-2024-56197,0,0,e9afd498035eec9eafab8200bca26d2809dec4007383a3f79e63ae62a3cb2cb9,2025-02-04T21:15:27.260000 CVE-2024-56198,0,0,d9de207e762af79ae5486154cdbb63e6556ac0599a95c1cf37d7f9e9fe1adfd1,2024-12-31T16:15:27.247000 @@ -274239,7 +274240,7 @@ CVE-2024-56553,0,0,d73f092fa407a2c4632c4de0d4d2babdb741c99293b819a91977b3209c030 CVE-2024-56554,0,0,4950d099528e83b14a4e664e675a49b2cb0f0bca70f7a35876c65aeedeef4938,2025-02-10T18:15:30.680000 CVE-2024-56555,0,0,27d859f187620a0e53806d8ddb970b864190f9d6d5d8bd618c07bfbaa01a7d68,2024-12-27T15:15:14.297000 CVE-2024-56556,0,0,62adf1a099eefec4d0fa5a439487b9bcfa2c7b9741ffaabb648fd7f8b0ed7670,2025-02-10T18:15:30.940000 -CVE-2024-56557,0,0,b094055cd23182d8b8134730a2178a00894d62ddcf24adba7c906422ed13179a,2024-12-27T15:15:14.520000 +CVE-2024-56557,0,1,f222bea6eebf5ee087c56d4680fd17e1ef91317d2973edefb93be336214804d0,2025-02-18T16:15:18.597000 CVE-2024-56558,0,0,dae4ef50d75c61c1b5a5060f05a03785acd6b71bd1850448ee41b577d959c9ce,2025-02-11T16:15:43.450000 CVE-2024-56559,0,0,353853da3e898d4bba88a08653e9a07b493a01962873d91259b7435d27f07afe,2024-12-27T15:15:14.760000 CVE-2024-5656,0,0,ba99339cfecc1c5fdb0f6d1bb26f06bfe70b58ff628ceb5bd66c459a2628a6f1,2024-06-13T14:15:13.397000 @@ -274333,7 +274334,7 @@ CVE-2024-56639,0,0,4e03b9a4b0fe8d6bd8f9fd82003b020dc8d8aef46c04d71ba745b13665fcf CVE-2024-5664,0,0,b6962e20742af8ea90e612bbc7ac8c73d6aa535f0e49e5cabd0c7dd59647632b,2024-11-21T09:48:07.107000 CVE-2024-56640,0,0,10f0b2a3aaf12df52ffd0999892bf36d19f534ecac7e8924491df7836872b181,2025-02-11T16:15:46.470000 CVE-2024-56641,0,0,7bd87e333960b236379a7ab6f66f186a39f9577a76aff23809b25204a27a92db,2024-12-27T15:15:23.830000 -CVE-2024-56642,0,0,0dca8c301b88ee62830f0130813b46b2f13788c16ba6198c40b80f2a4204fe28,2025-02-11T16:15:46.650000 +CVE-2024-56642,0,1,8abe8530351fb237277e113d6f46693243b7bf833dd01f5d3daea39a3120bb14,2025-02-18T16:15:18.770000 CVE-2024-56643,0,0,7b5f1a4805f035363d7a8272badd51b331d739badf6cbf1475c665112dd3ac85,2025-01-06T17:14:41.813000 CVE-2024-56644,0,0,8a46d5b530bbcb9e52d9ab6abd7dba97d34ca0f87bf22a510768ea3f07eda72d,2024-12-27T15:15:24.163000 CVE-2024-56645,0,0,216619e3bf854381932f49b2368332f2fb98fc73e7d8eac5a9707768667df0ab,2024-12-27T15:15:24.260000 @@ -274592,6 +274593,10 @@ CVE-2024-57035,0,0,5b4d21f0e6f76521453f47b20f8d7e46bcfa11378320e2eaefaad51e3d6de CVE-2024-57036,0,0,55b7f3d5f4d5a99be083f64a92e65d0a6b625216d85565aff3a03ccb780b5c92,2025-02-04T16:15:39.170000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-57041,0,0,0979fe76d9e8316158a2a941acc94a8ef64339b0f6c4a4654fbbd04ce63283cd,2025-02-06T22:15:39 +CVE-2024-57045,1,1,846b1fa7f8b8766e95bf5fac895d98e9b6946a3056e75f3bc1fe3464ab0d52a5,2025-02-18T15:15:16.677000 +CVE-2024-57046,1,1,89a77d18aa4e499cb06782e6acc2e33281da81ab9c788a1ccfbd9da29edf6421,2025-02-18T15:15:16.783000 +CVE-2024-57049,1,1,bb09532b2133516270627f68d6575e9d0d1de367e97562db8d50b8e01add90bd,2025-02-18T15:15:16.890000 +CVE-2024-57050,1,1,e79e6558e5a68210197bce499f04e8a93bca456c6a6510e86e8df65cbfdeac18,2025-02-18T15:15:16.977000 CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000 CVE-2024-57063,0,0,fa7a06800dd5ee4856efd324c0da0c074e3f1d402ee027ea56f36ed882b9a139,2025-02-06T16:15:39.023000 CVE-2024-57064,0,0,d535f1189c2fd178785b9587824905a95a99a3e73d0701453c0d1b761967f131,2025-02-06T16:15:39.347000 @@ -274656,7 +274661,7 @@ CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b CVE-2024-57237,0,0,10a0a055ff6114ab5c31b296696f6a71ea30e20eb63b78fcf8047450271df36f,2025-02-12T20:15:35.483000 CVE-2024-57238,0,0,a6b3be788c3bc4fc051e3d4d8b4703fb53567dec95099f9b84b95f6aa023a077,2025-02-12T20:15:35.620000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 -CVE-2024-57241,0,1,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000 +CVE-2024-57241,0,0,8994dec25d800da5e0c31df7a39443f7369494e97fd5d505a6f1c683c830876d,2025-02-18T14:15:28.237000 CVE-2024-57248,0,0,fb61bd5f2cf829e3e9949d68a4efd231804cc252fcca96074ac9da52c6e827ed,2025-02-10T18:15:32.563000 CVE-2024-57249,0,0,8fcbb1cd0dac9099c77da0f7019c7d58aadbbe52552dc9898297ef492ac8f84f,2025-02-11T16:15:48.463000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 @@ -274874,7 +274879,7 @@ CVE-2024-57721,0,0,2848dad2c2b609041733157af3749bc2705ed04a630325793e55f87a8c15a CVE-2024-57722,0,0,cc12b04f9055359b9f59d1fb9351a1dc5f896d626ba1ab2353434d622e66c018,2025-01-23T15:15:12.610000 CVE-2024-57723,0,0,8dfe124ae30760a599d5a92653aea7bf25ab7fabdd29029a0d6962e3146e832c,2025-01-23T15:15:12.820000 CVE-2024-57724,0,0,80b6486449089b1abee894f99cbdee8ef8e8a7c83dc4631c3181139e769eeda6,2025-01-23T15:15:13.020000 -CVE-2024-57725,0,0,c498f9bcfb13503eba996e676be1e0c89d527282fd27cfff492633db6d1d9137,2025-02-14T21:15:16.033000 +CVE-2024-57725,0,1,27c6ae24c439cdb14d5e3d88f037e70f1d1e4712d4ba24364db40248ce2a4e12,2025-02-18T15:15:17.067000 CVE-2024-57726,0,0,b06228a1f549336c575c9af51a5eec97f13915f9b87b92d879c22e35b9610a8c,2025-01-31T21:15:11.857000 CVE-2024-57727,0,0,e4677a15ae16ec0ebae3eb2021b05fa3f0029b408f389dd592fbd8ecc2109cf2,2025-02-14T02:00:02.377000 CVE-2024-57728,0,0,300d732277cb2b6af20193b0ebd36f609253f83cb041dd620ac6c99126042718,2025-01-31T21:15:12.330000 @@ -274902,7 +274907,7 @@ CVE-2024-57774,0,0,2551abca035214b076f4360f33057fe8d04ee4b5e8e086ec9ba87a0de1485 CVE-2024-57775,0,0,d443a466195113d1df55f765112263e4c5993950dd535868322856b10159040e,2025-01-31T21:15:12.570000 CVE-2024-57776,0,0,3f1d44a7df34cf026fef540e7df11379f7f5ec930fc80f9b9e89c0c1941674ac,2025-02-03T20:15:36.390000 CVE-2024-57777,0,0,0a0491ad5da31bf74445425855f0e8fab666a442d1eaff789c85a35d3cece260,2025-02-14T21:15:16.197000 -CVE-2024-57778,0,0,2b62091443e50e0aa11cddaf50af38cf82a924e836011a0f4c93d74197ed8f0c,2025-02-14T21:15:16.373000 +CVE-2024-57778,0,1,1a22178fc29abe6dc59d7566fc4abe03a351aa30931d5173f5e6ba8cd7ab0933,2025-02-18T15:15:17.207000 CVE-2024-5778,0,0,44ca5dca3141a6d37f6826ebacfa9246d365e941b7c28662690166013bb5bd71,2024-06-12T08:15:51.173000 CVE-2024-57782,0,0,f31398c7dbcd08990fe3a679c70778cb11745fc0c1d7fcafad9b4fe318340130,2025-02-13T23:15:10.863000 CVE-2024-57784,0,0,a0ffa91a6d1336afb59f42e28acde5cce54240c902b605d9b18af65e76eeccc4,2025-02-03T21:15:15.133000 @@ -274977,22 +274982,22 @@ CVE-2024-57901,0,0,012acb0ab56cc61cb0a7817e0eee65ff7532b8e18ae1a7773ea269400d685 CVE-2024-57902,0,0,746e8d9a9ea49c354baeba85ccf563446e433549d54a4b087d31671d2185f287,2025-01-15T13:15:14.867000 CVE-2024-57903,0,0,50052b64b55d2c4762de701d92d82de00114bebd2de7c535247b43c4bcdb95f1,2025-01-15T13:15:14.973000 CVE-2024-57904,0,0,3262ecb3c3c103f98db3569e7c85310fc4e16d9aea58056b578ccd75d9f62d99,2025-02-02T11:15:12.590000 -CVE-2024-57905,0,1,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000 -CVE-2024-57906,0,1,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000 -CVE-2024-57907,0,1,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000 -CVE-2024-57908,0,1,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000 -CVE-2024-57909,0,1,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000 +CVE-2024-57905,0,0,f2afd28499ba77d78d6161b9dc86205d9b013f5c063eb3a0fb31b7b050ac1772,2025-02-18T13:40:32.897000 +CVE-2024-57906,0,0,1c82c39362aa54ac7ded96d3affeb3f600b57be3199ebe50578c90e46414f30b,2025-02-18T13:40:18.470000 +CVE-2024-57907,0,0,14fc15d2d8a4886ac02d6a926289ee27d35ba482e0b2a7ef1a4ad5e89411d941,2025-02-18T13:40:05.290000 +CVE-2024-57908,0,0,f5a6cf31cde370a07311bca688e839555e8a2f6a361c59c9fbf062fe0a19faf6,2025-02-18T13:39:42.783000 +CVE-2024-57909,0,0,12e8190174f6a0552d498937d8f65055272a396a0ee2cbc25a50408a9d03019f,2025-02-18T13:39:06.190000 CVE-2024-5791,0,0,c186795f1b9cb5c37849e995a8b3a0b74da1832637d3182b3a656dc9e7491fd6,2024-11-21T09:48:20.453000 CVE-2024-57910,0,0,8608ac6abfac8f417ccdafd980c9b6946bd5a88dadccafd52a7ad793d4fd3d91,2025-02-03T14:48:35.543000 CVE-2024-57911,0,0,1bd58cba4dcc3e15e3e807eeffd494022f72a8e294782de7f37752bb8026d96a,2025-02-03T14:51:30.527000 -CVE-2024-57912,0,1,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000 +CVE-2024-57912,0,0,ff54a5a6a7eb1c97fe4ff28d89ed5aa0d755e3ea6a30f1a7403fc0c4ef28f573,2025-02-18T13:38:39.953000 CVE-2024-57913,0,0,f4c7a2492e587f9186e7f660b6755e3565a9bbd1bab88284bedc36464601cafd,2025-02-02T11:15:13.780000 CVE-2024-57914,0,0,47047672b97dc7073c40b4f814317b314574d03739889bb553935924c13faf35,2025-01-31T15:19:21.703000 CVE-2024-57915,0,0,d04e2c0336358ae9a308504943da8fc42f1e8c30d5d5a9b94f788387892b4897,2025-02-13T16:16:43.287000 -CVE-2024-57916,0,1,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000 +CVE-2024-57916,0,0,c0b98cbfe9c39628ac30d26773ea7fd535890238bcb57e5b434e164f632debe0,2025-02-18T13:38:31.347000 CVE-2024-57917,0,0,b1167e5c425222d1e86557f7fbfade37e2c05b542cac17d0614dacc0faf5facb,2025-01-23T17:15:20.330000 CVE-2024-57918,0,0,51a0ae7790d69294b939f21a09ba710f5e4fba529bc7fb169229a8b80c38f093,2025-01-19T12:15:25.960000 -CVE-2024-57919,0,1,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000 +CVE-2024-57919,0,0,e1738bf3dfca2fdef7365aa48f1ce4c0aa5de667cd9d2a7db2f45a4ee2b8b3c7,2025-02-18T13:38:22.377000 CVE-2024-5792,0,0,50e11f463088247110774be144fbfaca02cb5ac823192aaf13a748fe05bdb47b,2024-11-21T09:48:20.570000 CVE-2024-57920,0,0,05c144fc213deb035ca56e5f20c83d1cd18bb751206c0c2a6034a93879334dc6,2025-01-19T12:15:26.150000 CVE-2024-57921,0,0,c7302d486dbfb4c3bec63ccb147bf84370f9dbf24a7b88cf2b3ffd88950eddd1,2025-01-19T12:15:26.247000 @@ -275046,7 +275051,7 @@ CVE-2024-57966,0,0,61d2b5fd5d958d136f7dd40b4676334560812ee79ee948ded13f78b89db9e CVE-2024-57967,0,0,8fee44e6eb84e9ffdf47037f396d369451745de427e458c886fbbf4f38d70d65,2025-02-03T18:15:37.853000 CVE-2024-57968,0,0,df2d26687f6eb03cc4ebdae430a2d63e09872c2f76ae608d0c55e2648f4f6e40,2025-02-06T18:15:32.287000 CVE-2024-57969,0,0,b371badd84f84271fd7c4769fff6f836cd92998659f71f251308fa31806e425a,2025-02-14T07:15:32.340000 -CVE-2024-57970,0,0,fc94e473eab89136d60efd4d226219db9cbde959702cd7788c370f74c3d3ceb3,2025-02-16T04:15:21.843000 +CVE-2024-57970,0,1,7c0875f2d20f0c5e1f382717358d28b61ebe8a0a2bfb0f2c818ee7d95f28a926,2025-02-18T15:15:17.343000 CVE-2024-57971,0,0,c3ebbc678e2e75513f00418181cbcb1e653e71fdcb237d937003b8561a873e70,2025-02-16T04:15:23.077000 CVE-2024-5798,0,0,1cf6b5fddcb53bc6e432a6a3428f56651407d96c3d029c184944ae69fb8dd23b,2024-11-21T09:48:21.013000 CVE-2024-5799,0,0,23def4a6c23961b05e747f80024dd1bb17c6a1bb6930d36587790a1981c0653f,2024-09-26T20:39:09.127000 @@ -276670,7 +276675,7 @@ CVE-2024-7587,0,0,905f1e2769f930482ddb7f6e8ea78290401663df4ac22d8bf86420647d5839 CVE-2024-7588,0,0,1358b20a23caea616b44e7d1fe9b2d36965a9414c7baff3fbe2639297f0ac95b,2024-08-14T13:00:37.107000 CVE-2024-7589,0,0,4a4abde1139ff2d724dfc63d85f01201c50a76c0c99327051fb78ce9046dd2da,2024-11-21T09:51:46.310000 CVE-2024-7590,0,0,1533bedd8671f69add27338b97b679c389b63d7adf3d74a6b1d24d9f2d72c2c0,2024-08-13T12:58:25.437000 -CVE-2024-7591,0,0,3981556d61b5d492202f1f69870bd6896666aa7faf47c350af2b715310e14220,2025-02-17T17:15:09.300000 +CVE-2024-7591,0,1,041f4eda84f2c8a6fc5bb4d14a322e4df44b8c9f4b7f6dff3915a52ba4bbd6ad,2025-02-18T16:15:19.110000 CVE-2024-7592,0,0,f506a3341b4fbba83ac6e211c07afc6e4724cb2928db9d2406bc99c446bd1c95,2025-02-05T21:13:47.837000 CVE-2024-7593,0,0,f2d05ff860ab3aa3b763311f1f5d13b00758cca4a3232cf35d1c0d7a53d425d8,2024-09-25T01:00:03.110000 CVE-2024-7594,0,0,995a792dc1a727d1e80b76bbb236d5f218a77e1a6b8b9724198f4319ca380735,2025-01-10T13:15:10.303000 @@ -279352,11 +279357,11 @@ CVE-2025-1240,0,0,363ac0ec488e57d295d78c481b595c1c1507ba076f5813d8f4f20530988afa CVE-2025-1243,0,0,cc81de32b5d05e39147da539415b77f22c0d2f7ae5860780f62e8e275e3c2c4c,2025-02-12T01:15:09.073000 CVE-2025-1244,0,0,8584cc98578bbf80aa01c78299adca4034b401510d32b47a83477d34cdce15e7,2025-02-12T15:15:18.430000 CVE-2025-1247,0,0,e0153bae3362c83882a00e373f05f61681964ee52d16af66c9ce73b6be435d9c,2025-02-13T14:16:18.400000 -CVE-2025-1269,1,1,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000 +CVE-2025-1269,0,0,55228bfdc527f8c0442ccb88e2c1b27ad63ccf245d0eb3acb1b2a3cadaa49d85,2025-02-18T14:15:28.513000 CVE-2025-1270,0,0,a0fba4bca59afda304bf8335640266a3acf6a1624640bee675db51d94e9fc436,2025-02-13T13:15:09.273000 CVE-2025-1271,0,0,0359319eae8a142a0720b34e58c3d3808902c47ddd06a524c0e8a18f2f2f366a,2025-02-13T13:15:09.433000 CVE-2025-1283,0,0,afbf73056779c2284deff120b8f7806be9c37e816574c79d2148aa8a36b813a0,2025-02-13T22:15:11.413000 -CVE-2025-1298,0,0,c241b07b63fa1a12db4bf2cbddc777a3c460534a51a196b1be44ba87a34980ab,2025-02-14T08:15:30.877000 +CVE-2025-1298,0,1,3dd2689cd87b723cb3286c5171c05d1ec556a4e424788772bb6ebd63733b94f4,2025-02-18T15:15:18.007000 CVE-2025-1302,0,0,80ab185ad47640442cc52c9cc763e0a51ea23219a81264b6e3df3c8afc9e7cea,2025-02-15T05:15:11.683000 CVE-2025-1332,0,0,b482e2f3c2fe31a7c23343f351379d12ec2298734a614d40739ee811eedd1bd1,2025-02-16T01:15:20.440000 CVE-2025-1335,0,0,cca5a5aeab602daf60e1966b659a6706e108a1c270c3d12ddcea19b2340f545f,2025-02-16T04:15:23.230000 @@ -279372,7 +279377,7 @@ CVE-2025-1354,0,0,3d7667bfcb2c0b251ddb0a6e2cd2d09c76acedbca3edf8c1b754b383822407 CVE-2025-1355,0,0,2b32faeae86cf10a841d554d3f1028e038f2f84a86d16604e50e5f2d459277b4,2025-02-16T17:15:07.973000 CVE-2025-1356,0,0,ad47206c360f81c88d742a140cb46365165054af6533ecf378500f5e98562fa1,2025-02-16T18:15:07.383000 CVE-2025-1357,0,0,4433e1005a5e4201fdc796c40c8e7b39186d5a371766813fcd3008d782d857bd,2025-02-16T19:15:09.500000 -CVE-2025-1358,0,0,9ec04afb65270064953f92f1f98c94b6c7f923699eb2bc5c685de93fafaa422a,2025-02-16T20:15:07.990000 +CVE-2025-1358,0,1,9cc206366a5cf3c6fd36dca7ea305ebd259d86e92a5cfd3942bb4b274e8c43ad,2025-02-18T15:15:18.157000 CVE-2025-1359,0,0,a74490df0bf9cd453b684197a6da2b817f973233464d2e18244cbcb76e58d0cd,2025-02-16T20:15:08.817000 CVE-2025-1360,0,0,fb0d3aa81a9aae261cf8bbfc32f9a1a37cc5f63f6b37722c4b26a02ea0975887,2025-02-16T21:15:09.970000 CVE-2025-1364,0,0,6c9a498ed4da91fc543c9e0d0bc6b549f91692b353d2222b29ef08d5dcc47090,2025-02-16T23:15:09.087000 @@ -279398,7 +279403,7 @@ CVE-2025-1389,0,0,b6f1b0c672dbbad3874206b7be5adc417f88010255a18af2ae0024e0bb3a7b CVE-2025-1390,0,0,02ff75a3058ee51af8713fa469c7bed94932b28a55e59655029e36f100f66a9a,2025-02-18T03:15:10.447000 CVE-2025-1391,0,0,a1f2e3a8ca093b8de620c0e72b50119acca7a6fd87679168958e3acea938ff79,2025-02-17T14:15:08.413000 CVE-2025-1392,0,0,381fc64763a47738c9a933c7e4bcfcc84ef66c73e4a81eacddf01751da768947,2025-02-17T16:15:16.120000 -CVE-2025-1414,1,1,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000 +CVE-2025-1414,0,0,2f5bab9c20787a8cfb85d96fac71605946ccbe482a1c195e142f5a36ac57ff3b,2025-02-18T14:15:28.670000 CVE-2025-20014,0,0,9692e5cd581a413def58e50a6734c5a89401a76673de37fc6a41ad824a4429cc,2025-01-29T20:15:35.207000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20029,0,0,9b8781ac9a16d1f4940e1c86f8d87c8f1f8e66cb5b362950b6fdcd60c25126c4,2025-02-05T18:15:29.573000 @@ -279730,7 +279735,7 @@ CVE-2025-21396,0,0,02c0d56bd41ecdabdfe6ce22c5c5e978e70b99d6624ab2be1d0aabfacb417 CVE-2025-21397,0,0,a7500ab2a246bb24c7f6147467f14845cb499ff96d8de9eb946a15acf67323e8,2025-02-14T17:38:29.007000 CVE-2025-21399,0,0,f94f6647dfbca1fa188350cabbc49dc6fa4498708cee05fd2499c6da322431d0,2025-01-31T02:15:37.700000 CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000 -CVE-2025-21401,0,0,2e24ce0f54684c9309cfe6f1adac5a5a8a1682c152140c2d76a9e52198e7f90f,2025-02-15T00:15:27.163000 +CVE-2025-21401,0,1,df0f74dcda8fafe80cdce4c22148075892d97eed204201d20b25f487dd51c8fe,2025-02-18T15:15:18.357000 CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 CVE-2025-21403,0,0,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21404,0,0,52911fbd9555282a607ac90a4775c4fcf93efe57be2e8be255b794e015e5a513,2025-02-11T22:00:00.150000 @@ -279929,6 +279934,8 @@ CVE-2025-21698,0,0,4561b308f50d7938aedbb56320a438b4d9b59e891167d36ae946f3978aca1 CVE-2025-21699,0,0,9479a2957d4567a88f2a0130934ef0c635f4b0b9356198064e7f88281fd52030,2025-02-14T14:06:47.237000 CVE-2025-21700,0,0,1988e353bf970928db094f4eb8b02a104971f35d83e20789d12d6036e63fda23,2025-02-13T14:16:18.803000 CVE-2025-21701,0,0,0d5db2c9937957c1e18c4f0255b6e33827b9d7a4319fd313888b10a928dcd781,2025-02-13T15:15:20.867000 +CVE-2025-21702,1,1,c64429a1c383d07aab5bc015806eb0d3b2a9a1b23a87fda2173c17df4896f90d,2025-02-18T15:15:18.530000 +CVE-2025-21703,1,1,50ca96765329a32311c86e462da796359e5192ba961e83c86eb5e2a5200841a8,2025-02-18T16:15:20.310000 CVE-2025-22129,0,0,d84466451eb5813ecdb45d579943a91ad86a0d891b836c8fd8053b0ece067119,2025-02-04T19:15:33.360000 CVE-2025-22130,0,0,a71c51c8237898c4394724aa5ef423b90094196082b564075e1f1cf6c2992343,2025-01-08T16:15:38.543000 CVE-2025-22131,0,0,69440877e24142b0c883a083dd220512bc0b0c9b1551c23031d4be6598836d66,2025-01-20T16:15:27.880000 @@ -279954,6 +279961,7 @@ CVE-2025-22153,0,0,25942cbccd29909e1ea0be6d083f0e8cabc6b2b46ac2d218bce2acfdeffc8 CVE-2025-22204,0,0,15823536a3679737b5ef36e2f772e366706e0f48ba530e66ed64a7380917346d,2025-02-04T18:15:35.247000 CVE-2025-22205,0,0,4a7393a73c090000f7e7459f6326bb2956f3bef3fff211860e4b811cae26357d,2025-02-05T18:15:30.803000 CVE-2025-22206,0,0,094330103ef881a5c8f14e940f719b75f142ae139c1345e47cbc22b02438b266,2025-02-06T11:15:10.797000 +CVE-2025-22207,1,1,36bd2a01b3734e7d30a82c8bd8af60469c82bc176babbcec3b528cbb977e5f15,2025-02-18T16:15:20.467000 CVE-2025-22208,0,0,55682c702be57115138b9836a7ae27c0c6ea10f7b8b4845e2269e3fb48a78e9f,2025-02-15T09:15:11.043000 CVE-2025-22209,0,0,f0ef35082d3ac11b8f37aa95511370b4c1ef70485b50313f4e611683562ad393,2025-02-15T09:15:11.237000 CVE-2025-22214,0,0,9f9cbba758088c6fe54f3b7aba457fa8b68f7e0bf397744585451dc526c7cea3,2025-01-02T04:15:06.277000 @@ -280927,7 +280935,7 @@ CVE-2025-24028,0,0,f1373528095a8b61c5fbceda214a71e8eed17ec39e3b1a5d2d9d5b3514d22 CVE-2025-24029,0,0,78ccc702bd5d12fe713f342eb01497f1004c6f35d754359834f77e673529d847,2025-02-03T22:15:28.320000 CVE-2025-24030,0,0,53ed9f8c2f1606c3ac2d0893d8b45d45add03d54f0c0cb325356c13a37ba8b27,2025-01-23T04:15:07.100000 CVE-2025-24031,0,0,ac426670a7f454f9f80ca805af4f67a5b59a95fceeff862c47fc81fa9e528f0c,2025-02-10T16:15:38.990000 -CVE-2025-24032,0,1,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000 +CVE-2025-24032,0,0,72aa612ba55cd72261ee2e284e9cc841f431fd35eea91269dd2777977c0b2a63,2025-02-18T14:15:28.770000 CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000 @@ -281506,7 +281514,7 @@ CVE-2025-25526,0,0,ea54d5d1ec1ba48465999b613bd81e7df7fbbb988e6de51b2728e9a8f0673 CVE-2025-25527,0,0,c68bc1052cef66b41ddea961ada3d6ffad1b7182b1c7b5d98c868e3b22f09402,2025-02-13T18:18:24.080000 CVE-2025-25528,0,0,c3db55de0c707ae91006dfba4ea9fb94cdd9be16ea897ee1463626bcb8f0054a,2025-02-13T18:18:24.237000 CVE-2025-25529,0,0,6124e8b4719cb216d9ad570cfdb00458b6cbfc89cc7816e874f9cf6eec43135a,2025-02-13T18:18:24.400000 -CVE-2025-25530,0,0,80f36605b63569036b66acb5263c199af5b962300f8a88d6532226521bf2cf87,2025-02-11T20:15:39.327000 +CVE-2025-25530,0,1,b0841c72c111eba76befc9a6815265a0e35641a6c941e6566d713f948cd659f3,2025-02-18T16:15:20.723000 CVE-2025-25740,0,0,e293852be5217bbbef8df2d3ca6ee22f2f657a54490e20535567ff73eeb99c95,2025-02-14T15:15:13.190000 CVE-2025-25741,0,0,bd9cb96b0f827c65aa97d3cf4c8992f0fabd3fe1e6bdadae7cd80546fd1e08cc,2025-02-12T18:15:28.293000 CVE-2025-25742,0,0,44a73b49255ee9adcf82a52f384eb5c222198ebf34b2a31793c5bb7b83755521,2025-02-12T17:15:24.150000 @@ -281514,18 +281522,18 @@ CVE-2025-25743,0,0,3e0a389ecb2db0e0095f9b6886be8088e6f27e2c991a4672bb35c92ce419a CVE-2025-25744,0,0,9d528b6c8981e3c3b88d0f5ae19eaefffd1ccd1634a805d0e82416c7735270a6,2025-02-12T17:15:24.390000 CVE-2025-25745,0,0,264990220c6b904fe4d42f36b2ec67929db475383a425f47e66656ac1635944b,2025-02-14T16:15:37.010000 CVE-2025-25746,0,0,97cc4fafec6afdf30f54321fd0abbf6c4170d075b88c0daed02fb3f015fe5fe8,2025-02-12T17:15:24.500000 -CVE-2025-25897,0,0,4c9ed8ee3da92100f9730c8381968442218abe4f4ba02bddc4f9615a38a665b8,2025-02-13T16:16:49.790000 -CVE-2025-25898,0,1,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000 +CVE-2025-25897,0,1,011a13475d5d2314ce8d3e20e2eaba51128ca214c7db076f61e733e1a30cacf0,2025-02-18T15:00:36.487000 +CVE-2025-25898,0,0,fc74d55de52024bc41ff8bda523e9e77a6f3aa249f295c0b9a1f80a670c8abea,2025-02-18T14:59:38.510000 CVE-2025-25899,0,0,98096043478a3b9132f54ded5050225abd5f7dd69864cd5bcfb5e9d82d93f188,2025-02-13T20:15:49.913000 CVE-2025-25900,0,0,0a49592be1d696f5f901fb9602bc587e2d7d2fe0e68d036d6f9f545c33b03dec,2025-02-13T16:16:50.037000 -CVE-2025-25901,0,1,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000 +CVE-2025-25901,0,0,3d0f8edd50682ae64d3cb2fe331b3f075e5218ba4cab3ff5c4ac461a68bbd907,2025-02-18T14:57:24.510000 CVE-2025-25988,0,0,19dea6ab3561d4393aca964f7f08baf91ad8e25d3c5d8889e52ba302a8a3eb4a,2025-02-14T19:15:14.497000 -CVE-2025-25990,0,0,6abcae9f945cc88810c38e3600b21685803f14ddc79a81671983226999ae8055,2025-02-14T21:15:16.913000 +CVE-2025-25990,0,1,3799d4ee2eafd94f9f260dbe11fd1f5d7b5884f5756bc3f8070105dd11697e10,2025-02-18T15:15:18.790000 CVE-2025-25991,0,0,690955a0e4187b4bcaa0c4890a2801dcd88d67bbfdde2361a09f0f8cf1615e5c,2025-02-14T20:15:37.210000 CVE-2025-25992,0,0,3d1e4e5fceffc298e311378ec712b3436e60db9d6c9a25f2ff71f3ddce497276,2025-02-14T19:15:14.633000 CVE-2025-25993,0,0,b265230a291556165ba6f150cab5c736bd9594a64a150461cb0009dc8129dba1,2025-02-14T19:15:14.763000 -CVE-2025-25994,0,0,6bec65e408b077c95d438b99a20cddf302d68b2ed2a6a207d98d1bd92f9a888b,2025-02-14T20:15:37.390000 -CVE-2025-25997,0,0,76f87d459e5781a855c01da7ce8c838760a817361c8faf2da21d279ede1a1fd5,2025-02-14T19:15:14.903000 +CVE-2025-25994,0,1,aada5f394d667f977ebabeb966b8805ece67cc43768150de72852a4683195b84,2025-02-18T15:15:18.923000 +CVE-2025-25997,0,1,8311ed2a6df06b368ecafa86d7532bb151f440bce533690a11763d40390899ab,2025-02-18T15:15:19.063000 CVE-2025-26156,0,0,ed50a78dc07d84b8a6cd1651b254bd95afaa0a14b0b845be84f546d924c3a171,2025-02-14T19:15:15.033000 CVE-2025-26157,0,0,d004ab43d8fe8ea78bd140330b58a555de4fee9e9368d957f123229a36026b7e,2025-02-14T20:15:37.543000 CVE-2025-26158,0,0,a0e00f753c83eabc9278c9305568ba6da08dc96a9ef521b68e39e9b3fd8a79c9,2025-02-14T20:15:37.677000