From 4bbf161fefe51c583f95afe2ef63ac79392ab0bd Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 17 Jan 2025 23:03:48 +0000 Subject: [PATCH] Auto-Update: 2025-01-17T23:00:22.094238+00:00 --- CVE-2015/CVE-2015-16xx/CVE-2015-1642.json | 4 +- CVE-2015/CVE-2015-17xx/CVE-2015-1769.json | 4 +- CVE-2015/CVE-2015-23xx/CVE-2015-2387.json | 4 +- CVE-2015/CVE-2015-24xx/CVE-2015-2419.json | 4 +- CVE-2015/CVE-2015-24xx/CVE-2015-2424.json | 4 +- CVE-2015/CVE-2015-24xx/CVE-2015-2425.json | 4 +- CVE-2015/CVE-2015-25xx/CVE-2015-2502.json | 4 +- CVE-2015/CVE-2015-25xx/CVE-2015-2545.json | 4 +- CVE-2015/CVE-2015-25xx/CVE-2015-2546.json | 4 +- CVE-2022/CVE-2022-406xx/CVE-2022-40633.json | 22 +- CVE-2022/CVE-2022-416xx/CVE-2022-41696.json | 34 ++- CVE-2022/CVE-2022-435xx/CVE-2022-43512.json | 32 ++- CVE-2022/CVE-2022-451xx/CVE-2022-45121.json | 34 ++- CVE-2022/CVE-2022-454xx/CVE-2022-45468.json | 34 ++- CVE-2022/CVE-2022-463xx/CVE-2022-46300.json | 32 ++- CVE-2022/CVE-2022-467xx/CVE-2022-46732.json | 34 ++- CVE-2023/CVE-2023-06xx/CVE-2023-0621.json | 34 ++- CVE-2023/CVE-2023-06xx/CVE-2023-0622.json | 34 ++- CVE-2023/CVE-2023-06xx/CVE-2023-0623.json | 34 ++- CVE-2023/CVE-2023-259xx/CVE-2023-25953.json | 32 ++- CVE-2023/CVE-2023-317xx/CVE-2023-31752.json | 32 ++- CVE-2023/CVE-2023-507xx/CVE-2023-50738.json | 60 +++++ CVE-2024/CVE-2024-126xx/CVE-2024-12613.json | 56 ++++- CVE-2024/CVE-2024-126xx/CVE-2024-12614.json | 75 +++++- CVE-2024/CVE-2024-126xx/CVE-2024-12615.json | 66 ++++- CVE-2024/CVE-2024-39xx/CVE-2024-3907.json | 111 +++++++- CVE-2024/CVE-2024-39xx/CVE-2024-3908.json | 101 +++++++- CVE-2024/CVE-2024-43xx/CVE-2024-4350.json | 14 +- CVE-2024/CVE-2024-43xx/CVE-2024-4353.json | 14 +- CVE-2024/CVE-2024-528xx/CVE-2024-52870.json | 39 ++- CVE-2024/CVE-2024-534xx/CVE-2024-53407.json | 67 ++++- CVE-2024/CVE-2024-555xx/CVE-2024-55503.json | 80 +++++- CVE-2024/CVE-2024-570xx/CVE-2024-57030.json | 39 ++- CVE-2024/CVE-2024-570xx/CVE-2024-57033.json | 25 ++ CVE-2024/CVE-2024-570xx/CVE-2024-57035.json | 25 ++ CVE-2024/CVE-2024-572xx/CVE-2024-57252.json | 60 +++++ CVE-2024/CVE-2024-573xx/CVE-2024-57372.json | 39 ++- CVE-2024/CVE-2024-75xx/CVE-2024-7512.json | 14 +- CVE-2024/CVE-2024-82xx/CVE-2024-8291.json | 14 +- CVE-2025/CVE-2025-05xx/CVE-2025-0533.json | 10 +- CVE-2025/CVE-2025-05xx/CVE-2025-0534.json | 10 +- CVE-2025/CVE-2025-05xx/CVE-2025-0538.json | 145 +++++++++++ CVE-2025/CVE-2025-05xx/CVE-2025-0540.json | 145 +++++++++++ CVE-2025/CVE-2025-05xx/CVE-2025-0541.json | 141 +++++++++++ CVE-2025/CVE-2025-213xx/CVE-2025-21399.json | 16 +- CVE-2025/CVE-2025-216xx/CVE-2025-21606.json | 82 ++++++ CVE-2025/CVE-2025-230xx/CVE-2025-23039.json | 56 +++++ CVE-2025/CVE-2025-232xx/CVE-2025-23202.json | 82 ++++++ CVE-2025/CVE-2025-232xx/CVE-2025-23205.json | 90 +++++++ CVE-2025/CVE-2025-232xx/CVE-2025-23206.json | 86 +++++++ CVE-2025/CVE-2025-232xx/CVE-2025-23207.json | 60 +++++ README.md | 88 ++++--- _state.csv | 265 ++++++++++---------- 53 files changed, 2311 insertions(+), 288 deletions(-) create mode 100644 CVE-2023/CVE-2023-507xx/CVE-2023-50738.json create mode 100644 CVE-2024/CVE-2024-570xx/CVE-2024-57033.json create mode 100644 CVE-2024/CVE-2024-570xx/CVE-2024-57035.json create mode 100644 CVE-2024/CVE-2024-572xx/CVE-2024-57252.json create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0538.json create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0540.json create mode 100644 CVE-2025/CVE-2025-05xx/CVE-2025-0541.json create mode 100644 CVE-2025/CVE-2025-216xx/CVE-2025-21606.json create mode 100644 CVE-2025/CVE-2025-230xx/CVE-2025-23039.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23202.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23205.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23206.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23207.json diff --git a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json index 1a7154597fe..7e5f1f201f1 100644 --- a/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json +++ b/CVE-2015/CVE-2015-16xx/CVE-2015-1642.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1642", "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:00.110", - "lastModified": "2024-11-21T02:25:50.630", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:14:52.883", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json b/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json index e1a7a18d03a..2ad05a5c7b6 100644 --- a/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json +++ b/CVE-2015/CVE-2015-17xx/CVE-2015-1769.json @@ -2,8 +2,8 @@ "id": "CVE-2015-1769", "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-15T00:59:01.467", - "lastModified": "2024-11-21T02:26:05.500", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:31:06.387", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json b/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json index 3ef7e60663a..7a12a23b704 100644 --- a/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json +++ b/CVE-2015/CVE-2015-23xx/CVE-2015-2387.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2387", "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T22:59:08.103", - "lastModified": "2024-11-21T02:27:19.600", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:42:17.533", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json index 6b48ff947e9..f2d19165a5d 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2419.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2419", "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:33.283", - "lastModified": "2024-11-21T02:27:21.957", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:39:50.700", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json index 39862a65ad1..41b60bcfd6f 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2424.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2424", "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:35.987", - "lastModified": "2024-11-21T02:27:22.517", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:42:06.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json b/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json index 5a08bcde8e4..5914ea3a514 100644 --- a/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json +++ b/CVE-2015/CVE-2015-24xx/CVE-2015-2425.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2425", "sourceIdentifier": "secure@microsoft.com", "published": "2015-07-14T21:59:36.813", - "lastModified": "2024-11-21T02:27:22.633", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:42:13.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json index a09aa6ece15..7f42302827f 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2502.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2502", "sourceIdentifier": "secure@microsoft.com", "published": "2015-08-19T10:59:00.090", - "lastModified": "2024-11-21T02:27:30.230", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:36:28.900", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json index c9690314229..9f6756c801f 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2545.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2545", "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:52.190", - "lastModified": "2024-11-21T02:27:34.900", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:36:34.027", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json b/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json index 179868941bd..c69f7045a98 100644 --- a/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json +++ b/CVE-2015/CVE-2015-25xx/CVE-2015-2546.json @@ -2,8 +2,8 @@ "id": "CVE-2015-2546", "sourceIdentifier": "secure@microsoft.com", "published": "2015-09-09T00:59:53.207", - "lastModified": "2024-11-21T02:27:35.020", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-17T21:36:42.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2022/CVE-2022-406xx/CVE-2022-40633.json b/CVE-2022/CVE-2022-406xx/CVE-2022-40633.json index f35ae207cec..d1a470b5136 100644 --- a/CVE-2022/CVE-2022-406xx/CVE-2022-40633.json +++ b/CVE-2022/CVE-2022-406xx/CVE-2022-40633.json @@ -2,7 +2,7 @@ "id": "CVE-2022-40633", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-02T23:15:10.090", - "lastModified": "2024-11-21T07:21:45.110", + "lastModified": "2025-01-17T22:15:26.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json b/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json index c055e5b3bc2..133d3688370 100644 --- a/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json +++ b/CVE-2022/CVE-2022-416xx/CVE-2022-41696.json @@ -2,7 +2,7 @@ "id": "CVE-2022-41696", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-21T23:15:12.167", - "lastModified": "2024-11-21T07:23:40.160", + "lastModified": "2025-01-17T22:15:26.413", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-435xx/CVE-2022-43512.json b/CVE-2022/CVE-2022-435xx/CVE-2022-43512.json index 64c5fd3dba8..903ddb6e4e7 100644 --- a/CVE-2022/CVE-2022-435xx/CVE-2022-43512.json +++ b/CVE-2022/CVE-2022-435xx/CVE-2022-43512.json @@ -2,7 +2,7 @@ "id": "CVE-2022-43512", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-21T23:15:12.277", - "lastModified": "2024-11-21T07:26:40.087", + "lastModified": "2025-01-17T22:15:26.590", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json b/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json index 63cc543da62..ed3d6ddb481 100644 --- a/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json +++ b/CVE-2022/CVE-2022-451xx/CVE-2022-45121.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45121", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-21T23:15:12.333", - "lastModified": "2024-11-21T07:28:48.153", + "lastModified": "2025-01-17T22:15:26.757", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json b/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json index cc425572507..197f76a733c 100644 --- a/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json +++ b/CVE-2022/CVE-2022-454xx/CVE-2022-45468.json @@ -2,7 +2,7 @@ "id": "CVE-2022-45468", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-21T23:15:12.400", - "lastModified": "2024-11-21T07:29:18.210", + "lastModified": "2025-01-17T22:15:26.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2022/CVE-2022-463xx/CVE-2022-46300.json b/CVE-2022/CVE-2022-463xx/CVE-2022-46300.json index f5711bd43fc..ee6bc35b323 100644 --- a/CVE-2022/CVE-2022-463xx/CVE-2022-46300.json +++ b/CVE-2022/CVE-2022-463xx/CVE-2022-46300.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46300", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-21T23:15:12.563", - "lastModified": "2024-11-21T07:30:20.273", + "lastModified": "2025-01-17T22:15:27.093", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json b/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json index 24bb76f5440..7c7da92baa0 100644 --- a/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json +++ b/CVE-2022/CVE-2022-467xx/CVE-2022-46732.json @@ -2,7 +2,7 @@ "id": "CVE-2022-46732", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-01-18T00:15:12.357", - "lastModified": "2024-11-21T07:30:59.237", + "lastModified": "2025-01-17T22:15:27.260", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,9 +36,41 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json index f87cfbb6dbf..fd7650c2dc4 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0621.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0621", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-09T22:15:51.597", - "lastModified": "2024-11-21T07:37:30.100", + "lastModified": "2025-01-17T22:15:27.440", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json index 064a5a08ce1..25f32194508 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0622.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0622", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-09T22:15:51.667", - "lastModified": "2024-11-21T07:37:30.190", + "lastModified": "2025-01-17T22:15:27.613", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json b/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json index cb05a18c1c6..f3bbb05a415 100644 --- a/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json +++ b/CVE-2023/CVE-2023-06xx/CVE-2023-0623.json @@ -2,7 +2,7 @@ "id": "CVE-2023-0623", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-03-09T22:15:51.737", - "lastModified": "2024-11-21T07:37:30.280", + "lastModified": "2025-01-17T22:15:27.790", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,9 +32,41 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], "configurations": [ { "nodes": [ diff --git a/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json b/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json index e8e4d572b06..2b66d091058 100644 --- a/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json +++ b/CVE-2023/CVE-2023-259xx/CVE-2023-25953.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25953", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2023-05-23T02:15:09.317", - "lastModified": "2024-11-21T07:50:30.607", + "lastModified": "2025-01-17T22:15:27.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.8 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-317xx/CVE-2023-31752.json b/CVE-2023/CVE-2023-317xx/CVE-2023-31752.json index ef372f1b7bf..3bb6261026b 100644 --- a/CVE-2023/CVE-2023-317xx/CVE-2023-31752.json +++ b/CVE-2023/CVE-2023-317xx/CVE-2023-31752.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31752", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-23T20:15:09.993", - "lastModified": "2024-11-21T08:02:14.377", + "lastModified": "2025-01-17T21:15:08.807", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json b/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json new file mode 100644 index 00000000000..7c20aed6ed9 --- /dev/null +++ b/CVE-2023/CVE-2023-507xx/CVE-2023-50738.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2023-50738", + "sourceIdentifier": "7bc73191-a2b6-4c63-9918-753964601853", + "published": "2025-01-17T21:15:09.660", + "lastModified": "2025-01-17T22:15:28.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A\u00a0new feature to prevent Firmware downgrades was recently added to some Lexmark products. A method to \noverride this downgrade protection has been identified." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "7bc73191-a2b6-4c63-9918-753964601853", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 0.9, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "7bc73191-a2b6-4c63-9918-753964601853", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-354" + }, + { + "lang": "en", + "value": "CWE-1328" + } + ] + } + ], + "references": [ + { + "url": "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html", + "source": "7bc73191-a2b6-4c63-9918-753964601853" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12613.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12613.json index 7c996fcca83..9e50115ddae 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12613.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12613.json @@ -2,19 +2,43 @@ "id": "CVE-2024-12613", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:07.633", - "lastModified": "2025-01-16T10:15:07.633", - "vulnStatus": "Received", + "lastModified": "2025-01-17T22:17:16.967", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX fuctions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": " El complemento Passwords Manager para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del valor $wpdb->prefix en varias funciones AJAX en todas las versiones hasta la 1.4.8 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/dec38992-a69f-4ccd-a23b-4dd1639897c3?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12614.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12614.json index 6db4da12207..355f13a4306 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12614.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12614.json @@ -2,20 +2,24 @@ "id": "CVE-2024-12614", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:08.023", - "lastModified": "2025-01-16T10:15:08.023", - "vulnStatus": "Received", + "lastModified": "2025-01-17T22:17:15.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Passwords Manager plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pms_save_setting' and 'post_new_pass' AJAX actions in all versions up to, and including, 1.4.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins settings and add passwords." + }, + { + "lang": "es", + "value": "El complemento Passwords Manager para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una falta de verificaci\u00f3n de capacidad en las acciones AJAX 'pms_save_setting' y 'post_new_pass' en todas las versiones hasta la 1.4.8 incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, actualicen la configuraci\u00f3n de los complementos y agreguen contrase\u00f1as." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -32,33 +36,90 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-89" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B" + } + ] + } + ] } ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-settings-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/898c5554-fd02-47a2-a1f9-1c488cfab57e?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-126xx/CVE-2024-12615.json b/CVE-2024/CVE-2024-126xx/CVE-2024-12615.json index e8126caaba2..5ab57043224 100644 --- a/CVE-2024/CVE-2024-126xx/CVE-2024-12615.json +++ b/CVE-2024/CVE-2024-126xx/CVE-2024-12615.json @@ -2,19 +2,43 @@ "id": "CVE-2024-12615", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-16T10:15:08.380", - "lastModified": "2025-01-16T10:15:08.380", - "vulnStatus": "Received", + "lastModified": "2025-01-17T22:17:11.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Passwords Manager plugin for WordPress is vulnerable to SQL Injection via the $wpdb->prefix value in several AJAX actions in all versions up to, and including, 1.4.8 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database." + }, + { + "lang": "es", + "value": " El complemento Passwords Manager para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s del valor $wpdb->prefix en varias acciones AJAX en todas las versiones hasta la 1.4.8 incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que los atacantes autenticados, con acceso de nivel de suscriptor y superior, agreguen consultas SQL adicionales a las consultas ya existentes que se pueden usar para extraer informaci\u00f3n confidencial de la base de datos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", @@ -47,22 +71,52 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:hirewebxperts:passwords_manager:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "C097552E-4BE1-42EC-BFA6-B0CA75E11B5B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/admin-page/addon/csv-export/index.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-categories-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3221505/passwords-manager/trunk/include/pms-passwords-ajax-action.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce8397d5-6637-4faa-be1f-9cf52c25be9b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3907.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3907.json index 1c3caf28cc9..43a1a62d04e 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3907.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3907.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3907", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T11:15:12.160", - "lastModified": "2024-11-21T09:30:40.303", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T21:21:37.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2F0EEFAB-B3B0-4C10-A712-7A35F5FD076E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64192A8B-CC65-44EC-942B-CC16AADF0D69" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.313802", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formSetCfm.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261143", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261143", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.313802", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-39xx/CVE-2024-3908.json b/CVE-2024/CVE-2024-39xx/CVE-2024-3908.json index db940eb1364..a8458e80f57 100644 --- a/CVE-2024/CVE-2024-39xx/CVE-2024-3908.json +++ b/CVE-2024/CVE-2024-39xx/CVE-2024-3908.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3908", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-17T12:15:07.633", - "lastModified": "2024-11-21T09:30:40.433", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-17T21:16:07.327", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -76,38 +96,99 @@ ] } ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac500_firmware:2.0.1.9\\(1307\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2F0EEFAB-B3B0-4C10-A712-7A35F5FD076E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac500:-:*:*:*:*:*:*:*", + "matchCriteriaId": "64192A8B-CC65-44EC-942B-CC16AADF0D69" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261144", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.313803", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC500/formWriteFacMac.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.261144", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261144", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.313803", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json index 6b8c68488c8..82bbd63e483 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4350.json @@ -2,13 +2,13 @@ "id": "CVE-2024-4350", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-08-12T13:38:36.460", - "lastModified": "2024-08-30T18:18:37.130", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-17T22:15:28.360", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.0 with a vector of AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator and a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N Thanks, m3dium for\u00a0reporting." + "value": "Concrete CMS versions 9.0.0 to 9.3.2 and below 8.5.18 are vulnerable to Stored XSS in RSS Displayer when user input is stored and later embedded into responses. A rogue administrator could inject malicious code into fields due to insufficient input validation. The Concrete CMS security team gave this vulnerability a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\u00a0Thanks, m3dium for\u00a0reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)" }, { "lang": "es", @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 2.1, - "baseSeverity": "LOW", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json index 67799a67646..0df10da1be2 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4353.json @@ -2,13 +2,13 @@ "id": "CVE-2024-4353", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-08-01T19:15:52.313", - "lastModified": "2024-12-16T19:08:05.467", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-17T22:15:28.510", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board\ninstance functionality. The Name input field does not check the input sufficiently letting a rogue administrator have the capability to inject malicious\nJavaScript code. The Concrete CMS security team gave this vulnerability a CVSS v3.1 score of 3.1 with a vector of AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:N https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator \u00a0and a CVSS v4 score of 1.8 with a vector of CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N\u00a0Concrete versions below 9 are not affected by this vulnerability. Thanks fhAnso for reporting." + "value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in the generate dashboard board\ninstance functionality. The Name input field does not check the input sufficiently letting a rogue administrator have the capability to inject malicious\nJavaScript code. The Concrete CMS security team gave this vulnerability\u00a0a CVSS v4 score of 4.6 with a vector of CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N. Concrete versions below 9 are not affected by this vulnerability.Thanks fhAnso for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)." }, { "lang": "es", @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 1.8, - "baseSeverity": "LOW", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "ACTIVE", diff --git a/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json b/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json index b914bc7269d..680d212b39e 100644 --- a/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json +++ b/CVE-2024/CVE-2024-528xx/CVE-2024-52870.json @@ -2,7 +2,7 @@ "id": "CVE-2024-52870", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T20:15:28.527", - "lastModified": "2025-01-17T20:15:28.527", + "lastModified": "2025-01-17T22:15:28.663", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Teradata Vantage Editor 1.0.1 is mostly intended for SQL database access and docs.teradata.com access, but provides unintended functionality (including Chromium Developer Tools) that can result in a client user accessing arbitrary remote websites." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-909" + } + ] + } + ], "references": [ { "url": "https://chrismanson.com/CVE/cve-2024-52870.html", diff --git a/CVE-2024/CVE-2024-534xx/CVE-2024-53407.json b/CVE-2024/CVE-2024-534xx/CVE-2024-53407.json index 4012690d3ee..8c41c1db75c 100644 --- a/CVE-2024/CVE-2024-534xx/CVE-2024-53407.json +++ b/CVE-2024/CVE-2024-534xx/CVE-2024-53407.json @@ -2,20 +2,79 @@ "id": "CVE-2024-53407", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:09.263", - "lastModified": "2025-01-15T23:15:09.263", - "vulnStatus": "Received", + "lastModified": "2025-01-17T22:51:40.307", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Phiewer 4.1.0, a dylib injection leads to Command Execution which allow attackers to inject dylib file potentially leading to remote control and unauthorized access to sensitive user data." + }, + { + "lang": "es", + "value": " En Phiewer 4.1.0, una inyecci\u00f3n de dylib conduce a la ejecuci\u00f3n de comandos que permite a los atacantes inyectar un archivo dylib, lo que potencialmente conduce al control remoto y al acceso no autorizado a datos confidenciales del usuario." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:phiewer:phiewer:4.1.0:*:*:*:*:*:*:*", + "matchCriteriaId": "1109E4C8-1611-41F2-840E-E1215BE99E15" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SyFi/CVE-2024-53407", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-555xx/CVE-2024-55503.json b/CVE-2024/CVE-2024-555xx/CVE-2024-55503.json index c545ead2357..6c0c9d47720 100644 --- a/CVE-2024/CVE-2024-555xx/CVE-2024-55503.json +++ b/CVE-2024/CVE-2024-555xx/CVE-2024-55503.json @@ -2,20 +2,92 @@ "id": "CVE-2024-55503", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-15T23:15:09.390", - "lastModified": "2025-01-15T23:15:09.390", - "vulnStatus": "Received", + "lastModified": "2025-01-17T22:51:48.330", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue in termius before v.9.9.0 allows a local attacker to execute arbitrary code via a crafted script to the DYLD_INSERT_LIBRARIES component." + }, + { + "lang": "es", + "value": " Un problema en termius anterior a v.9.9.0 permite que un atacante local ejecute c\u00f3digo arbitrario a trav\u00e9s de un script manipulado en el componente DYLD_INSERT_LIBRARIES." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:termius:termius:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.9.0", + "matchCriteriaId": "DECF23CD-3363-4741-803C-3FCB85514E5B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*", + "matchCriteriaId": "387021A0-AF36-463C-A605-32EA7DAC172E" + } + ] + } + ] } ], - "metrics": {}, "references": [ { "url": "https://github.com/SyFi/CVE-2024-55503", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json index c9fac19ad3c..9794ecda84c 100644 --- a/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57030.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57030", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T20:15:28.667", - "lastModified": "2025-01-17T20:15:28.667", + "lastModified": "2025-01-17T21:15:09.823", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Wegia < 3.2.0 is vulnerable to Cross Site Scripting (XSS) in /geral/documentos_funcionario.php via the id parameter." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57030", diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57033.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57033.json new file mode 100644 index 00000000000..6e607a72c9a --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57033.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57033", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-17T21:15:09.980", + "lastModified": "2025-01-17T21:15:09.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA < 3.2.0 is vulnerable to Cross Site Scripting (XSS) via the dados_addInfo parameter of documentos_funcionario.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57033", + "source": "cve@mitre.org" + }, + { + "url": "https://www.wegia.org/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json new file mode 100644 index 00000000000..1cb9d5c17d9 --- /dev/null +++ b/CVE-2024/CVE-2024-570xx/CVE-2024-57035.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57035", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-17T21:15:10.100", + "lastModified": "2025-01-17T21:15:10.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "WeGIA v3.2.0 is vulnerable to SQL Injection viathe nextPage parameter in /controle/control.php." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/nilsonLazarin/WeGIA/issues/827", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/nmmorette/vulnerability-research/tree/main/CVE-2024-57035", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json new file mode 100644 index 00000000000..1320740d0ce --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57252.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-57252", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-17T21:15:10.217", + "lastModified": "2025-01-17T22:15:28.817", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "OtCMS <=V7.46 is vulnerable to Server-Side Request Forgery (SSRF) in /admin/read.php, which can Read system files arbitrarily." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/J-0k3r/CVE-2024-57252", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/J-0k3r/some/blob/main/ssrf.pdf", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json b/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json index b423ba7d3ec..f4954187e28 100644 --- a/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json +++ b/CVE-2024/CVE-2024-573xx/CVE-2024-57372.json @@ -2,7 +2,7 @@ "id": "CVE-2024-57372", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-17T20:15:29.447", - "lastModified": "2025-01-17T20:15:29.447", + "lastModified": "2025-01-17T22:15:28.957", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,42 @@ "value": "Cross Site Scripting vulnerability in InformationPush master version allows a remote attacker to obtain sensitive information via the title, time and msg parameters" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], "references": [ { "url": "https://github.com/kaixin1995", diff --git a/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json b/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json index b608d215c9c..91f97742a30 100644 --- a/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json +++ b/CVE-2024/CVE-2024-75xx/CVE-2024-7512.json @@ -2,13 +2,13 @@ "id": "CVE-2024-7512", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-08-12T13:38:43.590", - "lastModified": "2024-08-30T18:19:01.187", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-17T21:15:10.317", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 1.8 with vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting." + "value": "Concrete CMS versions 9.0.0 through 9.3.2 are affected by a stored XSS vulnerability in Board instances. A rogue administrator could inject malicious code. The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.6 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N. Versions below 9 are not affected. Thanks, m3dium for reporting. (CNA updated AC score to L based on CVSS 4.0 documentation)" }, { "lang": "es", @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 1.8, - "baseSeverity": "LOW", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 4.6, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "ACTIVE", diff --git a/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json b/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json index b3e187ecd1b..7881344ae9b 100644 --- a/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json +++ b/CVE-2024/CVE-2024-82xx/CVE-2024-8291.json @@ -2,13 +2,13 @@ "id": "CVE-2024-8291", "sourceIdentifier": "ff5b8ace-8b95-4078-9743-eac1ca5451de", "published": "2024-09-25T01:15:46.193", - "lastModified": "2024-09-30T15:59:11.073", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-17T22:15:29.107", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color.\u00a0 A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 2.1 with vector CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N \u00a0Thanks,\u00a0 Alexey Solovyev for reporting." + "value": "Concrete CMS versions 9.0.0 to 9.3.3 and below 8.5.19 are vulnerable to Stored XSS in Image Editor Background Color.\u00a0 A rogue admin could add malicious code to the Thumbnails/Add-Type. The Concrete CMS Security Team gave this a CVSS v4 score of 5.1 with vector https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N.\u00a0Thanks,\u00a0 Alexey Solovyev for reporting. (CNA updated this risk rank on 17 Jan 2025 by lowering the AC based on CVSS 4.0 documentation that access privileges should not be considered for AC)." }, { "lang": "es", @@ -22,11 +22,11 @@ "type": "Secondary", "cvssData": { "version": "4.0", - "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", - "baseScore": 2.1, - "baseSeverity": "LOW", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.1, + "baseSeverity": "MEDIUM", "attackVector": "NETWORK", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "attackRequirements": "NONE", "privilegesRequired": "HIGH", "userInteraction": "NONE", diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json index 3b5d5b18db9..5695f4e330e 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0533.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0533", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T18:15:31.577", - "lastModified": "2025-01-17T18:15:31.577", + "lastModified": "2025-01-17T21:15:10.487", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.479119", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/onupset/CVE/issues/2", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json index 83281d8cb8a..e3950c2f3fe 100644 --- a/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0534.json @@ -2,7 +2,7 @@ "id": "CVE-2025-0534", "sourceIdentifier": "cna@vuldb.com", "published": "2025-01-17T19:15:28.777", - "lastModified": "2025-01-17T19:15:28.777", + "lastModified": "2025-01-17T21:15:10.650", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -59,7 +59,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", @@ -107,7 +107,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -140,6 +140,10 @@ { "url": "https://vuldb.com/?submit.479128", "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/onupset/CVE/issues/3", + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json new file mode 100644 index 00000000000..b64717e4be5 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0538.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0538", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-17T21:15:10.847", + "lastModified": "2025-01-17T21:15:10.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in code-projects Tourism Management System 1.0. Affected is an unknown function of the file /admin/manage-pages.php. The manipulation of the argument pgedetails leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 3.5, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.1, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", + "baseScore": 4.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + }, + { + "lang": "en", + "value": "CWE-94" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/aaryan-11-x/My-CVEs/blob/main/Stored%20XSS%20-%20Code-Projects%20Tourism%20Management%20System%201.0.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292422", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292422", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.479895", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json new file mode 100644 index 00000000000..521e830edc7 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0540.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0540", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-17T21:15:11.037", + "lastModified": "2025-01-17T21:15:11.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/magic2353112890/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://itsourcecode.com/", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292432", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292432", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480063", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json new file mode 100644 index 00000000000..05d9dccbfb8 --- /dev/null +++ b/CVE-2025/CVE-2025-05xx/CVE-2025-0541.json @@ -0,0 +1,141 @@ +{ + "id": "CVE-2025-0541", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-17T22:15:29.337", + "lastModified": "2025-01-17T22:15:29.337", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/nbeisss/CVE/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.292433", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.292433", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480220", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json index 25eda7a1044..726f89db491 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21399.json @@ -2,7 +2,7 @@ "id": "CVE-2025-21399", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-17T20:15:46.117", - "lastModified": "2025-01-17T20:15:46.117", + "lastModified": "2025-01-17T21:15:11.283", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", @@ -35,6 +35,18 @@ } ] }, + "weaknesses": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-273" + } + ] + } + ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21399", diff --git a/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json b/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json new file mode 100644 index 00000000000..f207adda768 --- /dev/null +++ b/CVE-2025/CVE-2025-216xx/CVE-2025-21606.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-21606", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T21:15:11.420", + "lastModified": "2025-01-17T21:15:11.420", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "stats is a macOS system monitor in for the menu bar. The Stats application is vulnerable to a local privilege escalation due to the insecure implementation of its XPC service. The application registers a Mach service under the name `eu.exelban.Stats.SMC.Helper`. The associated binary, eu.exelban.Stats.SMC.Helper, is a privileged helper tool designed to execute actions requiring elevated privileges on behalf of the client, such as setting fan modes, adjusting fan speeds, and executing the `powermetrics` command. The root cause of this vulnerability lies in the `shouldAcceptNewConnection` method, which unconditionally returns YES (or true), allowing any XPC client to connect to the service without any form of verification. As a result, unauthorized clients can establish a connection to the Mach service and invoke methods exposed by the HelperTool interface. An attacker can exploit this vulnerability to modify the hardware settings of the user\u2019s device and execute arbitrary code with root privileges. This issue has been addressed in version 2.11.21 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-345" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/exelban/stats/commit/c10759f7a186efdd82ddd818dae2ac1f853691fc", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/exelban/stats/security/advisories/GHSA-qwhf-px96-7f6v", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json new file mode 100644 index 00000000000..2ea2825418a --- /dev/null +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23039.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-23039", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T21:15:11.560", + "lastModified": "2025-01-17T21:15:11.560", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Caido is a web security auditing toolkit. A Cross-Site Scripting (XSS) vulnerability was identified in Caido v0.45.0 due to improper sanitization in the URL decoding tooltip of HTTP request and response editors. This issue could allow an attacker to execute arbitrary scripts, potentially leading to the theft of sensitive information. This issue has been addressed in version 0.45.1 and all users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.2, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.5, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/caido/caido/security/advisories/GHSA-3mfw-fhfp-mgrv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json new file mode 100644 index 00000000000..65eb44c2310 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23202.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-23202", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T21:15:11.713", + "lastModified": "2025-01-17T21:15:11.713", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Bible Module is a tool designed for ROBLOX developers to integrate Bible functionality into their games. The `FetchVerse` and `FetchPassage` functions in the Bible Module are susceptible to injection attacks due to the absence of input validation. This vulnerability could allow an attacker to manipulate the API request URLs, potentially leading to unauthorized access or data tampering. This issue has been addressed in version 0.0.3. All users are advised to upgrade. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "HIGH", + "subsequentSystemIntegrity": "HIGH", + "subsequentSystemAvailability": "HIGH", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-20" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/devycreates/Bible-Module/commit/5b783855fc3285be2da8639c97ac37af28f8c55a", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/devycreates/Bible-Module/security/advisories/GHSA-cm7w-99v2-prrq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json new file mode 100644 index 00000000000..f51455c3ee0 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23205.json @@ -0,0 +1,90 @@ +{ + "id": "CVE-2025-23205", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T21:15:11.850", + "lastModified": "2025-01-17T21:15:11.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "nbgrader is a system for assigning and grading notebooks. Enabling frame-ancestors: 'self' grants any JupyterHub user the ability to extract formgrader content by sending malicious links to users with access to formgrader, at least when using the default JupyterHub configuration of `enable_subdomains = False`. #1915 disables a protection which would allow user Alice to craft a page embedding formgrader in an IFrame. If Bob visits that page, his credentials will be sent and the formgrader page loaded. Because Alice's page is on the same Origin as the formgrader iframe, Javasript on Alice's page has _full access_ to the contents of the page served by formgrader using Bob's credentials. This issue has been addressed in release 0.9.5 and all users are advised to upgrade. Users unable to upgrade may disable `frame-ancestors: self`, or enable per-user and per-service subdomains with `JupyterHub.enable_subdomains = True` (then even if embedding in an IFrame is allowed, the host page does not have access to the contents of the frame)." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-668" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/jupyter/nbgrader/commit/73e137511ac1dc02e95790d4fd6d4d88dab42325", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyter/nbgrader/pull/1915", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/jupyter/nbgrader/security/advisories/GHSA-fcr8-4r9f-r66m", + "source": "security-advisories@github.com" + }, + { + "url": "https://jupyterhub.readthedocs.io/en/stable/explanation/websecurity.html#:~:text=frame-ancestors", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json new file mode 100644 index 00000000000..591c9592429 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23206.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2025-23206", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T21:15:12.003", + "lastModified": "2025-01-17T21:15:12.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "The AWS Cloud Development Kit (AWS CDK) is an open-source software development framework to define cloud infrastructure in code and provision it through AWS CloudFormation. Users who use IAM OIDC custom resource provider package will download CA Thumbprints as part of the custom resource workflow. However, the current `tls.connect` method will always set `rejectUnauthorized: false` which is a potential security concern. CDK should follow the best practice and set `rejectUnauthorized: true`. However, this could be a breaking change for existing CDK applications and we should fix this with a feature flag. Note that this is marked as low severity Security advisory because the issuer url is provided by CDK users who define the CDK application. If they insist on connecting to a unauthorized OIDC provider, CDK should not disallow this. Additionally, the code block is run in a Lambda environment which mitigate the MITM attack. The patch is in progress. To mitigate, upgrade to CDK v2.177.0 (Expected release date 2025-02-22). Once upgraded, users should make sure the feature flag '@aws-cdk/aws-iam:oidcRejectUnauthorizedConnections' is set to true in `cdk.context.json` or `cdk.json`. There are no known workarounds for this vulnerability." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.8, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "PRESENT", + "privilegesRequired": "HIGH", + "userInteraction": "ACTIVE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-347" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/aws/aws-cdk/blob/d16482fc8a4a3e1f62751f481b770c09034df7d2/packages/%40aws-cdk/custom-resource-handlers/lib/aws-iam/oidc-handler/external.ts#L34", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/aws-cdk/issues/32920", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/aws/aws-cdk/security/advisories/GHSA-v4mq-x674-ff73", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json new file mode 100644 index 00000000000..de2cd870ed6 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23207.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23207", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-17T22:15:29.523", + "lastModified": "2025-01-17T22:15:29.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "KaTeX is a fast, easy-to-use JavaScript library for TeX math rendering on the web. KaTeX users who render untrusted mathematical expressions with `renderToString` could encounter malicious input using `\\htmlData` that runs arbitrary JavaScript, or generate invalid HTML. Users are advised to upgrade to KaTeX v0.16.21 to remove this vulnerability. Users unable to upgrade should avoid use of or turn off the `trust` option, or set it to forbid `\\htmlData` commands, forbid inputs containing the substring `\"\\\\htmlData\"` and sanitize HTML output from KaTeX." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/KaTeX/KaTeX/commit/ff289955e81aab89086eef09254cbf88573d415c", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/KaTeX/KaTeX/security/advisories/GHSA-cg87-wmx4-v546", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 0aaf365f42f..f1230bb2d48 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-17T21:00:27.243000+00:00 +2025-01-17T23:00:22.094238+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-17T21:00:00.330000+00:00 +2025-01-17T22:51:48.330000+00:00 ``` ### Last Data Feed Release @@ -33,59 +33,57 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -277985 +277998 ``` ### CVEs added in the last Commit -Recently added CVEs: `15` +Recently added CVEs: `13` -- [CVE-2024-13026](CVE-2024/CVE-2024-130xx/CVE-2024-13026.json) (`2025-01-17T20:15:27.600`) -- [CVE-2024-52870](CVE-2024/CVE-2024-528xx/CVE-2024-52870.json) (`2025-01-17T20:15:28.527`) -- [CVE-2024-57030](CVE-2024/CVE-2024-570xx/CVE-2024-57030.json) (`2025-01-17T20:15:28.667`) -- [CVE-2024-57031](CVE-2024/CVE-2024-570xx/CVE-2024-57031.json) (`2025-01-17T20:15:28.790`) -- [CVE-2024-57032](CVE-2024/CVE-2024-570xx/CVE-2024-57032.json) (`2025-01-17T20:15:28.910`) -- [CVE-2024-57034](CVE-2024/CVE-2024-570xx/CVE-2024-57034.json) (`2025-01-17T20:15:29.020`) -- [CVE-2024-57369](CVE-2024/CVE-2024-573xx/CVE-2024-57369.json) (`2025-01-17T20:15:29.140`) -- [CVE-2024-57370](CVE-2024/CVE-2024-573xx/CVE-2024-57370.json) (`2025-01-17T20:15:29.303`) -- [CVE-2024-57372](CVE-2024/CVE-2024-573xx/CVE-2024-57372.json) (`2025-01-17T20:15:29.447`) -- [CVE-2025-0534](CVE-2025/CVE-2025-05xx/CVE-2025-0534.json) (`2025-01-17T19:15:28.777`) -- [CVE-2025-0535](CVE-2025/CVE-2025-05xx/CVE-2025-0535.json) (`2025-01-17T19:15:28.990`) -- [CVE-2025-0536](CVE-2025/CVE-2025-05xx/CVE-2025-0536.json) (`2025-01-17T20:15:29.583`) -- [CVE-2025-0537](CVE-2025/CVE-2025-05xx/CVE-2025-0537.json) (`2025-01-17T20:15:29.767`) -- [CVE-2025-21185](CVE-2025/CVE-2025-211xx/CVE-2025-21185.json) (`2025-01-17T20:15:30.227`) -- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-17T20:15:46.117`) +- [CVE-2023-50738](CVE-2023/CVE-2023-507xx/CVE-2023-50738.json) (`2025-01-17T21:15:09.660`) +- [CVE-2024-57033](CVE-2024/CVE-2024-570xx/CVE-2024-57033.json) (`2025-01-17T21:15:09.980`) +- [CVE-2024-57035](CVE-2024/CVE-2024-570xx/CVE-2024-57035.json) (`2025-01-17T21:15:10.100`) +- [CVE-2024-57252](CVE-2024/CVE-2024-572xx/CVE-2024-57252.json) (`2025-01-17T21:15:10.217`) +- [CVE-2025-0538](CVE-2025/CVE-2025-05xx/CVE-2025-0538.json) (`2025-01-17T21:15:10.847`) +- [CVE-2025-0540](CVE-2025/CVE-2025-05xx/CVE-2025-0540.json) (`2025-01-17T21:15:11.037`) +- [CVE-2025-0541](CVE-2025/CVE-2025-05xx/CVE-2025-0541.json) (`2025-01-17T22:15:29.337`) +- [CVE-2025-21606](CVE-2025/CVE-2025-216xx/CVE-2025-21606.json) (`2025-01-17T21:15:11.420`) +- [CVE-2025-23039](CVE-2025/CVE-2025-230xx/CVE-2025-23039.json) (`2025-01-17T21:15:11.560`) +- [CVE-2025-23202](CVE-2025/CVE-2025-232xx/CVE-2025-23202.json) (`2025-01-17T21:15:11.713`) +- [CVE-2025-23205](CVE-2025/CVE-2025-232xx/CVE-2025-23205.json) (`2025-01-17T21:15:11.850`) +- [CVE-2025-23206](CVE-2025/CVE-2025-232xx/CVE-2025-23206.json) (`2025-01-17T21:15:12.003`) +- [CVE-2025-23207](CVE-2025/CVE-2025-232xx/CVE-2025-23207.json) (`2025-01-17T22:15:29.523`) ### CVEs modified in the last Commit -Recently modified CVEs: `78` +Recently modified CVEs: `38` -- [CVE-2024-29415](CVE-2024/CVE-2024-294xx/CVE-2024-29415.json) (`2025-01-17T20:15:27.950`) -- [CVE-2024-31343](CVE-2024/CVE-2024-313xx/CVE-2024-31343.json) (`2025-01-17T19:32:04.977`) -- [CVE-2024-3136](CVE-2024/CVE-2024-31xx/CVE-2024-3136.json) (`2025-01-17T19:21:25.430`) -- [CVE-2024-32118](CVE-2024/CVE-2024-321xx/CVE-2024-32118.json) (`2025-01-17T20:42:17.053`) -- [CVE-2024-33510](CVE-2024/CVE-2024-335xx/CVE-2024-33510.json) (`2025-01-17T20:35:31.247`) -- [CVE-2024-35274](CVE-2024/CVE-2024-352xx/CVE-2024-35274.json) (`2025-01-17T20:29:43.327`) -- [CVE-2024-38807](CVE-2024/CVE-2024-388xx/CVE-2024-38807.json) (`2025-01-17T20:15:28.130`) -- [CVE-2024-39908](CVE-2024/CVE-2024-399xx/CVE-2024-39908.json) (`2025-01-17T20:15:28.250`) -- [CVE-2024-41946](CVE-2024/CVE-2024-419xx/CVE-2024-41946.json) (`2025-01-17T20:15:28.380`) -- [CVE-2024-47906](CVE-2024/CVE-2024-479xx/CVE-2024-47906.json) (`2025-01-17T20:27:14.100`) -- [CVE-2024-7571](CVE-2024/CVE-2024-75xx/CVE-2024-7571.json) (`2025-01-17T19:45:37.847`) -- [CVE-2024-8495](CVE-2024/CVE-2024-84xx/CVE-2024-8495.json) (`2025-01-17T20:04:56.517`) -- [CVE-2024-8539](CVE-2024/CVE-2024-85xx/CVE-2024-8539.json) (`2025-01-17T20:02:50.283`) -- [CVE-2024-9420](CVE-2024/CVE-2024-94xx/CVE-2024-9420.json) (`2025-01-17T20:29:36.007`) -- [CVE-2024-9842](CVE-2024/CVE-2024-98xx/CVE-2024-9842.json) (`2025-01-17T19:55:48.957`) -- [CVE-2024-9843](CVE-2024/CVE-2024-98xx/CVE-2024-9843.json) (`2025-01-17T20:00:21.843`) -- [CVE-2024-9844](CVE-2024/CVE-2024-98xx/CVE-2024-9844.json) (`2025-01-17T19:37:13.830`) -- [CVE-2025-21128](CVE-2025/CVE-2025-211xx/CVE-2025-21128.json) (`2025-01-17T20:37:35.437`) -- [CVE-2025-21129](CVE-2025/CVE-2025-211xx/CVE-2025-21129.json) (`2025-01-17T20:37:33.603`) -- [CVE-2025-21130](CVE-2025/CVE-2025-211xx/CVE-2025-21130.json) (`2025-01-17T20:37:32.137`) -- [CVE-2025-21131](CVE-2025/CVE-2025-211xx/CVE-2025-21131.json) (`2025-01-17T20:37:30.750`) -- [CVE-2025-21132](CVE-2025/CVE-2025-211xx/CVE-2025-21132.json) (`2025-01-17T20:37:29.347`) -- [CVE-2025-21360](CVE-2025/CVE-2025-213xx/CVE-2025-21360.json) (`2025-01-17T20:40:22.527`) -- [CVE-2025-21361](CVE-2025/CVE-2025-213xx/CVE-2025-21361.json) (`2025-01-17T20:39:49.017`) -- [CVE-2025-21362](CVE-2025/CVE-2025-213xx/CVE-2025-21362.json) (`2025-01-17T20:38:30.560`) +- [CVE-2022-45468](CVE-2022/CVE-2022-454xx/CVE-2022-45468.json) (`2025-01-17T22:15:26.927`) +- [CVE-2022-46300](CVE-2022/CVE-2022-463xx/CVE-2022-46300.json) (`2025-01-17T22:15:27.093`) +- [CVE-2022-46732](CVE-2022/CVE-2022-467xx/CVE-2022-46732.json) (`2025-01-17T22:15:27.260`) +- [CVE-2023-0621](CVE-2023/CVE-2023-06xx/CVE-2023-0621.json) (`2025-01-17T22:15:27.440`) +- [CVE-2023-0622](CVE-2023/CVE-2023-06xx/CVE-2023-0622.json) (`2025-01-17T22:15:27.613`) +- [CVE-2023-0623](CVE-2023/CVE-2023-06xx/CVE-2023-0623.json) (`2025-01-17T22:15:27.790`) +- [CVE-2023-25953](CVE-2023/CVE-2023-259xx/CVE-2023-25953.json) (`2025-01-17T22:15:27.970`) +- [CVE-2023-31752](CVE-2023/CVE-2023-317xx/CVE-2023-31752.json) (`2025-01-17T21:15:08.807`) +- [CVE-2024-12613](CVE-2024/CVE-2024-126xx/CVE-2024-12613.json) (`2025-01-17T22:17:16.967`) +- [CVE-2024-12614](CVE-2024/CVE-2024-126xx/CVE-2024-12614.json) (`2025-01-17T22:17:15.190`) +- [CVE-2024-12615](CVE-2024/CVE-2024-126xx/CVE-2024-12615.json) (`2025-01-17T22:17:11.650`) +- [CVE-2024-3907](CVE-2024/CVE-2024-39xx/CVE-2024-3907.json) (`2025-01-17T21:21:37.327`) +- [CVE-2024-3908](CVE-2024/CVE-2024-39xx/CVE-2024-3908.json) (`2025-01-17T21:16:07.327`) +- [CVE-2024-4350](CVE-2024/CVE-2024-43xx/CVE-2024-4350.json) (`2025-01-17T22:15:28.360`) +- [CVE-2024-4353](CVE-2024/CVE-2024-43xx/CVE-2024-4353.json) (`2025-01-17T22:15:28.510`) +- [CVE-2024-52870](CVE-2024/CVE-2024-528xx/CVE-2024-52870.json) (`2025-01-17T22:15:28.663`) +- [CVE-2024-53407](CVE-2024/CVE-2024-534xx/CVE-2024-53407.json) (`2025-01-17T22:51:40.307`) +- [CVE-2024-55503](CVE-2024/CVE-2024-555xx/CVE-2024-55503.json) (`2025-01-17T22:51:48.330`) +- [CVE-2024-57030](CVE-2024/CVE-2024-570xx/CVE-2024-57030.json) (`2025-01-17T21:15:09.823`) +- [CVE-2024-57372](CVE-2024/CVE-2024-573xx/CVE-2024-57372.json) (`2025-01-17T22:15:28.957`) +- [CVE-2024-7512](CVE-2024/CVE-2024-75xx/CVE-2024-7512.json) (`2025-01-17T21:15:10.317`) +- [CVE-2024-8291](CVE-2024/CVE-2024-82xx/CVE-2024-8291.json) (`2025-01-17T22:15:29.107`) +- [CVE-2025-0533](CVE-2025/CVE-2025-05xx/CVE-2025-0533.json) (`2025-01-17T21:15:10.487`) +- [CVE-2025-0534](CVE-2025/CVE-2025-05xx/CVE-2025-0534.json) (`2025-01-17T21:15:10.650`) +- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-01-17T21:15:11.283`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 397efb01514..ae1e42b72a5 100644 --- a/_state.csv +++ b/_state.csv @@ -75129,7 +75129,7 @@ CVE-2015-1638,0,0,daef968245a5d8fd79d931ce1ffd08b3f2e1d88478095e206dc2c85022015b CVE-2015-1639,0,0,34505230ce09a0015f32d75857dbd4437155d53d3a8d301d593db632ff0e6063,2024-11-21T02:25:50.263000 CVE-2015-1640,0,0,801ae17082793204d46bf77801ffd5de8c9c829afdb3530ebef3b0a19f191653,2024-11-21T02:25:50.390000 CVE-2015-1641,0,0,913c22d7558bea0c75255e58334088a59285fdd02f3ed9c077433b0f9afc207b,2024-11-21T02:25:50.510000 -CVE-2015-1642,0,0,a3421e4cd449d71f7c3a1c75a980c15fe55af2cf8fbe29700f0c83431d2aa42b,2024-11-21T02:25:50.630000 +CVE-2015-1642,0,1,b5d348ae611a85e11931653f7b298a9616d66bc5043315babd122859ce2b9c21,2025-01-17T21:14:52.883000 CVE-2015-1643,0,0,35965b865ae4a0fe7d80f230f483ebd1ed4164b7f19a9ddda1fca4ecbbcd5c1a,2024-11-21T02:25:50.753000 CVE-2015-1644,0,0,a460657ddeb2cebbe863b19e4913930868d68bdff8abc83394f5f8a8c15788d1,2024-11-21T02:25:50.873000 CVE-2015-1645,0,0,8cb7107b2c6b144164ea8cd42a107617cf9ba3326c21773f955c39867f026fb0,2024-11-21T02:25:51 @@ -75256,7 +75256,7 @@ CVE-2015-1765,0,0,0d81fef387f6776b306a0f185e451445a82c0c192c017cbc6dafd4e9c6a26d CVE-2015-1766,0,0,3f00a70e44f7fa95c26bd5cb8bcf5b39076875377af9edefc257bc0d9d230c4e,2024-11-21T02:26:05.143000 CVE-2015-1767,0,0,292b1f56789470d2933eef9d582c7832d8d18f0b3d4658197d1dc427c079f87e,2024-11-21T02:26:05.267000 CVE-2015-1768,0,0,b2fc6680ee97b1d0858e4bb59d759f45ec5d75cf1c3839c62cbe9f26046551ab,2024-11-21T02:26:05.380000 -CVE-2015-1769,0,0,db98a0ac6833ae3a48d3fd41229998e7725ce44ee22cf071cbe89684ba60e316,2024-11-21T02:26:05.500000 +CVE-2015-1769,0,1,ea69303f8701c35ee0a2a8320ac522e3920ce265bfacdbf4b362a7bb2f942bc1,2025-01-17T21:31:06.387000 CVE-2015-1770,0,0,ac4dd844443bdb2d660ee56ae351b4e74e4c7f4d429bf19d57edadd471942ebc,2024-11-21T02:26:05.623000 CVE-2015-1771,0,0,a44961f133acd00d46d9847eec99f2955a76b6125ced31ae1d283f363776ed0c,2024-11-21T02:26:05.747000 CVE-2015-1772,0,0,26826297cb83f5add3d9515dbab903d2b96da4af06792c133c24c3386ce750e3,2024-11-21T02:26:05.867000 @@ -75814,7 +75814,7 @@ CVE-2015-2383,0,0,a9938b2adce7669516c2e0d39317dc0111ddc799392a2288a121b4c97bcb18 CVE-2015-2384,0,0,c005a1114405680728845c33908cb8345dd0509075de61a36d774e48ef902957,2024-11-21T02:27:19.390000 CVE-2015-2385,0,0,c6474a36cdfd195c898272ea95d2f5984e4a286c610bacf18f5bb29cced83610,2024-11-21T02:27:19.483000 CVE-2015-2386,0,0,bae2348f361a88c43c8cd62e8685d637aa0a62bf3183e8e3997963f368278b04,2023-11-07T02:25:14.977000 -CVE-2015-2387,0,0,389e8a7ce620f6dbbe4e9b25d521022b0f7fb140b1c6d5cc08a2875f6b659938,2024-11-21T02:27:19.600000 +CVE-2015-2387,0,1,3edbc4ef0ef44f7ced40337f34b294221f1ab02727159f140feaa776febb011e,2025-01-17T21:42:17.533000 CVE-2015-2388,0,0,a38382093b6e2e011f3b4300de3903f63f6f757652b136252d7fe5ae97e976fd,2024-11-21T02:27:19.713000 CVE-2015-2389,0,0,f256a84c6f2df57029f53974a3c1ba2ca8bd4beb8ed7e8acc6172d03c5fdada2,2024-11-21T02:27:19.817000 CVE-2015-2390,0,0,bffb4fcc4a36dbabee27b5da6eedec72cd11c7d3ee37c8899d62eec144fd1f40,2024-11-21T02:27:19.920000 @@ -75846,14 +75846,14 @@ CVE-2015-2415,0,0,7512055095e6c9148a8e1d7f9bfe0464477371b6d2bb084a1f6ac532f8805f CVE-2015-2416,0,0,0b31ed452077b4b8d973eaf2946d322fefbc298dc4d1c78999b738ba9c906663,2024-11-21T02:27:21.647000 CVE-2015-2417,0,0,588f596db008224ab03afbd73ad0659a1c1a976d9e9aaa4fd43b3b34bc7a5615,2024-11-21T02:27:21.753000 CVE-2015-2418,0,0,dc1aee9b99bd6f9b84cd1406c22e3a310d0fb56f22106fc826eaf0a031c759bc,2024-11-21T02:27:21.853000 -CVE-2015-2419,0,0,8daafa99cb2294f97f995a91c888b231ec53bfb07d2e408d956b5f9b70b3e8e5,2024-11-21T02:27:21.957000 +CVE-2015-2419,0,1,bd517559cfd784a354ab85b9e21fe6b0bba68af89e3e71d34b33ff83b13bd0c6,2025-01-17T21:39:50.700000 CVE-2015-2420,0,0,6cd9292688b9c4caad3ef00795f216de2ea230a683201d7a9b3ca0838bbc87d0,2024-11-21T02:27:22.063000 CVE-2015-2421,0,0,527a453b8446f5bfa81f7d5c60d49a63a5df609d371d6eafcdba71c7d77fc1f5,2024-11-21T02:27:22.170000 CVE-2015-2422,0,0,1c9f4482bc96767226f4aa227fa39b9799d0cca0ea3edee3d19f9cb162e7ab53,2024-11-21T02:27:22.280000 CVE-2015-2423,0,0,42d5bd8c456c579663bd230e11c052dc6af4b7225a1931ab55e41c0bc8c19eae,2024-11-21T02:27:22.383000 -CVE-2015-2424,0,0,9ae78885f86f4e2d9b56004384ce84c9755f220085e52e4249dd5849959383e2,2024-11-21T02:27:22.517000 -CVE-2015-2425,0,0,b34d20362bfba815c4005956e855cfc07b174653b7e61b1244f3b6701148cabb,2024-11-21T02:27:22.633000 -CVE-2015-2426,0,1,72ea76bed8868889f055e199d17c2feb7247c30abf4f8c963d7c3c48580ae770,2025-01-17T20:23:27.523000 +CVE-2015-2424,0,1,86ea4eb5d4fe7477377c15eea20cce9f232b36340a9d7c6d14074aec45565f9e,2025-01-17T21:42:06.810000 +CVE-2015-2425,0,1,897c7957a8854933128306aa5ee23f8ae1c56365274b89e5eaf174a22f4e41a9,2025-01-17T21:42:13.630000 +CVE-2015-2426,0,0,72ea76bed8868889f055e199d17c2feb7247c30abf4f8c963d7c3c48580ae770,2025-01-17T20:23:27.523000 CVE-2015-2427,0,0,55abc32dc641b1459ddff4dad2a062e6486deafbfb28dde2091ea8dd3b588f4e,2024-11-21T02:27:22.863000 CVE-2015-2428,0,0,c3fed403027608df7c604e96f1cf1d9d58f8b077ac33ed1fac80d48d4de5efae,2024-11-21T02:27:22.963000 CVE-2015-2429,0,0,6be635d2208a9a1c248aca11d3c39004b6116c618774c2e9a60c137855ab2935,2024-11-21T02:27:23.077000 @@ -75929,7 +75929,7 @@ CVE-2015-2498,0,0,202cbbf2c14229e42623ba9128bdc51ccc3a1902c2c354f8f3cede5a9184b5 CVE-2015-2499,0,0,70e8036036c71a6de7081ff692ff0e4a3549e9bd108e6c7bca9e2608a7a3b604,2024-11-21T02:27:29.900000 CVE-2015-2500,0,0,496ff078b783b269b965c0dd26ab28dfcb36e7af0def9d2fdb2b5bf345bfe394,2024-11-21T02:27:30.020000 CVE-2015-2501,0,0,774a00ebcdd2619b1e941d592326a64fd3994a8c6df23a03fe342a89e0eac333,2024-11-21T02:27:30.123000 -CVE-2015-2502,0,0,9acff03600d4228999ad3c87e88105973ae06f4e5be92405eb6dd94388a9304f,2024-11-21T02:27:30.230000 +CVE-2015-2502,0,1,3c3eb6f250479458660abd40657b90a15c303f4757461d7df8931503888d6e24,2025-01-17T21:36:28.900000 CVE-2015-2503,0,0,7e8500b80856a7799d677bc4d2caf972dea8e91c4ba249bc08c8754fe59623c4,2024-11-21T02:27:30.357000 CVE-2015-2504,0,0,2d91468948eb80c794f9274ec20d44d15c583164dac8ea9bf906f3ef46ee9088,2024-11-21T02:27:30.480000 CVE-2015-2505,0,0,e00dc56f0c8441e1a169b1e41e377b5a1a5f5ff1585811e95a57d965627ad58f,2024-11-21T02:27:30.587000 @@ -75972,8 +75972,8 @@ CVE-2015-2541,0,0,b4ad359df8ea3d6ce59de1ec9aea5fc3f9b5a7972b8730a22c8a33204924b5 CVE-2015-2542,0,0,e858356d88869dfc32fc0a5db3f8ff2e6c58c20d9b80f3e051aa3022452eec21,2024-11-21T02:27:34.567000 CVE-2015-2543,0,0,d2981f278e391c30162d239a8c90ece25d994ee78f79bc50898095faf6471efc,2024-11-21T02:27:34.680000 CVE-2015-2544,0,0,4e5b0730ad2054e505576a69c1345f1cb6192323f7c2e99a172295e5997e6f06,2024-11-21T02:27:34.787000 -CVE-2015-2545,0,0,90e359775dc9879bca8b59826c0a14a2a4faf8bbb4d47054783f5ab46c2c6a60,2024-11-21T02:27:34.900000 -CVE-2015-2546,0,0,0ec1ea2a09c717603d7abf368114f33e354b1246512e92e5c00485274890ada1,2024-11-21T02:27:35.020000 +CVE-2015-2545,0,1,ef820c6faf95db393ebc31f5daf1b8c7ec3c1957c443974d478a53b0fccbd742,2025-01-17T21:36:34.027000 +CVE-2015-2546,0,1,d50a898920dfa7d46fd02f67918e109efe147136ee9f751dc4827a0b1a91e8da,2025-01-17T21:36:42.523000 CVE-2015-2547,0,0,71327887aaaf05c12c1ea748b54de15f5859e1d66eadec6ddd3af104078d9d44,2023-11-07T02:25:22.523000 CVE-2015-2548,0,0,479e31aacc15b060afbe8ad07e34024eff90df53ca8ea1778dba1c3ec3a3391a,2024-11-21T02:27:35.150000 CVE-2015-2549,0,0,0611df9998e7a8096b95492e11ed27891d3ba1b63b496f542cd355dc6b2f94f5,2024-11-21T02:27:35.267000 @@ -181498,7 +181498,7 @@ CVE-2021-39176,0,0,2e3aead9ddd0b82b89926b6a20fd914969b178169fe642b78c215589ebc0f CVE-2021-39177,0,0,94621f65be7365339566e701b063302230769a53f23d4c2a33dc46068aacc51f,2024-11-21T06:18:48.060000 CVE-2021-39178,0,0,46da173937ffd2a6580777e8dbae9e5be56ecd9a133d4aba6be686af97883ec2,2024-11-21T06:18:48.217000 CVE-2021-39179,0,0,672ec5401735fc18b84933f2a306cfabbeb7a7ee6c7bf4f54e7242157b1a725b,2024-11-21T06:18:48.367000 -CVE-2021-3918,0,1,0c75c618fba6a4b816bf8c046a9a04c22dada1d9743e213ac614cbdf1ae5afe6,2025-01-17T20:15:26.073000 +CVE-2021-3918,0,0,0c75c618fba6a4b816bf8c046a9a04c22dada1d9743e213ac614cbdf1ae5afe6,2025-01-17T20:15:26.073000 CVE-2021-39180,0,0,c645e58cee4b609a57409f03eb7666998e18efe29cd42facfb16d72ad079e1e6,2024-11-21T06:18:48.587000 CVE-2021-39181,0,0,6ea853949c3c45c0050c591197e804812653e58aaf24989b0476e638140790d6,2024-11-21T06:18:49.193000 CVE-2021-39182,0,0,36a7c52fd4a3b7880bbe227b743f81fd4242f9537ed0c611bf72c8f848ba42a7,2024-11-21T06:18:49.347000 @@ -206768,7 +206768,7 @@ CVE-2022-4063,0,0,81990d17f14d70663f3d859eb917b837f3cc25942c932f3802b4b252a1457f CVE-2022-40630,0,0,27154720c2f65a9ab1d7019a7dadebdd723234d03a6892aa623e3115ce42f115,2024-11-21T07:21:44.650000 CVE-2022-40631,0,0,1cab6f89a0a16f36a479b0c66c7e6f586ade7ff36056e79a6272fdb7189a508e,2024-11-21T07:21:44.787000 CVE-2022-40632,0,0,2db3276ec5e3ad600471c995b66de2baf9eb225871fa1306467dcfee1424a2c3,2024-11-21T07:21:44.977000 -CVE-2022-40633,0,0,55c0c021ebe321a2fa80cfebfc913809dae9d2f504a40c436274a621f55d27b5,2024-11-21T07:21:45.110000 +CVE-2022-40633,0,1,c1e8b5f398c405df71dc5e5293998d79054f0beb9da018fe45dc88cf6ebc5c3a,2025-01-17T22:15:26.210000 CVE-2022-40634,0,0,38e73191b340ae880c43ffc1a71c771641cd1db97131702e009b02e78fbf6063,2024-11-21T07:21:45.237000 CVE-2022-40635,0,0,79645a22302ac74ff2ef0daeef470b4d7704a51db2984faa3b3a81a3387529fd,2024-11-21T07:21:45.373000 CVE-2022-40636,0,0,669a0366b9b0cf27d6e87ea4373e444b8994970975e188a2d8e62d9fd5b1ce52,2024-11-21T07:21:45.500000 @@ -207685,7 +207685,7 @@ CVE-2022-41692,0,0,d4ab23325d5f41e82bc4dd7738a81423c579d427a3f673f7325145296e27c CVE-2022-41693,0,0,1ddc4eb21ce7bfebe983bb7fa66dd722ebfa2560e816379852fe95aa76c98c9f,2024-11-21T07:23:39.740000 CVE-2022-41694,0,0,13fea11f525189752ace5a4bd2aac59370a7b0a673ae13da1c1ef8114f9588a5,2024-11-21T07:23:39.873000 CVE-2022-41695,0,0,9210d7bdad136f8916cc7b644c1a8ef7b74250ed8b3b825964784975abb4a6ca,2024-11-21T07:23:40.010000 -CVE-2022-41696,0,0,5ba5b25260ee83a10fda4f6de3114e2b05d0930f35e9a899b6db13937beb2e33,2024-11-21T07:23:40.160000 +CVE-2022-41696,0,1,6d315c1bca8c494e799721b13367283fb488038fdffd54e8a0c57585dc214967,2025-01-17T22:15:26.413000 CVE-2022-41697,0,0,f00b141234f72886b17f4c01f4b33545cf7804193e1c401581c723d7666b2f9f,2024-11-21T07:23:40.287000 CVE-2022-41698,0,0,702b3b5691f0e4832af2d18d9487073faa8cda8765d70b6d1fabe5bbc59a6e66,2024-11-21T07:23:40.407000 CVE-2022-41699,0,0,506f1b14eef7ebb06f69aacc950ebc30837a9c960b333b7d62da43f205c68a11,2024-11-21T07:23:40.563000 @@ -209096,7 +209096,7 @@ CVE-2022-43507,0,0,9c1debc9f0fe5c55da3e74eb8438f93cbd01cdb83cf018c1efa9d548449db CVE-2022-43508,0,0,213518e35a0e980f7d63f0d455efe9a02a14cb788bbf513c85a37af3167f8a8d,2024-11-21T07:26:39.793000 CVE-2022-43509,0,0,f260041112e062a3483cff6f41e7cb0b1f8d36ad9f2271cfe5b7b911c9bc754c,2024-11-21T07:26:39.947000 CVE-2022-4351,0,0,fcbf305de217537de8f4077247a910e2400e62ba6c5930fb198a467af04d483e,2024-11-21T07:35:06.730000 -CVE-2022-43512,0,0,467827d7c58df7526ab2c5f0bcfecacc7f18778ffa2fba092f2edeaad333dedc,2024-11-21T07:26:40.087000 +CVE-2022-43512,0,1,a51c1f5fb7aa2e5ea971d01f6eed927bb609fdb0ad336bf75c9df0d95a0863f7,2025-01-17T22:15:26.590000 CVE-2022-43513,0,0,50feb12093b3a60914e372d15f8441f150941ec3b05597671ccb94a16ec4c825,2024-11-21T07:26:40.527000 CVE-2022-43514,0,0,77a047eef85fe88e54f789aab1387c41aaa5885c650fc2d0d427366404bc9b7c,2024-11-21T07:26:40.713000 CVE-2022-43515,0,0,f254c9d4fff6c25998f11bfca5e5dfdfe9dbad86928d34a26d287c4ee40bfd0d,2024-11-21T07:26:40.877000 @@ -210207,7 +210207,7 @@ CVE-2022-45115,0,0,b15d64a0b05f59c19ad4082d608529767652d2eddc0f428e43e33a312668e CVE-2022-45118,0,0,a9a37fd5cd5086c5e6c8dd42feacdfc297afebe03af70ecc6cdefd6a62262e4b,2024-11-21T07:28:48.013000 CVE-2022-45119,0,0,0ec7cea9a64a43b4cafb16ef188454c0780dac63007898e6ccf76bdd44cdd11e,2023-11-07T03:54:35.800000 CVE-2022-4512,0,0,94f4aee10d868a090ee99610058e7773ab635340a3bfdad3d4ff380bdc153990,2024-11-21T07:35:24.663000 -CVE-2022-45121,0,0,266a7b238104005ad0aa6a4034aa972eb5790f6bff64d3b5e0183d9fa22c6ccc,2024-11-21T07:28:48.153000 +CVE-2022-45121,0,1,ac622b3511eb295f7f4e0eb9513dae84100e20f05272d373782e415cf8984486,2025-01-17T22:15:26.757000 CVE-2022-45122,0,0,a46ab503159417a5ef3d2adf3c698b6e1c34052f45e5ad949a5e65a3681145a7,2024-11-21T07:28:48.260000 CVE-2022-45124,0,0,b28668f1937ec5406e93724f618a9f68a8d78ab6816045d3f38c01ada228bf40,2024-11-21T07:28:48.373000 CVE-2022-45126,0,0,7d352c26524a4eab8e0c8c6be0b4eda27a8cd071f5717323b95140dec8c66d6f,2024-11-21T07:28:48.500000 @@ -210464,7 +210464,7 @@ CVE-2022-4546,0,0,298620c799a1f3c6297dbd8923c6d7863e99176e5edfd833b05c371e1b6c05 CVE-2022-45460,0,0,e43406d3c3e1b140b6943f963232aa87efb306e6a0fc75f54d71b33a3dea4569,2024-11-21T07:29:17.817000 CVE-2022-45461,0,0,56f2b787c69deca86bd3b5d6242a910782e4836cc155b584a001e8e770eb3c65,2024-11-21T07:29:17.963000 CVE-2022-45462,0,0,32a35c19ff603662093585c37e6728cd478d853de03e2f1a86a26cb05e496a4b,2024-11-21T07:29:18.100000 -CVE-2022-45468,0,0,6e22f205abd2675fc49c4dd6cb74b1def2231a6acd6a710354409bddf6d81ff8,2024-11-21T07:29:18.210000 +CVE-2022-45468,0,1,fa1867cc9af6053d2ec73a891320c6f662470812ba37fca8f9f416f66f1702e4,2025-01-17T22:15:26.927000 CVE-2022-45469,0,0,10bf55fb9ce7b61a18b792fad66711157265be7d37c9751a18b547b87ea10df4,2024-11-21T07:29:18.303000 CVE-2022-4547,0,0,51ee15e64287577a8049b1f42132b37d58fea2f22fa687791795f3c930f6d263,2024-11-21T07:35:27.947000 CVE-2022-45470,0,0,7a0272577430809ad451c7cc2786bf7c96e8f498b5c4453652c56de828914865,2024-11-21T07:29:18.417000 @@ -211019,7 +211019,7 @@ CVE-2022-4628,0,0,af23e6e9e565780759bdf59d3b766a635ad57b4fb21c2728e54741b055019c CVE-2022-46280,0,0,abeb67f7e3dd286f90e79c3e35df9e3bf3b9629711af7006bc94b23dc65a2e27,2024-11-21T07:30:18.347000 CVE-2022-46282,0,0,9c36d4ca9968a01130382cc6e2a7ddac6b9b823837d34fe0c53147dc3f4f259b,2024-11-21T07:30:18.477000 CVE-2022-46285,0,0,aa9498ffc3f606f2ebf9c85686190d94cc96fd79334ec854f8b7fb58c6f566c8,2024-11-21T07:30:18.587000 -CVE-2022-46286,0,1,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000 +CVE-2022-46286,0,0,cbe51ec8707537edac370be593bedbfd387955a9bad13447559576eb38b6b947,2025-01-17T19:15:26.120000 CVE-2022-46287,0,0,797a4cd550a55f760e45973c53ef155fb1f9ed748b322d3cdec94808ffcf1039,2024-11-21T07:30:18.830000 CVE-2022-46288,0,0,7480c39c861fc7d58b6b32d83d68b02f45625585e631468efb23cfe6477ab3b0,2024-11-21T07:30:18.957000 CVE-2022-46289,0,0,68fe438812fa3dc83afea63191a2a290a06c3e87ab7c9255e9ab7bbfd73b0b2b,2024-11-21T07:30:19.077000 @@ -211033,7 +211033,7 @@ CVE-2022-46295,0,0,1475cdfdf832c05ff1f7e5f2873d5130a33d18d4af49153ac50dd53604674 CVE-2022-46298,0,0,81ecb0503a158126ac020b654cf720846310525e0e27480c8543970f686e57da,2024-11-21T07:30:19.993000 CVE-2022-46299,0,0,ff1e6a2ba860be014cd4aea8e10fc3dcd3ae06dcc03ea8be80dbc20ea84aabb6,2024-11-21T07:30:20.133000 CVE-2022-4630,0,0,1f7a479f36a53b238712e3f77f246b555a3e4d1c422f55a47b284b3a44d71efc,2024-11-21T07:35:37.843000 -CVE-2022-46300,0,0,5b86ca9d8d8c0f42139886e468061925d654c04361a080fd7c837026af6bb8e9,2024-11-21T07:30:20.273000 +CVE-2022-46300,0,1,987e6e8c1a1c4bdb3c02ef95f9cb79147d2c45360c4f2b52425b215f3c199d2f,2025-01-17T22:15:27.093000 CVE-2022-46301,0,0,a7425d855a626c1b2a1d46573da6d9c68678c556b5eba390077458e29f6bf52d,2024-11-21T07:30:20.393000 CVE-2022-46302,0,0,6adfe7ccfbd5e9bdb19474982e8602306db7158978e8b33aba4fe4d22ec580b0,2024-11-21T07:30:20.527000 CVE-2022-46303,0,0,cc6804fd19995000674841f108652842954ef2981cc6218c6a98837004d0279c,2024-11-21T07:30:20.673000 @@ -211357,7 +211357,7 @@ CVE-2022-46725,0,0,7fff6feb41ccaa3f67f4c9f0e48196fb81f9abdb42c8d2f41f770e073c8ac CVE-2022-46727,0,0,af8e313bca217b93c3f2672bb55870facfee6375d281bc0c07e1351e04696f99,2023-11-07T03:55:51.580000 CVE-2022-46728,0,0,3a822acf6167275765f764ac260bc9302405662dfcb2879d04efd07d46f8ff04,2023-11-07T03:55:51.883000 CVE-2022-4673,0,0,ae81b2d3725dffbb1142722b47d0f8c8c70b094a6f67b615dbce927873432382,2024-11-21T07:35:42.640000 -CVE-2022-46732,0,0,0ef206a36781119a6ccf5c9d69295d30ed2e91e67ebcd85201aa6e5f4cb275e8,2024-11-21T07:30:59.237000 +CVE-2022-46732,0,1,9b6803bda51c38cdf9bb5d0cc1148f6b00114f3012d00faf6d32a6a27eeaf0d6,2025-01-17T22:15:27.260000 CVE-2022-46733,0,0,dab6a16ba7aa13baea3e43ae318c71e03ced958ebc4b4f9863afc731ab25e4c2,2024-11-21T07:30:59.350000 CVE-2022-46738,0,0,2bc8d3136674cbb74669d235a37a0dadd4f4f38eb64d7bbc723615e5d78bd0d6,2024-11-21T07:30:59.470000 CVE-2022-4674,0,0,862e8bd2930ad0406eb37b5a5972b8f3d6437e29a1be0060b6860a9f39c31ed5,2024-11-21T07:35:42.747000 @@ -213168,7 +213168,7 @@ CVE-2023-0045,0,0,704c91fccb5b28af66e8c86e56e1fc3c00e24836d4ccf8b0cb3c414ef15e16 CVE-2023-0046,0,0,995378f3517e0fe9dc2a92e59c5d98c60ae6bf06c6bef581c852efaeae77bfee,2024-11-21T07:36:27.290000 CVE-2023-0047,0,0,0f6f54604438936498314b186c9ccd6c0fbbc8e12d0f984b6b0c58ce4eb80ee5,2023-11-07T03:59:30.533000 CVE-2023-0048,0,0,b291f54384bd541745864236ed994833e5e1baf706d05fdc783803ca006c2979,2024-11-21T07:36:27.420000 -CVE-2023-0049,0,1,bc8ff9f1805475042b8cc58a828cdcc6a3248eea7cf0c0a2a1cf44c94a1eae21,2025-01-17T20:15:26.260000 +CVE-2023-0049,0,0,bc8ff9f1805475042b8cc58a828cdcc6a3248eea7cf0c0a2a1cf44c94a1eae21,2025-01-17T20:15:26.260000 CVE-2023-0050,0,0,70e74b9b8208384d9dcc342ce6c842472dff7944ce13c6af2a0e40d946f1bad8,2024-11-21T07:36:27.650000 CVE-2023-0051,0,0,b3736b0c92d0c83ca9692b48df63f81280eb185360d47b3e152bbd17075ac98b,2024-11-21T07:36:27.763000 CVE-2023-0052,0,0,2e6b156356f96952fd4e942ed201144d57623fa780d29644abbe2fcabff76c7d,2024-11-21T07:36:27.887000 @@ -213719,9 +213719,9 @@ CVE-2023-0617,0,0,691cc18bb8bdbd989d0ff33cb4f5f372eb4b04c5e44de3164da8290f4a638d CVE-2023-0618,0,0,775826c71f1996e7cb60426b950decb11d90a801edfb5e45db1856141eb943d9,2024-11-21T07:37:29.760000 CVE-2023-0619,0,0,5722e52aa72b08165b4166b3b9b6859b19c0331870b8aeb3e79b2b7004003a03,2024-11-21T07:37:29.880000 CVE-2023-0620,0,0,a5515d5c7090dff005472db945dd0702898706a494973ef909a2290deb6fed78,2024-11-21T07:37:29.983000 -CVE-2023-0621,0,0,aea4c5e5f6b151a1d1e194e82b84b63001c0a20c6134793765c7eb84d6e5fb38,2024-11-21T07:37:30.100000 -CVE-2023-0622,0,0,8011473c07fb27b652bae2c3dd79f8294a3782c694d53de3536f7767213fdfe6,2024-11-21T07:37:30.190000 -CVE-2023-0623,0,0,596ebc85b5e5b9abfa142d234ffa378d4897fca425a60bdff27b9bccfdec446d,2024-11-21T07:37:30.280000 +CVE-2023-0621,0,1,357536594b0dba3db9d46cabe10b3eaf600ab9b92a901f2c561741cd080a7a23,2025-01-17T22:15:27.440000 +CVE-2023-0622,0,1,eba408c9fc4b879e8e2d3f31f1bdf7016481e47405c9cbc09350a43ba0297e47,2025-01-17T22:15:27.613000 +CVE-2023-0623,0,1,bb06b621ab29fca2a5d0de54c848579ce397fdb383a791d7039fbd6e8eba0dc2,2025-01-17T22:15:27.790000 CVE-2023-0624,0,0,eaf3ca96b523453f69ed50c1e3d6e02b21e9481d5e9740644bb572068c03671c,2024-11-21T07:37:30.367000 CVE-2023-0625,0,0,3c17b1eb2fded0e36723950e50b80b46fd91e13ea45ab8676337a9333caa4f21,2024-11-21T07:37:30.457000 CVE-2023-0626,0,0,66b454a1f2a64e228f8638b52590a60150b0e68a5bac4c60006842b880b3daea,2024-11-21T07:37:30.583000 @@ -220064,7 +220064,7 @@ CVE-2023-2595,0,0,03162bc5022fbbb42d9d2a4432deae69e87f6292466a73e282c58b39efeab8 CVE-2023-25950,0,0,9c4446fe06b1b9cd133d12ed0f382469d8b479b1999ff643029f47b9ee324f95,2024-11-21T07:50:30.227000 CVE-2023-25951,0,0,cbe311b60154417e1ee241796aa378a0815122f3e435f42cc5ade363ec34de6f,2024-11-21T07:50:30.337000 CVE-2023-25952,0,0,9ce32dc72cc6827cb9c76e0645289aad0b1e5278d4796296e6e8d037d949982e,2024-11-21T07:50:30.477000 -CVE-2023-25953,0,0,331af0d8559ae571ed576fc6e0762d8d129d8872af8a94b22161f8ae7ad1034a,2024-11-21T07:50:30.607000 +CVE-2023-25953,0,1,4927a5577d3d58cba6f2f8ed4b68e0d60bafedb819690a56ff0cf60666a6cdcf,2025-01-17T22:15:27.970000 CVE-2023-25954,0,0,a390ff11f2215f142ba09a417106c386bc0a05ab482e20604002e6383878d74c,2024-11-21T07:50:30.743000 CVE-2023-25955,0,0,a5674fef30cfd50e0f69ca26585ceee9624b2e16aac77484f6a586723321bd18,2024-11-21T07:50:30.860000 CVE-2023-25956,0,0,e1e9a1328ab2a7147ff0accc99e5a12b6f8d948f953b9b04d76482155f876e12,2024-11-21T07:50:30.970000 @@ -221567,9 +221567,9 @@ CVE-2023-2792,0,0,fef13f732773d0e431073564ea7df3b9b2f07f8206a8b84cf0ecccbd55e32b CVE-2023-27920,0,0,9d81864437507c8b8a361728c9a02b9737429af055acb54d59da6c86619da664,2024-11-21T07:53:42.113000 CVE-2023-27921,0,0,0085c6f81f0b41ea4c17a31a5a9e61d59be8e76b29f5ff83e41d87884f7ef722,2024-11-21T07:53:42.243000 CVE-2023-27922,0,0,ac0158270331d35cb0b6ab82df6120fd3e141fc0060add4828d4a13f54eea95f,2024-11-21T07:53:42.360000 -CVE-2023-27923,0,1,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f33f,2025-01-17T19:15:26.870000 -CVE-2023-27925,0,1,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000 -CVE-2023-27926,0,1,452e0fe0b991a0da2a8be11c47cd2297b20bbb72a6e0c2fbc9f597f1f456616b,2025-01-17T19:15:27.213000 +CVE-2023-27923,0,0,dfc2af0be88940f681e2754002453c6d1a65077412d9597e5c65f3d7a904f33f,2025-01-17T19:15:26.870000 +CVE-2023-27925,0,0,d2d5f164a571dc49cd31a6f0b6b6032d3bf875ef3eb1471e532be0eba1903b26,2025-01-17T19:15:27.060000 +CVE-2023-27926,0,0,452e0fe0b991a0da2a8be11c47cd2297b20bbb72a6e0c2fbc9f597f1f456616b,2025-01-17T19:15:27.213000 CVE-2023-27927,0,0,abacbdd0b9fa3d33f6de3eefe2559fb0a8687912f1ba95b656a8359d9c1e54ba,2025-01-17T18:15:21.080000 CVE-2023-27928,0,0,88bb21c18c03cb2a32e94eba7299b570726c57a8fc6e8495f81a0709e9ed14bd,2024-11-21T07:53:42.930000 CVE-2023-27929,0,0,a091d899039ed37bf23b8240da36d5ddf0facff2f164c1c59d32fc6ea55eb1e2,2024-11-21T07:53:43.113000 @@ -222006,7 +222006,7 @@ CVE-2023-28362,0,0,27177a8d408082bb8174e3277015cbad3f5c47547c0db03786e552334779b CVE-2023-28364,0,0,b8e69a33d67631d2c3d239f1c01280f5576d4f6621054c060df4f07489827dbc,2024-11-21T07:54:55.643000 CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722eee,2024-12-12T18:54:11.327000 CVE-2023-28366,0,0,960802829fc443cdad65c26e57c943b97bd525d1c3e69a293aaac3644999e79b,2024-11-21T07:54:55.887000 -CVE-2023-28367,0,1,ea542543ae5e959ac9dd6964b8c5f27f5841b12efe8c4d64b461fc5cfcaa014c,2025-01-17T19:15:27.370000 +CVE-2023-28367,0,0,ea542543ae5e959ac9dd6964b8c5f27f5841b12efe8c4d64b461fc5cfcaa014c,2025-01-17T19:15:27.370000 CVE-2023-28368,0,0,36f7dd98387b40400855f4cffb9250bac7b1a05259b6ebff4e7caf81b76ab285,2024-11-21T07:54:56.150000 CVE-2023-28369,0,0,815c110e1ebcd6e549e22f4e285aba8d19a651b9d972e72a40643fc9d8cd7614,2024-11-21T07:54:56.247000 CVE-2023-2837,0,0,ac2b220952bcea1d0717efa8546becfc7608c322c6c4219716a62813de1b4fcb,2024-11-21T07:59:23.307000 @@ -222032,11 +222032,11 @@ CVE-2023-28387,0,0,f9b7d4deb7119122d0725dd3c3f5ae24a7033492e3de0c64d04b1908eb139 CVE-2023-28388,0,0,c6e3f76c7146a4a5420346e6b4abc4c602b810d24302c2c2bc9194a7fb16021c,2024-11-21T07:54:58.410000 CVE-2023-28389,0,0,bff9d3c68a6d345a4e7511aeb7a5417443617d3f28ef7e3b6626b492a82cad7f,2024-11-21T07:54:58.520000 CVE-2023-2839,0,0,af48c4f8dd5100e3db5e7ada1d63714675a34143bc1c04b0e4d3e83c9108abbd,2024-11-21T07:59:23.553000 -CVE-2023-28390,0,1,c85aed1822e6c646b3274670df5bf41d2bf4e7a5359b7c9a5347420b02a587bf,2025-01-17T19:15:27.540000 +CVE-2023-28390,0,0,c85aed1822e6c646b3274670df5bf41d2bf4e7a5359b7c9a5347420b02a587bf,2025-01-17T19:15:27.540000 CVE-2023-28391,0,0,96b2e987a61ff1f4717e8853a32fe94900b25df323f3d5fdc9e3209fa1732e3a,2024-11-21T07:54:58.733000 -CVE-2023-28392,0,1,83a0a4651bcdf30b2f49f0699cf09751b91bd0a6cee1a4c54ac295fcf4f78f63,2025-01-17T19:15:27.707000 +CVE-2023-28392,0,0,83a0a4651bcdf30b2f49f0699cf09751b91bd0a6cee1a4c54ac295fcf4f78f63,2025-01-17T19:15:27.707000 CVE-2023-28393,0,0,b9d1947879606ab8cdca8a7d536ab0d1decf3db81b719c9bdde0ae5d346ca7dc,2024-11-21T07:54:58.997000 -CVE-2023-28394,0,1,100f1bc5bc8d03e63b963636191abcd9b52f1d706680b9bdf6e07c40f68b7850,2025-01-17T19:15:27.887000 +CVE-2023-28394,0,0,100f1bc5bc8d03e63b963636191abcd9b52f1d706680b9bdf6e07c40f68b7850,2025-01-17T19:15:27.887000 CVE-2023-28395,0,0,904bec410c3c41ff86abb1cb882c22a23ba059a83aab1c32f70cd670c88b4dae,2024-11-21T07:54:59.197000 CVE-2023-28396,0,0,c36f2c0b4c21b1edb34a4b96e04dcd198cdad10534665759b7da80f1c87657fa,2024-11-21T07:54:59.300000 CVE-2023-28397,0,0,4bff9ed10c02507982d7b9dab6671245255794a218efdc6bf229f1abb97481c6,2024-11-21T07:54:59.407000 @@ -222050,7 +222050,7 @@ CVE-2023-28404,0,0,8cba623eb88a12f1ff1c663d93cba5426a2b008fd2ff25ef48ad773dee273 CVE-2023-28405,0,0,eb07a7c8bb3f0a504569a93d84e1a79e2aba3c46584783ae4f7cb3c9a6d9ae7c,2024-11-21T07:55:00.133000 CVE-2023-28406,0,0,551653fb8dc6910553ae3a28d97b601eb1c980f7dcbaa1b5e098debe28505262,2024-11-21T07:55:00.243000 CVE-2023-28407,0,0,199205300f4f0e14a26b03c1c8f7c07f60c835a3558153d1547344007813055e,2024-11-21T07:55:00.380000 -CVE-2023-28408,0,1,62e24e047076cef91429bde7ba9f00808a813e368271a169e7e2ee6573bf088c,2025-01-17T19:15:28.050000 +CVE-2023-28408,0,0,62e24e047076cef91429bde7ba9f00808a813e368271a169e7e2ee6573bf088c,2025-01-17T19:15:28.050000 CVE-2023-28409,0,0,05ef2028d153b92b090be4ae3fc5be09764f1611b8ab1280c421e9eac3952df6,2024-11-21T07:55:00.603000 CVE-2023-2841,0,0,65e0123fc1c15f5180846b067709d76a1cfee713e1fec37f8cb236ae2ab617ba,2024-11-21T07:59:23.790000 CVE-2023-28410,0,0,115b868a646d0d217870b219c7e1a1d30d699f9bf5975c779a55555499229b77,2024-11-21T07:55:00.717000 @@ -223303,7 +223303,7 @@ CVE-2023-29915,0,0,0ce0397192842c252b846962bced464e60694e0efb915231157cc6a2f5bb3 CVE-2023-29916,0,0,32e47b0c304e58029efd0b2bd53fdd0cc99d8d2784e9816056bd8fec28f9a672,2024-11-21T07:57:38.333000 CVE-2023-29917,0,0,d7eeba389a9e9d9b829727bd8bbc8d886d26f6b82767446d62c5c9991ac5d688,2024-11-21T07:57:38.463000 CVE-2023-29918,0,0,89129b543c3bddd14909f8b651edea6b66467446dd0bc3a51cf2d047e1388bb9,2024-11-21T07:57:38.590000 -CVE-2023-29919,0,1,534b6a0e578a3fd9502e76366d66ebb50860789124d34973be718a270ba8a952,2025-01-17T19:15:28.213000 +CVE-2023-29919,0,0,534b6a0e578a3fd9502e76366d66ebb50860789124d34973be718a270ba8a952,2025-01-17T19:15:28.213000 CVE-2023-2992,0,0,81c4ed0720a0b4f1ca1bbf98c6c15a905ea91d77d082061cdcae83daa76516dc,2024-11-21T07:59:42.850000 CVE-2023-29921,0,0,749acecf71319cfdc6ee74f8f9f25062b01436064aa3dc9392f88eda69f282fe,2024-11-21T07:57:38.890000 CVE-2023-29922,0,0,3431d33c974e0688dae8cb539aef6212beb8727f19b682746cf9f9893095fcf7,2024-11-21T07:57:39.787000 @@ -223532,7 +223532,7 @@ CVE-2023-30376,0,0,20f2a963d7ad818e28318f87f648c34436fcee292966134144cff81cb1dff CVE-2023-30378,0,0,e15838630934f93860865d8658f43cb9c208f4c246ef06ba53c6edc2fd205f53,2024-11-21T08:00:06.600000 CVE-2023-3038,0,0,f94e5be791b5988f81c55513fb4e21975b5d007bb4a0dbf128136e9d14133ae6,2024-11-21T08:16:17.920000 CVE-2023-30380,0,0,696b31ac7ccfb98c41c59846013679362be1517b6f600fde9be15e8086b53a35,2024-11-21T08:00:06.750000 -CVE-2023-30382,0,1,8b5439e9e1c0731e2487a576225ed7d67ba20cf2f5a7cd23dc6fc8a77464507c,2025-01-17T19:15:28.400000 +CVE-2023-30382,0,0,8b5439e9e1c0731e2487a576225ed7d67ba20cf2f5a7cd23dc6fc8a77464507c,2025-01-17T19:15:28.400000 CVE-2023-30383,0,0,632e1374b9fd95787063cd692106c1c920d5f7661a2dc03e359ce31ed1d1138a,2024-11-21T08:00:07.040000 CVE-2023-3039,0,0,5fb1117a3c974bb5675369e9814fd755e9c2c006e24e1faf7e2d4e7dfc8e49b6,2024-11-21T08:16:18.053000 CVE-2023-30394,0,0,0029c2f10bc315baa8071d1799ca0506df08206db7f66c6b9f0205ee7b2e5992,2024-11-21T08:00:07.210000 @@ -224584,15 +224584,15 @@ CVE-2023-31746,0,0,3a8aaaa50147d3d114e7254fa8029831eb539b8eeed897297373531d4ecfd CVE-2023-31747,0,0,e1f12a48eff45f6219f0ac7382e90c9f6cd09a4192724e614d84764897076af4,2024-11-21T08:02:14.103000 CVE-2023-31748,0,0,0f540337304e36e00c3f95780de455af527831695e1251ae1c5fbb139d2d59fc,2024-11-21T08:02:14.240000 CVE-2023-3175,0,0,fab3b543d5ff15291ae9f767c9d5983231c0dacf478e930dd2c194f4b56209b7,2024-11-21T08:16:37.620000 -CVE-2023-31752,0,0,e1a2f383f3389c63e10edb1a5bd9cba3d47f2f35829bffd00c98f70ee3dde98d,2024-11-21T08:02:14.377000 +CVE-2023-31752,0,1,ee474beb03744c87e92450427a948c8f94a94bd80f470a494135a528877b360b,2025-01-17T21:15:08.807000 CVE-2023-31753,0,0,a01c8f63450a5be58d34e8da69864a94437251cbf65819aebace014d90f577ce,2024-11-21T08:02:14.520000 CVE-2023-31754,0,0,0c75682a0bd4eb45a7c37937ec25b5f4de7d53f92879d6007ad582a59d0a5de5,2024-11-21T08:02:14.660000 CVE-2023-31756,0,0,a73045134a3b14e8af18c4165a123a126150c38b75bd32af45321f00329ed5e7,2024-11-21T08:02:14.800000 CVE-2023-31757,0,0,a3655ce676061948f6e1e9354c86685d8c6417d4af6e4a07d846fcff2816711c,2024-11-21T08:02:14.930000 -CVE-2023-31759,0,1,b0fdfe74673c1bb53629cd8431c9e03d5ae487967b83f76eb186d827312a2e58,2025-01-17T20:15:26.417000 +CVE-2023-31759,0,0,b0fdfe74673c1bb53629cd8431c9e03d5ae487967b83f76eb186d827312a2e58,2025-01-17T20:15:26.417000 CVE-2023-3176,0,0,999fe1ea7317073fe2b31bb323d98a6f29f6d8081642f27e32d077db6c6b4e5e,2024-11-21T08:16:37.740000 -CVE-2023-31761,0,1,c57341aba924ff1aff3fc07fbbcb36e447d1450125869ef758718f7cb2a2f5d5,2025-01-17T20:15:26.607000 -CVE-2023-31762,0,1,532d0e70760fe217951cfb4965d85bd3fc3a6855eabc78cfef04cbef357982d3,2025-01-17T20:15:26.797000 +CVE-2023-31761,0,0,c57341aba924ff1aff3fc07fbbcb36e447d1450125869ef758718f7cb2a2f5d5,2025-01-17T20:15:26.607000 +CVE-2023-31762,0,0,532d0e70760fe217951cfb4965d85bd3fc3a6855eabc78cfef04cbef357982d3,2025-01-17T20:15:26.797000 CVE-2023-31763,0,0,706e05d2d51a686562a1101f8bd8dcfea6102f1ec5076cccd54be2f7389c13d2,2025-01-17T18:15:22.763000 CVE-2023-3177,0,0,f3764f4c236d0ab0117ed89ccad93e42a68d1a0bf6301e7696daca10e17bf0f4,2024-11-21T08:16:37.877000 CVE-2023-31779,0,0,57d1dd015d41bdb7a16d9d6f14cf7992f409481c534697d1fe2caa03c46dac25,2024-11-21T08:02:15.617000 @@ -232539,7 +232539,7 @@ CVE-2023-41909,0,0,fe47e0627e6e0587df197cb6248e0465a6c5ef9d1c0f8ba2337ec5ef31936 CVE-2023-4191,0,0,a1f09945fb0d56d83cb9a39e25dcf2c3f3da58585f1ce2f71c0f2f2b554cbd07,2024-11-21T08:34:35.250000 CVE-2023-41910,0,0,64f3a8df0aec898c615375b8ab396e9af1e460f91ed84851a241df6ad1989111,2024-11-21T08:21:54.133000 CVE-2023-41911,0,0,b1e24ed70c01d41beb1625b3453221caf7529f5117e55e253bd79147bbb3624b,2024-11-21T08:21:54.283000 -CVE-2023-41913,0,1,8eccfcb64e4092467b7f3d1e49bbd1c87302ec056e35e181db8ae9f9b277ca0a,2025-01-17T20:15:26.993000 +CVE-2023-41913,0,0,8eccfcb64e4092467b7f3d1e49bbd1c87302ec056e35e181db8ae9f9b277ca0a,2025-01-17T20:15:26.993000 CVE-2023-41914,0,0,629446d372d0abedb1ad82be6b117795a171e478179fae12418e0936509ae8ed,2024-11-21T08:21:54.603000 CVE-2023-41915,0,0,824124f069fd425cbfdde77de3fd5ef411f29d7d8677c33e5d479880df876a7d,2024-11-21T08:21:54.753000 CVE-2023-41916,0,0,8508e363940b50927c9cfffce701c64baac0318125b1f297ea1090b10a3d39fc,2024-11-21T08:21:54.947000 @@ -233191,8 +233191,8 @@ CVE-2023-42780,0,0,cdd093383de8ac80b2dd603c4cd8b5fb12111fdfaea151dda39675c869053 CVE-2023-42781,0,0,e6266811e943f5b3219ef0407d2b4114a945fd77347810cc844cb61ed53dc644,2024-11-21T08:23:08.683000 CVE-2023-42782,0,0,da0c83cbed17a04613b39ce2336362e43c1e910e28a92e71a36daf2e58e858be,2024-11-21T08:23:08.817000 CVE-2023-42783,0,0,98b628fd4937ef156152a20479ae772c8ff5e58950f81df1627766b6fb5ac59b,2024-11-21T08:23:08.960000 -CVE-2023-42785,0,1,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000 -CVE-2023-42786,0,1,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000 +CVE-2023-42785,0,0,8dd676627303de9c3d9ba75f061b4ec60ffeda7ccd7e3a5b84dca9e6e354a6bc,2025-01-17T20:42:36.303000 +CVE-2023-42786,0,0,967866e48165f25bab886d1b856014950038c725e2df60097b32795581ff2a8f,2025-01-17T20:42:31.930000 CVE-2023-42787,0,0,9495dbf34a13c743d9a5e135b36546505b91d005fdd69c84cafbd04056c07414,2024-11-21T08:23:09.100000 CVE-2023-42788,0,0,0c30b35d8520306a2f83f71d70c6e59375e6c5852cdeb5813f843ade4b3abedb,2024-11-21T08:23:09.237000 CVE-2023-42789,0,0,eebbac5c484c3f93b2be647e7bb4c1bcdda0e75aa8868e3a113ae482b9f36f7e,2024-11-21T08:23:09.387000 @@ -238756,6 +238756,7 @@ CVE-2023-50734,0,0,2aab95fd5c588a3dc97b1bd0a6b2f20bfd2911d8fb04a876cbd8fcebb2dd7 CVE-2023-50735,0,0,4f96b135e945b5004f8ce6581b61e59142e00708b1dc6f868a054e729d12e204,2024-11-21T08:37:14.423000 CVE-2023-50736,0,0,5bcd601c09b61694b00e59d37ca8d9fc78245869949bc1916a3889b4eccad37c,2024-11-21T08:37:14.603000 CVE-2023-50737,0,0,2bae2fb365dc9f4ed02a348f748b5179e20f499009864d44daab198cff17a8d2,2024-11-21T08:37:14.780000 +CVE-2023-50738,1,1,71aa9283b563ec923ff9cc7ef837204e01cd197d5ac11b19caa3497cc58614eb,2025-01-17T22:15:28.167000 CVE-2023-5074,0,0,a5fd6d88eec362223e3b4064e6992870a2bdcd5526e9e7c259a1985148840ea2,2024-11-21T08:41:00.840000 CVE-2023-50740,0,0,3525405993410ebfa59c0e2c13f4f85218736bc8538411d8d86d3e99bcb5ebdc,2024-11-21T08:37:14.957000 CVE-2023-50743,0,0,25f6602c5a61a6d7f3ce7f009407eeeb62215a68ef3b38bc4c354b94bd825007,2024-11-21T08:37:15.150000 @@ -239973,7 +239974,7 @@ CVE-2023-52430,0,0,3e605ecbbfa5bc25bd6ba3bdae218b6daf7fb6b7ef5cd1295da5e98a82987 CVE-2023-52431,0,0,3b65e75012502361f350313609372b5ca7987ca043856cb876f1200aaf866296,2024-11-21T08:39:44.607000 CVE-2023-52432,0,0,af6bbc3ba2085044bc35aab3722a76fe65601a751067cd007d5e003c2a8af490,2024-11-21T08:39:44.843000 CVE-2023-52433,0,0,1ccd9225647e705e6c1a54a035b252c92f397c783c91b93e0a2f9e347d0ccaf8,2024-11-21T08:39:44.963000 -CVE-2023-52434,0,1,e52e54cf2796f0eefaf0d192c649076f5b46d3101eff0e65efe71ce7f7375dfb,2025-01-17T20:15:27.203000 +CVE-2023-52434,0,0,e52e54cf2796f0eefaf0d192c649076f5b46d3101eff0e65efe71ce7f7375dfb,2025-01-17T20:15:27.203000 CVE-2023-52435,0,0,4511ddd5fc96777a4d1f57c09b94f2c6faa283be3bbe7bed342b3e7847c5ee92,2024-11-21T08:39:45.323000 CVE-2023-52436,0,0,a1d6ae97e0519eaf28cd31921dc5d9066b5d3c0d9e7a62cba2649db5d3a51484,2024-11-21T08:39:45.483000 CVE-2023-52437,0,0,42872141987ae74e64d2ed167d955818bd8792275db5df08a84277dbded74cb3,2024-02-22T13:15:08.020000 @@ -242857,7 +242858,7 @@ CVE-2024-0584,0,0,6d20f8338a23d66c740dd2ada9b9c1d3225d737f562208348d092c3e9d9874 CVE-2024-0585,0,0,940b680c34ad121dfa69b25eb22e69053bc2430cad3c0f48e3188936c0ea546d,2024-11-21T08:46:56.887000 CVE-2024-0586,0,0,483c6d27ef26d2b65fcaea8ba03f9ffda3e17eabeb80e6d97e4f5eea0e29ae61,2024-11-21T08:46:57.010000 CVE-2024-0587,0,0,77138ad54200d6675cf5918f9c4f964baf339e5709c9bb1413429e1cdc91821b,2024-11-21T08:46:57.137000 -CVE-2024-0588,0,1,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11a3,2025-01-17T19:25:52.137000 +CVE-2024-0588,0,0,6f8550ff909ae4c7da15a920587063371148ea1a9a4ef35a0da365c3198c11a3,2025-01-17T19:25:52.137000 CVE-2024-0589,0,0,226846ac6698efb5192efce79755aeadfa69697e910a3ae32d7b46e4b008d86b,2024-11-21T08:46:57.360000 CVE-2024-0590,0,0,de2ecff39d8bb7ecc0e43dccf38abeb5bc3d8547e89ecead319caf442de4085d,2024-11-21T08:46:57.473000 CVE-2024-0591,0,0,98f524326e7fc7678fbc5044c03d1eca3ded8bb9446a3be7808261fe30cea397,2024-11-21T08:46:57.577000 @@ -242950,7 +242951,7 @@ CVE-2024-0686,0,0,58a4f8086c8930fbb51616d8278e615e925236d70a39e255af4cb3fd241728 CVE-2024-0687,0,0,d93998c18d64bf210c2a399ddf1aafa937567f61265f0453c37e7cb6ae0fcbfb,2024-11-21T08:47:08.990000 CVE-2024-0688,0,0,f3ebd7023a060a28d0cc78dc0ec429c8687e890a387ec0156df94427106c910b,2024-11-21T08:47:09.103000 CVE-2024-0689,0,0,f6eb3eb2e29fe7f683bb7540f0e85632c4df022fb0391601d5707221e43a0076,2024-11-21T08:47:09.223000 -CVE-2024-0690,0,1,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 +CVE-2024-0690,0,0,9ce0b3460699ff11c8b8b32adfe31c63d3dde9fd17062e5d0bc7d944978c5a30,2025-01-17T20:15:27.403000 CVE-2024-0691,0,0,a50f23db7013613682b7784287817142b53493a2be1ac349b95c9f4a363c01f3,2024-11-21T08:47:09.507000 CVE-2024-0692,0,0,7c106171b188dbfb79ab576be16610df86db06442a5256cd303ae65c0208be17,2024-11-21T08:47:09.630000 CVE-2024-0693,0,0,f7c97d1f9175fe3f5ed316e5c461bd1f136f08d48c2edf3c1956c86a334e4bbb,2024-11-21T08:47:09.750000 @@ -243963,11 +243964,11 @@ CVE-2024-10845,0,0,931b9473d8b3acaeed75a4b2f9ecbf4fef9f369e659ecb3385eb6146d4936 CVE-2024-10848,0,0,7f61f0b085abc016c8998a0cf5b48d8ec8995f00d20acc55868e83ab5fdbbc8f,2024-12-05T10:31:39.120000 CVE-2024-10849,0,0,4d7b3a7dc2e3927a966dcad144508a97f5cd8dc242ff6022b96218bb7cdf6329,2024-12-06T09:15:05.350000 CVE-2024-1085,0,0,7c8525867b2d9a7f82bb7c58a74cd9cc5d38a56649870114c80343a2ce238539,2024-11-21T08:49:45.880000 -CVE-2024-10850,0,1,3ee32c584b6a724590d5c35947a6d9faf6699b12da9ac0bec63764664297cd20,2025-01-17T20:25:39.717000 -CVE-2024-10851,0,1,b9719cb3375ad6837d88d3a8dce4e3f2101af4d2bc9d4e1158f357654c88b57a,2025-01-17T20:19:49.767000 +CVE-2024-10850,0,0,3ee32c584b6a724590d5c35947a6d9faf6699b12da9ac0bec63764664297cd20,2025-01-17T20:25:39.717000 +CVE-2024-10851,0,0,b9719cb3375ad6837d88d3a8dce4e3f2101af4d2bc9d4e1158f357654c88b57a,2025-01-17T20:19:49.767000 CVE-2024-10852,0,0,88fb8de98b83210c82faaa8e1b095564877022a37a1a43fabad4deb9c385a053,2024-11-13T17:01:16.850000 -CVE-2024-10853,0,1,ce3a77067be5283eae2eb787cf1349282af756283dbf12ae12e3dd3a959d3a36,2025-01-17T20:17:28.650000 -CVE-2024-10854,0,1,1d21778617e5698cc4a6fe694898eba8adf5884ebfaaf494a56d944972925458,2025-01-17T20:16:10.667000 +CVE-2024-10853,0,0,ce3a77067be5283eae2eb787cf1349282af756283dbf12ae12e3dd3a959d3a36,2025-01-17T20:17:28.650000 +CVE-2024-10854,0,0,1d21778617e5698cc4a6fe694898eba8adf5884ebfaaf494a56d944972925458,2025-01-17T20:16:10.667000 CVE-2024-10855,0,0,ae24b9251832889f0ab5093466f5bbce4d7ad6d8dd4bf7a8321d2155c2606591,2024-11-26T20:34:02.857000 CVE-2024-10856,0,0,7e9eb9b0320a824a6f22312f21c483e6a20231d2b64419ecd83ac1284ebe6150,2024-12-24T11:15:07.260000 CVE-2024-10857,0,0,957ae8afb2b021b5a39096260dcb79ccdc7e257258c659d883b9a23a31df5c0b,2024-11-26T07:15:05.003000 @@ -244088,9 +244089,9 @@ CVE-2024-1100,0,0,06d4324d0991a4d3753bde5966a9b264dffaf09b28ecc31d28a9b56fac7549 CVE-2024-11000,0,0,a38dc4ca4277a8132ad2903c6c182b631811d1505019b5b41baf3535595f105f,2024-11-13T01:05:49.643000 CVE-2024-11002,0,0,540046c3a7a5e2c208fbfda3876432629143ca7cdae67f847887a838d1bc9e67,2024-11-26T07:15:05.413000 CVE-2024-11003,0,0,a783ec5f16b410f220d004ec7b834ae4a4b65091c9d3bd08888ea586385d6942,2024-12-03T14:15:19.800000 -CVE-2024-11004,0,1,37c1d7c2f1ef184a998491b68427a7f9e99e8afc6b534f3bc130eb0bd2b02663,2025-01-17T20:05:17.653000 -CVE-2024-11005,0,1,fa8080dd6a39ae983dd91a0245d004a410872839033c117908c796f6ebe0bef1,2025-01-17T20:23:26.140000 -CVE-2024-11006,0,1,5c4a40f976629354d970d466e03d90ddfcc056a711f9bc6e5c571798db0e1e41,2025-01-17T20:23:23.497000 +CVE-2024-11004,0,0,37c1d7c2f1ef184a998491b68427a7f9e99e8afc6b534f3bc130eb0bd2b02663,2025-01-17T20:05:17.653000 +CVE-2024-11005,0,0,fa8080dd6a39ae983dd91a0245d004a410872839033c117908c796f6ebe0bef1,2025-01-17T20:23:26.140000 +CVE-2024-11006,0,0,5c4a40f976629354d970d466e03d90ddfcc056a711f9bc6e5c571798db0e1e41,2025-01-17T20:23:23.497000 CVE-2024-11007,0,0,62a2e0757d628f20a5e5c0dd4a347b28f717af7d2afebfa5668d63b84e88b9e1,2024-11-22T17:15:07.010000 CVE-2024-11008,0,0,f77f5c0af0d83a13a0666741ffaf97ab51cf85c369755c809be24c29ec4e42eb,2024-12-11T11:15:04.947000 CVE-2024-11009,0,0,f480d27ee8261f76524c7f6e635dd05967cd1bee3828280624cb8a929fc9e083,2024-11-27T12:15:19.383000 @@ -244309,8 +244310,8 @@ CVE-2024-11263,0,0,cc23e994a38bc31df951aa6a58125fc0f0777c81e47c57f81b464948cdbf2 CVE-2024-11265,0,0,cd84e375ba34be8f1d8c0a95984eed473f1b4c14b99dc4b41ab53021d7d29454,2024-11-23T06:15:18.310000 CVE-2024-11268,0,0,65d234ad05896fe7713da8af2e2cfd7055c2e949b8bf81d6b5e68616c5bf2258,2024-12-09T18:15:22.120000 CVE-2024-1127,0,0,64ca0bb18ea16b2fd1f9f1c90b4e9efdaa03cabe0d526d98a06239671c9cf287,2025-01-15T18:22:10.127000 -CVE-2024-11270,0,1,f913b393ed1680b42f1ef0da4b22b8b795701c7c65dc154e477c74e712bf5f69,2025-01-17T20:56:14.373000 -CVE-2024-11271,0,1,6f64f81c0050f88212781d232ab52df3dc26095a2c8e61b8de7b71e76dbe7021,2025-01-17T20:49:14.347000 +CVE-2024-11270,0,0,f913b393ed1680b42f1ef0da4b22b8b795701c7c65dc154e477c74e712bf5f69,2025-01-17T20:56:14.373000 +CVE-2024-11271,0,0,6f64f81c0050f88212781d232ab52df3dc26095a2c8e61b8de7b71e76dbe7021,2025-01-17T20:49:14.347000 CVE-2024-11274,0,0,d1342831a6abeef5bb3515b5ff94eee0e3fe5805367e12756f20bd1f3e6994e5,2024-12-12T12:15:22.267000 CVE-2024-11275,0,0,d867fdb3089eb487aba710ee3a783df90afa48402af791b20254c6cf6b05da5e,2024-12-13T09:15:04.887000 CVE-2024-11276,0,0,812b69192092bc16930f9ab3876c16990ac594a09aff786923cf483c78cda3e7,2024-12-06T09:15:05.827000 @@ -244637,12 +244638,12 @@ CVE-2024-1163,0,0,3534cb0564ba7e08015dfddf52a975a19f7b672cf09e3f78e469f84e669f2c CVE-2024-11630,0,0,602de6590967350fd7f3827b1a11ce4a1c578a1994d3c132149d73cf61dca0eb,2024-11-22T22:15:13.637000 CVE-2024-11631,0,0,ec063b412cc8e1fc69f64e54e806f8de997f3af353f8bd5c4b78d65e3cccfe32,2024-11-25T16:54:46.333000 CVE-2024-11632,0,0,de73f7ca209ed3887af097dcd8d60cda4bdd27816f354a861b8ba50b3a9bc56a,2024-11-25T16:50:43.257000 -CVE-2024-11633,0,1,68efe6d50a10738071cbd51ec1cbc8813b80c80199253ca588c6b5fdecb7bcf2,2025-01-17T19:35:05.380000 -CVE-2024-11634,0,1,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580535,2025-01-17T19:32:48.327000 +CVE-2024-11633,0,0,68efe6d50a10738071cbd51ec1cbc8813b80c80199253ca588c6b5fdecb7bcf2,2025-01-17T19:35:05.380000 +CVE-2024-11634,0,0,14627ed8cbf95632caf8b74a22783ca02eb0bf7651aea5ed85be227c49580535,2025-01-17T19:32:48.327000 CVE-2024-11635,0,0,ffacee27dce2a3419b3aa106b350e83d5585d5dcfe645774b0023dac2c389ee8,2025-01-08T08:15:24.117000 CVE-2024-11636,0,0,0b6d42fa0d5704cd6ac079216da1bb6972215c21c5e47338513c0632cc826b2e,2025-01-13T15:15:07.560000 CVE-2024-11637,0,0,5348ca65261140ae16ec15332c773ee06343664939e89530c0d5541b934692f4,2025-01-14T02:15:07.907000 -CVE-2024-11639,0,1,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000 +CVE-2024-11639,0,0,b0b1970767477e87b7cf619e96fa5cb2fbca7d53895c7bdaf49d93303071061e,2025-01-17T19:40:09.763000 CVE-2024-1164,0,0,d6b3223f31512976ce37113225736cbf014a2aac3d8c295ef68c5d3e3fda5f16,2025-01-16T15:08:00.773000 CVE-2024-11642,0,0,e083dfd7b8388b09206f810c50ef0061b39601a9804b6746591b0dd89f756ab4,2025-01-09T11:15:10.187000 CVE-2024-11643,0,0,ae78ce4f54b48c77ffb4df12d001ddabc5e672affe5a377c6c988d0deb6a52af,2024-12-04T16:15:24.177000 @@ -244776,8 +244777,8 @@ CVE-2024-11768,0,0,d1dc5256960dbb7c1872ab2eee741d8ee6a82b0e95e8bd4589e5dba11cf58 CVE-2024-11769,0,0,7c09ce15e3c33c67c82c4f8389595c27e00e07d607e16c4d909baefd0cbdfd8b,2024-12-04T08:15:06.680000 CVE-2024-1177,0,0,50204f0e1e82280f8898460ad80abf26f09df69c8b4bae2f8e7f259925f88097,2024-11-21T08:49:58.233000 CVE-2024-11770,0,0,811fe48f54a597d0d878563d5e3c6ae267f413b42e3fcfc7383af1a6019b7d76,2024-12-14T05:15:07.627000 -CVE-2024-11772,0,1,b31e7eab1d3591b26e66c024fb786d86ba840ba76e4420f4d7e4a7cf301cac00,2025-01-17T19:40:52.337000 -CVE-2024-11773,0,1,4b3745f64612448355fff5a57f3da9fcc76fa6199f1570739cf6dd2889fe60fa,2025-01-17T19:41:50.450000 +CVE-2024-11772,0,0,b31e7eab1d3591b26e66c024fb786d86ba840ba76e4420f4d7e4a7cf301cac00,2025-01-17T19:40:52.337000 +CVE-2024-11773,0,0,4b3745f64612448355fff5a57f3da9fcc76fa6199f1570739cf6dd2889fe60fa,2025-01-17T19:41:50.450000 CVE-2024-11774,0,0,2f351d61aa038a49c773ab74e882e8cd2203f9cf3f3df13c0faa462f8ee3a46b,2024-12-20T07:15:10.393000 CVE-2024-11775,0,0,0be2b5775aa12c2634dedea0534264de5c8544551afcfc7760cb6a86958e9dd8,2024-12-20T07:15:10.597000 CVE-2024-11776,0,0,db96a767ae984aa946e97339afd57034a67d2d93961a6fe48dad1a311ebfe8b3,2024-12-20T03:15:06.420000 @@ -244822,7 +244823,7 @@ CVE-2024-11812,0,0,df32cc25c5bb5c5dcc725bf487d9704dded6625df8d19e9336934b5d64e1e CVE-2024-11813,0,0,47a3a35561cd3c4cfbe2425cc2aa9f8596afbe4dae47aa0811b6748805370891,2024-12-04T03:15:05.227000 CVE-2024-11814,0,0,2a13f9fe8be8eabbe1cb3354ac6af91e2a65c049708e435975b8ce27567d551d,2024-12-04T10:15:05.007000 CVE-2024-11815,0,0,69d47446f06da0442c4119d1d5b0771fdfaa9c1fcc2c009fd2bb7f3fcd33e23a,2025-01-09T11:15:10.770000 -CVE-2024-11816,0,1,c811b77570eeef53a9aa738dc451541502abd64f4c51291f237dbf96aa0dea91,2025-01-17T21:00:00.330000 +CVE-2024-11816,0,0,c811b77570eeef53a9aa738dc451541502abd64f4c51291f237dbf96aa0dea91,2025-01-17T21:00:00.330000 CVE-2024-11817,0,0,9a66a0fca3306ba25f6938738b8c35626d89b0596c6acf3b5c6bd12c17a8843e,2024-12-03T15:15:41.753000 CVE-2024-11818,0,0,03353c8ea92f63bcb93155865a1eb5dbe1fed70391bddfd4d8cf954b882838c4,2024-12-03T15:06:10.997000 CVE-2024-11819,0,0,4ad555b58c0b6ae087a0e197e14f318c0818cf9ebf662c2c2b44a9340719cc17,2024-12-03T15:00:58.693000 @@ -244913,7 +244914,7 @@ CVE-2024-11911,0,0,caa0b453641ff9f186639ae770eb52db38531714654a626a4eab9e32db680 CVE-2024-11912,0,0,0aaa3071f593c52d1aa93372da39c5543ab6e6ea5c65e9bf469d02aec4ea5907,2024-12-18T12:15:08.950000 CVE-2024-11914,0,0,fa4ae25ac8caf18cb116501f16c4447bae56afeb864dc904882202ad6cc9632f,2024-12-12T04:15:06.983000 CVE-2024-11915,0,0,dc3ca0c1970f54dc4a5ca94d3cc15a32b71532a500815bf83b22c0157a62de2b,2025-01-11T08:15:24.680000 -CVE-2024-11916,0,1,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000 +CVE-2024-11916,0,0,17cc1576783bac64a1ea783d61b5743105d0ea45a1a64d569e9cb4896ade874f,2025-01-17T20:58:37.443000 CVE-2024-11918,0,0,f7031582b21494aaa2ccab4dd4ab92d52bf9f67c1445d9fb72b363b717cfc06b,2024-11-28T06:15:08.347000 CVE-2024-1192,0,0,4521fc6ae268791ebd6da2ad80ce9552b7ae38c5833cb5098776b1906357f9a0,2025-01-08T14:35:22.633000 CVE-2024-11921,0,0,8d14fd5ac89466ae906ad741ca0367246b772d6837be889940ee25bf6694b61d,2024-12-27T19:15:07.850000 @@ -245444,9 +245445,9 @@ CVE-2024-12603,0,0,b77b6c9527bd0798c4124cb6a67b3eb0384daf1c81bc149052bbc09ab0e74 CVE-2024-12605,0,0,a0f2993b097a4c99b97e822aef9d508fcc987f27fa00acaa2c8fa4c5ee5e87b3,2025-01-09T15:15:14.150000 CVE-2024-12606,0,0,22dbeb9ccb7de3748ffcb5a9742ed9efae0d34cb977177faf680cf3e4f662ce5,2025-01-10T04:15:19.667000 CVE-2024-1261,0,0,7451d11c24f2ac390a05020abbe5be1a7d1e877de58a9c0842a513a0e1790005,2024-11-21T08:50:11.030000 -CVE-2024-12613,0,0,17ef13e8555c69068e4fa02b53cb81098153e1f551058b907c691c77374dc1a6,2025-01-16T10:15:07.633000 -CVE-2024-12614,0,0,e571b4e4491487f2f9e819ccc16fae6c0ac59e6cfb7ed30e8d5046638d60453c,2025-01-16T10:15:08.023000 -CVE-2024-12615,0,0,bf0a4dcec7d9520733542eb42362ef30d25c98232bfadbee356ba2a388d2079e,2025-01-16T10:15:08.380000 +CVE-2024-12613,0,1,7dd856ce73c7c9a995010e01aad16c5eee77060b0b2db6bbab6d0cdb4cee95e9,2025-01-17T22:17:16.967000 +CVE-2024-12614,0,1,85c73f48edb54993612da38f79df29849481d1d0bbf1a99bc0613daba18ae317,2025-01-17T22:17:15.190000 +CVE-2024-12615,0,1,6e994a8d3113ca6f9de4c4e061e53b865bfdcf07b29aa5840c39b6ffd2b32fac,2025-01-17T22:17:11.650000 CVE-2024-12616,0,0,77a54d2c4fc323087210e2a6a22bc6796e40cd4e337b416a96bae19b39d4476a,2025-01-09T11:15:14.970000 CVE-2024-12617,0,0,fa783f9d7a3d972025357eb9fc5c4fe83a667f5b392e03f824f0f0bb531ed431,2024-12-24T05:15:07.013000 CVE-2024-12618,0,0,9a78b540470b044696728715f2dbde7ff3f05b2e5efee894087a680363f0dace,2025-01-09T11:15:15.193000 @@ -245593,7 +245594,7 @@ CVE-2024-12848,0,0,95ac60390486f7accc1a4c21b3c339a643ce34c81e0e6f7a88c7c7253bce5 CVE-2024-12849,0,0,3437660a93e3ba43e7759c6102f16953543e1a3c3d091452a24c483dbd6bd5de,2025-01-07T06:15:17.607000 CVE-2024-1285,0,0,6f25c863c73c3b70a1777f6b7ea15f17f9158b6669df8af6e4411802154a74d9,2025-01-08T17:13:54.647000 CVE-2024-12850,0,0,075205b205303999a6a29790d3e10f6b915eaaea804fbc90dec0f08e9b7ce1f4,2024-12-24T10:15:06.033000 -CVE-2024-12851,0,1,739e2bee0532c97834ac7b49f8423e4644c5e740b4838d9d7c66421a1853e33a,2025-01-17T20:47:22.757000 +CVE-2024-12851,0,0,739e2bee0532c97834ac7b49f8423e4644c5e740b4838d9d7c66421a1853e33a,2025-01-17T20:47:22.757000 CVE-2024-12852,0,0,956342645c2c9c3b82a820b6a59451a9a24604b5dbbad73965c12b7f863032fc,2025-01-08T07:15:27.250000 CVE-2024-12853,0,0,41257905fe1b8024a4b0abaa09fe8324bc7a9ba4b9ffaf1cfe293b8b9bbd7a08,2025-01-08T10:15:06.903000 CVE-2024-12854,0,0,69236f9eafc0f2c7414eefa82874add13ee2f0264bbd1b7a7471ee6aa8d8128f,2025-01-08T10:15:07.120000 @@ -245730,7 +245731,7 @@ CVE-2024-13022,0,0,90bb63d1bc90626e0499ce8896752c6e5ed50822b829721b8cf1b7b0080af CVE-2024-13023,0,0,d029eb35c9bdf0045e63a954d82e8162ce974ac9ca1940b6ad8d92005bea27e7,2024-12-29T21:15:06.020000 CVE-2024-13024,0,0,2d443fd15bbce33c05ab26d4fb4c87b3a41715b85dfb24d19e706acdb51ba0ef,2024-12-29T21:15:06.220000 CVE-2024-13025,0,0,49213aeccb84de269a6cda473f64c9cd212034f3fe128e40066ff20ce3282b78,2024-12-30T18:15:09.273000 -CVE-2024-13026,1,1,82a449cf89ff406cec5c1a223488a6ac04dd2d898424ead123b337ba8c82ad89,2025-01-17T20:15:27.600000 +CVE-2024-13026,0,0,82a449cf89ff406cec5c1a223488a6ac04dd2d898424ead123b337ba8c82ad89,2025-01-17T20:15:27.600000 CVE-2024-13028,0,0,fa93211a2bdb9a3d16a1438985d05a65ae11871db310d3e60efe2083e10fb468,2024-12-29T23:15:06.030000 CVE-2024-13029,0,0,3645cd09171242525298fe881249dfcae0b5fc3148bc05a911d0c24263b4be86,2024-12-30T00:15:04.837000 CVE-2024-1303,0,0,922ad92b627c1129d744b1f80cb5c88d28598a22649a8dddf52c9956281bb86f,2024-11-21T08:50:16.593000 @@ -246002,7 +246003,7 @@ CVE-2024-1354,0,0,5af9747793c0c7f9d624ad8210334d43a11a7e2ffd1bfd24e0f893306f0166 CVE-2024-1355,0,0,6172baf85be4d7a27bbb49e6e2c61129e709fa636052c76496ed45a61202985b,2024-11-21T08:50:23.993000 CVE-2024-1356,0,0,6cb6186c899ef9742e559deecf7de4862ea2bb78bef5eed0c472ae9df79196b1,2024-11-21T08:50:24.133000 CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996b1,2024-11-21T08:50:24.283000 -CVE-2024-1358,0,1,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 +CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000 CVE-2024-1361,0,0,8a11a93152fbfa05be2934d541581f2e8e8c1350c348ceb554a6a47ec08e0e2f,2025-01-15T18:39:23.493000 @@ -246035,9 +246036,9 @@ CVE-2024-1387,0,0,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce0 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 CVE-2024-1389,0,0,5873690e0845507df8953cc4f63b4ccd0c40998cbb5a2b9d552ef1fc675e0a5e,2024-11-21T08:50:28.477000 CVE-2024-1390,0,0,37b0dff04be1b8b0f2a887698f2eb84de50a3b7e7acefe6e7e54550c938a7935,2024-11-21T08:50:28.600000 -CVE-2024-1391,0,1,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 -CVE-2024-1392,0,1,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 -CVE-2024-1393,0,1,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 +CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 +CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 +CVE-2024-1393,0,0,807d9a3a72d3c227cf073d19ae4d043ce29012d9a81f19ad09766963a4531e84,2025-01-17T19:54:07.350000 CVE-2024-1394,0,0,3bfb4bdf7cbd2e83903d52b6ed8359606dbe1ee24d71dfdae11060be7f14efdb,2024-11-21T08:50:29.120000 CVE-2024-1395,0,0,aa14344d5f3c417e75370dfad240218276bccf85a1cff8add87ecef1ce7213df,2024-11-21T08:50:29.483000 CVE-2024-1396,0,0,99c867002ef97abbaaafea27abb6c91c61f510e73a2f0816bc88ba650d70c41c,2024-11-21T08:50:29.700000 @@ -246066,7 +246067,7 @@ CVE-2024-1418,0,0,22561da6c61f825effad6710d5e038f72164164027714334fbeb98ec73fee7 CVE-2024-1419,0,0,42ab1fc2d6ab9ca492a38fb437634f1d4cac86970a1dc12ed30b178360f9c764,2024-11-21T08:50:32.870000 CVE-2024-1420,0,0,87cbde692a44b30138e5311554a8fe03ab6752ef419e674117c5a1abadbc52bd,2024-02-12T15:15:07.733000 CVE-2024-1421,0,0,0e761ebddf75c548cf7dd6af07abf9548a53b36a5b8589a388f6af75094a73b3,2024-11-21T08:50:33.003000 -CVE-2024-1422,0,1,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000 +CVE-2024-1422,0,0,c910d0586a998d32e26f3d43ad0e4a4057e510585a23426b26fef7d51c99eee6,2025-01-17T19:56:49.607000 CVE-2024-1423,0,0,cf9424b269ea30f1f1f93fb8aca6f7020e19a4ef0b7ad3a1dcf8f2e9317f1810,2024-02-27T15:15:07.460000 CVE-2024-1424,0,0,3a0dddd030d6706d7ea56e2d0d2580f7738e1c15b83c7969d9f91a85b7900a41,2024-11-21T08:50:33.260000 CVE-2024-1425,0,0,5f21d9d2efc76ee4284336e12fe4e6efc369aee3b9a89ab878da35914f23bb10,2024-12-31T17:16:58.103000 @@ -246515,7 +246516,7 @@ CVE-2024-1899,0,0,40fb5e76195a966ed2f9c2f9f806f40458f96148e21a41dc2acf991f4cece8 CVE-2024-1900,0,0,f881fab7684a20d971b8a8aa44c738635846f8721e30624ba500440528156b1c,2024-11-21T08:51:33.443000 CVE-2024-1901,0,0,7c912c9d925cface47b3667a73bd4854a08825c4b20741b5a200d0c51e0913f0,2024-11-21T08:51:33.640000 CVE-2024-1902,0,0,dc9150fbfc8e8407e248cfc687ffa0aa089edfe85cb497a2aed3531352c4bf8c,2025-01-10T14:29:55.370000 -CVE-2024-1904,0,1,3fb619cb9530adc2f228f4cf1f926fd91d0755f05f626abfed13b0242d8ac681,2025-01-17T19:22:36.853000 +CVE-2024-1904,0,0,3fb619cb9530adc2f228f4cf1f926fd91d0755f05f626abfed13b0242d8ac681,2025-01-17T19:22:36.853000 CVE-2024-1905,0,0,9438b0be2531bbc1baec0a545feda53b61cecb9096148dc315dd330c5967f3c0,2024-11-21T08:51:34.117000 CVE-2024-1906,0,0,585b2a5ddfa9da688ccc05c3adce2c6e116818c5e5c9fa6b8b8e48d0db1d5628,2025-01-07T14:34:56.787000 CVE-2024-1907,0,0,54b36b562379da23fdf0e9559b6c1372c4bc0a1e4af6c39ddfeaf398b35ceab8,2025-01-07T14:34:27.417000 @@ -246596,7 +246597,7 @@ CVE-2024-1986,0,0,9a8f0eee78ceace023fbaae1731849068919c7cb8b85b99d980679ab3b4a94 CVE-2024-1987,0,0,efb3d1a8a42874cd18227faab1672e13f445c9ed41abf8b26384d0f9c194bcfc,2024-11-21T08:51:44.510000 CVE-2024-1988,0,0,749d8c2ddaf70a633139f1ec755edd9f0527e6b5bbade91c0fa93f2f63fdf022,2024-11-21T08:51:44.630000 CVE-2024-1989,0,0,3e827d2b408fe3d95963b81c03d1739ac783159d4036d9003dcfd7b4f6bf06b3,2024-11-21T08:51:44.773000 -CVE-2024-1990,0,1,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000 +CVE-2024-1990,0,0,6ca122afa2cbed7b952287cea2db94fce93af859861913d9befea54e951265b8,2025-01-17T19:30:21.120000 CVE-2024-1991,0,0,3f483f3ae7b7a904e68a16f960d0742fa77cd9a15dddb9bd88a60a002c10365a,2024-11-21T08:51:45.033000 CVE-2024-1992,0,0,b8b239eca0d5b8204e03b37ee1727233d0899e772ea9ca7c8745c6726ce5f27e,2024-03-20T17:15:07.307000 CVE-2024-1993,0,0,010d59aa4d31f8f60f42634d27cfbdf469d8f3f88be31616056c1b25e622a672,2024-11-21T08:51:45.183000 @@ -246957,7 +246958,7 @@ CVE-2024-20416,0,0,273ee00425f01d60b03c693c8cbc646195093da5a971d2cedee90941275bc CVE-2024-20417,0,0,8d6689b774b826299be686eb353fb8c6a46665a0574bf3b92cad6c4181365066,2024-08-22T12:48:02.790000 CVE-2024-20418,0,0,78e92fa90165573b2bf91db19398fd27b2d59cbe1df9f9973b1fe6c910c833d8,2024-11-06T18:17:17.287000 CVE-2024-20419,0,0,b7a07e52e55ec37dcedd038a63d58760cf8d25f8aeb5d5655fd15240f80b5276,2024-11-21T08:52:35.887000 -CVE-2024-2042,0,1,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000 +CVE-2024-2042,0,0,08e54f8cbf88478a6dc057bcb8ac9f29d00de3bbfb904223d2b0e22660927020,2025-01-17T19:57:25.747000 CVE-2024-20420,0,0,83b9e03d7a71760da83231fa0a3cc89531489fdb524ac42b99087108afa4413f,2024-10-31T14:35:05.980000 CVE-2024-20421,0,0,41945c40188e5bea99a955c2e7ed6ffca996a7aa12b6b996aa91405a9cae04fe,2024-10-31T14:35:06.853000 CVE-2024-20424,0,0,aa090d93f13e6508c14839062b8468dcc526f2531d5d6053b9aca3b7c672acf5,2024-11-01T18:07:44.057000 @@ -247862,7 +247863,7 @@ CVE-2024-21405,0,0,3e6dea45078ef40ec2e5cc252eeb8e66344281f8f13d2c5561347a4506294 CVE-2024-21406,0,0,c3c5e6f5abd31ba504c5e779a20922c9520fef7dad2cf137662a3736daac3074,2024-11-21T08:54:17.750000 CVE-2024-21407,0,0,61ca144d76c93aa5467e49bd9c2efd72d906e8b334691cc56a48356a7e8e1044,2024-11-21T08:54:17.900000 CVE-2024-21408,0,0,a6229327b01f5c72f23988c3a60a0a48d9605f36b6855597610f5db381fdcfcb,2024-11-21T08:54:18.060000 -CVE-2024-21409,0,1,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000 +CVE-2024-21409,0,0,1c7d183cf8153f501da98ff2724d60d58255ee684a46f298519b0e98a61d9285,2025-01-17T20:15:27.787000 CVE-2024-2141,0,0,e25edc3e366c33121ab88f864948d943b2cc55f959cde5bf1ebbabb3fc09fbe8,2024-11-21T09:09:07.003000 CVE-2024-21410,0,0,95d0b95a5f0063806998bacddd7789744542e29655fa4a9d4c4406647d1610d4,2024-11-29T15:28:11.497000 CVE-2024-21411,0,0,014096b872a3129a023c532a8b0c270957fa0df4578b38d594339a889b601731,2024-12-27T17:07:01.770000 @@ -248080,7 +248081,7 @@ CVE-2024-21637,0,0,1140ba166277eae389c521b36c0621316eb6057fc838a547a74c3d24196ab CVE-2024-21638,0,0,0f4b6119a82ba5623983a2b749ce9df1d0c594b7e3d3bb8f84381915080f5040,2024-11-21T08:54:46.663000 CVE-2024-21639,0,0,5276ce2d1a6f7b6f75781a1f3dc058d7ecaf22f670ec18133c7f7d3a65b3bddf,2024-11-21T08:54:46.790000 CVE-2024-21640,0,0,d1f2f6f27ac6ed2f5703893479d90d543efb6655c01092ab7d45d8a3b99269c5,2024-11-21T08:54:46.913000 -CVE-2024-21641,0,1,db050d79964c69ce96e1eb1aac883318fa1a8cab751a50d091175bb753f0f1a9,2025-01-17T19:15:28.590000 +CVE-2024-21641,0,0,db050d79964c69ce96e1eb1aac883318fa1a8cab751a50d091175bb753f0f1a9,2025-01-17T19:15:28.590000 CVE-2024-21642,0,0,de70a6bfa950a627ab65c75fa7dad1a3416dbc3fb8ff08d3dde22e7f5d32b06e,2024-11-21T08:54:47.160000 CVE-2024-21643,0,0,32fdcb45a95ed76c8eb6f74a98faf450c608a66c40d280a4146a4ece6b7d89c7,2024-11-21T08:54:47.280000 CVE-2024-21644,0,0,cb8e43fb0db69ebecec7d4b37165179645cedf9336385f238216782049be95e2,2024-11-21T08:54:47.407000 @@ -248776,7 +248777,7 @@ CVE-2024-22416,0,0,ce5a0d6e72a6db893e55bf13b4a84406e9dde4fefaa4a731b34365d5bd9fa CVE-2024-22417,0,0,a6b201629695816fff1bfd926d3044da5ae33025799cda6e08350c8b2f9a32c5,2024-11-21T08:56:14.690000 CVE-2024-22418,0,0,9967051e7be6dca739557da2248e47213dc367d3971baec1a01bb8d0fd807a65,2024-11-21T08:56:14.857000 CVE-2024-22419,0,0,905426a4394067aa7259c60f5a063467a09e54d19e7b59fae0c1424d42e6ec45,2024-11-21T08:56:15.020000 -CVE-2024-2242,0,1,875bde67f4e55e9edc704b7e69f21e4fad6e457089626b8d7b7f847232aa7536,2025-01-17T19:57:07.283000 +CVE-2024-2242,0,0,875bde67f4e55e9edc704b7e69f21e4fad6e457089626b8d7b7f847232aa7536,2025-01-17T19:57:07.283000 CVE-2024-22420,0,0,024696f5e1270d1cdc81730d5d8a64dd81a093512a259d92223067db5a445130,2024-11-21T08:56:15.203000 CVE-2024-22421,0,0,68ad10dfed72f3aca3738f68707fe94c502fe15e2d9ab9159832423762e11d44,2024-11-21T08:56:15.343000 CVE-2024-22422,0,0,370a9051f3f2c4021b8468e74ec0889a82957024baf94c98a6d7fbfbc647291b,2024-11-21T08:56:15.487000 @@ -250756,7 +250757,7 @@ CVE-2024-25385,0,0,59ac22d49f2fad863547dec5a90c0c7a9b9f0475e0a1175434939147054ba CVE-2024-25386,0,0,56406e6fb98d0483e199e75526abcdd166cb1bbc8af5cb6a4a3846bb8e4462df,2024-11-21T09:00:42.437000 CVE-2024-25388,0,0,d6e57a4ae8cf2758cb02e2bff996a06728f2a007c0c76d23c807db1db9644ae1,2024-11-21T09:00:42.660000 CVE-2024-25389,0,0,c2b0698b0bd4f31a02466ca55b61acffcf8581a14c7d0397412e907bbbf1dd53,2024-11-21T09:00:42.890000 -CVE-2024-2539,0,1,1f5228a0fa2e0ca11e6e938126a0ec773f063beb0985a4005450b333ad9ae338,2025-01-17T19:20:18.470000 +CVE-2024-2539,0,0,1f5228a0fa2e0ca11e6e938126a0ec773f063beb0985a4005450b333ad9ae338,2025-01-17T19:20:18.470000 CVE-2024-25390,0,0,c77040aacef696841b7e7aa474cba96c21df04aaf3673ec4e97d2f452d4f0584,2024-11-21T09:00:43.123000 CVE-2024-25391,0,0,da9cb877ec1c28c6b122310a0eb79d771f3c52280b5b2b78b017d9345e03ec37,2024-11-21T09:00:43.340000 CVE-2024-25392,0,0,11d51bf11eeeceb6ace20ccc3cd98a5983b38266eb598b75f0b4a9733ad17238,2024-11-21T09:00:43.550000 @@ -251592,7 +251593,7 @@ CVE-2024-2654,0,0,856aaf05d41c60ee2c85d4fc3321f895fbd088078df5e99f877e9b71221f4e CVE-2024-26540,0,0,5970c3a2d028ecebe91244fa68ea154ff04c44c8c8a65c7d51e6549924364887,2024-11-21T09:02:32.843000 CVE-2024-26542,0,0,005342b86fb12fcb5776ff8acf0dbdaf45e957519ff7c276f4bd35750e623b36,2024-11-21T09:02:33.060000 CVE-2024-26548,0,0,52535dde3cb49a827020d0dd3b0109d887b5f1701428dae937ca95f7c0db795b,2024-11-21T09:02:33.270000 -CVE-2024-2655,0,1,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000 +CVE-2024-2655,0,0,0feab97c289640bf500dd7527d61858533072964c9502239802f5c822f5470cc,2025-01-17T19:18:36.207000 CVE-2024-26557,0,0,5030fca45521e6854401bf94aaafb7cf9024afdf103c06b91e5b7a83eb21bc1f,2024-11-21T09:02:33.473000 CVE-2024-26559,0,0,77579a317422b2517728ee5978bc7ec2f8eaf2102b599e2c765a82e7b784719f,2024-11-21T09:02:33.640000 CVE-2024-2656,0,0,8da716d6d289821d1b7475ad4430d9bb42beb8c3503e9dc5c8fa548d820bbebb,2024-11-21T09:10:13.570000 @@ -253861,7 +253862,7 @@ CVE-2024-29402,0,0,823440ced7da8e7d0a8b3af16f5a511cd429be38a31d64a72a1bb56686617 CVE-2024-29404,0,0,8e0768ffa0e6271c10ef5a904f790cba861a6a3d32897c4a1e9132b2e0d48d5c,2024-12-13T14:15:21.740000 CVE-2024-2941,0,0,3e71967aa0c4cbd6af2eecc6a53b210ed6ca835a6b57f301721a578e1f34e48d,2024-11-21T09:10:53.607000 CVE-2024-29413,0,0,e4856a49d0b9ba39155f8e7a02f85d7a362c6e1dae478077aa2043ac538afa2b,2024-11-21T09:08:00.883000 -CVE-2024-29415,0,1,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 +CVE-2024-29415,0,0,2a3b41c75a72df6c05646dae150ef4f5ab8cf2a6c172222d216a6c011a3d65c2,2025-01-17T20:15:27.950000 CVE-2024-29417,0,0,59ed7330a649e9c190a03d2824c71e319289766718abccd335aa458a7d2711a6,2024-11-21T09:08:01.307000 CVE-2024-29419,0,0,2f3442ac6427a352cbbf9021272e009750360630cf456587e3262353974b9774,2024-11-21T09:08:01.520000 CVE-2024-2942,0,0,c582b913b7e1aa03026ab0af4662fd77534dacff2215aab90e4e0f0fc5a28b07,2024-11-21T09:10:53.753000 @@ -255347,7 +255348,7 @@ CVE-2024-3134,0,0,8a39e4855d8d63cdafc0fb55b2b72495acc977f724df3a600d17eda7fe3bd2 CVE-2024-31340,0,0,f846f9b41d1a7e3c60094da310944043379c35e273ee8f0fc6224f053f25016a,2024-11-21T09:13:19.617000 CVE-2024-31341,0,0,b00d5886f7319c7cb32664ac877d125dd0889e61e4e3be95f0b8debdfd5f0dc5,2024-11-21T09:13:19.800000 CVE-2024-31342,0,0,3f71a443075939346a164f889b5a1a10f44b0ffaada2af8a01d689a2b56757ae,2024-11-21T09:13:19.920000 -CVE-2024-31343,0,1,598bbc47f9055360a3856282f4b242ab5d2455d01aade215092c65730c33f807,2025-01-17T19:32:04.977000 +CVE-2024-31343,0,0,598bbc47f9055360a3856282f4b242ab5d2455d01aade215092c65730c33f807,2025-01-17T19:32:04.977000 CVE-2024-31344,0,0,f083ab481feb1cfc3b74439afbde7e0804b226a14a90fe3c8d35a052df10131f,2024-11-21T09:13:20.173000 CVE-2024-31345,0,0,14c52f9c3da5bdb90298c2b06fd58a68d1c79361ab0ea506debd4e9a43a476d3,2024-11-21T09:13:20.283000 CVE-2024-31346,0,0,b972a4a46a8f82aecb8e6a911642668b9c99df971421a9cdb94fecde63fc42f7,2024-11-21T09:13:20.400000 @@ -255365,7 +255366,7 @@ CVE-2024-31356,0,0,61572d342d52a9f95b7f14ff954e86c998c7bae2cb6a9ab1b28b0b15e7946 CVE-2024-31357,0,0,f0dabc113a60563e313c65ba34e72da05a3c68eb061735faa5c177e277cb6a87,2024-11-21T09:13:21.723000 CVE-2024-31358,0,0,24f1b391e8c0073bd1720f4c9942be2b90dce97d5f6e3136e7a4f22304df3577,2024-11-21T09:13:21.850000 CVE-2024-31359,0,0,b4a393ddc5be024e5127a716cac6d76c0dd542b36e97ecca2fcdaddfb152f530,2024-11-21T09:13:21.970000 -CVE-2024-3136,0,1,9e02aa4992302fe344595ff868f246169a934bd46e1b7ca8d370f5725a800866,2025-01-17T19:21:25.430000 +CVE-2024-3136,0,0,9e02aa4992302fe344595ff868f246169a934bd46e1b7ca8d370f5725a800866,2025-01-17T19:21:25.430000 CVE-2024-31360,0,0,8cb5e974db070725c801d7c826083d98c0c6e0dc164cd395ec990085232931bc,2024-11-21T09:13:22.097000 CVE-2024-31361,0,0,cd57a3ba85fbda740068fecaf7c25781b9ceeb2fe9afb57e7e9c1192b5574512,2024-11-21T09:13:22.220000 CVE-2024-31362,0,0,e1e383b1b6021174784187d582f1cdfeb1828d1a7981c4a748eecb139f1930a5,2024-11-21T09:13:22.327000 @@ -255902,7 +255903,7 @@ CVE-2024-32114,0,0,ec761db7a5ad46df257b60e3bffba3183bd48091e424b77fbddb80d44570b CVE-2024-32115,0,0,3c8a228f0b573fc5544521748051d92562cca7b9375133f8f23d502a90fd21ac,2025-01-14T15:15:15.387000 CVE-2024-32116,0,0,f10f3c24dc00a2826d06434dd27b29c41c2c38d776ae02f6706b238c0f312734,2024-11-13T17:01:16.850000 CVE-2024-32117,0,0,6ced7b5df85b7cf270709040a6c78ad7915ac1694cdc1063e73cbc492ca11ee8,2024-11-13T17:01:16.850000 -CVE-2024-32118,0,1,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 +CVE-2024-32118,0,0,2178f2e51949497d6f853d9fa8cabb773027cc510805d277e413737b19193366,2025-01-17T20:42:17.053000 CVE-2024-32125,0,0,35c62d76638cb3e6e8a0b666fab0d78df4c4a5a2cc2247a2353bf686c3ce91e4,2024-11-21T09:14:30.493000 CVE-2024-32126,0,0,45af23cb6fd016f363f996b64e239b35d3f7c25ac6138e901c5aa8f136e4359a,2024-11-21T09:14:30.620000 CVE-2024-32127,0,0,dded2ba7f0afc7a4f66304fe4ecc3b2ff22d2370ed0fac28ea97950754f4c2c6,2024-11-21T09:14:30.743000 @@ -256904,7 +256905,7 @@ CVE-2024-33506,0,0,ebc73da9186542bc574ff2ffa1bd0018ebfe9872b5e96093b78710739d042 CVE-2024-33508,0,0,3b76b0d03aba3d39a9333effe55dda5557e5f1c6adb532df7c6b80bfe8c854e4,2024-09-20T19:48:06.197000 CVE-2024-33509,0,0,11ba9153d706e68229ce986557f07cc698790121f85f23f3dcb45f7cca9bacc8,2024-11-21T09:17:02.900000 CVE-2024-3351,0,0,fdd55a913ea8ca434b668d00d42f466f17e8d7ad8fab0600f36cb4e91885e476,2024-11-21T09:29:26.227000 -CVE-2024-33510,0,1,41c46c0d1bdff1476309e4ca2fd63171fd38acedd7b65a6422e43ced8af09809,2025-01-17T20:35:31.247000 +CVE-2024-33510,0,0,41c46c0d1bdff1476309e4ca2fd63171fd38acedd7b65a6422e43ced8af09809,2025-01-17T20:35:31.247000 CVE-2024-33511,0,0,526fe159ade6529bd19d0c08778644f889465aaf60097f6c4a4eb6711afe8076,2024-11-21T09:17:03.143000 CVE-2024-33512,0,0,4574fb7abf2a92458d61a56576bea04c4638c0bb9b288fef0012c5d9672244e5,2024-11-21T09:17:03.290000 CVE-2024-33513,0,0,8a8fc6e4e71d77b3f0c09c008c86b819c457cad410cec5e46bbb67435dedeb95,2024-11-21T09:17:03.413000 @@ -258253,7 +258254,7 @@ CVE-2024-35270,0,0,54fc0aef882c68b0af36e2a2e87ea567a3f0433770da6d3701c29cb540de6 CVE-2024-35271,0,0,53435ea3e84efa467a9bdfc22250170e3299e5610ce3c91fa1af50680f120201,2024-11-21T09:20:03.527000 CVE-2024-35272,0,0,7c25fd9425a5925ce7b680ae430dc4c99441fca7143b7504eaba903c26bfba9b,2024-11-21T09:20:03.667000 CVE-2024-35273,0,0,9ab858ebb346d630e6bbf8da2157e41f0d8e42e4a4c1d3d1d26beda7fb4bf411,2025-01-14T14:15:29.663000 -CVE-2024-35274,0,1,b634b8288c0dfdfa69709dbe44a7d735931faaa8485a146c2a3cc42a8a1673b2,2025-01-17T20:29:43.327000 +CVE-2024-35274,0,0,b634b8288c0dfdfa69709dbe44a7d735931faaa8485a146c2a3cc42a8a1673b2,2025-01-17T20:29:43.327000 CVE-2024-35275,0,0,db920a4838b9e37c71b9bc6fd6d2d69f628712cc99e5de16479c022646ccb044,2025-01-14T14:15:29.817000 CVE-2024-35276,0,0,4c959b5ba1a33576ed209445d5bbc58fbac65866e46c0631f77c80bdc2461b2f,2025-01-14T14:15:29.973000 CVE-2024-35277,0,0,1f41c5934d010de66ad104c6e38cd26c146e0cb4b1b59e8e833cdfbc61bc9a2c,2025-01-14T14:15:30.130000 @@ -261188,7 +261189,7 @@ CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c99950 CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000 CVE-2024-3880,0,0,05ad02535029fe300c22028f294905db3effcae3d9f6a9c08e2e8efe572ad3c1,2024-11-21T09:30:37.263000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 -CVE-2024-38807,0,1,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000 +CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000 CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 CVE-2024-3881,0,0,1c9f85fd80cca491c38bc78c8ef5005187e956d6680406848ed713e292f20d1d,2024-11-21T09:30:37.407000 @@ -261335,10 +261336,10 @@ CVE-2024-3905,0,0,4c80ed85238faf80c10f5a55c3b441f63de24b896b80922a247980fa1e8d8f CVE-2024-3906,0,0,38d5ab7d7295bbfbf8fda50b3a718f84612bcac7a5bf8734ddc0e18ea8e0ca6c,2024-11-21T09:30:40.170000 CVE-2024-39063,0,0,1f8e26cf4e98abfdc7b6058f73f534bd52a0245eabab786c5a57812027f6a139,2024-11-21T09:27:10.580000 CVE-2024-39069,0,0,df07d5b4e498e68eab0525d09eafd252e5aae6cc734f27b8571431c3959a392e,2024-11-21T09:27:10.793000 -CVE-2024-3907,0,0,1a0f3fda369fc08d9c55f5d25dfe1ae1c5bf9cb244d8afca8d400cc9c35cbc80,2024-11-21T09:30:40.303000 +CVE-2024-3907,0,1,d33abb7499d8bdfc0449d1ce0b19211840dd2ba2d6c9eb538b65c815ab9ef15f,2025-01-17T21:21:37.327000 CVE-2024-39071,0,0,bcf49297986e31d2062e985568f055f9ac47c400defe91dd2a64b6e8784beffa,2024-11-21T09:27:10.997000 CVE-2024-39072,0,0,7c7576a6aaa8d080d42e8873fa54dabc8fa57d12eb24e8fb3b3b37f2c1e5a476,2024-11-21T09:27:11.203000 -CVE-2024-3908,0,0,1c733ce2eacb0037fcd287dd4aefa5557907db7b2f29c3e50b378d6cffa40154,2024-11-21T09:30:40.433000 +CVE-2024-3908,0,1,9ae7a3395f82376068b28a5a66b47db9023d7d608b35c761f458f643cc6e3617,2025-01-17T21:16:07.327000 CVE-2024-39081,0,0,29ab3d686e2b6d4ec4a310846650a5756a54f10027b101688be62026057df595,2024-10-01T15:51:30.237000 CVE-2024-3909,0,0,7558d94419a80b4787ddbb5aa4ff5bc9036caa4b45c2d36a6cd8f69e85924d21,2024-11-21T09:30:40.570000 CVE-2024-39090,0,0,c1fb932b3c7852f6751439bcd02ca4ef3c48bbe1e8476802f1cae84e9705ca59,2024-11-21T09:27:11.500000 @@ -262016,7 +262017,7 @@ CVE-2024-39904,0,0,c25a670401bfc26df8afcb7510809458f883fcd709af93a20a1029e5f5b91 CVE-2024-39905,0,0,d79772b7ab69602842d543f2aa4b14bfae95db33b08992cb0b4a652162ac9ab0,2024-11-21T09:28:32.333000 CVE-2024-39906,0,0,8d84350de04535242f8eba72f437fedb14fc0f4312838c85d0cb07a5dd7eabf7,2024-11-21T09:28:32.470000 CVE-2024-39907,0,0,edf57fcc33358c073aa915be7687ed4c74053eee07257c0ad5a7a4d29826ac2c,2024-11-21T09:28:32.600000 -CVE-2024-39908,0,1,a6dcf6760b0b9fadd4df0a6808959b67696a98faed411226ac5f767e57357d30,2025-01-17T20:15:28.250000 +CVE-2024-39908,0,0,a6dcf6760b0b9fadd4df0a6808959b67696a98faed411226ac5f767e57357d30,2025-01-17T20:15:28.250000 CVE-2024-39909,0,0,9d88933c61918df2ab3a46b346780be6fb4993d20f3c89b1a28d0310c14f463f,2024-11-21T09:28:32.873000 CVE-2024-3991,0,0,08484fa30be32cf1d03fb643f139be84ebb0c34a79eeb48a7dfe85b33cdb2bd0,2024-11-21T09:30:51.813000 CVE-2024-39910,0,0,dbf23b9bd5c1278ce3098904e5fab34d72b7a29e6eab68c3cb0b804733b304d4,2024-09-29T00:33:03.740000 @@ -263256,7 +263257,7 @@ CVE-2024-41942,0,0,535ebcb4b97c78bedf2f7311ce0f48835e7e8fe72ce0eede852eddf65bfe7 CVE-2024-41943,0,0,b401c9597fea52061b292b5edf2ea2b1816277516e1c8124372a15f0d38f4602,2024-11-21T09:33:19.043000 CVE-2024-41944,0,0,b81db67673e0a559dd65eb2ed0cfc77ac77482224d4f913fa794d14608de7fbd,2024-11-21T09:33:19.157000 CVE-2024-41945,0,0,545083983c906452c705c32959e61f1e138d28b245f7dee7128036882422c3fc,2024-11-21T09:33:19.287000 -CVE-2024-41946,0,1,ebf7d045a612de7e8a5027be0a47987383beb029532620895ad2ec00ca4eb0bc,2025-01-17T20:15:28.380000 +CVE-2024-41946,0,0,ebf7d045a612de7e8a5027be0a47987383beb029532620895ad2ec00ca4eb0bc,2025-01-17T20:15:28.380000 CVE-2024-41947,0,0,90712920d19210817cb67aa5bcd0865a5a2c6aa7439a01baa7857fbe40516e3f,2024-09-06T20:46:01.477000 CVE-2024-41948,0,0,78d1c056fee2c5dcee03b1552ca1ce273973bb0e550a762cd83c60abf036b586,2024-08-09T18:38:47.533000 CVE-2024-41949,0,0,ba00371f44252e55246d1a7d2f5fa0dfa7605953cf6a28d48eec18833be56179,2024-08-09T18:32:53.153000 @@ -264484,7 +264485,7 @@ CVE-2024-43496,0,0,0242182724a163d34b64c27570d48e74fec7fa3a5f31ed50af5812f9b730b CVE-2024-43497,0,0,4bdb08b5512720098aa53f39c82776e46a94d92f13bb4d00fa631640bfc3bf61,2024-10-17T21:15:30.827000 CVE-2024-43498,0,0,6823453d1785ee41df601df301c6e3cbcce61135bd27efcd9a921959505dcc3f,2024-11-19T20:01:04.877000 CVE-2024-43499,0,0,617c6fff156980c452bf6c4c76a89367a4c75ee7ac3fdaf302e79bd6407a3cbe,2024-11-19T19:59:24.387000 -CVE-2024-4350,0,0,0ad31aad7d22cd728edc1e8327fa0c37f0d9e5f2114e3890806b3b638b4bd639,2024-08-30T18:18:37.130000 +CVE-2024-4350,0,1,2a936f9de7c8d535efaa1c3655498f0d6d0ce4a92e8ebb4b6b597f0f26aafd89,2025-01-17T22:15:28.360000 CVE-2024-43500,0,0,5e4bf5d707a97d7bfb742090bc769e9ddd0238eb88135f00a956546aaa90a719,2024-10-17T21:01:08.067000 CVE-2024-43501,0,0,98f378daa7e7080e336d485a2f2ce640128c09b69b8e9cd5a55d4c6b948536cb,2024-10-17T21:06:07.377000 CVE-2024-43502,0,0,a031736eda864dd857ef3d2503e2b864fcbd3df5434b6415a6233eaac1b922e7,2024-10-17T20:58:37.107000 @@ -264515,7 +264516,7 @@ CVE-2024-43526,0,0,d54f8d3df06e63578ea31a5b5f5a0499f3e25359a79ddf071f80ea9020ddf CVE-2024-43527,0,0,cf43baa77e520ba66e08c4469fab788ecc2cd5afada491e82545c4ff70097831,2024-10-17T18:18:08.877000 CVE-2024-43528,0,0,3b7ddee05c3362a1c6c17e49a12b4a951ee30686e6e392e28452d63584be2ccd,2024-10-16T21:47:05.543000 CVE-2024-43529,0,0,31731c35d1f6f78789cb51bf5d48475173d7e19ca743804ee36963b47e9d807a,2024-10-16T21:48:07.683000 -CVE-2024-4353,0,0,b5340d839919aa23c3d0c2526a7112ce3f0b7f2316cd4631ccb03ed28b08ea5b,2024-12-16T19:08:05.467000 +CVE-2024-4353,0,1,4ffccafc3bf4ca0705afabb86a0c2986583233b5fcf3d09f91b99af57e2570bc,2025-01-17T22:15:28.510000 CVE-2024-43530,0,0,35f67c50080a3f5ab2620813a784f901c8c482b8af17231e86829e6b0457ad79,2024-11-19T03:52:28.357000 CVE-2024-43532,0,0,140eee66da6b8d85edd0f2673901f2a7c7e0bdac0ab41cbb82dcfca2e573c283,2024-10-16T21:51:34.370000 CVE-2024-43533,0,0,14fdffec7e07d6529aba3d90037ad8500f7888787d7e8b9da221ae33348dc78d,2024-10-16T21:48:30.067000 @@ -267637,7 +267638,7 @@ CVE-2024-47902,0,0,fdda8971bba9d387ffd8bac2920cf21627a1eb6b178788f8572a5ebbd51c2 CVE-2024-47903,0,0,0c6cef1ca40c315b435460659456fbef42fad928d34e10fedc61c687cf9e7cd1,2024-10-30T15:54:34.647000 CVE-2024-47904,0,0,32023a46094ac777f1807113f7df9a61b152507a55799c58b4c461b6386d43d6,2024-10-30T15:39:06.020000 CVE-2024-47905,0,0,608432e588c6d3242c468fe1003ea181f1c11435c6c8fb7e2cb7ff5f4bf50c01,2024-11-18T15:08:47.280000 -CVE-2024-47906,0,1,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000 +CVE-2024-47906,0,0,91f204b1a48521d2fbe0aed5282a0ab552e9411b89b1217b86f237b75201256d,2025-01-17T20:27:14.100000 CVE-2024-47907,0,0,04c7fba075b24cd5202b6bdbbe3d222a18b28463e62afd4edeb1c843310f652e,2024-11-18T15:09:30.573000 CVE-2024-47909,0,0,114aa268672736b24d218b508c70839e7abe1697ede83610908b9c3a6775a40c,2024-11-18T15:09:45.750000 CVE-2024-4791,0,0,d44a7b4ec125d63941043e195495f910a4d2a5e0ccb20e58ca1a3450532482bd,2024-11-21T09:43:37.137000 @@ -270942,7 +270943,7 @@ CVE-2024-52865,0,0,5d09c59cf2b4fe7df00e6e85adc4b0f685431645dbcb69f48b719d3b7eecb CVE-2024-52867,0,0,b14a9f7c8b0d212f056e38d3758777be722d9d6a10918da14d6ef6ffa3fcbd7e,2024-11-21T09:46:35.283000 CVE-2024-52869,0,0,e0274197b53af25ceec7228d280f45262bb697201ad58fd74dcd6e7042363fe7,2025-01-08T21:15:12.523000 CVE-2024-5287,0,0,ede9629ba14e7833d0e00ab367a4e2205145f22a5dce3f4d9b720c5001bdf2cc,2024-11-21T09:47:21.753000 -CVE-2024-52870,1,1,2044bb354c0ef18d0d39e7296895a5f738c04920123dc7a4233f523d08e77681,2025-01-17T20:15:28.527000 +CVE-2024-52870,0,1,285cbf7f66ae06ab6cf0ba5cd4a799e03813969b3816af7fe51a71da5b5b8a42,2025-01-17T22:15:28.663000 CVE-2024-52871,0,0,bc912334ad7760e2905477f1da15c92d58ec818da9de2502b7206c7a0336bc4d,2024-11-18T18:35:09.027000 CVE-2024-52872,0,0,d5c137691ac8affde2eb9f0d98f11a2242b42b7ed558ce4003950a43927045f3,2024-11-18T18:35:09.270000 CVE-2024-52876,0,0,6fd21241a1a4f5f736d93e368fdcf08c204bdebd19eb249ace2fceb507212592,2024-11-18T17:35:08.900000 @@ -271308,7 +271309,7 @@ CVE-2024-53376,0,0,8911dbfc8997baa2a57cf32f34b4dcc9a56903a67bd0c4ffc9a41950a9065 CVE-2024-5338,0,0,abd3cd0960193de57487be3582f664d37ab06a1518c59aace36e92f8c263b67a,2024-11-21T09:47:26.997000 CVE-2024-5339,0,0,710abf6b65aa86d6904f8abe1101ad889bace87733c06f79ec2fe20822e1db4d,2024-11-21T09:47:27.133000 CVE-2024-5340,0,0,2c2fba286498156a3309f1d9db161c67194b50596b7c53b6a9c7d8df9b89917d,2024-11-21T09:47:27.263000 -CVE-2024-53407,0,0,4a55e9f5f4e9c98382c7226d7b0e05d3471728a49b843f19b760e106979f5ffb,2025-01-15T23:15:09.263000 +CVE-2024-53407,0,1,a9f08a2a8b48dbaa4752120065410e5d3389d13fa41e9ba37732894187dbca00,2025-01-17T22:51:40.307000 CVE-2024-5341,0,0,5035641083613f7715a9cc55e9dc02da384db0018776b0363e78acae939d270c,2024-11-21T09:47:27.407000 CVE-2024-5342,0,0,c19ccffd3ff364daed28ff3ce4f3e63c62c97b909f79a312d9891c60f97a9cce,2024-11-21T09:47:27.517000 CVE-2024-53425,0,0,dba41ac0d03c322e076798942c48ad94ab227d8220eb1e3a3534e4bdae7c6815,2024-11-26T18:15:20.090000 @@ -272303,7 +272304,7 @@ CVE-2024-55494,0,0,a1b10176f7d1839512005775c9e7583ed311f893fd691a402dee6bebdd80d CVE-2024-55496,0,0,c5e38095d75676960b7fbf7f58bdc885b4b159f2f77ece315454c30d8284a24b,2024-12-20T21:15:09.090000 CVE-2024-5550,0,0,4077662850b9d5945d5c85ce45904d9c2783b7c7a72633a9665404cf6f9e870c,2024-11-21T09:47:54.640000 CVE-2024-55500,0,0,291bca667f736f806651e2d665be6fd37497249cdecfcaf8ca1e90cca486c57b,2024-12-11T16:15:17.253000 -CVE-2024-55503,0,0,3178e626ab6aa02cde3a243a7db09cdb3cc0d580d5e6c88eda4e3ee59de8b93c,2025-01-15T23:15:09.390000 +CVE-2024-55503,0,1,064b1132dd99b0fc79a8dd51ea340f43a83611c4433b6171fe0e3b54bc9f811d,2025-01-17T22:51:48.330000 CVE-2024-55505,0,0,95dbb5d9746aa9dcee4d91d0bb5c6de34af0ae63a0cc3e08bcc1dd1518ddf13c,2024-12-18T22:15:07.477000 CVE-2024-55506,0,0,d4e1bef5832aef9ebf8db3056c7ea2e3da4b2a2de7821b1387a5fe03b91675cc,2024-12-26T20:15:22.867000 CVE-2024-55507,0,0,e090c8e2ae47f2afd9c837e2f8b0be6d662da9c654c585f5e405c25baac19616,2025-01-03T21:15:13.340000 @@ -273166,10 +273167,12 @@ CVE-2024-57023,0,0,d41df66e12ee48dea9911b68b69fd3e2dd6413bff89fbe7d5f003eb0363c9 CVE-2024-57024,0,0,1beec8a751780ae175322494ef7070044d054f1fa5e0ef48a3b87e0391061ef3,2025-01-15T17:15:18.280000 CVE-2024-57025,0,0,ffe0150ee7bafc58fb550b4d8a1a7a0168a0884a7f8c6275ccd41663b84022f7,2025-01-15T17:15:18.377000 CVE-2024-5703,0,0,3d28349807701c555fbb2ea67def24c228f00e38f4a4f9bb2c70209ffe7ffa47,2024-11-21T09:48:12.467000 -CVE-2024-57030,1,1,e09a8a5add52558ad8dc576a6d31b3927ba13f9420c4220db450326f4cc891a2,2025-01-17T20:15:28.667000 -CVE-2024-57031,1,1,4ff5f488d31f759c2a25a0bc73d06eb69144a5d62732bdf899ef3bb385fbb9c9,2025-01-17T20:15:28.790000 -CVE-2024-57032,1,1,f0c8cdf6b3c394b5e47d51ddbb69c4bd9b1af03bcc3de3e6a67be5cab57d5ba1,2025-01-17T20:15:28.910000 -CVE-2024-57034,1,1,50df6e932372fb174fa2655a86da7a03168323e2cde159cbd71ecb63a50e56dc,2025-01-17T20:15:29.020000 +CVE-2024-57030,0,1,e2085dbd261ee8fb49a18a0a03fb91173298ac1c000f3b1b7e66eedd701a1450,2025-01-17T21:15:09.823000 +CVE-2024-57031,0,0,4ff5f488d31f759c2a25a0bc73d06eb69144a5d62732bdf899ef3bb385fbb9c9,2025-01-17T20:15:28.790000 +CVE-2024-57032,0,0,f0c8cdf6b3c394b5e47d51ddbb69c4bd9b1af03bcc3de3e6a67be5cab57d5ba1,2025-01-17T20:15:28.910000 +CVE-2024-57033,1,1,6fc47549a06b46925031c839aeeb554403f3e3a332a3da55b165b2b40d57fd82,2025-01-17T21:15:09.980000 +CVE-2024-57034,0,0,50df6e932372fb174fa2655a86da7a03168323e2cde159cbd71ecb63a50e56dc,2025-01-17T20:15:29.020000 +CVE-2024-57035,1,1,052d5b092622afaf4ea0e57f5cee5a1ab42123cd321a83f80b5763b5f382972d,2025-01-17T21:15:10.100000 CVE-2024-5704,0,0,cbccfff62486c3c4f34573a6ffedc788349c4048d54ed4b150463209e5b954e3,2024-11-21T09:48:12.583000 CVE-2024-5708,0,0,f68252af81d3d9fd48c33f6db887b706921f7e4e9ec883679703f59930376646,2024-08-06T16:30:24.547000 CVE-2024-5709,0,0,9e7f02d16313ead7a68864ca2ed2dc29106d9085227941350b2847c3e4c2a85b,2024-08-06T16:30:24.547000 @@ -273204,6 +273207,7 @@ CVE-2024-57228,0,0,2b2ede4eee89a9d230ac4fe6f1506a12a678e5912df7ff0d6e847af20a26c CVE-2024-5723,0,0,e9a9bfbb365da81a3cbb0381b41b1530e9a21124d15e20f7ac8fec3dc25c5b02,2024-11-26T02:16:48.200000 CVE-2024-5724,0,0,3819aa5efba8f524b2e05daa0542d560ece04ca1ec3f26079bc1135d63d2a09c,2024-11-21T09:48:13.843000 CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d96,2024-11-26T02:18:06.927000 +CVE-2024-57252,1,1,628dc6b1296f8743687d596afba3a931ec7c07f8b9dd88efd06e94d742bfce54,2025-01-17T22:15:28.817000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 @@ -273215,10 +273219,10 @@ CVE-2024-5733,0,0,08c79914b3b228d8239c5511d15a5ec639094518968ef7bdf362b13a620582 CVE-2024-5734,0,0,e11a2eabf858c649c3672ef7dfee7440a5aa55af470ebaa049ac34828502652b,2024-11-21T09:48:15.300000 CVE-2024-5735,0,0,1aecf1dad861da728b2f9826c6f1c9c383af7e2a97744eeffda3009b167fdae6,2024-11-21T09:48:15.447000 CVE-2024-5736,0,0,6b1b18dd72938ab32e71ae9b9c3e5aef903a076b6bda077e482ad25858245f35,2024-11-21T09:48:15.580000 -CVE-2024-57369,1,1,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000 +CVE-2024-57369,0,0,08768297729630cc31e03f050602de5b90fde20bc72ba089df28838013f0de04,2025-01-17T20:15:29.140000 CVE-2024-5737,0,0,fb7afad0bdcad96b29de7c5519f73ad0e5af614975f3cc39b56e0ff717aa63e5,2024-11-21T09:48:15.713000 -CVE-2024-57370,1,1,7765e75c31c1bc6246006d57f06cb37946989154ae631d46e5284bdc42f2fbbc,2025-01-17T20:15:29.303000 -CVE-2024-57372,1,1,91a30a42ebb7ce1420695c8357e3034a19294d83f5a0fb757e229eec32d59c59,2025-01-17T20:15:29.447000 +CVE-2024-57370,0,0,7765e75c31c1bc6246006d57f06cb37946989154ae631d46e5284bdc42f2fbbc,2025-01-17T20:15:29.303000 +CVE-2024-57372,0,1,c305f1ff8dee898dc877fd7092322892cec8b12f543ffd49cc6c6aec831bb670,2025-01-17T22:15:28.957000 CVE-2024-5739,0,0,0e4f510b66deb8d2a70ee4b32b2e47de655e3949e52e35934a40b7f5adddcb57,2024-11-21T09:48:15.850000 CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f02a,2024-11-21T09:48:15.963000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 @@ -274962,7 +274966,7 @@ CVE-2024-7508,0,0,a7d4299addf15fc74e07e60c708d376762d878236db909cc3b16cc673da8cb CVE-2024-7509,0,0,1d20a01ba25ba429690bc4a3d75ed6316644cb9406cd3eb90a5bb7d5e7873d40,2024-12-03T21:54:37.137000 CVE-2024-7510,0,0,45504ac03358aed12f1633b52cd834d55efea8194dbc4d2192df23d30460f213,2024-12-03T21:36:54.357000 CVE-2024-7511,0,0,9bf089a5dbb9957d15202d89b865f1149744d0ed4ad1c450b9f46cf07d7d9683,2024-12-03T21:31:50.467000 -CVE-2024-7512,0,0,cdc52e540a9bdca89bc4ac49ab8f59efe3e561d0b829cba4594b3502381e02df,2024-08-30T18:19:01.187000 +CVE-2024-7512,0,1,6e6986c7b9ae27924efa1b771bcbe402501f560cb58148172cc36bd006ab926d,2025-01-17T21:15:10.317000 CVE-2024-7513,0,0,a0b177aecfbd2f734939ad8dd9a1241704f6abbdbf43364c61f3c9c8ac7af1f7,2024-08-15T13:01:10.150000 CVE-2024-7514,0,0,14ce9dcc3ffed0373a6deaa5aa3e357b4b0f7014d133d7f13dac237fa2f5873a,2024-10-15T12:58:51.050000 CVE-2024-7515,0,0,144060b2d32affc4e63578ef1d58b4a89b0be73fa975a25e8bdeb2b20501ddf2,2024-08-15T13:01:10.150000 @@ -275015,7 +275019,7 @@ CVE-2024-7567,0,0,6fcc07bc770e46ac627a51be07c4648386148d0b824984d20ae9036535f6d5 CVE-2024-7568,0,0,2f553130e4eacfc693e995fca0612777f4d890e405998fe269b8e8bc9ce30eac,2024-09-27T00:41:18.483000 CVE-2024-7569,0,0,5994c6b63c20456eef57a01a5388108fe6a245760bb402517971f0893da8a4e1,2024-09-06T21:57:23.037000 CVE-2024-7570,0,0,4b95c50b05e603fd192a26ba7aeb93b1795ca78a10ab423596f59e19e721c691,2024-09-06T21:59:00.830000 -CVE-2024-7571,0,1,d18fe4fc5f9d3da0f1009cc412f613bc32f1ea956dc0840e9f2520909cc16ecf,2025-01-17T19:45:37.847000 +CVE-2024-7571,0,0,d18fe4fc5f9d3da0f1009cc412f613bc32f1ea956dc0840e9f2520909cc16ecf,2025-01-17T19:45:37.847000 CVE-2024-7572,0,0,d6a06dc5856037f9439f575c54e48139962b11c091f2a709c1a513d9fb1309c5,2024-12-10T19:15:31.317000 CVE-2024-7573,0,0,b682119c0c2e97bcbd91b2c93bf46919696a7eb8e95fa746f7aa6d0673139d3d,2024-08-28T12:57:27.610000 CVE-2024-7574,0,0,af702c08dced1e58034991ae3edb1ced31d7e457008281fc7156f6946a0e1bd9,2024-08-12T13:41:36.517000 @@ -275612,7 +275616,7 @@ CVE-2024-8287,0,0,44aad866f3460bf718be990008b4fca1b1acc226707db3970935711ac18575 CVE-2024-8288,0,0,2dbe9e38811e1b4dd40daba68eaba51e92496c00a9c8fcb0f014d8ae6dc0534a,2024-10-04T13:51:25.567000 CVE-2024-8289,0,0,9d7300f8940d3398f33784f738c77a2c01537f05398b35ceacb9c8df1f539077,2024-09-05T17:41:58.350000 CVE-2024-8290,0,0,5d15203a205ff71e6a186cdf59da5aa3299b33d75ed0d674580f969ba3b8eddb,2024-10-02T18:23:25.890000 -CVE-2024-8291,0,0,4c7a502b8dcdc7ae37b59ec52570589f381282cc1c90c62ca624f58c30b10e5a,2024-09-30T15:59:11.073000 +CVE-2024-8291,0,1,1ae4dc05fedd630c1151b869416b4c45162985e2f0c7f613bd6c4c8c04bb0401,2025-01-17T22:15:29.107000 CVE-2024-8292,0,0,5b8e8a7b1942b76a866c021acf702acc5b529e4f5401ecaebfc5d28b0fe9ddd2,2024-09-12T12:37:18.380000 CVE-2024-8294,0,0,9355f5f1d65d75ae788b4eeb610cbf65ea6d91fb3dd96f7695e8af8d66529a81,2024-08-30T15:38:13.437000 CVE-2024-8295,0,0,a34d7d504d9aac6d3f93634a6ef292d08d44f1052fca3c8af7eb1da16cd1590f,2024-08-30T15:37:41.510000 @@ -275786,7 +275790,7 @@ CVE-2024-8485,0,0,7da6ab34afa2ac24f2a2d46141ca9ec2b3fec75691fe7f053cec823f479e4d CVE-2024-8486,0,0,72c8d12fbda6079a657a7f7d5227b28970fafaa525b2f5c74dce370135cee472,2024-10-07T17:48:28.117000 CVE-2024-8488,0,0,3018a5659d434cc801dc5e3e8a6e3f6b1d0cf4538dce2991c2254ff7a5f65d98,2024-10-10T12:56:30.817000 CVE-2024-8490,0,0,62bf39487dc10cd157d6355db7b678c26d37a733716806928b901a962cb34d9b,2024-09-27T18:36:00.053000 -CVE-2024-8495,0,1,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000 +CVE-2024-8495,0,0,17397faf6a76a08d8fc13d36960aa09837cfb12c560f1e3c53a500c38b48cbe7,2025-01-17T20:04:56.517000 CVE-2024-8496,0,0,ab865babe0d164049e1365545a634298d8f9eeb65fa574e795c6818555b64d40,2024-12-13T19:42:40.417000 CVE-2024-8497,0,0,964dec8be2200cdf9d07127057f8b6f303d0e240ee7e6f76cdfe9a2fce62258d,2024-09-26T13:32:02.803000 CVE-2024-8499,0,0,2edefd90741d92198f57d70f6a88792184be7286118419ab2da73ea4b4333266,2024-11-08T21:01:13.457000 @@ -275819,7 +275823,7 @@ CVE-2024-8534,0,0,9508bbdbb90dcab7c3c9618335f28688c58197e5ebea0ff344bbe124b8a349 CVE-2024-8535,0,0,9430921b56a98fb793f25bd28deda9111898929b692dbcd6ef2778ea55060c41,2024-11-21T17:15:26.630000 CVE-2024-8536,0,0,f58b8cad2a0c4a90556b7c4730ad95a9e86edfd36c5b80cbcf69e920921131cf,2024-10-03T18:16:17.740000 CVE-2024-8538,0,0,9b85de2d90f35a6b2ee4405e401f24f5b3cc7b117815da585ee31db85a74f1aa,2024-09-26T16:28:02.990000 -CVE-2024-8539,0,1,b95b63a69114e86ee4b81290494a4e2a10a7471bf2622ad03aaa6c23d22526fb,2025-01-17T20:02:50.283000 +CVE-2024-8539,0,0,b95b63a69114e86ee4b81290494a4e2a10a7471bf2622ad03aaa6c23d22526fb,2025-01-17T20:02:50.283000 CVE-2024-8540,0,0,c20b714994c4aa7587d38b96cb78eba5da562e7776c062ceec053d693ed236df,2024-12-10T19:15:31.463000 CVE-2024-8541,0,0,11f11486e0c328b727b3519cc94f2174fb76a070c646745035cf6e7c2e119162,2024-11-08T15:07:08.400000 CVE-2024-8543,0,0,e6cedcbecc2d6bdc12712cbe45b90facb692961eb011612655f2e0245f4a87b3,2024-09-27T16:46:26.243000 @@ -276543,7 +276547,7 @@ CVE-2024-9413,0,0,a06de6835130fe994a1b9f10a16e4d390bb61a1bb02ceb9b43d0f4e1eeae35 CVE-2024-9414,0,0,daa11a618576f3dd1bc2a87a2671aa82c6ce206bc2d923313e6d592311bc638a,2024-10-18T12:52:33.507000 CVE-2024-9417,0,0,216f9ce7a9e770763e40db955a327ba67f06d2e630f73f66eb3add63da2d3dc5,2024-10-07T17:48:28.117000 CVE-2024-9419,0,0,75c2ffcece6c8d9641e61b7d83db859a8f0c6a3be035496f4eedc8e263459f13,2024-11-01T12:57:03.417000 -CVE-2024-9420,0,1,0e84e878b3a1f98289c88b1fb777d3526a495ded70c4b0ad1ee8e42f7524d058,2025-01-17T20:29:36.007000 +CVE-2024-9420,0,0,0e84e878b3a1f98289c88b1fb777d3526a495ded70c4b0ad1ee8e42f7524d058,2025-01-17T20:29:36.007000 CVE-2024-9421,0,0,037ff18a423af7d430246a25c13267312b520381fc2b22b38075ef45225d8825,2024-10-10T20:59:01.600000 CVE-2024-9422,0,0,84806a9eed518b06f6d8827496be4f70f3fd277675ce3978a293d23ef572b865,2024-11-22T18:15:18.287000 CVE-2024-9423,0,0,ea2ceee1b3bf62e5f678d6840797f5ce1005e985008fd3d6ffca2317e3c41048,2024-10-04T13:50:43.727000 @@ -276885,9 +276889,9 @@ CVE-2024-9836,0,0,00fe9619a572716e33d038c70d158c90aa86eec43cd0588694b10c90a08bd1 CVE-2024-9837,0,0,afe4e527f22e06da82758e417087daa648749cf526ed58128828756f86ec8839,2024-10-15T12:57:46.880000 CVE-2024-9839,0,0,57bea8403f5cc48dea698cfdd728b58122c5ab953b09fd7bbfa276adce1153b8,2024-11-18T17:11:17.393000 CVE-2024-9841,0,0,c53d88eafada925ed527f104c1b1b1199a9f5255a50ee9eb8941cdbc1ee0bb15,2024-11-13T19:34:26.237000 -CVE-2024-9842,0,1,73b7cd007d10f6b74ffd8cd6b50292b47cc50d7e962263b6bfd7542be8462f48,2025-01-17T19:55:48.957000 -CVE-2024-9843,0,1,3f01712625f1edfab25d9be2335cadc8d4f5a03c9e93738f00254824a275f98d,2025-01-17T20:00:21.843000 -CVE-2024-9844,0,1,f761f39a419d543ed7dd0afc14bfb68da04abe0d0db79b309ef397327e3b394c,2025-01-17T19:37:13.830000 +CVE-2024-9842,0,0,73b7cd007d10f6b74ffd8cd6b50292b47cc50d7e962263b6bfd7542be8462f48,2025-01-17T19:55:48.957000 +CVE-2024-9843,0,0,3f01712625f1edfab25d9be2335cadc8d4f5a03c9e93738f00254824a275f98d,2025-01-17T20:00:21.843000 +CVE-2024-9844,0,0,f761f39a419d543ed7dd0afc14bfb68da04abe0d0db79b309ef397327e3b394c,2025-01-17T19:37:13.830000 CVE-2024-9845,0,0,dac1b56b146024cd48eb8cf06bd45e68c3a45cc41706a416eb443467ca7d4d17,2024-12-13T19:44:22.813000 CVE-2024-9846,0,0,5a29335b18c23f96eafa12a0012dbfa40c39c1cc47deb5473e372f76f16fe2df,2024-11-06T14:58:04.160000 CVE-2024-9848,0,0,148772454ae4a112a7436067b81ee2ac8c78d3a83ad8a189df162c230ac91d15,2024-10-22T16:42:25.867000 @@ -277207,11 +277211,14 @@ CVE-2025-0529,0,0,ea496211e640b9457f778b80e44f6b96266d3a94c4c1a7f323035b1de0d266 CVE-2025-0530,0,0,e5a25d489129220890dc2444b8dbc044679c369120b99e93eb7cc0e0c586681e,2025-01-17T16:15:33.937000 CVE-2025-0531,0,0,70772c7ab6e128acaeccb2025ef3d3d40ee700c16af0c59c4844f2cb87966cbf,2025-01-17T16:15:34.250000 CVE-2025-0532,0,0,4d92732b352395641e27304ba949a5d746e81750f3574c04f91dc679f65ac49d,2025-01-17T18:15:31.237000 -CVE-2025-0533,0,0,00c854b2342ff9edb13ef61155d7cae29025b472a6af5e1d39d09a6ad67d9690,2025-01-17T18:15:31.577000 -CVE-2025-0534,1,1,a3ec127c39fbe4883168380fdd84d2a13f574a22ab79b7102ce42334ec5bc91e,2025-01-17T19:15:28.777000 -CVE-2025-0535,1,1,23267893be9929c36dee9ccdb2851027f260f2b1e068a3125e11e636a590092d,2025-01-17T19:15:28.990000 -CVE-2025-0536,1,1,bc38c8ba5af4e7472d7f22d13aed2c6d2fe30298a4c118afbe0638c85b0b1188,2025-01-17T20:15:29.583000 -CVE-2025-0537,1,1,d2d5f6c3ed1aba0629c7b9914597be74a65e836badbe3287071391416aeb4d55,2025-01-17T20:15:29.767000 +CVE-2025-0533,0,1,7f9d32a2b8498bdcb13287d845ecf92659d969c766d3960e43e297ee75f74856,2025-01-17T21:15:10.487000 +CVE-2025-0534,0,1,aa1feda9d93d553c893a821acdcd6e6031ddccdc91780da53a73a7286a0a0e2d,2025-01-17T21:15:10.650000 +CVE-2025-0535,0,0,23267893be9929c36dee9ccdb2851027f260f2b1e068a3125e11e636a590092d,2025-01-17T19:15:28.990000 +CVE-2025-0536,0,0,bc38c8ba5af4e7472d7f22d13aed2c6d2fe30298a4c118afbe0638c85b0b1188,2025-01-17T20:15:29.583000 +CVE-2025-0537,0,0,d2d5f6c3ed1aba0629c7b9914597be74a65e836badbe3287071391416aeb4d55,2025-01-17T20:15:29.767000 +CVE-2025-0538,1,1,665829c176e139d24899162f51dc3f75a7743136ae8d080cfb4406eda703598f,2025-01-17T21:15:10.847000 +CVE-2025-0540,1,1,0fe6a3968060e1d9e108f736a24030b6ee6db8d0695d6022f7d1a51c2ca09a50,2025-01-17T21:15:11.037000 +CVE-2025-0541,1,1,422e97928ac96e00be4b8b72ccf9ce9a6f4a23518705054b1953468a190b5cd0,2025-01-17T22:15:29.337000 CVE-2025-20016,0,0,3fa4bc97a0a3d288bd5925fa89275b3fac40424bcf9581fb156684828af784ae,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,fd9f374b8914b94f087a22b827ae9aa005122afe6c3b9fb7f7ca385e01f1379b,2025-01-15T17:15:18.950000 @@ -277234,11 +277241,11 @@ CVE-2025-21102,0,0,8153781fb244bf502850065fab180d787cadc10df5675c4bfb3f0250244d9 CVE-2025-21111,0,0,ac99f23afec6fb5ea7aef333a4f2d14bc0359a06e3db388b0b698b212d2c1078,2025-01-08T18:15:20.157000 CVE-2025-21122,0,0,43e018e554d36ad8c27426d45eac54aac7111a0f7fbc00c5faddfbf20d24d353,2025-01-14T19:15:33.070000 CVE-2025-21127,0,0,ff3f2190f0b612f83d2bddb73540fbc2cccf294add7d86059214c07a30b1706d,2025-01-14T19:15:33.230000 -CVE-2025-21128,0,1,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 -CVE-2025-21129,0,1,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000 -CVE-2025-21130,0,1,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000 -CVE-2025-21131,0,1,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000 -CVE-2025-21132,0,1,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000 +CVE-2025-21128,0,0,40945503866b9130c6c67e813bc72623208ffdfcd3f68f3f78dadfd34ec95930,2025-01-17T20:37:35.437000 +CVE-2025-21129,0,0,e461eb72d0798775b4431b992e70379c16a549ecff183ae810c30304f7444aa5,2025-01-17T20:37:33.603000 +CVE-2025-21130,0,0,0a403dcee067b476ce6e2b56e8043f657d644fdd57d4c6dc048a515a53142fc0,2025-01-17T20:37:32.137000 +CVE-2025-21131,0,0,bd9947447c6eaa1cc16f247aee5cb76a0ae540007c1234492add7170f98e9ee8,2025-01-17T20:37:30.750000 +CVE-2025-21132,0,0,638462d9be187051a18a689c12e2e1ce1ddef5c76aec080f6deef373f9d944d3,2025-01-17T20:37:29.347000 CVE-2025-21133,0,0,f39e797c9e3761662690c0d0c0e02c0c918947858d1f9156eb425e12cd546319,2025-01-14T19:15:34.187000 CVE-2025-21134,0,0,c93daea6012e8c7d66590fc258c4a36aadabfb4ef78a3c9c6e5bab6127e3d755,2025-01-16T20:43:02.810000 CVE-2025-21135,0,0,c9c3ecb3908293d81f3245af42be596eafeb2d021f670b2a2e192c0c24a4a599,2025-01-14T20:15:30.853000 @@ -277251,7 +277258,7 @@ CVE-2025-21172,0,0,4f24a61268da184b858f9e77120c20e5fc66016bfbd974b21d25930e48989 CVE-2025-21173,0,0,5d58cc1bc98454cc231277f66b132069108794b4784bc70fe1c2f951f9b342b5,2025-01-14T19:15:34.583000 CVE-2025-21176,0,0,fa110a0f22c836c12f0cf2ce220d5de18c4ab88ac77aabb721f68f988794d79a,2025-01-14T18:15:30.650000 CVE-2025-21178,0,0,1b6a69fe03b4fb3f04715244cc0650d44ad2017e1071e6abf791436e0822e04e,2025-01-14T18:15:30.847000 -CVE-2025-21185,1,1,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000 +CVE-2025-21185,0,0,1af79d3ef8f65c7dfb2c433d952a1d4f646119e4c304c6d9df90c5fba85cd1b8,2025-01-17T20:15:30.227000 CVE-2025-21186,0,0,91a8abe2a73ddcfa1782c8e7ce8a598c73ba47e42f61be06b2519fd9c6895eba,2025-01-14T18:15:31.020000 CVE-2025-21187,0,0,b9e3dedb73276bf5967898c1d3b393f17bdb00693d151852eac842fd28055fbf,2025-01-14T18:15:31.187000 CVE-2025-21189,0,0,4d509212258b8740ea90cead040b9819ec41a61e1c261bb431a52d9cf1d53af4,2025-01-14T18:15:31.377000 @@ -277383,9 +277390,9 @@ CVE-2025-21348,0,0,b18bc9f42c837973185b37906f0bca18a0077a98d8987a7deac1373ff7183 CVE-2025-21354,0,0,67bb15809fb7626348b06f722bdc42095fcef06c14f355f18c2f99bcdd08e1e7,2025-01-15T00:15:43.170000 CVE-2025-21356,0,0,26156418338a80fc3382415b36edf58e99a176cdf3ba70297a5f2e24591a5d33,2025-01-14T18:16:01.130000 CVE-2025-21357,0,0,48f6f50b58a645314e8c3a670faac4c08145ec6653b367344cbcab3656dfb136,2025-01-14T18:16:01.293000 -CVE-2025-21360,0,1,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 -CVE-2025-21361,0,1,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 -CVE-2025-21362,0,1,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 +CVE-2025-21360,0,0,1b890933152e0ad6c56f74976ff5f8eaba0ff19a3ed4db064fae08186acb8dc8,2025-01-17T20:40:22.527000 +CVE-2025-21361,0,0,15333b9f9e4e095e5eb0227b45a3d79a56875bc396c0df556b7a044756c81d2f,2025-01-17T20:39:49.017000 +CVE-2025-21362,0,0,2902d63a2e75a1ecbc123770588d73eec93458274a31a234a8cbf1bc4f8d0b31,2025-01-17T20:38:30.560000 CVE-2025-21363,0,0,f726115b55f9c5f5a854b5f286fdbda09ab250f236507ffb8edb604500d61e4e,2025-01-17T15:10:17.307000 CVE-2025-21364,0,0,63961d54501dd4938329aea14ac86e7e58ab23bd7b18dc877501db61b65d00ac,2025-01-17T15:11:24.487000 CVE-2025-21365,0,0,fbe06d12b36b39ab38ad43d75a690a732b558477f477e5dca938593a91da8dc8,2025-01-17T15:11:34.843000 @@ -277400,7 +277407,7 @@ CVE-2025-21385,0,0,116d61f5bfd24a155e4d33133e1d992c619fbf22c0ac93200278bd13c2b58 CVE-2025-21389,0,0,e0837d0e37718f09b2f4f6a27094db9197593cd197ddd111d928061563fd763e,2025-01-17T15:44:04.177000 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 -CVE-2025-21399,1,1,7faea7022a98fa48896e2ecf9653b40b0669c8575634a3a978238790ce9a5d34,2025-01-17T20:15:46.117000 +CVE-2025-21399,0,1,dd7dd15e0bf28105dde42fe08f9af97913f39e43de69ca54f29cd269a806e542,2025-01-17T21:15:11.283000 CVE-2025-21402,0,0,8735b6fc9eb678e6271b2b6fe2185ce8b908b167889ec93275e92441f05bbecc,2025-01-14T18:16:04.190000 CVE-2025-21403,0,0,170bb670eda6cfb5ceec8894e0be2f05a3e04b5bd73094066c77d77ef21a11f0,2025-01-14T18:16:04.350000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 @@ -277417,6 +277424,7 @@ CVE-2025-21600,0,0,0511e8e443940a54ef072ec82b613cd606986ba56f640dd75add723416939 CVE-2025-21602,0,0,98fe9b608a65f60bdad3939961d20a9c1558362795b914622d82bfabf6cfafaa,2025-01-09T17:15:19.150000 CVE-2025-21603,0,0,de5a98ab5a1846941043ac114cde34c932a06d56fde93bc5468f6ea62d88c11e,2025-01-08T15:15:21.320000 CVE-2025-21604,0,0,0ed8064b9182950e530cb7b2f52528d7c551930e7450b1b19d40475d7a199d1b,2025-01-06T16:15:30.927000 +CVE-2025-21606,1,1,0349594481f2ded846f30215d0cfc0bb438d93beaae4bb599942eb1b2e5cec37,2025-01-17T21:15:11.420000 CVE-2025-21607,0,0,1209306172347dde01f13b6689a1616e491e8e2e568e8703f282009eb4f87675,2025-01-15T16:15:34.463000 CVE-2025-21609,0,0,3c2fc9da6be905fe106ba75040e21828a0454c46abf195fca7a6951c7de8750f,2025-01-03T17:15:09.147000 CVE-2025-21610,0,0,7316a86caea5346e233350f085898ca7619157368c1365d30f5c1d1d8901ed25,2025-01-03T17:15:09.290000 @@ -277745,6 +277753,7 @@ CVE-2025-23035,0,0,15119e210304923b04825a533afb7d64de389165b45e441f65e24ce625e49 CVE-2025-23036,0,0,2fb507a6612e29adcef56fa56aa33311d41bce13c8a87d5f9d3d69910ed84b10,2025-01-14T01:15:18.563000 CVE-2025-23037,0,0,a1e1381f9e34163ba825239477ba56ff2234c19dc9e437125649d99c36cd92cc,2025-01-14T01:15:18.717000 CVE-2025-23038,0,0,1de4cc81179ad5c8416ead223772d5e98b46dd173dbfd59e0eb5993af28ad908,2025-01-14T01:15:18.867000 +CVE-2025-23039,1,1,0f4c8b18d96f18300eb9751f08f87708b6a9147a90f825f661850c792e0bc10b,2025-01-17T21:15:11.560000 CVE-2025-23040,0,0,01c74eb3bbfb2cd1f602a038f7c0e18be82bfb3ffcbee44004a2e80cdc5995d7,2025-01-15T18:15:24.797000 CVE-2025-23041,0,0,d87dedc1a7db6bd5664f42801252448bdb5151d09c41aace5826158a53a32d97,2025-01-14T19:15:44.713000 CVE-2025-23042,0,0,1110c74e58afce403252b0074fffd93e05f17f43b2190d384fd7a07c01cb5ad5,2025-01-14T19:15:44.863000 @@ -277774,6 +277783,10 @@ CVE-2025-23198,0,0,38d064f9eeb5dbdc89e5c2cab94de1a30dcf1ab278ad387ee52fa20cdcf4c CVE-2025-23199,0,0,dd0c2d35f6e256939803dab93415f9b547ee1909db113c76af2a7fe5a5e3c989,2025-01-16T23:15:08.567000 CVE-2025-23200,0,0,059d55c00b9698c0e7fb0e2a5468e34b0267f568df56955bd779c82b44a99f4d,2025-01-16T23:15:08.720000 CVE-2025-23201,0,0,b8e7e9379c2984feb102e6af9826e4aebb2824dc378f94af55ada00bfab366bf,2025-01-16T23:15:08.880000 +CVE-2025-23202,1,1,ebb9b3c0ec35ea830eb49777cc26a7423c92a02686e756805e9c6768f34595bd,2025-01-17T21:15:11.713000 +CVE-2025-23205,1,1,5dde18f3e1001012d88c0b2d8c423eb8fb8c3ba6cae70cd1181e6ed64426f77c,2025-01-17T21:15:11.850000 +CVE-2025-23206,1,1,ea12574764f66c161153bcbbbe1a91d389bf6c6631d0c7b641a3ca1fa029cc28,2025-01-17T21:15:12.003000 +CVE-2025-23207,1,1,e5de4237889cfabf27065c43b82af396f478aa914ba2d9d161effc65eaba9de4,2025-01-17T22:15:29.523000 CVE-2025-23366,0,0,9c322475015bf02d1585352d78c1a1b463f803a5f9fa5af211a6e73349c16f8f,2025-01-14T18:16:06.290000 CVE-2025-23423,0,0,b6f59e601cdbaad011f370832d8ff10b7231d5875d4fb9da3b536bb65b8259e8,2025-01-16T20:15:33.573000 CVE-2025-23424,0,0,af50c9c9dec5ab1ce79e37d50537a1d0fe21f0f1e703c32c29cd7fa3dc996735,2025-01-16T20:15:33.723000