From 4deed8bd8640e9650b24faa635f46d1959cf1c96 Mon Sep 17 00:00:00 2001 From: cad-safe-bot Date: Fri, 24 Jan 2025 19:03:59 +0000 Subject: [PATCH] Auto-Update: 2025-01-24T19:00:32.954520+00:00 --- CVE-2019/CVE-2019-156xx/CVE-2019-15690.json | 56 +++ CVE-2021/CVE-2021-08xx/CVE-2021-0877.json | 22 +- CVE-2021/CVE-2021-320xx/CVE-2021-32030.json | 6 +- CVE-2023/CVE-2023-206xx/CVE-2023-20673.json | 32 +- CVE-2023/CVE-2023-207xx/CVE-2023-20701.json | 32 +- CVE-2023/CVE-2023-207xx/CVE-2023-20703.json | 32 +- CVE-2023/CVE-2023-207xx/CVE-2023-20717.json | 22 +- CVE-2023/CVE-2023-207xx/CVE-2023-20718.json | 22 +- CVE-2023/CVE-2023-209xx/CVE-2023-20914.json | 32 +- CVE-2023/CVE-2023-209xx/CVE-2023-20930.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21102.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21103.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21104.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21106.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21107.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21109.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21110.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21112.json | 32 +- CVE-2023/CVE-2023-211xx/CVE-2023-21116.json | 32 +- CVE-2023/CVE-2023-234xx/CVE-2023-23444.json | 12 +- CVE-2023/CVE-2023-245xx/CVE-2023-24539.json | 32 +- CVE-2023/CVE-2023-245xx/CVE-2023-24540.json | 32 +- CVE-2023/CVE-2023-26xx/CVE-2023-2646.json | 38 +- CVE-2023/CVE-2023-26xx/CVE-2023-2660.json | 34 +- CVE-2023/CVE-2023-275xx/CVE-2023-27554.json | 34 +- CVE-2023/CVE-2023-278xx/CVE-2023-27870.json | 34 +- CVE-2023/CVE-2023-290xx/CVE-2023-29022.json | 32 +- CVE-2023/CVE-2023-290xx/CVE-2023-29026.json | 32 +- CVE-2023/CVE-2023-290xx/CVE-2023-29027.json | 32 +- CVE-2023/CVE-2023-290xx/CVE-2023-29028.json | 32 +- CVE-2023/CVE-2023-290xx/CVE-2023-29029.json | 32 +- CVE-2023/CVE-2023-294xx/CVE-2023-29400.json | 32 +- CVE-2023/CVE-2023-316xx/CVE-2023-31617.json | 32 +- CVE-2023/CVE-2023-316xx/CVE-2023-31618.json | 32 +- CVE-2023/CVE-2023-316xx/CVE-2023-31619.json | 32 +- CVE-2023/CVE-2023-319xx/CVE-2023-31916.json | 32 +- CVE-2024/CVE-2024-128xx/CVE-2024-12879.json | 36 +- CVE-2024/CVE-2024-130xx/CVE-2024-13091.json | 36 +- CVE-2024/CVE-2024-133xx/CVE-2024-13360.json | 36 +- CVE-2024/CVE-2024-133xx/CVE-2024-13361.json | 58 ++- CVE-2024/CVE-2024-134xx/CVE-2024-13426.json | 93 +++- CVE-2024/CVE-2024-135xx/CVE-2024-13584.json | 63 ++- CVE-2024/CVE-2024-135xx/CVE-2024-13590.json | 58 ++- CVE-2024/CVE-2024-16xx/CVE-2024-1603.json | 67 ++- CVE-2024/CVE-2024-244xx/CVE-2024-24427.json | 57 ++- CVE-2024/CVE-2024-244xx/CVE-2024-24428.json | 58 ++- CVE-2024/CVE-2024-259xx/CVE-2024-25937.json | 54 ++- CVE-2024/CVE-2024-28xx/CVE-2024-2805.json | 106 ++++- CVE-2024/CVE-2024-298xx/CVE-2024-29870.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29871.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29872.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29873.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29874.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29875.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29876.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29877.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29878.json | 51 ++- CVE-2024/CVE-2024-298xx/CVE-2024-29879.json | 51 ++- CVE-2024/CVE-2024-351xx/CVE-2024-35122.json | 56 +++ CVE-2024/CVE-2024-38xx/CVE-2024-3848.json | 78 +++- CVE-2024/CVE-2024-42xx/CVE-2024-4223.json | 54 ++- CVE-2024/CVE-2024-42xx/CVE-2024-4279.json | 84 +++- CVE-2024/CVE-2024-43xx/CVE-2024-4318.json | 94 +++- CVE-2024/CVE-2024-564xx/CVE-2024-56404.json | 64 +++ CVE-2025/CVE-2025-07xx/CVE-2025-0700.json | 145 +++++++ CVE-2025/CVE-2025-07xx/CVE-2025-0701.json | 145 +++++++ CVE-2025/CVE-2025-07xx/CVE-2025-0702.json | 145 +++++++ CVE-2025/CVE-2025-226xx/CVE-2025-22608.json | 60 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22609.json | 56 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22610.json | 78 ++++ CVE-2025/CVE-2025-226xx/CVE-2025-22611.json | 56 +++ CVE-2025/CVE-2025-226xx/CVE-2025-22612.json | 60 +++ CVE-2025/CVE-2025-232xx/CVE-2025-23222.json | 64 +++ CVE-2025/CVE-2025-240xx/CVE-2025-24025.json | 78 ++++ CVE-2025/CVE-2025-243xx/CVE-2025-24355.json | 60 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24359.json | 68 +++ CVE-2025/CVE-2025-243xx/CVE-2025-24362.json | 98 +++++ CVE-2025/CVE-2025-245xx/CVE-2025-24542.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24543.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24546.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24547.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24552.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24555.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24561.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24562.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24568.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24570.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24571.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24572.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24573.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24575.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24578.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24579.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24580.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24582.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24585.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24587.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24588.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24589.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24591.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24594.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24595.json | 56 +++ CVE-2025/CVE-2025-245xx/CVE-2025-24596.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24604.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24610.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24611.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24613.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24618.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24622.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24623.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24625.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24627.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24633.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24634.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24636.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24638.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24644.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24647.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24649.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24650.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24652.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24657.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24658.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24659.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24663.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24666.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24668.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24669.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24672.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24673.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24674.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24675.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24678.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24679.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24681.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24682.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24683.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24687.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24691.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24693.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24695.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24696.json | 56 +++ CVE-2025/CVE-2025-246xx/CVE-2025-24698.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24701.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24702.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24703.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24704.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24705.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24706.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24709.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24711.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24712.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24713.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24714.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24715.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24716.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24717.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24719.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24720.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24721.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24722.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24723.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24724.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24725.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24726.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24727.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24728.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24729.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24730.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24731.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24732.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24733.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24736.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24738.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24739.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24746.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24750.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24751.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24753.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24755.json | 56 +++ CVE-2025/CVE-2025-247xx/CVE-2025-24756.json | 56 +++ README.md | 108 ++--- _state.csv | 454 +++++++++++++------- 183 files changed, 9880 insertions(+), 393 deletions(-) create mode 100644 CVE-2019/CVE-2019-156xx/CVE-2019-15690.json create mode 100644 CVE-2024/CVE-2024-351xx/CVE-2024-35122.json create mode 100644 CVE-2024/CVE-2024-564xx/CVE-2024-56404.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0700.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0701.json create mode 100644 CVE-2025/CVE-2025-07xx/CVE-2025-0702.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22608.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22609.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22610.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22611.json create mode 100644 CVE-2025/CVE-2025-226xx/CVE-2025-22612.json create mode 100644 CVE-2025/CVE-2025-232xx/CVE-2025-23222.json create mode 100644 CVE-2025/CVE-2025-240xx/CVE-2025-24025.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24355.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24359.json create mode 100644 CVE-2025/CVE-2025-243xx/CVE-2025-24362.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24542.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24543.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24546.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24547.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24552.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24555.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24561.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24562.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24568.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24570.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24571.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24572.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24573.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24575.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24578.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24579.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24580.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24582.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24585.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24587.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24588.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24589.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24591.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24594.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24595.json create mode 100644 CVE-2025/CVE-2025-245xx/CVE-2025-24596.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24604.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24610.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24611.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24613.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24618.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24622.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24623.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24625.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24627.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24633.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24634.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24636.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24638.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24644.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24647.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24649.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24650.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24652.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24657.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24658.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24659.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24663.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24666.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24668.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24669.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24672.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24673.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24674.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24675.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24678.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24679.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24681.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24682.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24683.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24687.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24691.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24693.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24695.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24696.json create mode 100644 CVE-2025/CVE-2025-246xx/CVE-2025-24698.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24701.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24702.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24703.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24704.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24705.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24706.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24709.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24711.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24712.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24713.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24714.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24715.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24716.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24717.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24719.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24720.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24721.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24722.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24723.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24724.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24725.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24726.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24727.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24728.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24729.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24730.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24731.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24732.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24733.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24736.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24738.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24739.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24746.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24750.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24751.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24753.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24755.json create mode 100644 CVE-2025/CVE-2025-247xx/CVE-2025-24756.json diff --git a/CVE-2019/CVE-2019-156xx/CVE-2019-15690.json b/CVE-2019/CVE-2019-156xx/CVE-2019-15690.json new file mode 100644 index 00000000000..2594834c97e --- /dev/null +++ b/CVE-2019/CVE-2019-156xx/CVE-2019-15690.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2019-15690", + "sourceIdentifier": "vulnerability@kaspersky.com", + "published": "2025-01-24T18:15:27.657", + "lastModified": "2025-01-24T18:15:27.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "LibVNCServer 0.9.12 release and earlier contains heap buffer overflow vulnerability within the HandleCursorShape() function in libvncclient/cursor.c. An attacker sends cursor shapes with specially crafted dimensions, which can result in remote code execution." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "vulnerability@kaspersky.com", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://ics-cert.kaspersky.com/vulnerabilities/klcert-20-009-remote-code-execution-on-libvnc-version-prior-to-0-9-12/", + "source": "vulnerability@kaspersky.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json b/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json index 47b03807aa4..45661f6a148 100644 --- a/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json +++ b/CVE-2021/CVE-2021-08xx/CVE-2021-0877.json @@ -2,7 +2,7 @@ "id": "CVE-2021-0877", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:10.163", - "lastModified": "2024-11-21T05:43:12.400", + "lastModified": "2025-01-24T17:15:08.107", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, diff --git a/CVE-2021/CVE-2021-320xx/CVE-2021-32030.json b/CVE-2021/CVE-2021-320xx/CVE-2021-32030.json index e90e2ef5b6f..0a55011352d 100644 --- a/CVE-2021/CVE-2021-320xx/CVE-2021-32030.json +++ b/CVE-2021/CVE-2021-320xx/CVE-2021-32030.json @@ -2,7 +2,7 @@ "id": "CVE-2021-32030", "sourceIdentifier": "cve@mitre.org", "published": "2021-05-06T15:15:07.973", - "lastModified": "2024-11-21T06:06:44.840", + "lastModified": "2025-01-24T18:15:28.720", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -122,6 +122,10 @@ "Vendor Advisory" ] }, + { + "url": "https://www.atredis.com/blog/2021/4/30/asus-authentication-bypass", + "source": "cve@mitre.org" + }, { "url": "https://github.com/atredispartners/advisories/blob/master/ATREDIS-2020-0010.md", "source": "af854a3a-2127-422b-91ae-364da2661108", diff --git a/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json b/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json index 73d76b7883b..18a197dfee1 100644 --- a/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json +++ b/CVE-2023/CVE-2023-206xx/CVE-2023-20673.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20673", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.427", - "lastModified": "2024-11-21T07:41:19.717", + "lastModified": "2025-01-24T17:15:09.203", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-843" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-843" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json index 60cfa08b62e..f622de9f95e 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20701.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20701", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.787", - "lastModified": "2024-11-21T07:41:22.873", + "lastModified": "2025-01-24T17:15:09.410", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json index bc217435d98..1ba501c86f4 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20703.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20703", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:10.830", - "lastModified": "2024-11-21T07:41:23.177", + "lastModified": "2025-01-24T17:15:09.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json index 4c27c401129..c2bc4127d83 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20717.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20717", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.190", - "lastModified": "2024-11-21T07:41:24.550", + "lastModified": "2025-01-24T17:15:09.770", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.5, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.1, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.5, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json b/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json index 0b54302bbd5..0d5a024d0d4 100644 --- a/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json +++ b/CVE-2023/CVE-2023-207xx/CVE-2023-20718.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20718", "sourceIdentifier": "security@mediatek.com", "published": "2023-05-15T22:15:11.230", - "lastModified": "2024-11-21T07:41:24.663", + "lastModified": "2025-01-24T17:15:09.937", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json index ddef1541cdf..517f60a7d69 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20914.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20914", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.473", - "lastModified": "2024-11-21T07:41:48.577", + "lastModified": "2025-01-24T18:15:29.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-312" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-312" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json b/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json index ec237a898f8..14e280a0b59 100644 --- a/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json +++ b/CVE-2023/CVE-2023-209xx/CVE-2023-20930.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20930", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.513", - "lastModified": "2024-11-21T07:41:50.417", + "lastModified": "2025-01-24T18:15:29.927", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json index 548465cbd05..d9d9095a23d 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21102.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21102", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.623", - "lastModified": "2024-11-21T07:42:10.003", + "lastModified": "2025-01-24T18:15:30.103", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json index 22d41f03a77..d0223b0c55e 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21103.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21103", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.687", - "lastModified": "2024-11-21T07:42:10.117", + "lastModified": "2025-01-24T18:15:30.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json index 018cf571e20..1fb6461e698 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21104.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21104", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.737", - "lastModified": "2024-11-21T07:42:10.230", + "lastModified": "2025-01-24T18:15:30.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json index 15dfe453900..87e6ca8b56a 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21106.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21106", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.777", - "lastModified": "2024-11-21T07:42:10.457", + "lastModified": "2025-01-24T18:15:30.620", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-415" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-415" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json index f8fd66b78c4..454746c7903 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21107.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21107", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.830", - "lastModified": "2024-11-21T07:42:10.567", + "lastModified": "2025-01-24T18:15:30.783", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-276" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-276" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json index 95bdb78af6f..8ab72037a22 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21109.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21109", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.870", - "lastModified": "2024-11-21T07:42:10.793", + "lastModified": "2025-01-24T18:15:30.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-326" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json index 016ea297a0e..76091abd8ec 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21110.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21110", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.910", - "lastModified": "2024-11-21T07:42:10.897", + "lastModified": "2025-01-24T18:15:31.133", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json index dddf84c994b..ce165d01b46 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21112.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21112", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:11.987", - "lastModified": "2024-11-21T07:42:11.103", + "lastModified": "2025-01-24T17:15:10.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json b/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json index ac64ef741d9..83ed626bdb8 100644 --- a/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json +++ b/CVE-2023/CVE-2023-211xx/CVE-2023-21116.json @@ -2,7 +2,7 @@ "id": "CVE-2023-21116", "sourceIdentifier": "security@android.com", "published": "2023-05-15T22:15:12.027", - "lastModified": "2024-11-21T07:42:11.710", + "lastModified": "2025-01-24T17:15:10.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-Other" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-234xx/CVE-2023-23444.json b/CVE-2023/CVE-2023-234xx/CVE-2023-23444.json index a619448d9ca..71895f9901e 100644 --- a/CVE-2023/CVE-2023-234xx/CVE-2023-23444.json +++ b/CVE-2023/CVE-2023-234xx/CVE-2023-23444.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23444", "sourceIdentifier": "psirt@sick.de", "published": "2023-05-12T13:15:09.350", - "lastModified": "2024-11-21T07:46:12.540", + "lastModified": "2025-01-24T17:15:10.457", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -65,6 +65,16 @@ "value": "CWE-306" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-306" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24539.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24539.json index c76e9705dbd..b21a0793a20 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24539.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24539.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24539", "sourceIdentifier": "security@golang.org", "published": "2023-05-11T16:15:09.600", - "lastModified": "2024-11-29T12:15:05.670", + "lastModified": "2025-01-24T17:15:10.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-245xx/CVE-2023-24540.json b/CVE-2023/CVE-2023-245xx/CVE-2023-24540.json index 59b2f8c687c..8ad29397cd4 100644 --- a/CVE-2023/CVE-2023-245xx/CVE-2023-24540.json +++ b/CVE-2023/CVE-2023-245xx/CVE-2023-24540.json @@ -2,7 +2,7 @@ "id": "CVE-2023-24540", "sourceIdentifier": "security@golang.org", "published": "2023-05-11T16:15:09.687", - "lastModified": "2024-11-21T07:48:05.360", + "lastModified": "2025-01-24T17:15:10.893", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json index 6a016033717..b059ded1647 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2646.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2646", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-11T08:15:08.620", - "lastModified": "2024-11-21T07:58:59.837", + "lastModified": "2025-01-24T17:15:12.910", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -83,7 +103,7 @@ "weaknesses": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -93,13 +113,23 @@ }, { "source": "nvd@nist.gov", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-404" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json index 07d1f01fc57..92878a8e558 100644 --- a/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json +++ b/CVE-2023/CVE-2023-26xx/CVE-2023-2660.json @@ -2,7 +2,7 @@ "id": "CVE-2023-2660", "sourceIdentifier": "cna@vuldb.com", "published": "2023-05-11T15:15:11.830", - "lastModified": "2024-11-21T07:59:01.543", + "lastModified": "2025-01-24T17:15:13.147", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "cna@vuldb.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -90,6 +110,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json b/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json index 8f47a4ce9fa..cefb8b8d7d9 100644 --- a/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json +++ b/CVE-2023/CVE-2023-275xx/CVE-2023-27554.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27554", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-11T20:15:09.227", - "lastModified": "2024-11-21T07:53:07.957", + "lastModified": "2025-01-24T17:15:11.073", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:L", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -65,6 +85,16 @@ "value": "CWE-611" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-611" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json b/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json index ed8c167a432..b4e38743ea4 100644 --- a/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json +++ b/CVE-2023/CVE-2023-278xx/CVE-2023-27870.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27870", "sourceIdentifier": "psirt@us.ibm.com", "published": "2023-05-11T20:15:09.327", - "lastModified": "2024-11-21T07:53:36.683", + "lastModified": "2025-01-24T17:15:11.300", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -15,7 +15,7 @@ "cvssMetricV31": [ { "source": "psirt@us.ibm.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", @@ -35,6 +35,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -65,6 +85,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-203" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29022.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29022.json index 18a159f90c6..495ac06d1c6 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29022.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29022.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29022", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-11T18:15:13.023", - "lastModified": "2024-11-21T07:56:24.620", + "lastModified": "2025-01-24T17:15:11.670", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29026.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29026.json index f77ebdc534c..0547a016ec3 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29026.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29026.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29026", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-11T18:15:13.420", - "lastModified": "2024-11-21T07:56:25.120", + "lastModified": "2025-01-24T17:15:11.873", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29027.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29027.json index 27044a90ace..80976c88e26 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29027.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29027.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29027", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-11T18:15:13.517", - "lastModified": "2024-11-21T07:56:25.240", + "lastModified": "2025-01-24T17:15:12.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29028.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29028.json index a5075bb7224..b4a010e3070 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29028.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29028.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29028", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-11T18:15:13.610", - "lastModified": "2024-11-21T07:56:25.360", + "lastModified": "2025-01-24T17:15:12.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-290xx/CVE-2023-29029.json b/CVE-2023/CVE-2023-290xx/CVE-2023-29029.json index 5dc54df6b8b..5a7749eac96 100644 --- a/CVE-2023/CVE-2023-290xx/CVE-2023-29029.json +++ b/CVE-2023/CVE-2023-290xx/CVE-2023-29029.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29029", "sourceIdentifier": "PSIRT@rockwellautomation.com", "published": "2023-05-11T18:15:13.677", - "lastModified": "2024-11-21T07:56:25.480", + "lastModified": "2025-01-24T17:15:12.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 1.7, "impactScore": 3.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 } ] }, @@ -75,6 +95,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json b/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json index f574a3a5540..9d8d617241c 100644 --- a/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json +++ b/CVE-2023/CVE-2023-294xx/CVE-2023-29400.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29400", "sourceIdentifier": "security@golang.org", "published": "2023-05-11T16:15:09.850", - "lastModified": "2024-12-13T14:15:19.623", + "lastModified": "2025-01-24T17:15:12.747", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-74" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json index 20072bbe25d..80b9070bc97 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31617.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31617", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.057", - "lastModified": "2024-11-21T08:02:05.710", + "lastModified": "2025-01-24T17:15:13.593", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json index ba2663e47f1..94f9ec528fb 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31618.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31618", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.110", - "lastModified": "2024-11-21T08:02:05.847", + "lastModified": "2025-01-24T17:15:13.817", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json b/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json index bc576fb2392..9e3928e85f9 100644 --- a/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json +++ b/CVE-2023/CVE-2023-316xx/CVE-2023-31619.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31619", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-15T15:15:12.170", - "lastModified": "2024-11-21T08:02:05.980", + "lastModified": "2025-01-24T17:15:14.007", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31916.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31916.json index 33cf6e0e3f6..84902fcf3e8 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31916.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31916.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31916", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.847", - "lastModified": "2024-11-21T08:02:23.360", + "lastModified": "2025-01-24T17:15:14.200", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-617" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-128xx/CVE-2024-12879.json b/CVE-2024/CVE-2024-128xx/CVE-2024-12879.json index f4fb00575d5..abe134f0704 100644 --- a/CVE-2024/CVE-2024-128xx/CVE-2024-12879.json +++ b/CVE-2024/CVE-2024-128xx/CVE-2024-12879.json @@ -2,13 +2,17 @@ "id": "CVE-2024-12879", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T06:15:12.950", - "lastModified": "2025-01-22T06:15:12.950", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:07:31.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPBot Pro Wordpress Chatbot plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'qc_wp_latest_update_check_pro' function in all versions up to, and including, 13.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create Simple Text Responses to chat queries." + }, + { + "lang": "es", + "value": "El complemento WPBot Pro Wordpress Chatbot para WordPress es vulnerable a la modificaci\u00f3n no autorizada de datos debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n 'qc_wp_latest_update_check_pro' en todas las versiones hasta la 13.5.5 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, creen respuestas de texto simple a consultas de chat." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:quantumcloud:wpot:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "13.5.6", + "matchCriteriaId": "ACEBD05C-06A1-470C-8DEA-ABF84D176925" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/91427e3e-fedb-407e-8af6-8f4411a4166a?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpbot.pro/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-130xx/CVE-2024-13091.json b/CVE-2024/CVE-2024-130xx/CVE-2024-13091.json index 5230192d8a0..cd612b846a4 100644 --- a/CVE-2024/CVE-2024-130xx/CVE-2024-13091.json +++ b/CVE-2024/CVE-2024-130xx/CVE-2024-13091.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13091", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T00:15:15.810", - "lastModified": "2025-01-22T00:15:15.810", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:42:25.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WPBot Pro Wordpress Chatbot plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'qcld_wpcfb_file_upload' function in all versions up to, and including, 13.5.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. Note: The exploit requires thee ChatBot Conversational Forms plugin and the Conversational Form Builder Pro addon plugin." + }, + { + "lang": "es", + "value": "El complemento WPBot Pro Wordpress Chatbot para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validaci\u00f3n del tipo de archivo en la funci\u00f3n 'qcld_wpcfb_file_upload' en todas las versiones hasta la 13.5.4 y incluida. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecuci\u00f3n remota de c\u00f3digo. Nota: La vulnerabilidad requiere el complemento ChatBot Conversational Forms y el complemento Conversational Form Builder Pro." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpbot:wpot:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "13.5.6", + "matchCriteriaId": "B443BC2E-F97C-47DF-8160-5671A4B17701" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f9b6979-2662-4d2f-9656-b880dd80832c?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.wpbot.pro/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13360.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13360.json index 9677ef6b079..977535c5df3 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13360.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13360.json @@ -2,13 +2,17 @@ "id": "CVE-2024-13360", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T08:15:08.683", - "lastModified": "2025-01-22T08:15:08.683", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:58:46.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AI Power: Complete AI Pack plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.8.96 via the wpaicg_troubleshoot_add_vector(). This makes it possible for authenticated attackers, with subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services." + }, + { + "lang": "es", + "value": "El complemento AI Power: Complete AI Pack para WordPress es vulnerable a Server-Side Request Forgery en todas las versiones hasta la 1.8.96 y incluida a trav\u00e9s de wpaicg_troubleshoot_add_vector(). Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, realicen solicitudes web a ubicaciones arbitrarias que se originan en la aplicaci\u00f3n web y se pueden usar para consultar y modificar informaci\u00f3n de servicios internos." } ], "metrics": { @@ -47,14 +51,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.97", + "matchCriteriaId": "8C5CA64C-4781-4A74-AF0D-228633421634" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3224162/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/5cf6cbba-0e0c-4d2c-90d0-d7e0a5222df2?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-133xx/CVE-2024-13361.json b/CVE-2024/CVE-2024-133xx/CVE-2024-13361.json index f490e8fe74a..2856aa4151d 100644 --- a/CVE-2024/CVE-2024-133xx/CVE-2024-13361.json +++ b/CVE-2024/CVE-2024-133xx/CVE-2024-13361.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13361", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T08:15:08.843", - "lastModified": "2025-01-22T08:15:08.843", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:55:22.577", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The AI Power: Complete AI Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wpaicg_save_image_media function in all versions up to, and including, 1.8.96. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload image files and embed shortcode attributes in the image_alt value that will execute when sending a POST request to the attachment page." + }, + { + "lang": "es", + "value": "El complemento AI Power: Complete AI Pack para WordPress es vulnerable al acceso no autorizado debido a una verificaci\u00f3n de capacidad faltante en la funci\u00f3n wpaicg_save_image_media en todas las versiones hasta la 1.8.96 y incluida. Esto permite que atacantes autenticados, con acceso de nivel de suscriptor y superior, carguen archivos de imagen e incrusten atributos de c\u00f3digo corto en el valor image_alt que se ejecutar\u00e1 al enviar una solicitud POST a la p\u00e1gina de adjuntos." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.8.97", + "matchCriteriaId": "8C5CA64C-4781-4A74-AF0D-228633421634" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3224162/gpt3-ai-content-generator/trunk/classes/wpaicg_image.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/11d49c89-43be-4e12-86b5-aa7a72a89803?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-134xx/CVE-2024-13426.json b/CVE-2024/CVE-2024-134xx/CVE-2024-13426.json index 797ed5332e6..81bf8a1cb4f 100644 --- a/CVE-2024/CVE-2024-134xx/CVE-2024-13426.json +++ b/CVE-2024/CVE-2024-134xx/CVE-2024-13426.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13426", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T03:15:07.370", - "lastModified": "2025-01-22T03:15:07.370", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:37:38.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The WP-Polls plugin for WordPress is vulnerable to SQL Injection via COOKIE in all versions up to, and including, 2.77.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries. Those queries are stored and results are not displayed to the attacker, which means they cannot be exploited to obtain any additional information about the database. However, a properly configured payload allows for the injection of malicious JavaScript resulting in Stored Cross-Site Scripting." + }, + { + "lang": "es", + "value": "El complemento WP-Polls para WordPress es vulnerable a la inyecci\u00f3n SQL a trav\u00e9s de COOKIE en todas las versiones hasta la 2.77.2 y incluida, debido a un escape insuficiente en el par\u00e1metro proporcionado por el usuario y a la falta de preparaci\u00f3n suficiente en la consulta SQL existente. Esto hace posible que atacantes no autenticados agreguen consultas SQL adicionales a las consultas ya existentes. Esas consultas se almacenan y los resultados no se muestran al atacante, lo que significa que no se pueden explotar para obtener informaci\u00f3n adicional sobre la base de datos. Sin embargo, un payload correctamente configurado permite la inyecci\u00f3n de JavaScript malicioso que da como resultado Cross-Site Scripting Almacenado." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -47,42 +71,87 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wp-polls_project:wp-polls:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.77.3", + "matchCriteriaId": "B1A0B8AE-6CC6-4A10-B25E-DBBFF52CFEE3" + } + ] + } + ] + } + ], "references": [ { "url": "https://github.com/WordPress/wordpress-develop/blob/a82874058f58575dbba64ce09b6dcbd43ccf5fdc/src/wp-includes/default-constants.php#L249", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lesterchan/wp-polls", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L294", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/polls-logs.php#L97", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1378", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/lesterchan/wp-polls/blob/97ab44c2d4c3a3d308ce8b87dae8b2a8f7147f0e/wp-polls.php#L1416", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3224709%40wp-polls%2Ftrunk&old=2949758%40wp-polls%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://wordpress.org/plugins/wp-polls/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b76de574-2627-46cd-9817-134a009ac3bd?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13584.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13584.json index 7369b68c067..6f2903cfc0c 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13584.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13584.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13584", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T04:15:06.907", - "lastModified": "2025-01-22T04:15:06.907", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:20:40.760", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Picture Gallery \u2013 Frontend Image Uploads, AJAX Photo List plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'videowhisper_pictures' shortcode in all versions up to, and including, 1.5.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Picture Gallery \u2013 Frontend Image Uploads, AJAX Photo List para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'videowhisper_pictures' del complemento en todas las versiones hasta incluida, 1.5.19 debido a una entrada desinfecci\u00f3n insuficiente y a un escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,18 +71,45 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:videowhisper:picture_gallery:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.5.20", + "matchCriteriaId": "B9B409B7-FE5D-42A9-BE18-DDFFABAB4898" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/picture-gallery/trunk/inc/shortcodes.php#L49", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3218329%40picture-gallery&new=3218329%40picture-gallery&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f721733-2245-4d8d-9881-91cc0b48551b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-135xx/CVE-2024-13590.json b/CVE-2024/CVE-2024-135xx/CVE-2024-13590.json index 5e82ce0b833..86d26286c97 100644 --- a/CVE-2024/CVE-2024-135xx/CVE-2024-13590.json +++ b/CVE-2024/CVE-2024-135xx/CVE-2024-13590.json @@ -2,20 +2,24 @@ "id": "CVE-2024-13590", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-22T04:15:07.083", - "lastModified": "2025-01-22T04:15:07.083", - "vulnStatus": "Received", + "lastModified": "2025-01-24T18:09:26.147", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Ketchup Shortcodes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'spacer' shortcode in all versions up to, and including, 0.1.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." + }, + { + "lang": "es", + "value": "El complemento Ketchup Shortcodes para WordPress es vulnerable a Cross-Site Scripting Almacenado a trav\u00e9s del shortcode 'spacer' del complemento en todas las versiones hasta la 0.1.2 y incluida, debido a la falta de entrada desinfecci\u00f3n y al escape de salida en los atributos proporcionados por el usuario. Esto hace posible que atacantes autenticados, con acceso de nivel de colaborador y superior, inyecten scripts web arbitraria en p\u00e1ginas que se ejecutar\u00e1n cada vez que un usuario acceda a una p\u00e1gina inyectada." } ], "metrics": { "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -32,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -47,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ayecode:ketchup_shortcodes:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "0.2.1", + "matchCriteriaId": "AA1D1D2A-A94D-4B6F-A914-A9DA30BB45CF" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3222176/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4d25e292-b62b-493e-976c-a5eb95505065?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json b/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json index 91327bc072f..9573403d7ad 100644 --- a/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json +++ b/CVE-2024/CVE-2024-16xx/CVE-2024-1603.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1603", "sourceIdentifier": "security@huntr.dev", "published": "2024-03-23T19:15:07.283", - "lastModified": "2024-11-21T08:50:55.507", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T18:22:44.423", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,16 +71,53 @@ "value": "CWE-73" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-Other" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:paddlepaddle:paddlepaddle:2.6.0:*:*:*:*:*:*:*", + "matchCriteriaId": "F71F54C3-4868-476D-B0D8-D5E0FEE9FE63" + } + ] + } + ] } ], "references": [ { "url": "https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://huntr.com/bounties/7739eced-73a3-4a96-afcd-9c753c55929e", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24427.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24427.json index e4e0ed74f32..1c82ff2e5fb 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24427.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24427.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24427", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.640", - "lastModified": "2025-01-23T19:15:10.160", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T18:47:28.570", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,31 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.6.4", + "matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-244xx/CVE-2024-24428.json b/CVE-2024/CVE-2024-244xx/CVE-2024-24428.json index 46136c64943..428349d2c88 100644 --- a/CVE-2024/CVE-2024-244xx/CVE-2024-24428.json +++ b/CVE-2024/CVE-2024-244xx/CVE-2024-24428.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24428", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-21T23:15:12.767", - "lastModified": "2025-01-23T19:15:10.347", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T18:44:26.897", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -40,6 +60,16 @@ ] }, "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-617" + } + ] + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -51,10 +81,32 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*", + "versionEndIncluding": "2.6.4", + "matchCriteriaId": "F4887F15-E22E-44D0-8B7A-82ED1AB274A8" + } + ] + } + ] + } + ], "references": [ { "url": "https://cellularsecurity.org/ransacked", - "source": "cve@mitre.org" + "source": "cve@mitre.org", + "tags": [ + "Exploit", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25937.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25937.json index 019fe97be20..c723896a08a 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25937.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25937.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25937", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2024-03-21T22:15:10.910", - "lastModified": "2024-11-21T09:01:36.667", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:42:26.510", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -51,14 +71,40 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:deltaww:diaenergie:*:*:*:*:*:*:*:*", + "versionEndExcluding": "1.10.00.005", + "matchCriteriaId": "2AC96D25-8B44-4093-B30E-050C6F93A507" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12", - "source": "ics-cert@hq.dhs.gov" + "source": "ics-cert@hq.dhs.gov", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] }, { "url": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-074-12", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "US Government Resource" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json b/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json index ba08b54bf5d..16d49a06316 100644 --- a/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json +++ b/CVE-2024/CVE-2024-28xx/CVE-2024-2805.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2805", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-22T03:15:08.130", - "lastModified": "2024-11-21T09:10:33.803", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:45:05.873", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,102 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.18:*:*:*:*:*:*:*", + "matchCriteriaId": "56881C41-A993-45CC-BAE6-E9DE17FA56E2" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac15_firmware:15.03.05.20_multi:*:*:*:*:*:*:*", + "matchCriteriaId": "BAF4BBA3-7C56-4383-B167-933075D5C39F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B73E7C1C-F121-486A-8B15-E97EA0C219A5" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257660", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257660", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC15/V1.0%20V15.03.20_multi/SetSpeedWan.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link", + "Exploit", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.257660", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257660", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json index 2ff3d48e8c3..4650df65c44 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29870.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29870", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:07.867", - "lastModified": "2024-11-21T09:08:30.620", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:36.670", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json index f1762bd641a..b12be90729d 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29871.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29871", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.080", - "lastModified": "2024-11-21T09:08:30.760", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:34.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json index 35bece9730b..0882b97d8b5 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29872.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29872", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.313", - "lastModified": "2024-11-21T09:08:30.903", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:31.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json index 564bd099bf7..c3f860973cd 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29873.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29873", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.520", - "lastModified": "2024-11-21T09:08:31.040", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:29.537", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json index 4c5a7ddd037..77244ff3864 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29874.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29874", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.767", - "lastModified": "2024-11-21T09:08:31.167", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:27.523", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json index 03235172c0c..c3b36055a01 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29875.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29875", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:08.980", - "lastModified": "2024-11-21T09:08:31.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:25.493", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json index b1d24acdc97..d1458062e3d 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29876.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29876", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.163", - "lastModified": "2024-11-21T09:08:31.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:18:23.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json index 854c1b5e45c..5f0a936e0e7 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29877.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29877", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.353", - "lastModified": "2024-11-21T09:08:31.857", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:17:39.100", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json index ba9e70b3148..cbe5ffa5697 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29878.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29878", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.593", - "lastModified": "2024-11-21T09:08:31.983", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:17:36.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json b/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json index 8ea9a223ab2..6ab2f4a1052 100644 --- a/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json +++ b/CVE-2024/CVE-2024-298xx/CVE-2024-29879.json @@ -2,8 +2,8 @@ "id": "CVE-2024-29879", "sourceIdentifier": "cve-coordination@incibe.es", "published": "2024-03-21T14:15:09.817", - "lastModified": "2024-11-21T09:08:32.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T18:17:54.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -51,14 +71,37 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sapplica:sentrifugo:3.2:*:*:*:*:*:*:*", + "matchCriteriaId": "A58D689D-23A7-4757-ACF6-203013E83667" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "cve-coordination@incibe.es" + "source": "cve-coordination@incibe.es", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sentrifugo", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json new file mode 100644 index 00000000000..544fe73cff1 --- /dev/null +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35122.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2024-35122", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-24T18:15:31.680", + "lastModified": "2025-01-24T18:15:31.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM i 7.2, 7.3, 7.4, and 7.5 is vulnerable to a file level local denial of service caused by an insufficient authority requirement. A local non-privileged user can configure a referential constraint with the privileges of a user socially engineered to access the target file." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 2.8, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.3, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7178317", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json b/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json index 5521ddfc48a..af6479a3bf0 100644 --- a/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json +++ b/CVE-2024/CVE-2024-38xx/CVE-2024-3848.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3848", "sourceIdentifier": "security@huntr.dev", "published": "2024-05-16T09:15:14.543", - "lastModified": "2024-11-21T09:30:32.090", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-24T17:28:21.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,6 +16,28 @@ } ], "metrics": { + "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + } + ], "cvssMetricV30": [ { "source": "security@huntr.dev", @@ -49,24 +71,68 @@ "value": "CWE-29" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.12.1", + "matchCriteriaId": "D345B83A-B06E-4568-BD5F-0DA9CA081262" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/mlflow/mlflow/commit/f8d51e21523238280ebcfdb378612afd7844eca8", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/8d5aadaa-522f-4839-b41b-d7da362dd610", - "source": "security@huntr.dev" + "source": "security@huntr.dev", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] }, { "url": "https://github.com/mlflow/mlflow/commit/f8d51e21523238280ebcfdb378612afd7844eca8", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://huntr.com/bounties/8d5aadaa-522f-4839-b41b-d7da362dd610", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Issue Tracking", + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json index 5e5f0ce504d..5450f538eea 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4223.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4223", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T09:15:15.810", - "lastModified": "2024-11-21T09:42:25.150", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T17:58:19.593", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "F6D02936-81CB-45D8-A594-B5D9A2731936" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4c4395-6d1a-4d5f-885f-383e5c44c0f8?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce4c4395-6d1a-4d5f-885f-383e5c44c0f8?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json index a13bbb407a9..be776da8fc5 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4279.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4279", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:10.667", - "lastModified": "2024-11-21T09:42:32.043", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T17:03:18.140", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,101 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "F6D02936-81CB-45D8-A594-B5D9A2731936" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Course_List.php#L357", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45d04643-e43a-4732-91bf-e4af7b622e33?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tutor/trunk/classes/Course_List.php#L357", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/45d04643-e43a-4732-91bf-e4af7b622e33?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json index e62e0fc0b73..7a1ff6974a6 100644 --- a/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json +++ b/CVE-2024/CVE-2024-43xx/CVE-2024-4318.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4318", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-16T06:15:11.480", - "lastModified": "2024-11-21T09:42:36.927", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-24T17:11:02.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themeum:tutor_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.7.1", + "matchCriteriaId": "F6D02936-81CB-45D8-A594-B5D9A2731936" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L4456", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L4575", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bbb3c65-f02c-4d6d-bd4e-b3232af5e21b?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L4456", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/tutor/tags/2.7.0/classes/Utils.php#L4575", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3086489/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bbb3c65-f02c-4d6d-bd4e-b3232af5e21b?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-564xx/CVE-2024-56404.json b/CVE-2024/CVE-2024-564xx/CVE-2024-56404.json new file mode 100644 index 00000000000..0928bd16efe --- /dev/null +++ b/CVE-2024/CVE-2024-564xx/CVE-2024-56404.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2024-56404", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-24T18:15:31.883", + "lastModified": "2025-01-24T18:15:31.883", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In One Identity Identity Manager 9.x before 9.3, an insecure direct object reference (IDOR) vulnerability allows privilege escalation. Only On-Premise installations are affected." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-302" + } + ] + } + ], + "references": [ + { + "url": "https://support.oneidentity.com/product-notification/noti-00001678", + "source": "cve@mitre.org" + }, + { + "url": "https://support.oneidentity.com/technical-documents/identity-manager/9.3/release-notes/", + "source": "cve@mitre.org" + }, + { + "url": "https://www.oneidentity.com/community/identity-manager/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0700.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0700.json new file mode 100644 index 00000000000..09b06910062 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0700.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0700", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T17:15:14.517", + "lastModified": "2025-01-24T17:15:14.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/sys/log/list. The manipulation of the argument logId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/22", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/22#issue-2786899884", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293228", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293228", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480838", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0701.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0701.json new file mode 100644 index 00000000000..4c9e6ea512f --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0701.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0701", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T17:15:14.730", + "lastModified": "2025-01-24T17:15:14.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This affects an unknown part of the file /admin/sys/user/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/23", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/23#issue-2786909921", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293229", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293229", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480839", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0702.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0702.json new file mode 100644 index 00000000000..ee825b9a017 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0702.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0702", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-24T18:15:32.087", + "lastModified": "2025-01-24T18:15:32.087", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/JoeyBling/bootplus/issues/24", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293230", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293230", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.480841", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22608.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22608.json new file mode 100644 index 00000000000..27b75bde10b --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22608.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22608", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:14.960", + "lastModified": "2025-01-24T17:15:14.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to revoke any team invitations on a Coolify instance by only providing a predictable and incrementing ID, resulting in a Denial-of-Service attack (DOS). Version 4.0.0-beta.361 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-639" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-qmxm-wvm9-wvxx", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22609.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22609.json new file mode 100644 index 00000000000..e1893c61a90 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22609.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22609", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:15.100", + "lastModified": "2025-01-24T17:15:15.100", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0-beta.361 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22610.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22610.json new file mode 100644 index 00000000000..f4009b4a68e --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22610.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-22610", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:15.237", + "lastModified": "2025-01-24T17:15:15.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the global coolify instance OAuth configuration. This exposes the \"client id\" and \"client secret\" for every custom OAuth provider. The attacker can also modify the global OAuth configuration. Version 4.0.0-beta.361 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.7, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-496v-9q38-2x6c", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22611.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22611.json new file mode 100644 index 00000000000..88a4d197b70 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22611.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-22611", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:15.410", + "lastModified": "2025-01-24T17:15:15.410", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to escalate his or any other team members privileges to any role, including the owner role. He's also able to kick every other member out of the team, including admins and owners. This allows the attacker to access the `Terminal` feature and execute remote commands. Version 4.0.0-beta.361 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.1, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-9w72-9qww-qj6g", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22612.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22612.json new file mode 100644 index 00000000000..bb16ca3b669 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22612.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22612", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:15.570", + "lastModified": "2025-01-24T17:15:15.570", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plain text. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can execute arbitrary commands on the remote server. Version 4.0.0-beta.374 fixes the issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 10.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-200" + }, + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-wg8x-cgq4-vjxj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-232xx/CVE-2025-23222.json b/CVE-2025/CVE-2025-232xx/CVE-2025-23222.json new file mode 100644 index 00000000000..7dbec7af9e4 --- /dev/null +++ b/CVE-2025/CVE-2025-232xx/CVE-2025-23222.json @@ -0,0 +1,64 @@ +{ + "id": "CVE-2025-23222", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-24T17:15:15.730", + "lastModified": "2025-01-24T17:15:15.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "An issue was discovered in Deepin dde-api-proxy through 1.0.19 in which unprivileged users can access D-Bus services as root. Specifically, dde-api-proxy runs as root and forwards messages from arbitrary local users to legacy D-Bus methods in the actual D-Bus services, and the actual D-Bus services don't know about the proxy situation (they believe that root is asking them to do things). Consequently several proxied methods, that shouldn't be accessible to non-root users, are accessible to non-root users. In situations where Polkit is involved, the caller would be treated as admin, resulting in a similar escalation of privileges." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "cve@mitre.org", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-940" + } + ] + } + ], + "references": [ + { + "url": "https://bugzilla.suse.com/show_bug.cgi?id=1229918", + "source": "cve@mitre.org" + }, + { + "url": "https://security.opensuse.org/2025/01/24/dde-api-proxy-privilege-escalation.html", + "source": "cve@mitre.org" + }, + { + "url": "https://www.openwall.com/lists/oss-security/2025/01/24/3", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-240xx/CVE-2025-24025.json b/CVE-2025/CVE-2025-240xx/CVE-2025-24025.json new file mode 100644 index 00000000000..20fba28179a --- /dev/null +++ b/CVE-2025/CVE-2025-240xx/CVE-2025-24025.json @@ -0,0 +1,78 @@ +{ + "id": "CVE-2025-24025", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:15.900", + "lastModified": "2025-01-24T17:15:15.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.380, the tags page allows users to search for tags. If the search does not return any results, the query gets reflected on the error modal, which leads to cross-site scripting. Version 4.0.0-beta.380 fixes the issue." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 1.3, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "LOW", + "subsequentSystemIntegrity": "LOW", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "UNREPORTED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-116" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/coollabsio/coolify/security/advisories/GHSA-f2gf-jvmh-vq73", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24355.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24355.json new file mode 100644 index 00000000000..6e6d5de7a0c --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24355.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24355", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:16.047", + "lastModified": "2025-01-24T17:15:16.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Updatecli is a tool used to apply file update strategies. Prior to version 0.93.0, private maven repository credentials may be leaked in application logs in case of unsuccessful retrieval operation. During the execution of an updatecli pipeline which contains a `maven` source configured with basic auth credentials, the credentials are being leaked in the application execution logs in case of failure. Credentials are properly sanitized when the operation is successful but not when for whatever reason there is a failure in the maven repository, e.g. wrong coordinates provided, not existing artifact or version. Version 0.93.0 contains a patch for the issue." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.5, + "impactScore": 4.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-359" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/updatecli/updatecli/commit/344b28091ffeca5ed32e8d0f9eda542842fcd3fa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/updatecli/updatecli/security/advisories/GHSA-v34r-vj4r-38j6", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24359.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24359.json new file mode 100644 index 00000000000..87c7d5a5486 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24359.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-24359", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T17:15:16.197", + "lastModified": "2025-01-24T17:15:16.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "ASTEVAL is an evaluator of Python expressions and statements. Prior to version 1.0.6, if an attacker can control the input to the `asteval` library, they can bypass asteval's restrictions and execute arbitrary Python code in the context of the application using the library. The vulnerability is rooted in how `asteval` performs handling of `FormattedValue` AST nodes. In particular, the `on_formattedvalue` value uses the dangerous format method of the str class. The code allows an attacker to manipulate the value of the string used in the dangerous call `fmt.format(__fstring__=val)`. This vulnerability can be exploited to access protected attributes by intentionally triggering an `AttributeError` exception. The attacker can then catch the exception and use its `obj` attribute to gain arbitrary access to sensitive or protected object properties. Version 1.0.6 fixes this issue." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.4, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.5, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-134" + }, + { + "lang": "en", + "value": "CWE-749" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/lmfit/asteval/blob/cfb57f0beebe0dc0520a1fbabc35e66060c7ea71/asteval/asteval.py#L507", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/lmfit/asteval/security/advisories/GHSA-3wwr-3g9f-9gc7", + "source": "security-advisories@github.com" + }, + { + "url": "https://lucumr.pocoo.org/2016/12/29/careful-with-str-format", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24362.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24362.json new file mode 100644 index 00000000000..176af558ed9 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24362.json @@ -0,0 +1,98 @@ +{ + "id": "CVE-2025-24362", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-24T18:15:32.383", + "lastModified": "2025-01-24T18:15:32.383", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In some circumstances, debug artifacts uploaded by the CodeQL Action after a failed code scanning workflow run may contain the environment variables from the workflow run, including any secrets that were exposed as environment variables to the workflow. Users with read access to the repository would be able to access this artifact, containing any secrets from the environment. This vulnerability is patched in CodeQL Action version 3.28.3 or later, or CodeQL CLI version 2.20.3 or later.\n\nFor some affected workflow runs, the exposed environment variables in the debug artifacts included a valid `GITHUB_TOKEN` for the workflow run, which has access to the repository in which the workflow ran, and all the permissions specified in the workflow or job. The `GITHUB_TOKEN` is valid until the job completes or 24 hours has elapsed, whichever comes first.\n\nEnvironment variables are exposed only from workflow runs that satisfy all of the following conditions:\n- Code scanning workflow configured to scan the Java/Kotlin languages.\n- Running in a repository containing Kotlin source code.\n- Running with debug artifacts enabled.\n- Using CodeQL Action versions <= 3.28.2, and CodeQL CLI versions >= 2.9.2 (May 2022) and <= 2.20.2.\n- The workflow run fails before the CodeQL database is finalized within the `github/codeql-action/analyze` step.\n- Running in any GitHub environment: GitHub.com, GitHub Enterprise Cloud, and GitHub Enterprise Server. Note: artifacts are only accessible to users within the same GitHub environment with access to the scanned repo.\n\nThe `GITHUB_TOKEN` exposed in this way would only have been valid for workflow runs that satisfy all of the following conditions, in addition to the conditions above:\n- Using CodeQL Action versions >= 3.26.11 (October 2024) and <= 3.28.2, or >= 2.26.11 and < 3.\n- Running in GitHub.com or GitHub Enterprise Cloud only (not valid on GitHub Enterprise Server).\n\nIn rare cases during advanced setup, logging of environment variables may also occur during database creation of Java, Swift, and C/C++. Please read the corresponding CodeQL CLI advisory GHSA-gqh3-9prg-j95m for more details.\n\nIn CodeQL CLI versions >= 2.9.2 and <= 2.20.2, the CodeQL Kotlin extractor logs all environment variables by default into an intermediate file during the process of creating a CodeQL database for Kotlin code. This is a part of the CodeQL CLI and is invoked by the CodeQL Action for analyzing Kotlin repositories. \n\nOn Actions, the environment variables logged include GITHUB_TOKEN, which grants permissions to the repository being scanned.\nThe intermediate file containing environment variables is deleted when finalizing the database, so it is not included in a successfully created database. It is, however, included in the debug artifact that is uploaded on a failed analysis run if the CodeQL Action was invoked in debug mode.\n\nTherefore, under these specific circumstances (incomplete database creation using the CodeQL Action in debug mode) an attacker with access to the debug artifact would gain unauthorized access to repository secrets from the environment, including both the `GITHUB_TOKEN` and any user-configured secrets made available via environment variables.\n\nThe impact of the `GITHUB_TOKEN` leaked in this environment is limited:\n- For workflows on GitHub.com and GitHub Enterprise Cloud using CodeQL Action versions >= 3.26.11 and <= 3.28.2, or >= 2.26.11 and < 3, which in turn use the `actions/artifacts v4` library, the debug artifact is uploaded before the workflow job completes. During this time the `GITHUB_TOKEN` is still valid, providing an opportunity for attackers to gain access to the repository.\n- For all other workflows, the debug artifact is uploaded after the workflow job completes, at which point the leaked `GITHUB_TOKEN` has been revoked and cannot be used to access the repository." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-532" + } + ] + } + ], + "references": [ + { + "url": "https://docs.github.com/en/code-security/code-scanning/troubleshooting-code-scanning/logs-not-detailed-enough", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/github/codeql-action/commit/519de26711ecad48bde264c51e414658a82ef3fa", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/github/codeql-action/pull/1074", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/github/codeql-action/pull/2482", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/github/codeql-action/security/advisories/GHSA-vqf5-2xx6-9wfm", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/github/codeql-cli-binaries/security/advisories/GHSA-gqh3-9prg-j95m", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24542.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24542.json new file mode 100644 index 00000000000..f6c70b49db0 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24542.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24542", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:32.550", + "lastModified": "2025-01-24T18:15:32.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in icegram Icegram allows Stored XSS. This issue affects Icegram: from n/a through 3.1.31." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/icegram/vulnerability/wordpress-icegram-engage-plugin-3-1-31-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json new file mode 100644 index 00000000000..acd8f5e9724 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24543.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24543", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:32.703", + "lastModified": "2025-01-24T18:15:32.703", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json new file mode 100644 index 00000000000..da8d0b6aa80 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24546.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24546", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:32.893", + "lastModified": "2025-01-24T18:15:32.893", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RSTheme Ultimate Coming Soon & Maintenance allows Cross Site Request Forgery. This issue affects Ultimate Coming Soon & Maintenance: from n/a through 1.0.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ultimate-coming-soon/vulnerability/wordpress-ultimate-coming-soon-maintenance-plugin-1-0-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24547.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24547.json new file mode 100644 index 00000000000..7064548707e --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24547.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24547", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.063", + "lastModified": "2025-01-24T18:15:33.063", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Matthias Wagner - FALKEmedia Caching Compatible Cookie Opt-In and JavaScript allows Stored XSS. This issue affects Caching Compatible Cookie Opt-In and JavaScript: from n/a through 0.0.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/caching-compatible-cookie-optin-and-javascript/vulnerability/wordpress-caching-compatible-cookie-opt-in-plugin-0-0-10-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24552.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24552.json new file mode 100644 index 00000000000..fa9ef1d6ce3 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24552.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24552", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.257", + "lastModified": "2025-01-24T18:15:33.257", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Generation of Error Message Containing Sensitive Information vulnerability in David de Boer Paytium allows Retrieve Embedded Sensitive Data. This issue affects Paytium: from n/a through 4.4.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/paytium/vulnerability/wordpress-paytium-plugin-4-4-11-full-path-disclosure-fpd-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24555.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24555.json new file mode 100644 index 00000000000..67e4bf125e6 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24555.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24555", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.440", + "lastModified": "2025-01-24T18:15:33.440", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in SubscriptionDNA.com Subscription DNA allows Stored XSS. This issue affects Subscription DNA: from n/a through 2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/subscriptiondna/vulnerability/wordpress-subscription-dna-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24561.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24561.json new file mode 100644 index 00000000000..9e5b7fc1133 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24561.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24561", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.623", + "lastModified": "2025-01-24T18:15:33.623", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in ReviewsTap ReviewsTap allows Stored XSS. This issue affects ReviewsTap: from n/a through 1.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/reviewstap/vulnerability/wordpress-reviewstap-plugin-1-1-2-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24562.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24562.json new file mode 100644 index 00000000000..4e2fb7d85ff --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24562.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24562", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.810", + "lastModified": "2025-01-24T18:15:33.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Optimal Access Inc. KBucket allows Stored XSS. This issue affects KBucket: from n/a through 4.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kbucket/vulnerability/wordpress-kbucket-plugin-4-1-6-csrf-to-stored-cross-site-scripting-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24568.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24568.json new file mode 100644 index 00000000000..c7c99a03f2c --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24568.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24568", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:33.987", + "lastModified": "2025-01-24T18:15:33.987", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Brainstorm Force Starter Templates allows Cross Site Request Forgery. This issue affects Starter Templates: from n/a through 4.4.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/astra-sites/vulnerability/wordpress-starter-templates-plugin-4-4-9-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24570.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24570.json new file mode 100644 index 00000000000..c6edce8e1b9 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24570.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24570", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.147", + "lastModified": "2025-01-24T18:15:34.147", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Atarim Atarim allows Stored XSS. This issue affects Atarim: from n/a through 4.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/atarim-visual-collaboration/vulnerability/wordpress-atarim-plugin-4-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24571.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24571.json new file mode 100644 index 00000000000..703846a5bad --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24571.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24571", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.320", + "lastModified": "2025-01-24T18:15:34.320", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Epsiloncool WP Fast Total Search allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Fast Total Search: from n/a through 1.78.258." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fulltext-search/vulnerability/wordpress-wp-fast-total-search-plugin-1-78-258-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24572.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24572.json new file mode 100644 index 00000000000..6e803651bd8 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24572.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24572", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.477", + "lastModified": "2025-01-24T18:15:34.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Epsiloncool WP Fast Total Search allows Cross Site Request Forgery. This issue affects WP Fast Total Search: from n/a through 1.78.258." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fulltext-search/vulnerability/wordpress-wp-fast-total-search-plugin-1-78-258-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24573.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24573.json new file mode 100644 index 00000000000..823e63d5d23 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24573.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24573", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.640", + "lastModified": "2025-01-24T18:15:34.640", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pagelayer Team PageLayer allows DOM-Based XSS. This issue affects PageLayer: from n/a through 1.9.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pagelayer/vulnerability/wordpress-pagelayer-plugin-1-9-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24575.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24575.json new file mode 100644 index 00000000000..5651b4c61d0 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24575.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24575", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.793", + "lastModified": "2025-01-24T18:15:34.793", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HelloAsso HelloAsso allows Stored XSS. This issue affects HelloAsso: from n/a through 1.1.11." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/helloasso/vulnerability/wordpress-helloasso-plugin-1-1-11-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24578.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24578.json new file mode 100644 index 00000000000..c01bcdeefb2 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24578.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24578", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:34.947", + "lastModified": "2025-01-24T18:15:34.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows DOM-Based XSS. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24579.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24579.json new file mode 100644 index 00000000000..0df124f7d7e --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24579.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24579", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.090", + "lastModified": "2025-01-24T18:15:35.090", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Kyle Phillips Nested Pages allows Stored XSS. This issue affects Nested Pages: from n/a through 3.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-nested-pages/vulnerability/wordpress-nested-pages-plugin-3-2-9-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24580.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24580.json new file mode 100644 index 00000000000..3e709410123 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24580.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24580", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.247", + "lastModified": "2025-01-24T18:15:35.247", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Code for Recovery 12 Step Meeting List allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects 12 Step Meeting List: from n/a through 3.16.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/12-step-meeting-list/vulnerability/wordpress-12-step-meeting-list-plugin-3-16-5-arbitrary-content-deletion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24582.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24582.json new file mode 100644 index 00000000000..844f31f43bd --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24582.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24582", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.397", + "lastModified": "2025-01-24T18:15:35.397", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Insertion of Sensitive Information Into Sent Data vulnerability in Code for Recovery 12 Step Meeting List allows Retrieve Embedded Sensitive Data. This issue affects 12 Step Meeting List: from n/a through 3.16.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-201" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/12-step-meeting-list/vulnerability/wordpress-12-step-meeting-list-plugin-3-16-5-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24585.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24585.json new file mode 100644 index 00000000000..94db5ab7bf5 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24585.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24585", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.550", + "lastModified": "2025-01-24T18:15:35.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in N.O.U.S. Open Useful and Simple Event post allows Stored XSS. This issue affects Event post: from n/a through 5.9.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/event-post/vulnerability/wordpress-event-post-plugin-5-9-7-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24587.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24587.json new file mode 100644 index 00000000000..a4ffcb797a7 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24587.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24587", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.697", + "lastModified": "2025-01-24T18:15:35.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in I Thirteen Web Solution Email Subscription Popup allows Blind SQL Injection. This issue affects Email Subscription Popup: from n/a through 1.2.23." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/email-subscribe/vulnerability/wordpress-email-subscription-popup-plugin-1-2-23-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24588.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24588.json new file mode 100644 index 00000000000..366376a0acd --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24588.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24588", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:35.867", + "lastModified": "2025-01-24T18:15:35.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Patreon Patreon WordPress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Patreon WordPress: from n/a through 1.9.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/patreon-connect/vulnerability/wordpress-patreon-wordpress-plugin-1-9-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24589.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24589.json new file mode 100644 index 00000000000..92c56801399 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24589.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24589", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.013", + "lastModified": "2025-01-24T18:15:36.013", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in JS Morisset JSM Show Post Metadata allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects JSM Show Post Metadata: from n/a through 4.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/jsm-show-post-meta/vulnerability/wordpress-jsm-show-post-metadata-plugin-4-6-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json new file mode 100644 index 00000000000..5f918660eab --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24591.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24591", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.160", + "lastModified": "2025-01-24T18:15:36.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in NinjaTeam GDPR CCPA Compliance Support allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects GDPR CCPA Compliance Support: from n/a through 2.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ninja-gdpr-compliance/vulnerability/wordpress-gdpr-ccpa-compliance-cookie-consent-banner-plugin-2-7-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24594.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24594.json new file mode 100644 index 00000000000..667a9e86b89 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24594.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24594", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.330", + "lastModified": "2025-01-24T18:15:36.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Speedcomp Linet ERP-Woocommerce Integration allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Linet ERP-Woocommerce Integration: from n/a through 3.5.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/linet-erp-woocommerce-integration/vulnerability/wordpress-linet-erp-woocommerce-integration-plugin-3-5-7-csrf-to-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24595.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24595.json new file mode 100644 index 00000000000..81cff070de1 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24595.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24595", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.497", + "lastModified": "2025-01-24T18:15:36.497", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins All Embed \u2013 Elementor Addons allows Stored XSS. This issue affects All Embed \u2013 Elementor Addons: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/all-embed-addons-for-elementor/vulnerability/wordpress-all-embed-elementor-addons-plugin-1-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-245xx/CVE-2025-24596.json b/CVE-2025/CVE-2025-245xx/CVE-2025-24596.json new file mode 100644 index 00000000000..a4f757ceed3 --- /dev/null +++ b/CVE-2025/CVE-2025-245xx/CVE-2025-24596.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24596", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.657", + "lastModified": "2025-01-24T18:15:36.657", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in WC Product Table WooCommerce Product Table Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Product Table Lite: from n/a through 3.8.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wc-product-table-lite/vulnerability/wordpress-woocommerce-product-table-lite-plugin-3-8-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24604.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24604.json new file mode 100644 index 00000000000..f64f5fa2190 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24604.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24604", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.823", + "lastModified": "2025-01-24T18:15:36.823", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Vikas Ratudi VForm allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects VForm: from n/a through 3.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/v-form/vulnerability/wordpress-lifetime-free-drag-drop-contact-form-builder-for-wordpress-vform-plugin-3-0-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24610.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24610.json new file mode 100644 index 00000000000..f8d6834edce --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24610.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24610", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:36.980", + "lastModified": "2025-01-24T18:15:36.980", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Christian Leuenberg, L.net Web Solutions Restrict Anonymous Access allows Stored XSS. This issue affects Restrict Anonymous Access: from n/a through 1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/restrict-anonymous-access/vulnerability/wordpress-restrict-anonymous-access-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24611.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24611.json new file mode 100644 index 00000000000..566207fbd46 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24611.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24611", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.133", + "lastModified": "2025-01-24T18:15:37.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Smackcoders WP Ultimate Exporter allows Absolute Path Traversal. This issue affects WP Ultimate Exporter: from n/a through 2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-ultimate-exporter/vulnerability/wordpress-export-all-posts-products-orders-refunds-users-plugin-2-9-arbitrary-file-read-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24613.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24613.json new file mode 100644 index 00000000000..4363f1b3219 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24613.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24613", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.277", + "lastModified": "2025-01-24T18:15:37.277", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Foliovision FV Thoughtful Comments allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects FV Thoughtful Comments: from n/a through 0.3.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/thoughtful-comments/vulnerability/wordpress-fv-thoughtful-comments-plugin-0-3-5-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24618.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24618.json new file mode 100644 index 00000000000..d35e071b1bc --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24618.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24618", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.430", + "lastModified": "2025-01-24T18:15:37.430", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ElementInvader ElementInvader Addons for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24622.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24622.json new file mode 100644 index 00000000000..b235958a4aa --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24622.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24622", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.577", + "lastModified": "2025-01-24T18:15:37.577", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in PickPlugins Job Board Manager allows Cross Site Request Forgery. This issue affects Job Board Manager: from n/a through 2.1.59." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/job-board-manager/vulnerability/wordpress-job-board-manager-plugin-2-1-59-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24623.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24623.json new file mode 100644 index 00000000000..c5a8f5f684a --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24623.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24623", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.727", + "lastModified": "2025-01-24T18:15:37.727", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Really Simple Security Really Simple SSL allows Cross Site Request Forgery. This issue affects Really Simple SSL: from n/a through 9.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/really-simple-ssl/vulnerability/wordpress-really-simple-security-plugin-9-1-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24625.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24625.json new file mode 100644 index 00000000000..d33eac6487c --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24625.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24625", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:37.897", + "lastModified": "2025-01-24T18:15:37.897", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Marco Almeida | Webdados Taxonomy/Term and Role based Discounts for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Taxonomy/Term and Role based Discounts for WooCommerce: from n/a through 5.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/taxonomy-discounts-woocommerce/vulnerability/wordpress-taxonomy-term-and-role-based-discounts-for-woocommerce-plugin-5-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24627.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24627.json new file mode 100644 index 00000000000..44ae8157433 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24627.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24627", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.050", + "lastModified": "2025-01-24T18:15:38.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Linnea Huxford, LinSoftware Blur Text allows Stored XSS. This issue affects Blur Text: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/blur-text/vulnerability/wordpress-blur-text-plugin-1-0-0-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24633.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24633.json new file mode 100644 index 00000000000..43e105bb1ad --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24633.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24633", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.200", + "lastModified": "2025-01-24T18:15:38.200", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in silverplugins217 Build Private Store For Woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Build Private Store For Woocommerce: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/build-private-store-for-woocommerce/vulnerability/wordpress-build-private-store-for-woocommerce-plugin-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24634.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24634.json new file mode 100644 index 00000000000..4972906d0bb --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24634.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24634", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.350", + "lastModified": "2025-01-24T18:15:38.350", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Svetoslav Marinov (Slavi) Orbisius Simple Notice allows Stored XSS. This issue affects Orbisius Simple Notice: from n/a through 1.1.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/orbisius-simple-notice/vulnerability/wordpress-orbisius-simple-notice-plugin-1-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24636.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24636.json new file mode 100644 index 00000000000..0f258cb6bb1 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24636.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24636", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.507", + "lastModified": "2025-01-24T18:15:38.507", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Laymance Technologies LLC MachForm Shortcode allows Stored XSS. This issue affects MachForm Shortcode: from n/a through 1.4.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/machform-shortcode/vulnerability/wordpress-machform-shortcode-plugin-1-4-1-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24638.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24638.json new file mode 100644 index 00000000000..59c142662e0 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24638.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24638", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.670", + "lastModified": "2025-01-24T18:15:38.670", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pete Dring Create with Code allows DOM-Based XSS. This issue affects Create with Code: from n/a through 1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/create-with-code/vulnerability/wordpress-create-with-code-plugin-1-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24644.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24644.json new file mode 100644 index 00000000000..c34a792fcca --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24644.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24644", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:38.833", + "lastModified": "2025-01-24T18:15:38.833", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebToffee WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels allows Stored XSS. This issue affects WooCommerce PDF Invoices, Packing Slips, Delivery Notes and Shipping Labels: from n/a through 4.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/print-invoices-packing-slip-labels-for-woocommerce/vulnerability/wordpress-woocommerce-pdf-invoices-plugin-4-7-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24647.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24647.json new file mode 100644 index 00000000000..b9254a7bb85 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24647.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24647", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.007", + "lastModified": "2025-01-24T18:15:39.007", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in datafeedr.com WooCommerce Cloak Affiliate Links allows Cross Site Request Forgery. This issue affects WooCommerce Cloak Affiliate Links: from n/a through 1.0.35." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-cloak-affiliate-links/vulnerability/wordpress-woocommerce-cloak-affiliate-links-plugin-1-0-35-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24649.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24649.json new file mode 100644 index 00000000000..699c9b82e61 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24649.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24649", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.167", + "lastModified": "2025-01-24T18:15:39.167", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in wpase.com Admin and Site Enhancements (ASE) allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Admin and Site Enhancements (ASE): from n/a through 7.6.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/admin-site-enhancements/vulnerability/wordpress-admin-and-site-enhancements-ase-plugin-7-6-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json new file mode 100644 index 00000000000..0c5e1a2fe1c --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24650.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24650", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.347", + "lastModified": "2025-01-24T18:15:39.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Unrestricted Upload of File with Dangerous Type vulnerability in Themefic Tourfic allows Upload a Web Shell to a Web Server. This issue affects Tourfic: from n/a through 2.15.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/tourfic/vulnerability/wordpress-tourfic-plugin-2-15-3-arbitrary-file-upload-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24652.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24652.json new file mode 100644 index 00000000000..efb7d02fb35 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24652.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24652", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.517", + "lastModified": "2025-01-24T18:15:39.517", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Revmakx WP Duplicate \u2013 WordPress Migration Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Duplicate \u2013 WordPress Migration Plugin: from n/a through 1.1.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/local-sync/vulnerability/wordpress-wp-duplicate-plugin-1-1-6-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24657.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24657.json new file mode 100644 index 00000000000..5f1fa1c7929 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24657.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24657", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.680", + "lastModified": "2025-01-24T18:15:39.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebToffee Wishlist for WooCommerce allows Stored XSS. This issue affects Wishlist for WooCommerce: from n/a through 2.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wt-woocommerce-wishlist/vulnerability/wordpress-wishlist-for-woocommerce-plugin-2-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24658.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24658.json new file mode 100644 index 00000000000..d7aa4a4a20e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24658.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24658", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:39.853", + "lastModified": "2025-01-24T18:15:39.853", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Joe Hawes Auction Nudge \u2013 Your eBay on Your Site allows Stored XSS. This issue affects Auction Nudge \u2013 Your eBay on Your Site: from n/a through 7.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/auction-nudge/vulnerability/wordpress-auction-nudge-your-ebay-on-your-site-plugin-7-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24659.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24659.json new file mode 100644 index 00000000000..704525fa2d8 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24659.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24659", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.020", + "lastModified": "2025-01-24T18:15:40.020", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WordPress Download Manager Premium Packages allows Blind SQL Injection. This issue affects Premium Packages: from n/a through 5.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpdm-premium-packages/vulnerability/wordpress-premium-packages-sell-digital-products-securely-plugin-5-9-6-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24663.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24663.json new file mode 100644 index 00000000000..76d6a9429ce --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24663.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24663", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.203", + "lastModified": "2025-01-24T18:15:40.203", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tips and Tricks HQ, Ruhul Amin, Josh Lobe Simple Download Monitor allows Blind SQL Injection. This issue affects Simple Download Monitor: from n/a through 3.9.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-download-monitor/vulnerability/wordpress-simple-download-monitor-plugin-3-9-25-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24666.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24666.json new file mode 100644 index 00000000000..2cc7122897d --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24666.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24666", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.400", + "lastModified": "2025-01-24T18:15:40.400", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThemeIsle AI Chatbot for WordPress \u2013 Hyve Lite allows Stored XSS. This issue affects AI Chatbot for WordPress \u2013 Hyve Lite: from n/a through 1.2.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/hyve-lite/vulnerability/wordpress-hyve-lite-plugin-1-2-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24668.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24668.json new file mode 100644 index 00000000000..770734c63a7 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24668.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24668", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.563", + "lastModified": "2025-01-24T18:15:40.563", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Themeisle PPOM for WooCommerce allows Stored XSS. This issue affects PPOM for WooCommerce: from n/a through 33.0.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woocommerce-product-addon/vulnerability/wordpress-ppom-for-woocommerce-plugin-33-0-8-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24669.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24669.json new file mode 100644 index 00000000000..b4feeb7ef9c --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24669.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24669", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.730", + "lastModified": "2025-01-24T18:15:40.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in SERPed SERPed.net allows SQL Injection. This issue affects SERPed.net: from n/a through 4.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/serped-net/vulnerability/wordpress-serped-net-plugin-4-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24672.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24672.json new file mode 100644 index 00000000000..83983eb591b --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24672.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24672", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:40.890", + "lastModified": "2025-01-24T18:15:40.890", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CodePeople Form Builder CP allows SQL Injection. This issue affects Form Builder CP: from n/a through 1.2.41." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/cp-easy-form-builder/vulnerability/wordpress-form-builder-cp-plugin-1-2-41-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24673.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24673.json new file mode 100644 index 00000000000..47ffe4dfe4e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24673.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24673", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.033", + "lastModified": "2025-01-24T18:15:41.033", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in AyeCode Ltd Ketchup Shortcodes allows Stored XSS. This issue affects Ketchup Shortcodes: from n/a through 0.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ketchup-shortcodes-pack/vulnerability/wordpress-ketchup-shortcodes-plugin-0-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24674.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24674.json new file mode 100644 index 00000000000..01df8c89721 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24674.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24674", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.190", + "lastModified": "2025-01-24T18:15:41.190", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Teplitsa. Technologies for Social Good ShMapper by Teplitsa allows Stored XSS. This issue affects ShMapper by Teplitsa: from n/a through 1.5.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/shmapper-by-teplitsa/vulnerability/wordpress-shmapper-by-teplitsa-plugin-1-5-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24675.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24675.json new file mode 100644 index 00000000000..7c1c5a182b5 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24675.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24675", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.340", + "lastModified": "2025-01-24T18:15:41.340", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in osamaesh WP Visitor Statistics (Real Time Traffic) allows Stored XSS. This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 7.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wp-stats-manager/vulnerability/wordpress-wp-visitor-statistics-real-time-traffic-plugin-7-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24678.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24678.json new file mode 100644 index 00000000000..7b11045771b --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24678.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24678", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.477", + "lastModified": "2025-01-24T18:15:41.477", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Listamester Listamester allows Stored XSS. This issue affects Listamester: from n/a through 2.3.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-80" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/listamester/vulnerability/wordpress-listamester-plugin-2-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24679.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24679.json new file mode 100644 index 00000000000..066508eece4 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24679.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24679", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.630", + "lastModified": "2025-01-24T18:15:41.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in webraketen Internal Links Manager allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Internal Links Manager: from n/a through 2.5.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/seo-automated-link-building/vulnerability/wordpress-internal-links-manager-plugin-2-5-2-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24681.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24681.json new file mode 100644 index 00000000000..d599c381b3e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24681.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24681", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.767", + "lastModified": "2025-01-24T18:15:41.767", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpWax Product Carousel Slider & Grid Ultimate for WooCommerce allows Stored XSS. This issue affects Product Carousel Slider & Grid Ultimate for WooCommerce: from n/a through 1.10.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-product-carousel-slider-and-grid-ultimate/vulnerability/wordpress-product-carousel-slider-grid-ultimate-for-woocommerce-plugin-1-10-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24682.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24682.json new file mode 100644 index 00000000000..8e076e044f3 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24682.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24682", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:41.947", + "lastModified": "2025-01-24T18:15:41.947", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in mikemmx Super Block Slider allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Super Block Slider: from n/a through 2.7.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/super-block-slider/vulnerability/wordpress-super-block-slider-plugin-2-7-9-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24683.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24683.json new file mode 100644 index 00000000000..243d80aefc1 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24683.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24683", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.133", + "lastModified": "2025-01-24T18:15:42.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in WPChill RSVP and Event Management Plugin allows SQL Injection. This issue affects RSVP and Event Management Plugin: from n/a through 2.7.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/rsvp/vulnerability/wordpress-rsvp-and-event-management-plugin-2-7-14-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24687.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24687.json new file mode 100644 index 00000000000..6ad4b456bf6 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24687.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24687", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.283", + "lastModified": "2025-01-24T18:15:42.283", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Lars Wallenborn Show/Hide Shortcode allows Stored XSS. This issue affects Show/Hide Shortcode: from n/a through 1.0.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/showhide-shortcode/vulnerability/wordpress-show-hide-shortcode-plugin-1-0-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24691.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24691.json new file mode 100644 index 00000000000..c94768337c4 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24691.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24691", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.433", + "lastModified": "2025-01-24T18:15:42.433", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Gagan Sandhu , Enej Bajgoric , CTLT DEV, UBC People Lists allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects People Lists: from n/a through 1.3.10." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/people-lists/vulnerability/wordpress-people-lists-plugin-1-3-10-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24693.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24693.json new file mode 100644 index 00000000000..8227a41b7f8 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24693.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24693", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.597", + "lastModified": "2025-01-24T18:15:42.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Yehi Advanced Notifications allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Notifications: from n/a through 1.2.7." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/advanced-notifications/vulnerability/wordpress-advanced-notifications-plugin-1-2-7-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24695.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24695.json new file mode 100644 index 00000000000..3e9cd6104d6 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24695.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24695", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.740", + "lastModified": "2025-01-24T18:15:42.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in HasThemes Extensions For CF7 allows Server Side Request Forgery. This issue affects Extensions For CF7: from n/a through 3.2.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/extensions-for-cf7/vulnerability/wordpress-extensions-for-cf7-plugin-3-2-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24696.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24696.json new file mode 100644 index 00000000000..5da8b55ab05 --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24696.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24696", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:42.900", + "lastModified": "2025-01-24T18:15:42.900", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in WP Attire Attire Blocks allows Cross Site Request Forgery. This issue affects Attire Blocks: from n/a through 1.9.6." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/attire-blocks/vulnerability/wordpress-gutenberg-blocks-and-page-layouts-plugin-1-9-6-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json b/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json new file mode 100644 index 00000000000..5e18b81ca0e --- /dev/null +++ b/CVE-2025/CVE-2025-246xx/CVE-2025-24698.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24698", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.050", + "lastModified": "2025-01-24T18:15:43.050", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in G5Theme Essential Real Estate allows Cross Site Request Forgery. This issue affects Essential Real Estate: from n/a through 5.1.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/essential-real-estate/vulnerability/wordpress-essential-real-estate-plugin-5-1-8-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24701.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24701.json new file mode 100644 index 00000000000..e2cf1f19d23 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24701.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24701", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.207", + "lastModified": "2025-01-24T18:15:43.207", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in Kiboko Labs Chained Quiz allows Server Side Request Forgery. This issue affects Chained Quiz: from n/a through 1.3.2.9." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/chained-quiz/vulnerability/wordpress-chained-quiz-plugin-1-3-2-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24702.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24702.json new file mode 100644 index 00000000000..3773bfe0bb9 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24702.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24702", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.360", + "lastModified": "2025-01-24T18:15:43.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xagio Xagio SEO allows Stored XSS. This issue affects Xagio SEO: from n/a through 7.0.0.20." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/xagio-seo/vulnerability/wordpress-xagio-seo-plugin-7-0-0-20-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24703.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24703.json new file mode 100644 index 00000000000..922756c5487 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24703.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24703", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.520", + "lastModified": "2025-01-24T18:15:43.520", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Server-Side Request Forgery (SSRF) vulnerability in DLX Plugins Comment Edit Core \u2013 Simple Comment Editing allows Server Side Request Forgery. This issue affects Comment Edit Core \u2013 Simple Comment Editing: from n/a through 3.0.33." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 4.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.3, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/simple-comment-editing/vulnerability/wordpress-comment-edit-core-simple-comment-editing-plugin-3-0-33-server-side-request-forgery-ssrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24704.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24704.json new file mode 100644 index 00000000000..9b069e679a3 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24704.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24704", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.680", + "lastModified": "2025-01-24T18:15:43.680", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sebastian Zaha Magic the Gathering Card Tooltips allows Stored XSS. This issue affects Magic the Gathering Card Tooltips: from n/a through 3.4.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/magic-the-gathering-card-tooltips/vulnerability/wordpress-magic-the-gathering-card-tooltips-plugin-3-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24705.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24705.json new file mode 100644 index 00000000000..0b5e57d89be --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24705.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24705", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:43.840", + "lastModified": "2025-01-24T18:15:43.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Arshid WooCommerce Quick View allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WooCommerce Quick View: from n/a through 1.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/woo-quick-view/vulnerability/wordpress-woocommerce-quick-view-plugin-1-1-1-sensitive-data-exposure-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24706.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24706.json new file mode 100644 index 00000000000..3a9c347706c --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24706.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24706", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.003", + "lastModified": "2025-01-24T18:15:44.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in MultiVendorX WC Marketplace allows Stored XSS. This issue affects WC Marketplace: from n/a through 4.2.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/dc-woocommerce-multi-vendor/vulnerability/wordpress-multivendorx-plugin-4-2-13-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24709.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24709.json new file mode 100644 index 00000000000..22c5bc32ee6 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24709.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24709", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.170", + "lastModified": "2025-01-24T18:15:44.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Plethora Plugins Plethora Plugins Tabs + Accordions allows Stored XSS. This issue affects Plethora Plugins Tabs + Accordions: from n/a through 1.1.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/plethora-tabs-accordions/vulnerability/wordpress-plethora-plugins-tabs-accordions-plugin-1-1-5-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24711.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24711.json new file mode 100644 index 00000000000..ead28efb429 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24711.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24711", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.330", + "lastModified": "2025-01-24T18:15:44.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Popup Box allows Cross Site Request Forgery. This issue affects Popup Box: from n/a through 3.2.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/popup-box/vulnerability/wordpress-popup-box-plugin-3-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24712.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24712.json new file mode 100644 index 00000000000..0c300ff8664 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24712.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24712", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.480", + "lastModified": "2025-01-24T18:15:44.480", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in RadiusTheme Radius Blocks allows Cross Site Request Forgery. This issue affects Radius Blocks: from n/a through 2.1.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/radius-blocks/vulnerability/wordpress-radius-blocks-wordpress-gutenberg-blocks-plugin-2-1-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24713.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24713.json new file mode 100644 index 00000000000..29624ffa303 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24713.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24713", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.630", + "lastModified": "2025-01-24T18:15:44.630", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Button Generator \u2013 easily Button Builder allows Cross Site Request Forgery. This issue affects Button Generator \u2013 easily Button Builder: from n/a through 3.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/button-generation/vulnerability/wordpress-button-generator-easily-button-builder-plugin-3-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24714.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24714.json new file mode 100644 index 00000000000..a2d9f78d7f3 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24714.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24714", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.773", + "lastModified": "2025-01-24T18:15:44.773", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Bubble Menu \u2013 circle floating menu allows Cross Site Request Forgery. This issue affects Bubble Menu \u2013 circle floating menu: from n/a through 4.0.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bubble-menu/vulnerability/wordpress-bubble-menu-plugin-4-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json new file mode 100644 index 00000000000..90f473a3f10 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24715.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24715", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:44.913", + "lastModified": "2025-01-24T18:15:44.913", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Counter Box allows Cross Site Request Forgery. This issue affects Counter Box: from n/a through 2.0.5." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/counter-box/vulnerability/wordpress-counter-box-plugin-2-0-5-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24716.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24716.json new file mode 100644 index 00000000000..154706be18f --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24716.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24716", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.057", + "lastModified": "2025-01-24T18:15:45.057", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Herd Effects allows Cross Site Request Forgery. This issue affects Herd Effects: from n/a through 6.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/mwp-herd-effect/vulnerability/wordpress-herd-effects-plugin-6-2-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24717.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24717.json new file mode 100644 index 00000000000..12913553701 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24717.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24717", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.210", + "lastModified": "2025-01-24T18:15:45.210", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Modal Window allows Cross Site Request Forgery. This issue affects Modal Window: from n/a through 6.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/modal-window/vulnerability/wordpress-modal-window-plugin-6-1-4-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24719.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24719.json new file mode 100644 index 00000000000..9de696660a2 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24719.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24719", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.360", + "lastModified": "2025-01-24T18:15:45.360", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpdevart Widget Countdown allows Stored XSS. This issue affects Widget Countdown: from n/a through 2.7.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/widget-countdown/vulnerability/wordpress-widget-countdown-plugin-2-7-1-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24720.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24720.json new file mode 100644 index 00000000000..a734eee9faf --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24720.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24720", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.523", + "lastModified": "2025-01-24T18:15:45.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Sticky Buttons allows Cross Site Request Forgery. This issue affects Sticky Buttons: from n/a through 4.1.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/sticky-buttons/vulnerability/wordpress-sticky-buttons-plugin-4-1-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24721.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24721.json new file mode 100644 index 00000000000..587f8955a06 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24721.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24721", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.667", + "lastModified": "2025-01-24T18:15:45.667", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aleksandar Uro\u0161evi\u0107 Easy YouTube Gallery allows Stored XSS. This issue affects Easy YouTube Gallery: from n/a through 1.0.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/easy-youtube-gallery/vulnerability/wordpress-easy-youtube-gallery-plugin-1-0-4-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24722.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24722.json new file mode 100644 index 00000000000..bdb1ec4afaf --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24722.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24722", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:45.840", + "lastModified": "2025-01-24T18:15:45.840", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in F.A.Q Builder Team FAQ Builder AYS allows Stored XSS. This issue affects FAQ Builder AYS: from n/a through 1.7.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/faq-builder-ays/vulnerability/wordpress-faq-builder-ays-plugin-1-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24723.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24723.json new file mode 100644 index 00000000000..1c5b3932175 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24723.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24723", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.000", + "lastModified": "2025-01-24T18:15:46.000", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Booking Calendar Contact Form allows Stored XSS. This issue affects Booking Calendar Contact Form: from n/a through 1.2.55." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/booking-calendar-contact-form/vulnerability/wordpress-booking-calendar-contact-form-plugin-1-2-55-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24724.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24724.json new file mode 100644 index 00000000000..e9f43cad313 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24724.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24724", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.170", + "lastModified": "2025-01-24T18:15:46.170", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Side Menu Lite allows Cross Site Request Forgery. This issue affects Side Menu Lite: from n/a through 5.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/side-menu-lite/vulnerability/wordpress-side-menu-lite-plugin-5-3-1-cross-site-request-forgery-csrf-to-settings-change-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24725.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24725.json new file mode 100644 index 00000000000..5b8b62f088f --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24725.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24725", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.357", + "lastModified": "2025-01-24T18:15:46.357", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ThimPress Thim Elementor Kit allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Thim Elementor Kit: from n/a through 1.2.8." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/thim-elementor-kit/vulnerability/wordpress-thim-elementor-kit-plugin-1-2-8-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24726.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24726.json new file mode 100644 index 00000000000..177e9a40c30 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24726.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24726", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.530", + "lastModified": "2025-01-24T18:15:46.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in HT Plugins HT Conctact Form 7 allows Stored XSS. This issue affects HT Conctact Form 7: from n/a through 1.2.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ht-contactform/vulnerability/wordpress-contact-form-7-widget-plugin-1-2-1-stored-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json new file mode 100644 index 00000000000..672cc8c4043 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24727.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24727", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.707", + "lastModified": "2025-01-24T18:15:46.707", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CodePeople Contact Form Email allows Stored XSS. This issue affects Contact Form Email: from n/a through 1.3.52." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/contact-form-to-email/vulnerability/wordpress-contact-form-to-email-plugin-1-3-52-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24728.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24728.json new file mode 100644 index 00000000000..e08a1d7b9b3 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24728.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24728", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:46.877", + "lastModified": "2025-01-24T18:15:46.877", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Yannick Lefebvre Bug Library allows Blind SQL Injection. This issue affects Bug Library: from n/a through 2.1.4." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L", + "baseScore": 8.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.1, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bug-library/vulnerability/wordpress-bug-library-plugin-2-1-4-sql-injection-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24729.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24729.json new file mode 100644 index 00000000000..e696afa5fb1 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24729.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24729", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.037", + "lastModified": "2025-01-24T18:15:47.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ElementInvader ElementInvader Addons for Elementor allows Stored XSS. This issue affects ElementInvader Addons for Elementor: from n/a through 1.3.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/elementinvader-addons-for-elementor/vulnerability/wordpress-elementinvader-addons-for-elementor-plugin-1-3-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24730.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24730.json new file mode 100644 index 00000000000..05ff17fe111 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24730.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24730", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.193", + "lastModified": "2025-01-24T18:15:47.193", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Rextheme WP VR allows DOM-Based XSS. This issue affects WP VR: from n/a through 8.5.14." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/wpvr/vulnerability/wordpress-wp-vr-plugin-8-5-14-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24731.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24731.json new file mode 100644 index 00000000000..30cfad276e3 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24731.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24731", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.370", + "lastModified": "2025-01-24T18:15:47.370", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in IP2Location Download IP2Location Country Blocker allows Stored XSS. This issue affects Download IP2Location Country Blocker: from n/a through 2.38.3." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.7, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ip2location-country-blocker/vulnerability/wordpress-ip2location-country-blocker-plugin-2-38-3-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24732.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24732.json new file mode 100644 index 00000000000..aeacc816f41 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24732.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24732", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.530", + "lastModified": "2025-01-24T18:15:47.530", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Booking & Appointment - Repute Infosystems BookingPress allows DOM-Based XSS. This issue affects BookingPress: from n/a through 1.1.25." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/bookingpress-appointment-booking/vulnerability/wordpress-bookingpress-plugin-1-1-25-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json new file mode 100644 index 00000000000..07f59ba1615 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24733.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24733", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.697", + "lastModified": "2025-01-24T18:15:47.697", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in AddonMaster Post Grid Master allows PHP Local File Inclusion. This issue affects Post Grid Master: from n/a through 3.4.12." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-98" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-plugin-3-4-12-local-file-inclusion-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json new file mode 100644 index 00000000000..2d756add03d --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24736.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24736", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:47.850", + "lastModified": "2025-01-24T18:15:47.850", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Metaphor Creations Post Duplicator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Post Duplicator: from n/a through 2.35." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/post-duplicator/vulnerability/wordpress-post-duplicator-plugin-2-35-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24738.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24738.json new file mode 100644 index 00000000000..6fa30ad3253 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24738.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24738", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.017", + "lastModified": "2025-01-24T18:15:48.017", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in NowButtons.com Call Now Button allows Cross Site Request Forgery. This issue affects Call Now Button: from n/a through 1.4.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/call-now-button/vulnerability/wordpress-call-now-button-plugin-1-4-13-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24739.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24739.json new file mode 100644 index 00000000000..bcb8d9cd535 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24739.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24739", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.177", + "lastModified": "2025-01-24T18:15:48.177", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in FluentSMTP & WPManageNinja Team FluentSMTP allows Cross Site Request Forgery. This issue affects FluentSMTP: from n/a through 2.2.80." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/fluent-smtp/vulnerability/wordpress-fluentsmtp-plugin-2-2-80-cross-site-request-forgery-csrf-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24746.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24746.json new file mode 100644 index 00000000000..7535bf90726 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24746.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24746", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.437", + "lastModified": "2025-01-24T18:15:48.437", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Popup Maker Popup Maker allows Stored XSS. This issue affects Popup Maker: from n/a through 1.20.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/popup-maker/vulnerability/wordpress-popup-maker-plugin-1-20-2-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24750.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24750.json new file mode 100644 index 00000000000..d99808a9ca1 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24750.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24750", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.663", + "lastModified": "2025-01-24T18:15:48.663", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in ExactMetrics ExactMetrics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects ExactMetrics: from n/a through 8.1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.5 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/google-analytics-dashboard-for-wp/vulnerability/wordpress-exactmetrics-plugin-8-1-0-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24751.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24751.json new file mode 100644 index 00000000000..9c02ca68da3 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24751.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24751", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.810", + "lastModified": "2025-01-24T18:15:48.810", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in GoDaddy CoBlocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CoBlocks: from n/a through 3.1.13." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/coblocks/vulnerability/wordpress-coblocks-plugin-3-1-13-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24753.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24753.json new file mode 100644 index 00000000000..9bed4fc0b98 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24753.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24753", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:48.950", + "lastModified": "2025-01-24T18:15:48.950", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Missing Authorization vulnerability in Kadence WP Gutenberg Blocks by Kadence Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Gutenberg Blocks by Kadence Blocks: from n/a through 3.3.1." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/kadence-blocks/vulnerability/wordpress-kadence-blocks-plugin-3-3-1-broken-access-control-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24755.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24755.json new file mode 100644 index 00000000000..2f9d1445b9a --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24755.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24755", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:49.160", + "lastModified": "2025-01-24T18:15:49.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in add-ons.org PDF Invoices for WooCommerce + Drag and Drop Template Builder allows Stored XSS. This issue affects PDF Invoices for WooCommerce + Drag and Drop Template Builder: from n/a through 4.6.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.3, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/pdf-for-woocommerce/vulnerability/wordpress-pdf-invoices-for-woocommerce-plugin-4-6-0-cross-site-scripting-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-247xx/CVE-2025-24756.json b/CVE-2025/CVE-2025-247xx/CVE-2025-24756.json new file mode 100644 index 00000000000..b56eecbbc09 --- /dev/null +++ b/CVE-2025/CVE-2025-247xx/CVE-2025-24756.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-24756", + "sourceIdentifier": "audit@patchstack.com", + "published": "2025-01-24T18:15:49.307", + "lastModified": "2025-01-24T18:15:49.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cross-Site Request Forgery (CSRF) vulnerability in mgplugin Roi Calculator allows Stored XSS. This issue affects Roi Calculator: from n/a through 1.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "audit@patchstack.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L", + "baseScore": 7.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.7 + } + ] + }, + "weaknesses": [ + { + "source": "audit@patchstack.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] + } + ], + "references": [ + { + "url": "https://patchstack.com/database/wordpress/plugin/roi-calculator/vulnerability/wordpress-roi-calculator-plugin-1-0-csrf-to-stored-xss-vulnerability?_s_id=cve", + "source": "audit@patchstack.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 117dbe87ee4..044fede15a1 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-24T17:00:32.072783+00:00 +2025-01-24T19:00:32.954520+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-24T16:38:39.150000+00:00 +2025-01-24T18:58:46.177000+00:00 ``` ### Last Data Feed Release @@ -33,67 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -278788 +278908 ``` ### CVEs added in the last Commit -Recently added CVEs: `23` +Recently added CVEs: `120` -- [CVE-2024-13698](CVE-2024/CVE-2024-136xx/CVE-2024-13698.json) (`2025-01-24T16:15:34.597`) -- [CVE-2024-25034](CVE-2024/CVE-2024-250xx/CVE-2024-25034.json) (`2025-01-24T16:15:34.747`) -- [CVE-2024-40693](CVE-2024/CVE-2024-406xx/CVE-2024-40693.json) (`2025-01-24T16:15:36.003`) -- [CVE-2024-40706](CVE-2024/CVE-2024-407xx/CVE-2024-40706.json) (`2025-01-24T16:15:36.150`) -- [CVE-2024-41757](CVE-2024/CVE-2024-417xx/CVE-2024-41757.json) (`2025-01-24T16:15:36.297`) -- [CVE-2024-45077](CVE-2024/CVE-2024-450xx/CVE-2024-45077.json) (`2025-01-24T16:15:36.903`) -- [CVE-2024-9490](CVE-2024/CVE-2024-94xx/CVE-2024-9490.json) (`2025-01-24T15:15:10.683`) -- [CVE-2024-9491](CVE-2024/CVE-2024-94xx/CVE-2024-9491.json) (`2025-01-24T15:15:10.817`) -- [CVE-2024-9492](CVE-2024/CVE-2024-94xx/CVE-2024-9492.json) (`2025-01-24T15:15:10.940`) -- [CVE-2024-9493](CVE-2024/CVE-2024-94xx/CVE-2024-9493.json) (`2025-01-24T15:15:11.070`) -- [CVE-2024-9494](CVE-2024/CVE-2024-94xx/CVE-2024-9494.json) (`2025-01-24T15:15:11.197`) -- [CVE-2024-9495](CVE-2024/CVE-2024-94xx/CVE-2024-9495.json) (`2025-01-24T15:15:11.323`) -- [CVE-2024-9496](CVE-2024/CVE-2024-94xx/CVE-2024-9496.json) (`2025-01-24T15:15:11.450`) -- [CVE-2024-9497](CVE-2024/CVE-2024-94xx/CVE-2024-9497.json) (`2025-01-24T15:15:11.620`) -- [CVE-2024-9498](CVE-2024/CVE-2024-94xx/CVE-2024-9498.json) (`2025-01-24T15:15:11.793`) -- [CVE-2024-9499](CVE-2024/CVE-2024-94xx/CVE-2024-9499.json) (`2025-01-24T15:15:11.967`) -- [CVE-2025-0697](CVE-2025/CVE-2025-06xx/CVE-2025-0697.json) (`2025-01-24T15:15:12.130`) -- [CVE-2025-0698](CVE-2025/CVE-2025-06xx/CVE-2025-0698.json) (`2025-01-24T16:15:37.717`) -- [CVE-2025-0699](CVE-2025/CVE-2025-06xx/CVE-2025-0699.json) (`2025-01-24T16:15:37.977`) -- [CVE-2025-22605](CVE-2025/CVE-2025-226xx/CVE-2025-22605.json) (`2025-01-24T15:15:12.330`) -- [CVE-2025-22606](CVE-2025/CVE-2025-226xx/CVE-2025-22606.json) (`2025-01-24T16:15:38.307`) -- [CVE-2025-22607](CVE-2025/CVE-2025-226xx/CVE-2025-22607.json) (`2025-01-24T16:15:38.470`) -- [CVE-2025-23991](CVE-2025/CVE-2025-239xx/CVE-2025-23991.json) (`2025-01-24T16:15:38.723`) +- [CVE-2025-24717](CVE-2025/CVE-2025-247xx/CVE-2025-24717.json) (`2025-01-24T18:15:45.210`) +- [CVE-2025-24719](CVE-2025/CVE-2025-247xx/CVE-2025-24719.json) (`2025-01-24T18:15:45.360`) +- [CVE-2025-24720](CVE-2025/CVE-2025-247xx/CVE-2025-24720.json) (`2025-01-24T18:15:45.523`) +- [CVE-2025-24721](CVE-2025/CVE-2025-247xx/CVE-2025-24721.json) (`2025-01-24T18:15:45.667`) +- [CVE-2025-24722](CVE-2025/CVE-2025-247xx/CVE-2025-24722.json) (`2025-01-24T18:15:45.840`) +- [CVE-2025-24723](CVE-2025/CVE-2025-247xx/CVE-2025-24723.json) (`2025-01-24T18:15:46.000`) +- [CVE-2025-24724](CVE-2025/CVE-2025-247xx/CVE-2025-24724.json) (`2025-01-24T18:15:46.170`) +- [CVE-2025-24725](CVE-2025/CVE-2025-247xx/CVE-2025-24725.json) (`2025-01-24T18:15:46.357`) +- [CVE-2025-24726](CVE-2025/CVE-2025-247xx/CVE-2025-24726.json) (`2025-01-24T18:15:46.530`) +- [CVE-2025-24727](CVE-2025/CVE-2025-247xx/CVE-2025-24727.json) (`2025-01-24T18:15:46.707`) +- [CVE-2025-24728](CVE-2025/CVE-2025-247xx/CVE-2025-24728.json) (`2025-01-24T18:15:46.877`) +- [CVE-2025-24729](CVE-2025/CVE-2025-247xx/CVE-2025-24729.json) (`2025-01-24T18:15:47.037`) +- [CVE-2025-24730](CVE-2025/CVE-2025-247xx/CVE-2025-24730.json) (`2025-01-24T18:15:47.193`) +- [CVE-2025-24731](CVE-2025/CVE-2025-247xx/CVE-2025-24731.json) (`2025-01-24T18:15:47.370`) +- [CVE-2025-24732](CVE-2025/CVE-2025-247xx/CVE-2025-24732.json) (`2025-01-24T18:15:47.530`) +- [CVE-2025-24733](CVE-2025/CVE-2025-247xx/CVE-2025-24733.json) (`2025-01-24T18:15:47.697`) +- [CVE-2025-24736](CVE-2025/CVE-2025-247xx/CVE-2025-24736.json) (`2025-01-24T18:15:47.850`) +- [CVE-2025-24738](CVE-2025/CVE-2025-247xx/CVE-2025-24738.json) (`2025-01-24T18:15:48.017`) +- [CVE-2025-24739](CVE-2025/CVE-2025-247xx/CVE-2025-24739.json) (`2025-01-24T18:15:48.177`) +- [CVE-2025-24746](CVE-2025/CVE-2025-247xx/CVE-2025-24746.json) (`2025-01-24T18:15:48.437`) +- [CVE-2025-24750](CVE-2025/CVE-2025-247xx/CVE-2025-24750.json) (`2025-01-24T18:15:48.663`) +- [CVE-2025-24751](CVE-2025/CVE-2025-247xx/CVE-2025-24751.json) (`2025-01-24T18:15:48.810`) +- [CVE-2025-24753](CVE-2025/CVE-2025-247xx/CVE-2025-24753.json) (`2025-01-24T18:15:48.950`) +- [CVE-2025-24755](CVE-2025/CVE-2025-247xx/CVE-2025-24755.json) (`2025-01-24T18:15:49.160`) +- [CVE-2025-24756](CVE-2025/CVE-2025-247xx/CVE-2025-24756.json) (`2025-01-24T18:15:49.307`) ### CVEs modified in the last Commit -Recently modified CVEs: `83` +Recently modified CVEs: `61` -- [CVE-2024-3251](CVE-2024/CVE-2024-32xx/CVE-2024-3251.json) (`2025-01-24T16:31:37.807`) -- [CVE-2024-32760](CVE-2024/CVE-2024-327xx/CVE-2024-32760.json) (`2025-01-24T16:21:55.993`) -- [CVE-2024-3383](CVE-2024/CVE-2024-33xx/CVE-2024-3383.json) (`2025-01-24T15:29:26.313`) -- [CVE-2024-3384](CVE-2024/CVE-2024-33xx/CVE-2024-3384.json) (`2025-01-24T15:54:56.557`) -- [CVE-2024-3385](CVE-2024/CVE-2024-33xx/CVE-2024-3385.json) (`2025-01-24T15:55:48.127`) -- [CVE-2024-3386](CVE-2024/CVE-2024-33xx/CVE-2024-3386.json) (`2025-01-24T15:58:52.233`) -- [CVE-2024-3388](CVE-2024/CVE-2024-33xx/CVE-2024-3388.json) (`2025-01-24T16:16:18.310`) -- [CVE-2024-34161](CVE-2024/CVE-2024-341xx/CVE-2024-34161.json) (`2025-01-24T16:20:57.617`) -- [CVE-2024-35200](CVE-2024/CVE-2024-352xx/CVE-2024-35200.json) (`2025-01-24T16:15:15.340`) -- [CVE-2024-35995](CVE-2024/CVE-2024-359xx/CVE-2024-35995.json) (`2025-01-24T16:15:35.870`) -- [CVE-2024-42067](CVE-2024/CVE-2024-420xx/CVE-2024-42067.json) (`2025-01-24T16:15:36.447`) -- [CVE-2024-42068](CVE-2024/CVE-2024-420xx/CVE-2024-42068.json) (`2025-01-24T16:15:36.613`) -- [CVE-2024-44949](CVE-2024/CVE-2024-449xx/CVE-2024-44949.json) (`2025-01-24T16:15:36.763`) -- [CVE-2024-4618](CVE-2024/CVE-2024-46xx/CVE-2024-4618.json) (`2025-01-24T16:37:51.287`) -- [CVE-2024-47683](CVE-2024/CVE-2024-476xx/CVE-2024-47683.json) (`2025-01-24T16:15:37.083`) -- [CVE-2024-49926](CVE-2024/CVE-2024-499xx/CVE-2024-49926.json) (`2025-01-24T16:15:37.237`) -- [CVE-2024-50010](CVE-2024/CVE-2024-500xx/CVE-2024-50010.json) (`2025-01-24T16:15:37.430`) -- [CVE-2024-50282](CVE-2024/CVE-2024-502xx/CVE-2024-50282.json) (`2025-01-24T16:15:37.570`) -- [CVE-2024-57184](CVE-2024/CVE-2024-571xx/CVE-2024-57184.json) (`2025-01-24T15:15:10.523`) -- [CVE-2024-5913](CVE-2024/CVE-2024-59xx/CVE-2024-5913.json) (`2025-01-24T16:00:42.420`) -- [CVE-2024-5917](CVE-2024/CVE-2024-59xx/CVE-2024-5917.json) (`2025-01-24T16:04:54.887`) -- [CVE-2024-5919](CVE-2024/CVE-2024-59xx/CVE-2024-5919.json) (`2025-01-24T16:06:00.323`) -- [CVE-2024-5920](CVE-2024/CVE-2024-59xx/CVE-2024-5920.json) (`2025-01-24T16:06:43.023`) -- [CVE-2024-7634](CVE-2024/CVE-2024-76xx/CVE-2024-7634.json) (`2025-01-24T16:14:16.497`) -- [CVE-2025-21654](CVE-2025/CVE-2025-216xx/CVE-2025-21654.json) (`2025-01-24T16:15:38.177`) +- [CVE-2024-13091](CVE-2024/CVE-2024-130xx/CVE-2024-13091.json) (`2025-01-24T18:42:25.563`) +- [CVE-2024-13360](CVE-2024/CVE-2024-133xx/CVE-2024-13360.json) (`2025-01-24T18:58:46.177`) +- [CVE-2024-13361](CVE-2024/CVE-2024-133xx/CVE-2024-13361.json) (`2025-01-24T18:55:22.577`) +- [CVE-2024-13426](CVE-2024/CVE-2024-134xx/CVE-2024-13426.json) (`2025-01-24T18:37:38.503`) +- [CVE-2024-13584](CVE-2024/CVE-2024-135xx/CVE-2024-13584.json) (`2025-01-24T18:20:40.760`) +- [CVE-2024-13590](CVE-2024/CVE-2024-135xx/CVE-2024-13590.json) (`2025-01-24T18:09:26.147`) +- [CVE-2024-1603](CVE-2024/CVE-2024-16xx/CVE-2024-1603.json) (`2025-01-24T18:22:44.423`) +- [CVE-2024-24427](CVE-2024/CVE-2024-244xx/CVE-2024-24427.json) (`2025-01-24T18:47:28.570`) +- [CVE-2024-24428](CVE-2024/CVE-2024-244xx/CVE-2024-24428.json) (`2025-01-24T18:44:26.897`) +- [CVE-2024-25937](CVE-2024/CVE-2024-259xx/CVE-2024-25937.json) (`2025-01-24T18:42:26.510`) +- [CVE-2024-2805](CVE-2024/CVE-2024-28xx/CVE-2024-2805.json) (`2025-01-24T18:45:05.873`) +- [CVE-2024-29870](CVE-2024/CVE-2024-298xx/CVE-2024-29870.json) (`2025-01-24T18:18:36.670`) +- [CVE-2024-29871](CVE-2024/CVE-2024-298xx/CVE-2024-29871.json) (`2025-01-24T18:18:34.350`) +- [CVE-2024-29872](CVE-2024/CVE-2024-298xx/CVE-2024-29872.json) (`2025-01-24T18:18:31.603`) +- [CVE-2024-29873](CVE-2024/CVE-2024-298xx/CVE-2024-29873.json) (`2025-01-24T18:18:29.537`) +- [CVE-2024-29874](CVE-2024/CVE-2024-298xx/CVE-2024-29874.json) (`2025-01-24T18:18:27.523`) +- [CVE-2024-29875](CVE-2024/CVE-2024-298xx/CVE-2024-29875.json) (`2025-01-24T18:18:25.493`) +- [CVE-2024-29876](CVE-2024/CVE-2024-298xx/CVE-2024-29876.json) (`2025-01-24T18:18:23.223`) +- [CVE-2024-29877](CVE-2024/CVE-2024-298xx/CVE-2024-29877.json) (`2025-01-24T18:17:39.100`) +- [CVE-2024-29878](CVE-2024/CVE-2024-298xx/CVE-2024-29878.json) (`2025-01-24T18:17:36.817`) +- [CVE-2024-29879](CVE-2024/CVE-2024-298xx/CVE-2024-29879.json) (`2025-01-24T18:17:54.427`) +- [CVE-2024-3848](CVE-2024/CVE-2024-38xx/CVE-2024-3848.json) (`2025-01-24T17:28:21.717`) +- [CVE-2024-4223](CVE-2024/CVE-2024-42xx/CVE-2024-4223.json) (`2025-01-24T17:58:19.593`) +- [CVE-2024-4279](CVE-2024/CVE-2024-42xx/CVE-2024-4279.json) (`2025-01-24T17:03:18.140`) +- [CVE-2024-4318](CVE-2024/CVE-2024-43xx/CVE-2024-4318.json) (`2025-01-24T17:11:02.097`) ## Download and Usage diff --git a/_state.csv b/_state.csv index d39d00ae915..bbed38b5db5 100644 --- a/_state.csv +++ b/_state.csv @@ -133674,6 +133674,7 @@ CVE-2019-15687,0,0,631fa6883559929aa1f1ba6fd83d3891d2f2b7996c0b8937a59a8756b120d CVE-2019-15688,0,0,ea89229c33b4cee9066ab26488a8660db2c52706308eae88d3b6862c1d605c97,2024-11-21T04:29:15.837000 CVE-2019-15689,0,0,629e43a8bd569373cd6b7d4b5815383522904bfb3359850064a1c3098d372c44,2024-11-21T04:29:15.947000 CVE-2019-1569,0,0,51f78e17be9cc47788c1561bb50a778e1bced13c55e4d90967b9eb633e7f95a2,2024-11-21T04:36:49.903000 +CVE-2019-15690,1,1,c09b54b7ca9e39ef279f01b08012b242e21cb5377b9e6c8807a9dc0d6a49bc88,2025-01-24T18:15:27.657000 CVE-2019-15691,0,0,ffea0b91f1f36be4b31cb755b2df04ceda272166a735d2f0051e032565624c1f,2024-11-21T04:29:16.087000 CVE-2019-15692,0,0,b796642261001da0dd0123d4e48d3c486e03045c387ec48aafdadc4378094b7d,2024-11-21T04:29:16.240000 CVE-2019-15693,0,0,861049fe43cf437ab5d0f0cba06ef4440d8c3ec9045438ae693839101ba9ba9a,2024-11-21T04:29:16.367000 @@ -148399,8 +148400,8 @@ CVE-2020-13364,0,0,53ce55a341dba2b5cde7846e115da63d3b5af1cde2f6f4b9f0b9108c49560 CVE-2020-13365,0,0,f136ff2ce482ec34e26f3ef668ee8ad897f7240d0bbb0f4c0c252369bcc77c0d,2024-11-21T05:01:07.457000 CVE-2020-1337,0,0,9dca45a59737f88b3fbc4ffa0f6072a726fd182df2ab049ca0eb9fa4069ee98e,2024-11-21T05:10:16.580000 CVE-2020-13376,0,0,01c788872deaccf02c44c8959b1cb6541c67a2d8a306ae345b4147aed3a1f40d,2024-11-21T05:01:07.643000 -CVE-2020-13377,0,1,50d2cb2e90399337085a8304893e26f78e454d6bfb2f8538ff93280c08c6a8d2,2025-01-24T16:15:27.070000 -CVE-2020-13378,0,1,79d362d5440535ad8a89cdef5bd40ecd62ca4fccdd7dba3a6e0e06bf6e083af1,2025-01-24T16:15:27.830000 +CVE-2020-13377,0,0,50d2cb2e90399337085a8304893e26f78e454d6bfb2f8538ff93280c08c6a8d2,2025-01-24T16:15:27.070000 +CVE-2020-13378,0,0,79d362d5440535ad8a89cdef5bd40ecd62ca4fccdd7dba3a6e0e06bf6e083af1,2025-01-24T16:15:27.830000 CVE-2020-13379,0,0,6ff176fe592dc5c07f2c5703fe95edcc11613517518704b4ff40ef9da21eff08,2024-11-21T05:01:08.160000 CVE-2020-1338,0,0,5cea49e6e56113cf47ce9434a23de8c063a8817810fe85100e9754046ae01f26,2024-11-21T05:10:16.757000 CVE-2020-13380,0,0,110e61f6e418b6c3ff47b1bd4e2b8c03aefc718d22f8971bfcb5c1b10af9444a,2024-11-21T05:01:08.380000 @@ -165549,7 +165550,7 @@ CVE-2021-0873,0,0,388d081e4033a27e7b95c124b75949e4303ca718f90b7feeee713a550220ae CVE-2021-0874,0,0,a81451014b610be497602acc6d602d5fb1523d46ea9d96941e35aaf6fbe17802,2024-11-21T05:43:12.113000 CVE-2021-0875,0,0,b84858392200f92efe18826bd48bf6bfc27acce03bb29a0503651024ae321f23,2024-11-21T05:43:12.210000 CVE-2021-0876,0,0,bc2623adf140a5052e69517b9017d55af39a4eb3884658abdf34dbe2f8eebca3,2024-11-21T05:43:12.303000 -CVE-2021-0877,0,0,65c00b01d39ca7652715d0898eacfda44582e6a2c86cc0ba30e53641a5491fa0,2024-11-21T05:43:12.400000 +CVE-2021-0877,0,1,c2e5cd30d0c477a2e68bc1e7d07537fb61bd5004c669d9456ede730fc557548b,2025-01-24T17:15:08.107000 CVE-2021-0878,0,0,74054f38cbbca55331fda5f8dd7583715f509e18eeeced7decaee7dd72ee0770,2024-11-21T05:43:12.513000 CVE-2021-0879,0,0,b6d6a2c57e18595dc6074214481ede8a1a3a28cc41d86bfe2d6f3e905f1d0032,2024-11-21T05:43:12.610000 CVE-2021-0880,0,0,4612a9a40bedad3fd32283245ba201e18cb9e0bcf74c0ab05ea53f65dc15f628,2024-11-21T05:43:12.703000 @@ -176229,7 +176230,7 @@ CVE-2021-32025,0,0,be1366e60cdc64085a7ca3378dd8b2945646288a6056d66d9eaf86e564481 CVE-2021-32027,0,0,5ee2aa7a5aa3fa8bb911c577fd863dbdb076a0ad3ef0512d7dd32317414b22da,2024-11-21T06:06:44.467000 CVE-2021-32028,0,0,84c85cca513953c25777bc582de148d107114d46d9b13227dc0a8bf544f4d415,2024-11-21T06:06:44.593000 CVE-2021-32029,0,0,56c471bfaedf8eeeae330cda0d2954472dbd44261f536849dbc437841365a531,2024-11-21T06:06:44.717000 -CVE-2021-32030,0,0,81ecaafa0642c7d35d8051779d52ef32e3479e26c07e0a3c7db9a9e74a23d306,2024-11-21T06:06:44.840000 +CVE-2021-32030,0,1,793995724539fd7266f05023c81575e5fa8384d2c075c98f7758d1c73aca9099,2025-01-24T18:15:28.720000 CVE-2021-32032,0,0,d4a228b8d3584c392915c1306de9b4891f451e0bcc887a1a2c922b4efeafaf40,2024-11-21T06:06:44.993000 CVE-2021-32033,0,0,9d53a703f8e89930e795f200116050cb1538597c59d5f4de2f68d4733f37ec27,2024-11-21T06:06:45.167000 CVE-2021-32036,0,0,5f2cf3c6d2205a2b02a642da73b2e1978439d07a378edd4a500d10314baf33fc,2024-11-21T06:06:45.330000 @@ -184248,7 +184249,7 @@ CVE-2021-42714,0,0,140a3cd5e613fc165c37326bf38fb922982c9fd894685b7a4d43fefb24c5c CVE-2021-42715,0,0,c8bde02f0ab72afb9d2fb48b644a9a783de2cde5ac488a27334e06356251e70d,2024-11-21T06:28:01.600000 CVE-2021-42716,0,0,e8b94a98a1f8c8c4ace912bdc692f2844b824dcc8731c978eb1cf416bf562dab,2024-11-21T06:28:01.797000 CVE-2021-42717,0,0,e0cf32cf401f390ee5050d72c9219b1b18cae5d87b497dbc59e68726d57c7a54,2024-11-21T06:28:01.980000 -CVE-2021-42718,0,1,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000 +CVE-2021-42718,0,0,f953d3282057f93e0ecf49380a977e688d87af4fa7b770ecfb8f3d28fe970821,2025-01-24T15:15:08.273000 CVE-2021-42719,0,0,232b901bd7344df0e76a38bf0733064f0ffc60bd5a3326d6e3679ce2d8d049d8,2024-11-21T06:28:02.177000 CVE-2021-4272,0,0,006f9c0c258b6542fa695fbce9f3e6480d068f1e6d826347b4056504eefe3da7,2024-11-21T06:37:17.187000 CVE-2021-42720,0,0,6c01ada51f5b603949f0fb523bc32a23bc190aeaf3150ba0ad135eaf5048262b,2024-11-21T06:28:02.307000 @@ -187255,7 +187256,7 @@ CVE-2021-47031,0,0,f25d58627717c7a924412e6b385dc0162de8a15a4b87c0428fe4a16ade98f CVE-2021-47032,0,0,f22b5c2b67e4a40c2eae631e37e00c6244655f0e82c48b647957682054f83dad,2024-12-12T15:38:48.267000 CVE-2021-47033,0,0,0c47657436e397a05f9881d648a026b558b2d013a92d5e54cb5a3af71fee4259,2024-12-12T15:39:46.350000 CVE-2021-47034,0,0,24c3e8f7c4176b8f22212c00c61bbb11a7d89013e052d0b7d3fa32ebbfb9913f,2024-11-21T06:35:13.940000 -CVE-2021-47035,0,1,53047d823c2bc5a21fd15a3f65846d517f3d894eb26ec981725bfabe968e651b,2025-01-24T16:15:28.167000 +CVE-2021-47035,0,0,53047d823c2bc5a21fd15a3f65846d517f3d894eb26ec981725bfabe968e651b,2025-01-24T16:15:28.167000 CVE-2021-47036,0,0,5f024a05262de61e5ac08b9d5f719a3994f1541d12133f825b62021cb35ce987,2025-01-10T18:25:11.710000 CVE-2021-47037,0,0,e2a6224280b33eb3dd7afbe5e80331954cdd908902ccf3c78df2c23afa2e92d0,2025-01-09T19:47:04.127000 CVE-2021-47038,0,0,173970a6c5d44bb723efd6b764e694ea73860ece1a8d9e4523c1041c196f5023,2024-12-06T20:56:10.230000 @@ -187535,7 +187536,7 @@ CVE-2021-47311,0,0,98e1520633064ae9e3dacbc844be85413b874bf2f2fbe22abe4dd107f5906 CVE-2021-47312,0,0,ff86c9dd2d16a622215b4ad8e9480ff3358e2ff4844e931b7513ca3679660ed3,2024-11-21T06:35:51.343000 CVE-2021-47313,0,0,174ef32811d7098b5db5ef1f2809acfcc4a86790f0c1c80b5ea6f0036d215f8d,2024-11-21T06:35:51.557000 CVE-2021-47314,0,0,ff82d7f5d9d8e8b670019e9e1121b7bc84e2a204794ea492ea0b9951850e98c8,2024-12-24T16:38:21.477000 -CVE-2021-47315,0,1,1c774c850aa8c008ae669ed9dcdea3d54ed8679a6f9941a33747b5664e8e40c0,2025-01-24T16:15:28.320000 +CVE-2021-47315,0,0,1c774c850aa8c008ae669ed9dcdea3d54ed8679a6f9941a33747b5664e8e40c0,2025-01-24T16:15:28.320000 CVE-2021-47316,0,0,84a8b71459e2724b9fd56eaaaa584f59f6bab28499815fcf33aa4c939541d9ec,2024-12-24T16:28:58.957000 CVE-2021-47317,0,0,3838e2614ac7ab009e6914ad0a37d76ff9764506da6fe77773a0c7cb8f8c3855,2024-11-21T06:35:52.117000 CVE-2021-47318,0,0,97c8b27b6e49c8073856d58fa89216b8809f5362835ffff068977fd7df7f93b8,2024-12-26T19:51:01.310000 @@ -187710,7 +187711,7 @@ CVE-2021-47486,0,0,88c8c3df27ba0eeb24fb2b7659c34d77a5973e70158aa708cfc8f1021fd4d CVE-2021-47487,0,0,37fda3dbde69565646173f301baa99f70441700610bcbfc8402f3e27ab23c916,2024-05-28T19:15:08.983000 CVE-2021-47488,0,0,6bd518faf568ee263bd5be6b79978583251019752295859beb9e265d517b8683,2024-12-05T14:15:18.520000 CVE-2021-47489,0,0,7a56ba536c26f6b77795729fd8e0581a390a0f0ae03d489f7fb50e689f3ce146,2025-01-06T19:53:35.453000 -CVE-2021-47490,0,1,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000 +CVE-2021-47490,0,0,151ef266838c7722eaa82f178f6718ea223752e3cd4c4dc0ef3927c3dea46501,2025-01-24T16:15:28.487000 CVE-2021-47491,0,0,a7ae681a6beb6f8d9fda8dae0b15459feddf1ede34bb94ccc2241694dd76ab3c,2024-11-21T06:36:19.300000 CVE-2021-47492,0,0,e82c8d015c8bb1bcf824fdaff87708e8950e6b9aad1aae2306eadf8a5f0445b9,2024-11-21T06:36:19.453000 CVE-2021-47493,0,0,128c39466a91dd489967bfa4d617eb862533ef102769ccf5f2f0167d6d02e0df,2024-11-21T06:36:19.610000 @@ -211632,7 +211633,7 @@ CVE-2022-47087,0,0,71e1d075af60f0196fec030f4063ebef2a527befdf051f7d8aab63cbfb7f1 CVE-2022-47088,0,0,b98f05ebb857ea10095f9123635832e30648965003e7905490df3f376b4f5ac8,2024-11-21T07:31:29.167000 CVE-2022-47089,0,0,c26f1970b9b74981bf0ba358399601b51f970d4bc6d651e1fb898e47882bb5e7,2024-11-21T07:31:29.323000 CVE-2022-4709,0,0,1f437bf2ea3e8e3bab0082991e8fab50396d2759962fdd1fc9d6c440da113a90,2024-11-21T07:35:46.720000 -CVE-2022-47090,0,1,ae01e4c68d48c412bbdcfcb8069a7e5e6d3560c210d94a858acbda148fba9579,2025-01-24T15:15:09.350000 +CVE-2022-47090,0,0,ae01e4c68d48c412bbdcfcb8069a7e5e6d3560c210d94a858acbda148fba9579,2025-01-24T15:15:09.350000 CVE-2022-47091,0,0,db15f4651accf3f758fc133188e22b6d8feea29161132f964d3be0e2cd0a0db6,2024-11-21T07:31:29.467000 CVE-2022-47092,0,0,57a161cd1a90d36624564d6855b7761a383436d80f0225bf005d58c6b513c817,2024-11-21T07:31:29.617000 CVE-2022-47093,0,0,c2cb877abf1ea1738d9899afcbe4c8d2160b9b83bca6cbce52c2f3ad1b51f180,2024-11-21T07:31:29.773000 @@ -212119,7 +212120,7 @@ CVE-2022-47875,0,0,5452f740a78c73caa4a657fddea9b236c0ccab2f61a24d95fc04cf4b9ef18 CVE-2022-47876,0,0,20e65339e4b12003bfe8074da0a3070b01a9d4475680513dd99c3db343e8e56e,2024-11-21T07:32:26.917000 CVE-2022-47877,0,0,f4f2fa3f9619bc52600ea7032a7ebd4771ed2cd68feb9a57717103525e5dbea1,2024-11-21T07:32:27.047000 CVE-2022-47878,0,0,96bb6067105e74676882f6a527181b82486d927c40bffd915863185ad4f54ac6,2024-11-21T07:32:27.203000 -CVE-2022-47879,0,1,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 +CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000 CVE-2022-47880,0,0,2b9b12298f1b7624f9ffa9e5b9503a4a9a483e57014d89d5abe2b7ada15e54e5,2024-11-21T07:32:27.520000 CVE-2022-47881,0,0,34fa102bc5505e6f5f8a5f6eb9d86c65176a3776a73b2e6594f74a0441654a64,2024-11-21T07:32:27.750000 @@ -212876,7 +212877,7 @@ CVE-2022-4885,0,0,3ccdceef4b557bc79233cdb7b14f77a0f886bb4504e564212ba210d67b8e92 CVE-2022-48850,0,0,3b978e81aff8dc66cd596ad9489b1964b8388a9bdaa732c023a8dce60be7c237,2024-11-21T07:34:12.593000 CVE-2022-48851,0,0,b5963e610a6b567ac27737bdbd152c9c020f59e3a839696883f7155074b9e929,2024-11-21T07:34:12.727000 CVE-2022-48852,0,0,9fc4f1c46d46ea22bd79b6cf1608c487939c6d3e31f26d42d2cc7463963bf761,2024-11-21T07:34:12.860000 -CVE-2022-48853,0,1,8d77c49ee747406f062ef056c2dfb1e00e807558dfcc9efadd667e47932b4d7e,2025-01-24T16:15:28.903000 +CVE-2022-48853,0,0,8d77c49ee747406f062ef056c2dfb1e00e807558dfcc9efadd667e47932b4d7e,2025-01-24T16:15:28.903000 CVE-2022-48854,0,0,2d778ad3769b2fb042d7b591db0c0b14e6de39464f2c07683bd4152f5e15df97,2024-11-21T07:34:13.107000 CVE-2022-48855,0,0,3440a8fe244e5b729d47867f28dab7872054b8e4a4f1a9a9bdc3539e1e624218,2024-11-21T07:34:13.223000 CVE-2022-48856,0,0,994bd64d45742980b19592d97900b715dbceaf01d7b34b48a35f5cbef2c0d039,2024-11-21T07:34:13.363000 @@ -215509,7 +215510,7 @@ CVE-2023-20665,0,0,dfcb31026b7c30e90be6e3188d6c3b233b3c12e9403d3e657a19e03d0e7dd CVE-2023-20666,0,0,3ad2ba12d88061f23a7c0b09598969c2e9597c7160fc17bc5129321b5b838acf,2024-11-21T07:41:19.483000 CVE-2023-2067,0,0,0f14ce1d18441d6e968f52ac3b496b8b01e7386a752eeee24930cc49f9b3187d,2024-11-21T07:57:52.460000 CVE-2023-20670,0,0,e4e5ee151777987fef7de5981cab53d63b02c8c02f20668d5ebefff86242ed80,2024-11-21T07:41:19.597000 -CVE-2023-20673,0,0,e2164d77340a06460043e17bcb3eafcaf0731bd386509522d6609a863306d020,2024-11-21T07:41:19.717000 +CVE-2023-20673,0,1,29bae4906ec7c96c77c7c09aecc0e7fb7f495988834a892b933466c096361071,2025-01-24T17:15:09.203000 CVE-2023-20674,0,0,eb2146b7419e33779b6b00f43b6162659ce687b1b5ecf2b1d3b2ee2893270957,2024-11-21T07:41:19.830000 CVE-2023-20675,0,0,91492ea9a54e1bfc3d79a683f7dfb3a3f048f71ad7188ef164f152ebe8298300,2024-11-21T07:41:19.950000 CVE-2023-20676,0,0,57ebf27440c8ce41ba6129a4fb74ae61cf5eb4cd96f4cc80a46de05aee46574d,2024-11-21T07:41:20.067000 @@ -215537,9 +215538,9 @@ CVE-2023-20697,0,0,b15ff5814ad0ad32493c32593760653a362c78f43c2a573f054ad8ad9f354 CVE-2023-20698,0,0,8ddadf8df5c8784d5b1260722f41aafebe1a40e68b22dfcf40750ba3ecd27d48,2025-01-23T22:15:11.177000 CVE-2023-20699,0,0,4d6ac6ca5563d5f2a54f52ef2b9e7294293faa46f7f00297443cee93f8a621f5,2025-01-23T22:15:11.367000 CVE-2023-20700,0,0,b34b8edd94d410de075caf4b24435de4dae235dbba89d08781d6f13584fc0cdd,2025-01-23T22:15:11.560000 -CVE-2023-20701,0,0,6621f568cddef8a7b906dbb4d5f3b4c32f525a110a8951f8ee032d6b3f0ca16d,2024-11-21T07:41:22.873000 +CVE-2023-20701,0,1,fc32ec3458bae7abcef055d54e77fd3393a1f32bd2a222cee0ea0ffdbdf1327e,2025-01-24T17:15:09.410000 CVE-2023-20702,0,0,e2a87c7ea72a74e13d3b9da5cf9e91816dc47678a0d33d6ea334b793759111e7,2024-11-21T07:41:22.977000 -CVE-2023-20703,0,0,7de0d80bf71aede51269521da1972865a9e7061fe5bd0ce99e9d02bc7c65ca9b,2024-11-21T07:41:23.177000 +CVE-2023-20703,0,1,9c4746921326fa45c0841be614593261cd65c0d6284b5a69aa8fce32e55a939c,2025-01-24T17:15:09.593000 CVE-2023-20704,0,0,ea9e15a3ce0dd2baadf88f8bb7c3ea13f534cd0b64f67403162733a7a307325a,2024-11-21T07:41:23.280000 CVE-2023-20705,0,0,eeaa8ec22b70246791edd3adc54257964c89ed5f28290db91a37b301bd0563ad,2024-11-21T07:41:23.380000 CVE-2023-20706,0,0,05268dc862916b80280026b2a77cea3d7aca47fc15090bf10e4c7334e9987ed1,2024-11-21T07:41:23.507000 @@ -215552,17 +215553,17 @@ CVE-2023-20711,0,0,a3a059039f4079683556bc911267d66baaed48cea9038f1dfc5e720f76c3a CVE-2023-20712,0,0,448f7cc7b18b7736e4158919a106777207ebeaae578ec88d49e8147b47bd416f,2025-01-07T19:15:28.830000 CVE-2023-20715,0,0,8e093ad3da4ecddaecba75d344d8950a8e8f5da70b953ce26dbfe70f2bae96c6,2025-01-07T19:15:29.033000 CVE-2023-20716,0,0,bc3be8c9031ce5b0447b088e80cf2c0fbcfc772b8457c122fb9d1df8c33921cf,2025-01-07T19:15:29.203000 -CVE-2023-20717,0,0,b1525d88cbb5a71350e022089167c9477dd4337e8a5f350edb710d89d59053d5,2024-11-21T07:41:24.550000 -CVE-2023-20718,0,0,2e64cc91ac3fceb6b2ea1e66c38b215865ab90c7fd81e4e8c5d4727f49967c2a,2024-11-21T07:41:24.663000 -CVE-2023-20719,0,1,b9a51dcc17d7372cb485458318997bcd2c9a54e6b566b2d8edb56d8e4e7d82bd,2025-01-24T16:15:29.153000 +CVE-2023-20717,0,1,7c12e621a43ebd3ca57da61794e10716c27df59530d0e649da8d41cd8b7396c6,2025-01-24T17:15:09.770000 +CVE-2023-20718,0,1,6871c173b9e6c856a99b83bb31a5986b4d32cc9f4223baf79d2b88a8c52a023e,2025-01-24T17:15:09.937000 +CVE-2023-20719,0,0,b9a51dcc17d7372cb485458318997bcd2c9a54e6b566b2d8edb56d8e4e7d82bd,2025-01-24T16:15:29.153000 CVE-2023-2072,0,0,4884565e98bb3f8af8c5fb57495cf09e2b7ab12c309a5284f57a5c3408c00f44,2024-11-21T07:57:52.907000 -CVE-2023-20720,0,1,4a7a68b2c716e4ecb2a5aae90dc33885f65b61eb4754c7c958faef79b057fc00,2025-01-24T15:15:09.510000 -CVE-2023-20721,0,1,a24821403aa253474369b638de67f291e42084a5cf1fffe2e3188c98affac224,2025-01-24T15:15:09.697000 +CVE-2023-20720,0,0,4a7a68b2c716e4ecb2a5aae90dc33885f65b61eb4754c7c958faef79b057fc00,2025-01-24T15:15:09.510000 +CVE-2023-20721,0,0,a24821403aa253474369b638de67f291e42084a5cf1fffe2e3188c98affac224,2025-01-24T15:15:09.697000 CVE-2023-20722,0,0,8920eb055d033db9af8b82d589874977302f3c6343fff535a2c237261054f9eb,2024-11-21T07:41:25.093000 CVE-2023-20723,0,0,9d0686f907129b6919ada24bf4f11d306c0e127a565ad2d2e14861ae5024a41c,2024-11-21T07:41:25.200000 CVE-2023-20724,0,0,987f1a6ebac7796ad97470c40868ad4c190da72715630d9002692d9f05c5b7e0,2024-11-21T07:41:25.307000 CVE-2023-20725,0,0,f09278808328dfcfcad9a9453e6e7f164215557bbd6c9f4188e9f9b639210912,2025-01-07T21:15:10.227000 -CVE-2023-20726,0,1,ea7b2fc029caf76e23c2ddf30e1b5ec45f153a58220b9cdbb3044db4236b67df,2025-01-24T15:15:09.850000 +CVE-2023-20726,0,0,ea7b2fc029caf76e23c2ddf30e1b5ec45f153a58220b9cdbb3044db4236b67df,2025-01-24T15:15:09.850000 CVE-2023-20727,0,0,12b8e73d1738786379705578d5b084abe724825ea42c8abd1e84732d69f07547,2025-01-08T15:15:10.070000 CVE-2023-20728,0,0,a92d83daff0e8454efbc72619861f5e9876e5beba7cfa77f65738746f6788e6d,2025-01-07T21:15:10.397000 CVE-2023-20729,0,0,f84aa0f145a810d5b9d4006033a907e85d272d4f717361c7926bd179f76d2bd7,2025-01-08T15:15:10.470000 @@ -215713,7 +215714,7 @@ CVE-2023-20873,0,0,cff16cf52797f467ed7c741f13305368b4aeab764d12cb3c66fbc1fcdfdb8 CVE-2023-20877,0,0,b1137b7a4eeb2839e9ccb1d52d41b83ecff55e9d480687605ddf1601b1de1f1a,2024-11-21T07:41:44.253000 CVE-2023-20878,0,0,2b44a2f19288e0e47b5de5247c31e040ccee0af9e3dc60185cd935597e4e9887,2024-11-21T07:41:44.370000 CVE-2023-20879,0,0,eea88eeb6a512c97a72206f821436dcf25752e98f66fc5c1c632c6621e574c15,2024-11-21T07:41:44.493000 -CVE-2023-2088,0,1,24ce61252c8d92165fc18045e361791e8ad1d2941848cbdc61c8790fa17c0641,2025-01-24T16:15:31.020000 +CVE-2023-2088,0,0,24ce61252c8d92165fc18045e361791e8ad1d2941848cbdc61c8790fa17c0641,2025-01-24T16:15:31.020000 CVE-2023-20880,0,0,b89bffd797ab3d3197d8fc9600fb55a084a937e4452f2b287a8d2721678172d5,2024-11-21T07:41:44.600000 CVE-2023-20881,0,0,28548a0f62d733f2b9bfce23b0d5259ba7f92cf2a2fb9432dc94d495c2741f09,2025-01-21T20:15:28.703000 CVE-2023-20882,0,0,1976a8fc4a44fc2bcd0b63f6d8b4f374b2bf769fbb5b3a6e0734bfa5f060d62d,2025-01-16T15:15:09.943000 @@ -215749,7 +215750,7 @@ CVE-2023-20910,0,0,42b469d1e40838cbc2cf37212366f0d94ff573dac305f6e83df5f05900c29 CVE-2023-20911,0,0,ab40c86b9ae088eddceb5d780d2ee5f689d589c215dc35e9c7431f72c74f1d17,2024-11-21T07:41:48.260000 CVE-2023-20912,0,0,a7200d2947d78855a0b3085a5e7f9701a09997703d0fc330c2ba1ae6a4ffe923,2024-11-21T07:41:48.367000 CVE-2023-20913,0,0,e692bef2cbc52b4d3dd8dfad8fd764fb551f25ecca92b1f45eeb4bd10d46d51c,2024-11-21T07:41:48.470000 -CVE-2023-20914,0,0,6c83d813adb4c3f643430bdb85015202c855b393aff47cd830243eb05589bf62,2024-11-21T07:41:48.577000 +CVE-2023-20914,0,1,6b5145528d510b04a8c592c1d20cfdd7716ba9252d059fcb55c8803940a2aa2f,2025-01-24T18:15:29.743000 CVE-2023-20915,0,0,adfdd4422da4332db3f77db12fbf67dbbdac2660d5fc061368cc6c8467f1f174,2024-11-21T07:41:48.693000 CVE-2023-20916,0,0,a374d87bd55acf954a93f49d5fa49410d32593591843627dc9c7ca4968742700,2024-11-21T07:41:48.807000 CVE-2023-20917,0,0,d13795ea9bd32cac50a7140ca6600173c907f6872d18aacf395d3929d868bb19,2024-11-21T07:41:48.920000 @@ -215767,7 +215768,7 @@ CVE-2023-20927,0,0,a607587c512daad2a75d81512d73a603fcfa3abb48d5289e3dbaff22ab356 CVE-2023-20928,0,0,892415b0bbb1a273c0c4d0684975a78c5df304016f119c1b4ce59426590449f0,2024-11-21T07:41:50.197000 CVE-2023-20929,0,0,041e26d9b4c1dfffd082ab9480ad7471983cf487f26cb25f435768568d115446,2024-11-21T07:41:50.307000 CVE-2023-2093,0,0,f5d0e4a8e9249b4db32d41150a1e407490a3e931edcb3c038b611890842c7c04,2024-11-21T07:57:55.413000 -CVE-2023-20930,0,0,b824c22a056a67044b5c7a14aa54ef92e17bc9847cd45ef6236989d3ec5da585,2024-11-21T07:41:50.417000 +CVE-2023-20930,0,1,94d8d79f463551c6402b4135cc14c5a7c75415d884da1592c8007b82b38ecf47,2025-01-24T18:15:29.927000 CVE-2023-20931,0,0,d3b038426854dbc70e7344bdda980fc79d5daaad38a9b0361f8ca72476b28538,2024-11-21T07:41:50.530000 CVE-2023-20932,0,0,ab28ac247acecb824db440c588e9ebb9bc495ac7f65d5e471b1650aa0ccba933,2024-11-21T07:41:50.637000 CVE-2023-20933,0,0,a4eec22d73f22a806feb4c396f2b9e1e14b80acf59734b7f9d7828d4fdc36a15,2024-11-21T07:41:50.753000 @@ -215951,22 +215952,22 @@ CVE-2023-21099,0,0,afabd6091b22f62466375ddd2d5cf2dba66c45f7574132fd909c72a36e7ab CVE-2023-2110,0,0,718a01a86ed296dfb2aaf7f83682a9531cd721d906f14a1b1f42db7be1070ee9,2024-11-21T07:57:57.580000 CVE-2023-21100,0,0,a6f5ad62f1a95ea60c7f4843f485008a1ed2c66f5cb727afe7540a39c9398c46,2024-11-21T07:42:09.783000 CVE-2023-21101,0,0,38e7df0c443e508038a3e4161c84cfcbe9fa8e603833cd6af1be1d6a93d524fa,2024-11-21T07:42:09.897000 -CVE-2023-21102,0,0,7db45ef3845b42ca6260aef2ad7d3de5fc52e49318f989aa863d0d899c931533,2024-11-21T07:42:10.003000 -CVE-2023-21103,0,0,4aab360e2d731ad5d05ace3fbc6baf820fc49fbb8fff7729d2d0093647be6881,2024-11-21T07:42:10.117000 -CVE-2023-21104,0,0,5edb04014ea0598115fa5a7daf40e7d661269de366795455f086b823f138e170,2024-11-21T07:42:10.230000 +CVE-2023-21102,0,1,fe6581b7408e9ebb7ae2547494c92fe8527cef74da3f12efb6200baf57c43f9a,2025-01-24T18:15:30.103000 +CVE-2023-21103,0,1,20c7440a93699015ea517e3301547543c2847fe28ca104a70a3ef6a848b1a5b5,2025-01-24T18:15:30.293000 +CVE-2023-21104,0,1,1ec05ff75e8278ed536cc1101ff9d8c843c8ed6aa8b24ab8410b92c2d34e23d2,2025-01-24T18:15:30.460000 CVE-2023-21105,0,0,305734c9a4e52f89407b03a75469986fb19800a551f4779ecc963d7b4bee369a,2024-12-18T19:15:09.073000 -CVE-2023-21106,0,0,a21070bedfc41def36f9c4228bbd9bdc1b9318295e325d7ed8060f49990eb3c5,2024-11-21T07:42:10.457000 -CVE-2023-21107,0,0,e9fce52a458dda798e8fa179e231aa35ec79ebb57ee7145a83618907d265a72e,2024-11-21T07:42:10.567000 +CVE-2023-21106,0,1,cc7e89eb8cf88ad3e9d3752b4097248d4503d0099cb95620e0e59c23db1d5ad8,2025-01-24T18:15:30.620000 +CVE-2023-21107,0,1,84535a7ce9c93e7ebf8a2c283b51e406f5a990dd5441966e312e7872f5ebe156,2025-01-24T18:15:30.783000 CVE-2023-21108,0,0,aa471174704ea3fdb9f8b2106a5be8827cbb290a00c1eb662144d17620a7ea1d,2024-11-21T07:42:10.687000 -CVE-2023-21109,0,0,21facb850435009a25aa4af1cdbc5a045266a886c09f2ebe2efab1e8b6d62a86,2024-11-21T07:42:10.793000 +CVE-2023-21109,0,1,604447f954e139f9191bf5e1289232fe508636391eea9bd91609d198c4db2690,2025-01-24T18:15:30.957000 CVE-2023-2111,0,0,6a9640260aa91563af780e2010a0c6c0acb0d185fdafa584ccb0db7edce84d06,2025-01-10T17:15:11.043000 -CVE-2023-21110,0,0,ad60dfc70278c6b0bd34da20159da1fc88b332271fdeb070037af19f55a5c868,2024-11-21T07:42:10.897000 +CVE-2023-21110,0,1,0b4b736e103bdaa50e37209c44fa0a9e35d32b615b19ae7e57860a2003079c40,2025-01-24T18:15:31.133000 CVE-2023-21111,0,0,a9228ee60075f73227629f6cd77e27f676d0edb5135fe71db50c6e10f3d1393f,2024-11-21T07:42:11 -CVE-2023-21112,0,0,2f75ed082b153f8339631ada631436883348d00b331ae56e385d0ec55419bd1b,2024-11-21T07:42:11.103000 +CVE-2023-21112,0,1,8f032a593c5483bc4f7b3834871ad08de86f2ddb01c05d63111f70ea9ef7db61,2025-01-24T17:15:10.117000 CVE-2023-21113,0,0,31e1212d8efecb910800eecacc301137f8379e91cd70784a0252f8c3d5ee2583,2024-12-17T16:58:29.983000 CVE-2023-21114,0,0,fa32db5c147ae6a7a528a1bc56976da826ae48513e9e13398dd1022162fdf60f,2024-12-17T16:55:34.213000 CVE-2023-21115,0,0,d7e4c2025519fe78f076fc7aa3fd4a605d2590b8acba5d765081b08ac5bbd196,2024-11-21T07:42:11.600000 -CVE-2023-21116,0,0,36b148da9f9f12d9a702b28222cb2a1e2e18dcc65b527486718d44da0f823eab,2024-11-21T07:42:11.710000 +CVE-2023-21116,0,1,f36d1d9895ca6fa6cf75804df5dd1e5e8731c79ef1371e6b2a54b5eb9ac49188,2025-01-24T17:15:10.293000 CVE-2023-21117,0,0,f0124ef076dc79a4e01262a8b1df4548fa0485e051c0d1617c6886216a48de33,2024-11-21T07:42:11.813000 CVE-2023-21118,0,0,71bb5efb77659c4025ee924a86e0b6dfd68c36cf41f64b4a9e78eb742b30f14c,2024-11-21T07:42:11.923000 CVE-2023-2112,0,0,ea9a0d098479ca4a7653e7953d9458eaeb6beaee2899a894eed45d07c80dc3a1,2024-11-21T07:57:57.813000 @@ -217942,7 +217943,7 @@ CVE-2023-23440,0,0,23331a24ed6fa042411fd43f8a792c8068294bfdb2977056e0bb7e7c8bcb7 CVE-2023-23441,0,0,4a953f0968337cc774649a952b3cf8d5696aa197f235e8802480db67d2b08c12,2024-11-21T07:46:12.167000 CVE-2023-23442,0,0,fe6970f3a3deffb09880c9386fa0a2141bd23cf70dadfdc2f5f416e05825daa5,2024-11-21T07:46:12.287000 CVE-2023-23443,0,0,ff97eb33c74f86a442e8a98c8e7d211e003fa05ac20f95b4909749668ca2c44d,2024-11-21T07:46:12.430000 -CVE-2023-23444,0,0,35efe4deeeb259033ed78b708aef72d674a14e1a2f61a0262c34b01cb1aa269a,2024-11-21T07:46:12.540000 +CVE-2023-23444,0,1,af6371fa483594b27f468bf271fa3878b052345131d1783f19d6978af19a2e4b,2025-01-24T17:15:10.457000 CVE-2023-23445,0,0,8880e92d7bc034cb675d38c08f42febf5fa13c8e783bde27ccf599769f1f0259,2024-11-21T07:46:12.700000 CVE-2023-23446,0,0,c7a658494892aa196ecef5ec259814150fa42e230131ea0b1967b6aca86a951e,2024-11-21T07:46:12.857000 CVE-2023-23447,0,0,799570d84d44a1209e10ffb483abe255041344fd4d07112e85033741618026c6,2024-11-21T07:46:12.987000 @@ -218914,9 +218915,9 @@ CVE-2023-24535,0,0,9101527fd9107c5386236adaf2ee7bf3fcaeec19ee7ec12624ba60305ac5f CVE-2023-24536,0,0,bb2b8efcce4307c33912fd14b2db6df4da6e5afc1a5edcdd426d6232dcb522f3,2024-11-21T07:48:04.893000 CVE-2023-24537,0,0,98119d9acafd36005d2ffe696ca11675bc78d34c3c5852328010fe5111c9a191,2024-11-29T12:15:05.507000 CVE-2023-24538,0,0,c6ee96ea8510988e4fb3d5d751f84079e69488c511ff159e1502a7c218c3a75d,2024-11-21T07:48:05.130000 -CVE-2023-24539,0,0,7d40afbc3d00934c9e8f590fc3989310adbadf97bab0e18401a9671a9de01152,2024-11-29T12:15:05.670000 +CVE-2023-24539,0,1,ea2a302f962025f2382b8a15f62e5c70586e5fca58dbbba73e1ce7033f68300a,2025-01-24T17:15:10.670000 CVE-2023-2454,0,0,6361fc24a87ee7375e7b169be77c132fef3b9323deeb35b6d25dbcbf4850e79b,2025-01-06T18:15:13.670000 -CVE-2023-24540,0,0,78c0fbdc26b2cb2340f1de68d6774afb1921dcf0f98a7af2ab94c8367e561a16,2024-11-21T07:48:05.360000 +CVE-2023-24540,0,1,b7f6c4fc2274b312f970ecce72090873352ec9fdcea64505b5abf9b78add4433,2025-01-24T17:15:10.893000 CVE-2023-24542,0,0,6612770957bfd2d7428b34a6ccdd2c7fcc6dc69049e1a2e76f202f5ae6e2afa2,2024-11-21T07:48:05.473000 CVE-2023-24544,0,0,7a92daab2fe2f7e58be38c40376f6014daf231528157940605d6e0de84c2256e,2024-11-21T07:48:05.587000 CVE-2023-24545,0,0,a0ab2d4842655375847722a0e937641ff0e0f8a7250b255418abf046a7f0cb00,2024-11-21T07:48:05.733000 @@ -220538,7 +220539,7 @@ CVE-2023-26456,0,0,e082554b5abddc1181c4f573b227849cb909bfd759c086d3320483fc4595f CVE-2023-26457,0,0,1bf337e471bdfd12cf4e9a80906a6b456effcec0e91875477ab400f3fa9deff0,2024-11-21T07:51:30.473000 CVE-2023-26458,0,0,4f17b4a93349210a4477a4d519e7b00b822b8c47de774b72fec50d1f8dff2bd3,2024-11-21T07:51:31.217000 CVE-2023-26459,0,0,09338abaf25813d8a620bef182c6637fd3b37d13c5f707911e4d5bb3acc49305,2024-11-21T07:51:31.410000 -CVE-2023-2646,0,0,294086b8ba6d80e4f001e6345230bdf7f0e5fb49681be4cac6f875c880955d07,2024-11-21T07:58:59.837000 +CVE-2023-2646,0,1,ccc99fbe80f4ded6d07f3b3f839f57c6106a718899d71ea764725254ed7b5c7c,2025-01-24T17:15:12.910000 CVE-2023-26460,0,0,48284d4a5937580bfb1d772bc775dfbd15cdb9e095e57f5addb17f37f82e0e8b,2024-11-21T07:51:31.720000 CVE-2023-26461,0,0,7e1223c51d4b82add8bddd794a14557f764fef91b24807bfd5db3c5f7ac8e287,2024-11-21T07:51:32.480000 CVE-2023-26462,0,0,b28f0e03e82910749ea20e439b44f9545fd9fabf4bd993763e891b6621188a84,2024-11-21T07:51:32.687000 @@ -220676,7 +220677,7 @@ CVE-2023-26595,0,0,04344e2401c7ce98c0143d2d0d5275c14deb36b2fb712d71e2c152ccc7fd1 CVE-2023-26596,0,0,473d756e5fc103c72c25cb52f36d58f77ec5ae61a2a53c9a3dc335fe84d6a907,2024-11-21T07:51:49.530000 CVE-2023-26597,0,0,aacf593fde559d15ce4638d00292bbc24591756418f0523c6654e6c81acd48a7,2024-11-21T07:51:49.657000 CVE-2023-26599,0,0,1dbb1f2d05db14b400489b090477c44b30116883ba51ce5b297c4ac394001c52,2024-11-21T07:51:49.787000 -CVE-2023-2660,0,0,288dc291fc33ebb650dfe82b6575b42daed847546e66c6f5955d835ce292c557,2024-11-21T07:59:01.543000 +CVE-2023-2660,0,1,c5e50d8f7c245a28f7e9c9d744a9c90d554ec4216b5e5c8e04bc31f8bfdce061,2025-01-24T17:15:13.147000 CVE-2023-26600,0,0,fc886529aff42ccdb72f3f96931777e9e70a1824ffc00cacb571e65058ac20b7,2024-11-21T07:51:49.920000 CVE-2023-26601,0,0,a5885f284434b5f08eb9e7edc10d2032bb0cda5c5996581471528822ba1aee62,2024-11-21T07:51:50.100000 CVE-2023-26602,0,0,6b0e3fbb7db010761dc530c451b95f462476cafda0ba70599528d74ebf165b88,2024-11-21T07:51:50.250000 @@ -220692,8 +220693,8 @@ CVE-2023-26612,0,0,8eccd5871370c46cb1111cb4a17a9c69d073d082ba3a5df5b0e10012d4df5 CVE-2023-26613,0,0,120ba6265fcb3cf19f2357fdcb80ea4c92f5664f2a9334b9149078c19230fca3,2024-11-21T07:51:51.650000 CVE-2023-26615,0,0,b1c0aae5e392c30ce2c4d712f02efcbbe24144b6b4e10ffda1bbc8eaf0b88e1b,2024-11-21T07:51:51.820000 CVE-2023-26616,0,0,2e027fd845621efa326267a94dfcb7cbbd10a7f06b92f1d8d8cd963f5dc12aaf,2024-11-21T07:51:51.963000 -CVE-2023-2662,0,1,2973a9029829992593f0d5dabe74e36198f558dd0d24ae9660dda7d93b31eb3a,2025-01-24T16:15:31.363000 -CVE-2023-2663,0,1,a3908223a8e03c9451d85e3631bdc1567c5e1863507997b1f9008f1a823a9aa8,2025-01-24T16:15:31.577000 +CVE-2023-2662,0,0,2973a9029829992593f0d5dabe74e36198f558dd0d24ae9660dda7d93b31eb3a,2025-01-24T16:15:31.363000 +CVE-2023-2663,0,0,a3908223a8e03c9451d85e3631bdc1567c5e1863507997b1f9008f1a823a9aa8,2025-01-24T16:15:31.577000 CVE-2023-2664,0,0,e7c36dfaff988feacef4158a2d659b331a7c47d3406f8238770737e676e6c70b,2024-11-21T07:59:02.050000 CVE-2023-2665,0,0,e5b7339a4fcb8032459406e1fe808cdba5855d756319b57a6fa5792c1c96eed2,2024-11-21T07:59:02.170000 CVE-2023-2666,0,0,b098ed80079283f051abeddb7ba88f3806c5b4e359fbb2dc4b53ecc79dfeeafc,2024-11-21T07:59:02.293000 @@ -220755,7 +220756,7 @@ CVE-2023-26812,0,0,405afcd0d18a0ea560dd97c3f75aa90f8bace35b4b99f4dead56b89234a96 CVE-2023-26813,0,0,5fd5450c53d4b7396f768bb50de6f75fc57b355d9cbf4218f0f8b9ab8eee48ea,2024-11-21T07:51:58.173000 CVE-2023-26817,0,0,f8edc25173a549b3f29de504f53c2bc2fcc39d7fa335f22e484d9208ed7a554c,2024-11-21T07:51:58.307000 CVE-2023-26818,0,0,b63145fb84ce562cc723a09a012de7a28b2829ff563282d82a15395b053b2245,2025-01-21T20:15:28.950000 -CVE-2023-2682,0,1,9b88becbcfacd87e25e1a76055535af24eaf820e5db6040219e10c3c272cab2f,2025-01-24T16:15:31.980000 +CVE-2023-2682,0,0,9b88becbcfacd87e25e1a76055535af24eaf820e5db6040219e10c3c272cab2f,2025-01-24T16:15:31.980000 CVE-2023-26820,0,0,182ac862113fcb9d0cf4004fb66a49fe830229688194874f8f89f805ed1e0bc3,2024-11-21T07:51:58.593000 CVE-2023-26822,0,0,0387f39114a54d5ecb6e5ca3782e1c7b9aa74ae750547fc66c9d140c892e6c1e,2024-11-21T07:51:58.723000 CVE-2023-26823,0,0,204a407be7e9bf57ccaff49b561752927f6e7e4b0c05759cf501f80604a92154,2023-11-07T04:09:42.597000 @@ -221311,7 +221312,7 @@ CVE-2023-27539,0,0,79c56876ceb58bbd6b856aaea0384a545d7c13f924cf40b93447a0213977b CVE-2023-2754,0,0,d5f6eb5ab236b3e3f181c76459d82ae29b6dfb8e4cabb74d93353265b6c24b94,2024-11-21T07:59:13.700000 CVE-2023-27540,0,0,e4f5a1b7cec8ef2d7fa729e4f9d99a9b9a12336eae9d656bd8d408965b9762f1,2024-11-21T07:53:07.683000 CVE-2023-27545,0,0,b2e7b47fc90259bf8fa905eaab6313d354638d5c3596602c89dbf7a17d90f60f,2024-11-21T07:53:07.830000 -CVE-2023-27554,0,0,c49b65dffd7f955a5ce49f2d27a0b5d2ace0d68b127c10aad3ef2dfc3f9d4ec3,2024-11-21T07:53:07.957000 +CVE-2023-27554,0,1,fcf2ebab72cc0944dccd70a2526310290a286d09797603fbbdbe043d8d526833,2025-01-24T17:15:11.073000 CVE-2023-27555,0,0,3777aa72fa625967b5cda53af2e0f8261052871f52d53a5942e3108050fe8948,2024-11-21T07:53:08.090000 CVE-2023-27556,0,0,969f7cfc1e16960d50a85b35a60f2c41e633c8f4bc7d8f329967f854df446f58,2024-11-21T07:53:08.230000 CVE-2023-27557,0,0,fee7f96091f4daac062b31ac020f2cead86e494cc367ca598dea840d505d7a93,2024-11-21T07:53:08.370000 @@ -221544,7 +221545,7 @@ CVE-2023-27867,0,0,b3180c2e860e0413e8d41b1901615f40b89c210542c1724dadd9bee526fc0 CVE-2023-27868,0,0,cb7a506841b50eb06d257d56dc78fa2c1ab5b1ca3d2e8ff81ab764c29e3e03df,2024-11-21T07:53:36.427000 CVE-2023-27869,0,0,4f4a00d98ec41c193738491046862ede6064b06bf9027e76d4489b0e99b3d1c9,2024-11-21T07:53:36.557000 CVE-2023-2787,0,0,9fb1047255b25715a91fef59ad5a4da5af4311b790827aec2538c223ce0f6fc2,2024-11-21T07:59:17.380000 -CVE-2023-27870,0,0,824393db0bdd0220a14ac3204c3140d270e74d5451d66f6d23878fef206ab7ea,2024-11-21T07:53:36.683000 +CVE-2023-27870,0,1,3ea38275458aa0c6b389ca9a602ed81c7d57c55d4cb9fda57c47e946adc9312a,2025-01-24T17:15:11.300000 CVE-2023-27871,0,0,ea357f4faa19761cd1c0c05f1d43a11950992e2db72fb10cc6d71d8f7b13028a,2024-11-21T07:53:36.797000 CVE-2023-27873,0,0,b31b1d8677b8e850135ecaa71dd7d112f59b0e81c5ddcce14b855c8ba08f5f95,2024-11-21T07:53:36.910000 CVE-2023-27874,0,0,0463bc709b1afe4b00211e6eff9a08d11e494f4b25c1a468020d0c4ff2d7a5a8,2024-11-21T07:53:37.033000 @@ -222653,14 +222654,14 @@ CVE-2023-29018,0,0,922e43052abec4031928226480f9538d26a6892cda65ef30e3335a545bcbe CVE-2023-29019,0,0,2bb9d1ecd0bc7cc72e87afc659e37efd7756a1d02e250ef6e354bcdb71155936,2024-11-21T07:56:24.387000 CVE-2023-2902,0,0,47a9dad13558343e16b2017833e6364aab2d675a8542431aac7c200506e3c368,2024-11-21T07:59:31.927000 CVE-2023-29020,0,0,2a49e9f30066e93fdba914d2bb8fa0f11e6a43ca326e40530c27eaa91167b6f0,2024-11-21T07:56:24.500000 -CVE-2023-29022,0,0,85013377f8f3c5a555ac1af5ddde1ce6e20754afed474135db3e2de2153ff38c,2024-11-21T07:56:24.620000 +CVE-2023-29022,0,1,e66ea941b7e10386765faf64675274940ae480af5ddbfeb5226697a7889eae7d,2025-01-24T17:15:11.670000 CVE-2023-29023,0,0,c64c514f4e1f5a31c5c214b34efe883b6a34ac207496705f78d7ec08809e20cb,2024-11-21T07:56:24.763000 CVE-2023-29024,0,0,7c06025a9bab391c729156e49629d2916ef80c3f84c3e91b52d7a9e3f6d44c39,2024-11-21T07:56:24.893000 CVE-2023-29025,0,0,2be59035fd82225469e3059b819966fd8cb0982bccadc85ccf123f8d3df53bc6,2024-11-21T07:56:25.007000 -CVE-2023-29026,0,0,3f7165a3a55045b5b785417d0720c3104de15327d4c6c52e03db572a9e584c41,2024-11-21T07:56:25.120000 -CVE-2023-29027,0,0,8e0406191cc308d861a920d891e789f870e18d6c405f87eb53c1d855b8232b9d,2024-11-21T07:56:25.240000 -CVE-2023-29028,0,0,9f1d5ac10ee98e507f9b7db5c44ff779cdb28cfa9e07ebc6073f8c75ab9280cc,2024-11-21T07:56:25.360000 -CVE-2023-29029,0,0,36ad7bf236d04d24579454b1c9220d0225dbb6541bc5187c27270b76f2bdd89d,2024-11-21T07:56:25.480000 +CVE-2023-29026,0,1,b114387596b85621f04495942fb8a776a8c1d5339a35a81d08fbc514e328d2fe,2025-01-24T17:15:11.873000 +CVE-2023-29027,0,1,843d6f2b13c2354adddcbeb4ce851225c71df74e4a3c02cf918ac1bcfda70fb6,2025-01-24T17:15:12.077000 +CVE-2023-29028,0,1,138eda2990db7e4030f460e032ced1422a6cfbb5ad0c23b863a09020f8c197f4,2025-01-24T17:15:12.280000 +CVE-2023-29029,0,1,643828183084d0be4afc3eedc7dbea129e57b1f7f796bb4e5c6d8386a60395bd,2025-01-24T17:15:12.477000 CVE-2023-2903,0,0,9ba856a39b94381866d5413d1f09ca929280c6c11fb24ca23baeaf46b446d687,2024-11-21T07:59:32.067000 CVE-2023-29030,0,0,26b77e0fc62ed65c3e1141d3cf421cf74a3c2c419863014312219b7a9b96b8fb,2024-11-21T07:56:25.597000 CVE-2023-29031,0,0,7fe53f183d9ed3da1ecdfc1ed5672bbca9d1242a73ac8c88b5d9e3615331318d,2024-11-21T07:56:25.720000 @@ -222993,7 +222994,7 @@ CVE-2023-29388,0,0,b9d88f91ad2e793aacf5c8e6eccf028fea7b9c2660698f7be78bc69cb9046 CVE-2023-29389,0,0,c0a5bc2996fa100a5d1d4dbba184a794dfb7e1a165cf887f98ddec59042a381f,2024-11-21T07:56:59.087000 CVE-2023-2939,0,0,5097b0f3fd177e801415b54d7716f4683fb54c1157f3dcb9725b8d5f368e5323,2024-11-21T07:59:36.560000 CVE-2023-2940,0,0,7ad5423ee87e68f755e2cd74221edf5f886bdd506499833f9705f0fa2df479b6,2024-11-21T07:59:36.687000 -CVE-2023-29400,0,0,dea608444d68d5c5d1e530af9d1a8a44b7a086015c01eba61bbfe530a925c3f9,2024-12-13T14:15:19.623000 +CVE-2023-29400,0,1,1e44a659f313ac7ea2eae366c8b5a4f17b500bbe5c336da0915df4967f9eda4a,2025-01-24T17:15:12.747000 CVE-2023-29401,0,0,189d3900ddbcd7a2489925c125aba69107e9bb9c485eb99b6325e285251a68c9,2025-01-06T20:15:25.613000 CVE-2023-29402,0,0,a1ce29ca36e2d1afa1603edc7261a9f4ccc8426222c2732d9abfeb73f679ba58,2025-01-06T22:15:08.150000 CVE-2023-29403,0,0,5dd4e6e903a0bb525f274407e12a14583c7672c8b5f7195ea14caf14f928175e,2025-01-06T20:15:25.820000 @@ -223277,14 +223278,14 @@ CVE-2023-29802,0,0,1eb254eb69b96f7a1296ae9e7c3297f84acc11dd6acd6a3dc2b936c6a8a08 CVE-2023-29803,0,0,ee12973661cf31fcd1cca7248d9aae9e24d9e4b28b43bd296556c38847f1c3a4,2024-11-21T07:57:31.977000 CVE-2023-29804,0,0,ed3fbdbc16686992790c75a8a9dc18ab35383ed2351f6345fd5d7360c677e322,2024-11-21T07:57:32.117000 CVE-2023-29805,0,0,eab8f6c7a340db7effd1da4e68fd842071ac192aa93dc09c9185af7e7d598c51,2024-11-21T07:57:32.257000 -CVE-2023-29808,0,1,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000 -CVE-2023-29809,0,1,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000 +CVE-2023-29808,0,0,4b785c8755117024629672fd0053300c9be30727acd66fbd1146301239d1c1d5,2025-01-24T16:15:29.357000 +CVE-2023-29809,0,0,f2324c252c4e3b480546fe0c11564d7532207b0aa3e092380e867cca3e7d94ff,2025-01-24T16:15:29.680000 CVE-2023-2981,0,0,9fb4d1314e0567ac8aec055caebe6d7a58f037e10eefe707bba2b1061e47c270,2024-11-21T07:59:41.567000 CVE-2023-29815,0,0,b2eae5a9d28b68d854f53e61f1466bb75eb7be05b1159364fb38e6c41e10819f,2024-11-21T07:57:32.690000 -CVE-2023-29818,0,1,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000 -CVE-2023-29819,0,1,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000 +CVE-2023-29818,0,0,2e150953091693314133e4abcfacfde113a23cd4be7a162e0146616bfc82af3a,2025-01-24T16:15:29.943000 +CVE-2023-29819,0,0,42a3e498f4b71e6c349fc664a2c1989d31ee4f09c12e281cbe701df604c85826,2025-01-24T16:15:30.210000 CVE-2023-2982,0,0,8f7ccf530e35fb0c640011a15ad5fe3228bd641c44c701174542b27028f37cf4,2024-11-21T07:59:41.720000 -CVE-2023-29820,0,1,51f93390451451f65afce02a06a86e825aec64e5493f58b6321cc01a3852721c,2025-01-24T16:15:30.470000 +CVE-2023-29820,0,0,51f93390451451f65afce02a06a86e825aec64e5493f58b6321cc01a3852721c,2025-01-24T16:15:30.470000 CVE-2023-29824,0,0,85dedb7352f0727633aeaccc3e41069d9bd5b10e67735c58af0adb8a1e88f624,2024-11-21T07:57:33.280000 CVE-2023-29827,0,0,3e5479e873986015a998b7a860aff400de2c1d5169d2c547e9f9a859a0518a3d,2024-11-21T07:57:33.507000 CVE-2023-2983,0,0,bf27bf48a847d611eb833f14fa2aa7617e37685542c89701a1a81d2cb7aea60a,2024-11-21T07:59:41.843000 @@ -223363,7 +223364,7 @@ CVE-2023-29973,0,0,5d9ee80e86badd3f9db3dbfa1987e97512008502a69f06bef379036dc888d CVE-2023-29974,0,0,ddbcecfa997b6645a33f5ae1f43bd5460df6e86eec2a4de1694b2b486d1c9ddf,2024-11-21T07:57:42.783000 CVE-2023-29975,0,0,40720ee6d47d55a51706f124606d253d1ffa588cef9f156aa93ddba9fbd6c79d,2024-11-21T07:57:43.003000 CVE-2023-2998,0,0,1b6ce606c073f2f25d79f3f75e5e06457895c01800a04a3eca245ac3c767f43f,2024-11-21T07:59:43.453000 -CVE-2023-29983,0,1,ed99309646d76794ed687f7b700598e0017fad6201e28c194a1b81153669a24f,2025-01-24T16:15:30.773000 +CVE-2023-29983,0,0,ed99309646d76794ed687f7b700598e0017fad6201e28c194a1b81153669a24f,2025-01-24T16:15:30.773000 CVE-2023-29984,0,0,849d1d8bb8d1c82dd4465e18dc063bc7bb7d4f6685f858666cc49d05da57a8b5,2024-11-21T07:57:43.273000 CVE-2023-29985,0,0,b12310c1ee5bbdc1261f7a8ed5e13634d33dba6518ddef2866864286487694ec,2025-01-22T17:15:10.717000 CVE-2023-29986,0,0,c0a4da31bf6e6fcd318ed3581b7de177d3f4a8c74bca980aa70eef57c49d0ccc,2024-11-21T07:57:43.767000 @@ -223425,7 +223426,7 @@ CVE-2023-30123,0,0,835c58c9d607f19b1792968c8a910c4fe7fff5d09df3ae6ed77890887498e CVE-2023-30124,0,0,f6d6551541f17153a38fa0c2056b81805b77294c78e3ebdf6e8a039b5b0025e3,2025-01-23T20:15:27.850000 CVE-2023-30125,0,0,ddfbbcc2295c6563d91cd153a8cffb73381935c4f3636f46ef8f6367ce01a373,2024-11-21T07:59:49.257000 CVE-2023-3013,0,0,509acd34da124c1d7d9ccb7ed0713e0819213ff1b5d2ad46c88df5b81dbc0538,2024-11-21T08:16:14.467000 -CVE-2023-30130,0,1,120c6c222af6aa498067e68b2ffbe727b1a681831533898f9c85373164a5a3c7,2025-01-24T16:15:32.220000 +CVE-2023-30130,0,0,120c6c222af6aa498067e68b2ffbe727b1a681831533898f9c85373164a5a3c7,2025-01-24T16:15:32.220000 CVE-2023-30131,0,0,e098ad323162eb9e1d490a7a0316cb94f586f4d29ed0e78d4772fb619fbcda35,2024-11-21T07:59:49.547000 CVE-2023-30132,0,0,09a73d51f7875d392cb17e57f19213861472198646bd9982466cd1784a4881ea,2024-11-21T07:59:49.727000 CVE-2023-30135,0,0,28029c0c876039a2ea19d0259bbc275264b5b7a69c9301bd02b9aa38cead5fb2,2024-11-21T07:59:49.877000 @@ -223482,7 +223483,7 @@ CVE-2023-3024,0,0,42e16d8797666cef7c2a7af6337cf55918463e43391c3789ce8d44b34ac18f CVE-2023-30242,0,0,8baf24c44e63d1d69a6b0e1808b413624bf1c2f7ebe52100423b7d370d1b23ed,2024-11-21T07:59:55.833000 CVE-2023-30243,0,0,cdd46154297eae24fd51e167aa0472371f4219ce774c3c7239994abd7252160a,2024-11-21T07:59:55.980000 CVE-2023-30245,0,0,a964180dc5b6ec566c747fe0ba5220ac10fc7a3fffcac9a0879e4ba7b66689a8,2025-01-23T19:15:09.430000 -CVE-2023-30246,0,1,6dbb071f5e59c28eb4fadaf8cc46d1b6e0a4cacf509deac2c8135d3934a98362,2025-01-24T16:15:32.490000 +CVE-2023-30246,0,0,6dbb071f5e59c28eb4fadaf8cc46d1b6e0a4cacf509deac2c8135d3934a98362,2025-01-24T16:15:32.490000 CVE-2023-30247,0,0,903b7ad5843b2662c72b6532d3f837f2c30e6290bedd17cd01ed26c5389753f9,2024-11-21T07:59:56.410000 CVE-2023-3025,0,0,c446eec5a9db9b12bf1ed2b6e31a26a68cf8f29bc31a0a6681096b8631efaa39,2024-11-21T08:16:16.200000 CVE-2023-30253,0,0,75d2b84f9e9ecd963fdf5317e18b495d544993e124b5902f9ae167bc369b8b60,2025-01-14T17:15:11.487000 @@ -224234,7 +224235,7 @@ CVE-2023-31142,0,0,33067fdc6e10ff5f427c740824ff469ddce2b92b370b26eaf75d5d731d105 CVE-2023-31143,0,0,2638c7f79b5695c01ebe57354879379e7491ecc43d556a05b2051cd682ec1201,2024-11-21T08:01:28.940000 CVE-2023-31144,0,0,aefd10799d469e9493d0436033ef241396b6eb54f10b7a272814c265ede47981,2024-11-21T08:01:29.060000 CVE-2023-31145,0,0,b16492c0519f8c2fb3aae24cf21c34f88419a9f1b541df13b15a193744e29572,2024-11-21T08:01:29.183000 -CVE-2023-31146,0,1,ddea7ce0de4933e85188d8a3462304d8882216c76444e632582120b7101e997b,2025-01-24T16:15:32.803000 +CVE-2023-31146,0,0,ddea7ce0de4933e85188d8a3462304d8882216c76444e632582120b7101e997b,2025-01-24T16:15:32.803000 CVE-2023-31147,0,0,a85d6b27d5b28162209a154f893b6c9b0bdd5c2b97f32d7e1172a1b844e63736,2024-11-21T08:01:29.420000 CVE-2023-31148,0,0,6ba3950b9b92acae697445dc0ade4cc571b4b156687ce466cb9786eb2249f2a2,2024-11-21T08:01:29.547000 CVE-2023-31149,0,0,6b528c4781f1131663b6a823e21897aa43b0e7160cebc7114ce0c62f0de6da84,2024-11-21T08:01:29.710000 @@ -224544,12 +224545,12 @@ CVE-2023-31613,0,0,dc3bc24966fcb2f8b19ed3778b36b32d0e22aaaacc0ef0b444c0a986eb49f CVE-2023-31614,0,0,cac7870b524a6213f4456b450f01d98b860768ae9c8129fe5dc1d12e5b99ad73,2024-11-21T08:02:05.280000 CVE-2023-31615,0,0,febe50b4026c3ea138f24df1a3698d981043d9580285e2632bfa571eb671d727,2024-11-21T08:02:05.430000 CVE-2023-31616,0,0,ca90d2794d3bc5f0fa73e79c853d40712773f874d9a3d547424a158b18c588a3,2025-01-23T20:15:28.237000 -CVE-2023-31617,0,0,75d9dd79575ac8f28eb9201284a3f5e0ae81b07e30f1b178c2044ead3e2db45b,2024-11-21T08:02:05.710000 -CVE-2023-31618,0,0,17a85dd4b503cf0ee5b6f3d961c3c014ad7924ae5d1d84f5ffb3088162338cd5,2024-11-21T08:02:05.847000 -CVE-2023-31619,0,0,1989305e97d99faf58d6c74725a0f7878cfd96344011a42da35e35f910f0de6c,2024-11-21T08:02:05.980000 +CVE-2023-31617,0,1,5bf96898d5156077c55068ebeba29f15ccd9f29832abf7f06adbac536987a4f9,2025-01-24T17:15:13.593000 +CVE-2023-31618,0,1,161cd99f3e19d37b29ee4734c9a141582307f130ef057994e00b167062cc61f5,2025-01-24T17:15:13.817000 +CVE-2023-31619,0,1,1a460e436291c41f6edcda0474673dd598dcbf4e7d6560a964f39c8869010ca9,2025-01-24T17:15:14.007000 CVE-2023-3162,0,0,93f3ff20815ae3e12b6e1e87ebab4b734c329261c3fc1a22caf2ae8bad17d55b,2024-11-21T08:16:35.813000 -CVE-2023-31620,0,1,2c889dbd711ab948387f355f21dcf0e288fb9b8b250f5b6e8fa6c945ff1f20d3,2025-01-24T15:15:10.067000 -CVE-2023-31621,0,1,6d538cd26d4e963121721fdf4267e59ce563fb20354bcd190cf29f37f327e6c9,2025-01-24T15:15:10.273000 +CVE-2023-31620,0,0,2c889dbd711ab948387f355f21dcf0e288fb9b8b250f5b6e8fa6c945ff1f20d3,2025-01-24T15:15:10.067000 +CVE-2023-31621,0,0,6d538cd26d4e963121721fdf4267e59ce563fb20354bcd190cf29f37f327e6c9,2025-01-24T15:15:10.273000 CVE-2023-31622,0,0,6d3ee00752dab7888b5ef240c40e307113fb0e412de484db6d50d599629e9713,2025-01-23T22:15:11.817000 CVE-2023-31623,0,0,03592b0827424f5114a0d73dd38792e305e4e6b2ddd9e78d0778e663e72266bd,2025-01-23T21:15:10.520000 CVE-2023-31624,0,0,cae621723b9750b87aa4d5000c7779c52d24ea1456275041959a50c0c9659878,2025-01-23T21:15:10.720000 @@ -224693,13 +224694,13 @@ CVE-2023-3191,0,0,6d5b8163594269d541d9b945b744164903108dc6d9fb58a1266c95089a1b35 CVE-2023-31910,0,0,2972f57939109c9c1176101cd18f38750de45e0e257675e8f82afa08e2633400,2024-11-21T08:02:22.953000 CVE-2023-31913,0,0,4af7eef241b808ebe2dc23e1dc5068efdfeb48aa3da79d419517e79271e44131,2024-11-21T08:02:23.093000 CVE-2023-31914,0,0,86ae2a3a565226dd65e7f976141eb00bfb2dcc3616da6175e87a4ad43b968dce,2024-11-21T08:02:23.230000 -CVE-2023-31916,0,0,fbf6f69f7a900c147d3e8aa516a0f5061de70d38760e4be1320b53a2c933ed61,2024-11-21T08:02:23.360000 +CVE-2023-31916,0,1,b2ba581a50a8b818d1f24ebba35e6212bc03e423016659d3acf4da3cd3b0f54d,2025-01-24T17:15:14.200000 CVE-2023-31918,0,0,26d31462eec110bc0ea4d7b38a27204e297550e7e2ee2c74879290079d6ab345,2024-11-21T08:02:23.490000 CVE-2023-31919,0,0,5c290c97b9b9ec7ec4920d5807b11e284892926ed7c3d8e701e7620a8bb4f1cd,2024-11-21T08:02:23.620000 CVE-2023-3192,0,0,67f6792a55f68a187470b1e218d44e4e8e7549ccaf6c276bb4bb2dd84a9f0b2f,2024-11-21T08:16:39.850000 -CVE-2023-31920,0,1,d49a53c9c78aa04ab2e0f30e554cd510e77c1ff4b3883954eb91c13fa642891f,2025-01-24T16:15:33.003000 -CVE-2023-31921,0,1,cd627c5ee00b8d4c5e43df4d7636a4f1a58f57db000cbc18f8d30097b1567801,2025-01-24T16:15:33.267000 -CVE-2023-31922,0,1,179aaa78aeb2482dd9a931b29484603a17cd110d143d490d4d0f1d7eb31b03b8,2025-01-24T16:15:33.490000 +CVE-2023-31920,0,0,d49a53c9c78aa04ab2e0f30e554cd510e77c1ff4b3883954eb91c13fa642891f,2025-01-24T16:15:33.003000 +CVE-2023-31921,0,0,cd627c5ee00b8d4c5e43df4d7636a4f1a58f57db000cbc18f8d30097b1567801,2025-01-24T16:15:33.267000 +CVE-2023-31922,0,0,179aaa78aeb2482dd9a931b29484603a17cd110d143d490d4d0f1d7eb31b03b8,2025-01-24T16:15:33.490000 CVE-2023-31923,0,0,59fe50f283e4deac6570c3b41017e54c5113cebda3938e940b39c843e8251edd,2024-11-21T08:02:24.183000 CVE-2023-31925,0,0,02b550c7a751f4def6076f92f5dd28a5d9df4a50deb8b72ad1650fb3add8e2b0,2024-11-21T08:02:24.340000 CVE-2023-31926,0,0,6a7438cae3f0bf677e4b98748d244df1e2362cb69938bab18061fac53cb4b799,2024-11-21T08:02:24.460000 @@ -224733,8 +224734,8 @@ CVE-2023-31979,0,0,d300b44c03bc1c129975cbc0d8f58f0c399ebe733b11f42ec3f8f064dd4e0 CVE-2023-3198,0,0,515e3ed81d0edcf31d10aa5b94b3e10f747e5dbb4ce6303dd1e49d134c7cf2c9,2024-11-21T08:16:40.660000 CVE-2023-31981,0,0,666b12d5370a553f075d14d658af721536fc52e7bd665f1afa358898f4b1824f,2024-11-21T08:02:28.057000 CVE-2023-31982,0,0,011d00f032ef74457029adb163552b051e0086f751339ba3019b8b9f9b887d5c,2024-11-21T08:02:28.193000 -CVE-2023-31983,0,1,4efee5b350d93dfdc4cbfa54d890ec60308fe93855ac908b64e93cedc1b42ef4,2025-01-24T16:15:33.787000 -CVE-2023-31985,0,1,8651d59591b6d83f709711685ce799ddf56471be269aa9f26e57da8fd2cfafe2,2025-01-24T16:15:34.033000 +CVE-2023-31983,0,0,4efee5b350d93dfdc4cbfa54d890ec60308fe93855ac908b64e93cedc1b42ef4,2025-01-24T16:15:33.787000 +CVE-2023-31985,0,0,8651d59591b6d83f709711685ce799ddf56471be269aa9f26e57da8fd2cfafe2,2025-01-24T16:15:34.033000 CVE-2023-31986,0,0,a86388d12941ca26b2d9e93a6377a46e4cc009c4dc5a8370e0cdf32ce5e6b976,2025-01-23T20:15:29.883000 CVE-2023-3199,0,0,3090d868ba2232b79a6345d288a327f64a94c462d32135357515a4c0d92e958f,2024-11-21T08:16:40.807000 CVE-2023-31994,0,0,f52d122711ee0b067c08e1d09861ac42925c6e7f35be5acf7e4bdc9abaee5571,2025-01-17T17:15:09.097000 @@ -224804,7 +224805,7 @@ CVE-2023-32054,0,0,43f8a478b0cf21abf197ad3f98e1ede0d9dc9fb99f9bb0ffb66bf18dc5003 CVE-2023-32055,0,0,b108e9b579e96e99031370531d8ff900b3636fa0852d0cafd06a706bedfd6bb1,2024-11-21T08:02:37.347000 CVE-2023-32056,0,0,77fc61836a442c4a874042832c90313a78519587674b7788c06635f79aedc787,2024-11-21T08:02:37.493000 CVE-2023-32057,0,0,b876159d1a65a9365a9327fdb6ef4e8a575020a76d0220e7843e508aedff8e36,2024-11-21T08:02:37.617000 -CVE-2023-32058,0,1,789e3b94446572ab2a285fa05ea7fd78ae8544e9ea5130c19f1905ea8f4962ff,2025-01-24T16:15:34.267000 +CVE-2023-32058,0,0,789e3b94446572ab2a285fa05ea7fd78ae8544e9ea5130c19f1905ea8f4962ff,2025-01-24T16:15:34.267000 CVE-2023-32059,0,0,e512bcf8cb4bed5136ca7ce0eff2b0eef46022c2ecb32ed7149e920c3827b07c,2024-11-21T08:02:37.893000 CVE-2023-3206,0,0,7acd6ec61ef74b27192653cb468faadf9b045770661206ef36d1b65ac66d72df,2024-11-21T08:16:41.793000 CVE-2023-32060,0,0,f66ca288fc55d36e8d6dd2f6811e89a1e52aeb1e3d1406c030fa40256315994f,2024-11-21T08:02:38.003000 @@ -231031,7 +231032,7 @@ CVE-2023-39987,0,0,ec7b27858488ad489b9493d29969ba367ac6668558c5ffac734951051d609 CVE-2023-39988,0,0,402c42ea155cdcf9f869ed39cfb2bbf84c23e49800ae97d41b93e428e0ea4bde,2024-11-21T08:16:11.510000 CVE-2023-39989,0,0,726f571ee9bcf5dc47f2c24a51abc27b099f3763e764b9376d48d987eb90930d,2024-11-21T08:16:11.640000 CVE-2023-3999,0,0,e82adc70575076927945c28ec9abdcb884177ca58c4faef374d14bbf4ef780e1,2024-11-21T08:18:29.967000 -CVE-2023-39990,0,1,296393bd9a9a899690d56e0def8c6c30a2634233a34c3af77d7d07a4fa774f89,2025-01-24T16:08:44.243000 +CVE-2023-39990,0,0,296393bd9a9a899690d56e0def8c6c30a2634233a34c3af77d7d07a4fa774f89,2025-01-24T16:08:44.243000 CVE-2023-39991,0,0,74a383be9c4ebbeb72cb131d996b41f84dd1c8560e8c672b2e4694a32709fa2f,2024-11-21T08:16:11.923000 CVE-2023-39992,0,0,7ee9edbf56e39b17fe5662eaa21a6513fdaf7509e9723465071698fc41ff63a9,2024-11-21T08:16:12.073000 CVE-2023-39993,0,0,19bd25bb54abc9b1368859dc49e312bb28d2c35700f33dfb536d772530b61a4a,2024-11-21T08:16:12.203000 @@ -243573,7 +243574,7 @@ CVE-2024-10308,0,0,7d25344eaafedd87dec065a0c2fdf72a371424d31caf12f177490522cd87b CVE-2024-1031,0,0,3efe13ab8e8ca0afb2b2c16acf09e60475f45cbc86bc8540948b9d2e079bf4c2,2024-11-21T08:49:38.437000 CVE-2024-10310,0,0,9ff9c4ae788e99e7944a2ba13b3b5ac1a4941438452794ec0f6f96d02747c9be,2024-11-04T13:06:20.190000 CVE-2024-10311,0,0,99dd0a164fd5d198ec222660ccc9d29dd982dc019194a41db7c03f5195e8b984,2024-11-19T17:03:19.177000 -CVE-2024-10312,0,1,b39994a00b367a3cf6aa78e100276be7193fa2e7a390416f516ca912cdaaafee,2025-01-24T16:38:39.150000 +CVE-2024-10312,0,0,b39994a00b367a3cf6aa78e100276be7193fa2e7a390416f516ca912cdaaafee,2025-01-24T16:38:39.150000 CVE-2024-10313,0,0,8e51257a51d56a046cfe59a44fff727a9a10aea7b003f94d7090952f3eb5e764,2024-10-25T12:56:07.750000 CVE-2024-10314,0,0,f90831d51418d5b65f2e88d951f8cb1edd87a709639989f7c510f0aa8ecf0f49,2024-11-21T08:48:23.997000 CVE-2024-10315,0,0,97fe7043360404cd1fec656a00df0c2acadd9a6f0adabddf28ee8ca2d6ef024d,2024-11-18T22:15:05.550000 @@ -245710,7 +245711,7 @@ CVE-2024-12867,0,0,732c7583e9efa2618fe2f4098930414e7eb5e8b8eea2432950087191a298a CVE-2024-1287,0,0,86cfcf8ed68830eef8991c1cc47e2012e7e4c97ca8a27598ab8fa2741ba6d8b0,2024-11-21T08:50:14.227000 CVE-2024-12875,0,0,65f6ca3bff49bc2fd9ea644c89d99467e02d0f3d3859a576808fcf00ae63e813,2024-12-21T12:15:20.910000 CVE-2024-12877,0,0,a9e389a679e420f1b0a9a06268a68a8b0a86295a1a7eef4bfea3f46105e61e67,2025-01-11T08:15:26.127000 -CVE-2024-12879,0,0,57083a3f6b19f960c5e6f66e3a8040b1e0d47d960959f1d84a67c3110648ff15,2025-01-22T06:15:12.950000 +CVE-2024-12879,0,1,a421a5e4db3a04db3d207087595051348d7d155e9057f63ac7b875e4bac6c451,2025-01-24T18:07:31.260000 CVE-2024-1288,0,0,395f2de724425f73212a7bc39e91c09ee4289c7b4882341dd1ed370b6c884fd8,2024-11-21T08:50:14.440000 CVE-2024-12881,0,0,ca1a79d9bb91f6e4db066c4e6e2534703ac042b68f8ca082fdad0b99821d0028,2024-12-24T10:15:06.240000 CVE-2024-12883,0,0,0dccbc52a4dfe90cc951e45cce63bd7a8971973694371765a4b4ec10fba99d5e,2025-01-10T21:24:53.957000 @@ -245889,7 +245890,7 @@ CVE-2024-13083,0,0,a00551ba6e0cadbeb1b3f766f7f6ef5748853bc6fcbf1ce2f64d620d72471 CVE-2024-13084,0,0,d00934445b6245a2d7a1c922e54582011935a722283aea79975605354cc8b9da,2025-01-06T14:44:57.910000 CVE-2024-13085,0,0,d0eb71970e4340c9d521cd6295f0e2badb4028ac6e8c3353ab1951da5ac33a1b,2025-01-06T14:43:13.437000 CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000 -CVE-2024-13091,0,0,79325e85c05eaa7e559055e506d573e237b6616f4295772ccd163a3dacd63ce7,2025-01-22T00:15:15.810000 +CVE-2024-13091,0,1,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000 CVE-2024-13092,0,0,8a150593dbe1f180e29b1c2e3ea75cd720a3d6f50bb74cd3f244a3b1730f66a4,2025-01-06T21:15:14.273000 CVE-2024-13093,0,0,efaf6e963b0d924999f6d8167a81917175f763e9f833fbf291aa1961a6ad2e71,2025-01-06T21:15:14.427000 CVE-2024-1310,0,0,8eacc1832dc63ed57a42c33584abbb481a62a43a07e6f25f2b4df813accea989,2024-11-21T08:50:17.717000 @@ -246088,8 +246089,8 @@ CVE-2024-13351,0,0,7985eca9113b0e4ff9b5606ce71f06a97acfce6eac97b8c91847c6875b508 CVE-2024-13354,0,0,5de8a07beb3503362800c3c9a7e68d19454bfcd982cb7525cd68c521c68ce55c,2025-01-24T11:15:08.887000 CVE-2024-13355,0,0,b14926ff025e929de229a84af4734d711f0473d16ba82bc6498a7b20173af029,2025-01-16T10:15:08.750000 CVE-2024-1336,0,0,5ac217bb74b5afa6bf4a3181b1971e5eb197bf861678b67cc85953b7d0e71d82,2024-12-31T16:51:04.857000 -CVE-2024-13360,0,0,5a15ef95fa1b26b2a57df638110d6053fea7114725bb264e3e1cf4fc5a68b6b1,2025-01-22T08:15:08.683000 -CVE-2024-13361,0,0,3c631c1f596c92f56b1d110c92acbdf975dd0cf1ca4651f148400f0fa2b1bea9,2025-01-22T08:15:08.843000 +CVE-2024-13360,0,1,42c7ef7264873842b1b321dcb1d9eb02287e4b9dd082710569d0b72683473221,2025-01-24T18:58:46.177000 +CVE-2024-13361,0,1,796ae81aa903e35e91be1aa59cd637cc5eee53bc205bb2f1ae10309102da0980,2025-01-24T18:55:22.577000 CVE-2024-13366,0,0,4b12bd5212b118d30ff048db445e6d1c00e6cad223533401dbdc6a341b0a882c,2025-01-17T07:15:26.947000 CVE-2024-13367,0,0,28bc518effbeac20d5854322c01ceb858440caae6a5bae49591369a0a18ef4cb,2025-01-17T07:15:27.123000 CVE-2024-1337,0,0,ecd9569d803b0ad7e93765437336dbe54b6bca900bd0d8d6a4265ae95a2bd0fa,2024-11-21T08:50:21.857000 @@ -246116,7 +246117,7 @@ CVE-2024-13409,0,0,9a9934c96e1b3b594722c2aa6970db5452530e9596d366c39c81c530d063b CVE-2024-1341,0,0,090bf84c5ce2b0dfeca3a04f998237d36add49409b51be286587af2f8364beb8,2024-11-21T08:50:22.300000 CVE-2024-1342,0,0,2f41e6eac1e33a309fc72543d371a67df7cdf22eae12449849cd3aab8e438d93,2024-10-14T22:15:03.180000 CVE-2024-13422,0,0,e3ad66da42c2798d7caf436789cf96956e806fa00807b0554cd9b7f915a2326a,2025-01-23T12:15:28.163000 -CVE-2024-13426,0,0,ca26adc038606c0d17de30f213ba8a6e9e80443de40a7686c6aa3edda3908eec,2025-01-22T03:15:07.370000 +CVE-2024-13426,0,1,86fab2a47173ecbfa78b3dbc75ac72da294fc64d34b2b04366fafee0f3e9a13d,2025-01-24T18:37:38.503000 CVE-2024-1343,0,0,7c2447499342d3573955d9e9545316db90429adf3b266826e2ed2754189f075e,2024-11-21T08:50:22.433000 CVE-2024-13432,0,0,7d75f67ac18cf32d5dc44570eb7cf156c877d943529d3637d5b0bb399b86a599,2025-01-18T07:15:08.983000 CVE-2024-13433,0,0,b744d44080e2e33c41984f231e71d8cc1252181c511f568444c5c86671c3eb05,2025-01-18T07:15:09.160000 @@ -246155,9 +246156,9 @@ CVE-2024-1357,0,0,25eaf5b978f8da82b4d3e5ed8aa890834adc21c061c9c9c169613a72fe6996 CVE-2024-13572,0,0,810ff57abb3e74e570a0f4342646c85283702b45afe741301e2f9c7354adbef4,2025-01-24T11:15:09.520000 CVE-2024-1358,0,0,c4ea31b36cfcd7f75873d740d9e38ca70692f76dad02370c8ddbe488b8025229,2025-01-17T19:52:41.687000 CVE-2024-13583,0,0,0b9f6e50f40d8666926a0b56850821d9e08e6198a49b3d6cb41e84991c2caf40,2025-01-24T10:15:07.770000 -CVE-2024-13584,0,0,51a2a8790b306bf6f14abd867916b8a12305829a5bd93ce1ee2660a9c0414149,2025-01-22T04:15:06.907000 +CVE-2024-13584,0,1,ee87f1c36c9c93255b87e8f2b16900d4e175847a31f3c291ef2046e604a7f364,2025-01-24T18:20:40.760000 CVE-2024-1359,0,0,8114a50ae134a93430da828655ce595d1020af44415effc85b05f4f190881d3c,2024-11-21T08:50:24.543000 -CVE-2024-13590,0,0,e744f6d4395f4b003bd865fd245dc1ce88f3f6497b82dad9a2ff5ecb2f4434d5,2025-01-22T04:15:07.083000 +CVE-2024-13590,0,1,aa6f52a963149ee514cd80b7b2a6b7948bff891700d00f428940ffd85b0107d7,2025-01-24T18:09:26.147000 CVE-2024-13593,0,0,9e6eeaf6317d0d53a5777da60336a0df45a0567c61ee5316375bb6592e2f9ab4,2025-01-23T10:15:07.737000 CVE-2024-13594,0,0,b89d92c59d6589291d5b3e44e449a8d8620a2bd20dcfac4fc41ec59549c64cba,2025-01-24T11:15:09.667000 CVE-2024-1360,0,0,a87675d91847a9b72ed5368695c7c67c099276d1667e5e94dc544f268946892c,2024-11-21T08:50:24.707000 @@ -246173,7 +246174,7 @@ CVE-2024-1368,0,0,e78cd290aff3eda879ea71814281e9fb9dbaef60630fac7d18ff14dae3d223 CVE-2024-13680,0,0,62173e4be535780cad87d71db6bb29f755aeab9483d96845d17c346a119fa175,2025-01-24T07:15:06.930000 CVE-2024-13683,0,0,fb57f44e8b2d58d524faa1dd2ea3874f278594c1d56e7f409ae90b680d7e79aa,2025-01-24T07:15:08.523000 CVE-2024-1369,0,0,6f4848b431d59906fc570cd21627f350db35226c120e93c5a8a911f55c4de4fa,2024-11-21T08:50:25.857000 -CVE-2024-13698,1,1,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000 +CVE-2024-13698,0,0,dc17e4312525981bb14f68ea913383417af07334780551d0e9684f2f5489da45,2025-01-24T16:15:34.597000 CVE-2024-1370,0,0,9f0498253935aff35f1be521427ae96ebc633e827d9cc62afad8ecd6626aa44f,2024-11-21T08:50:26.027000 CVE-2024-1371,0,0,700f360c37065b466d7daf295c0b566055365a6732e2b4756cd7fe3bd3dfd8e6,2024-11-21T08:50:26.150000 CVE-2024-1372,0,0,ba2b445471fec156b955b505675756eb0a79c6540c94f30d84a8242b3e912ff8,2024-11-21T08:50:26.277000 @@ -246394,7 +246395,7 @@ CVE-2024-1599,0,0,105f658bdb5d4f55673b9a4a91d4766e7759683398ba430d2b081d80ef821d CVE-2024-1600,0,0,10ef0d97da1af05e4452c1d5b85c6b86d92a91f8e5aeffb132a19cd0ecdd104f,2024-11-21T08:50:55.133000 CVE-2024-1601,0,0,144a783d83759d1f22b634484b2bbef03f531a52b9217df0a5759fb08e47b78c,2024-11-21T08:50:55.263000 CVE-2024-1602,0,0,56ecc218dd37ad215a177db8079488241e64c43dc3bae7eec42fdf1bdb84777a,2024-11-21T08:50:55.387000 -CVE-2024-1603,0,0,46fcdb6371ceb421e4df395c252c5539adfadf7172ade240a8ef676f98c6758a,2024-11-21T08:50:55.507000 +CVE-2024-1603,0,1,40e9d93a18e24bfe0aaa466babdd862b8c37692838e40cbdcde8e0e815d795d8,2025-01-24T18:22:44.423000 CVE-2024-1604,0,0,7ac9103a08c9e9dd04004b4e7466052243f63c72b367568e72784f5a0bc1202e,2024-11-21T08:50:55.637000 CVE-2024-1605,0,0,9d25139cf22609654ef8a455d8d21cdf06e67cf1e19359d09ce5b9576dd7793f,2024-11-21T08:50:55.790000 CVE-2024-1606,0,0,98f100f836fcdef4d873587f10566a7e89908cb420114440541bb054f23516db,2024-11-21T08:50:55.920000 @@ -246414,7 +246415,7 @@ CVE-2024-1629,0,0,c74dc0a8115d571151dcc08903e06d82eae076a5e9551b744e94ddebd2daf4 CVE-2024-1630,0,0,9b1d75e935e3c43047021c7db741b2a5e1070d9e69f1d2a3037779c882a9deac,2024-11-21T08:50:57.613000 CVE-2024-1631,0,0,e9e6578f8c2841fcf55accc66d2d8ed4ff49074482673094d89548de7e2bc4e7,2024-11-21T08:50:57.763000 CVE-2024-1632,0,0,2cc9b424d1e45f344508e96412d6a0780302c60e8fef2d13cc2533af910269a7,2024-12-16T21:04:13.760000 -CVE-2024-1633,0,1,56d60136a7442b514c5e6b403331b5f9aef17563c47e24eae33412d5bd81684c,2025-01-24T15:21:06.727000 +CVE-2024-1633,0,0,56d60136a7442b514c5e6b403331b5f9aef17563c47e24eae33412d5bd81684c,2025-01-24T15:21:06.727000 CVE-2024-1634,0,0,45305cb187d566717a04251929f56eb3faac05db3d2b4efc70507b416ff13ab0,2024-11-21T08:50:58.150000 CVE-2024-1635,0,0,720ee7466ccef3685a076ad1a7c9e622aa00228f478532297557f856d0d14af9,2024-11-21T08:50:58.290000 CVE-2024-1636,0,0,39caa7ca41ae1683c62ffcaad59925dff9e09968a84b20eec7448789c4ba6505,2024-12-16T21:05:49.493000 @@ -249714,7 +249715,7 @@ CVE-2024-23603,0,0,385cd1da19f9f814b37d46a252792eece53dc5fba36c8bad0a0244cf15993 CVE-2024-23604,0,0,dc5cd839af33b7b3dcb48b002d81e48ae97043185456c58e26e0040b5dd4ee1e,2024-11-21T08:57:59.313000 CVE-2024-23605,0,0,6feaaf8078973106d62b89fd77d8350c669a4c873ff6f3514aa9598da39c9a5e,2024-11-21T08:57:59.433000 CVE-2024-23606,0,0,bab8065b9d3fb9f309eec8177d382348fc7f7d5cfbe3e357e07d9b91afce2e37,2025-01-22T14:58:56.600000 -CVE-2024-23607,0,1,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 +CVE-2024-23607,0,0,3fec5058d10d6cf455674d1c6284bb37392a28907ec5aace1fd1b3a1426cb5d1,2025-01-24T16:03:56.080000 CVE-2024-23608,0,0,f4f0d3dc90613d42fc8485a3197c71394b07fbc0df27981f4d6ad3675d04a364,2024-11-21T08:57:59.797000 CVE-2024-23609,0,0,b90f833366370fe43c05814eb1526887e7cb7b82ee5ea7a039ba9de77d7a868d,2024-11-21T08:57:59.930000 CVE-2024-2361,0,0,cdeca1550c32896fb6fcfb15aca13512200106e857f7cb5e97a4410236124f83,2024-11-21T09:09:35.667000 @@ -250263,8 +250264,8 @@ CVE-2024-24423,0,0,ddea1df30dfa7ce209949db87ba3322324bc4b2ab5b0764768258bd83bb95 CVE-2024-24424,0,0,512c38d36e5aa9c9f79f68e96ae95b4f93b2be8c28966f0070415d2ad484813e,2025-01-23T16:15:35.453000 CVE-2024-24425,0,0,f020647313a266e9b26d920d7b3ff0c5a70298ceb4b38f72086ac27d496b3748,2024-11-19T17:35:09.450000 CVE-2024-24426,0,0,1ba202c66d22ec01d9165c4229044ba2d8de45fa575e097063ba053bd7d0b3a7,2024-12-03T17:15:09.400000 -CVE-2024-24427,0,0,4a20ea605354325727ed25b8fb6efa9b7e64dfee29559ee0d209dd193c88e98b,2025-01-23T19:15:10.160000 -CVE-2024-24428,0,0,2a83892a232f940f91755b3cebde84aa3f51d2584a1449da0854d2a326e542c0,2025-01-23T19:15:10.347000 +CVE-2024-24427,0,1,9f4db1e25b8a6f9f095e87c0819d91e392c3303a0ffc4e643040fa19913b74d5,2025-01-24T18:47:28.570000 +CVE-2024-24428,0,1,ef5d1f3e1c76dfbbcd121548afdf85c644e4be29902773b535f47eb5dabf7d2f,2025-01-24T18:44:26.897000 CVE-2024-24429,0,0,4ab29af21421fe9731a30a80f100729ff3757ff97b28d5817033562018b538d4,2025-01-22T16:15:28.907000 CVE-2024-2443,0,0,1bdda57280ff24c7755bfc385c8c5e030e460e899c6d0c2078c3b0acbbc8fb06,2024-11-21T09:09:45.827000 CVE-2024-24430,0,0,bbeb452d0a78e4023881f525a04de9114ebaa1d6a1e4c74130e66ee8c8539e7c,2025-01-23T18:15:29.850000 @@ -250652,7 +250653,7 @@ CVE-2024-2496,0,0,051579418359f85bbcda93fbe22a82cdbe6432c139ab0c0ffad8ae83e4581f CVE-2024-24962,0,0,1cebc93e4d6c3df34e57cb9df2964db84f2563e9a4c0bd93e3ff40e70b58c267,2024-11-21T09:00:03.243000 CVE-2024-24963,0,0,f9ad2b45a0d9754f789fd77f11d0d6bd197c6b1494b09d688edc3d878ec75bf1,2024-11-21T09:00:03.350000 CVE-2024-24964,0,0,f2f90e1f53bc2e9057a1ed570baa4ea348ebae1fccc952c0417838ff4dd829be,2024-11-21T09:00:03.480000 -CVE-2024-24966,0,1,7f40249452ab29b78281e89da3b43963bc92b9dafe5558c0305b23f778ea8514,2025-01-24T16:03:35.577000 +CVE-2024-24966,0,0,7f40249452ab29b78281e89da3b43963bc92b9dafe5558c0305b23f778ea8514,2025-01-24T16:03:35.577000 CVE-2024-24968,0,0,400e490118c16083e36fd26c85d27bd24dddeb131874caab82b3947794aa5942,2024-09-16T18:03:16.707000 CVE-2024-2497,0,0,9d5b12a04696101a720d6a6eac03c4a25093d05e266f607e067ae28b468c6315,2024-11-21T09:09:53.157000 CVE-2024-24970,0,0,d539881e528c227f4316b7df6b7900424bfa37663985a5801663f38c22e74e22,2024-11-21T09:00:03.857000 @@ -250670,9 +250671,9 @@ CVE-2024-24984,0,0,567c9bd096a581925e3572e03ea5eeb0f022b51699fa71ede6b70b03cbba4 CVE-2024-24985,0,0,094cf98cc2834beed20248e4007d784f8f54307826d7d129d410921b97d6ed81,2024-11-15T14:00:09.720000 CVE-2024-24986,0,0,b3a0aebd140b4a87042d6dd637f5da69c8a05632aba7bbfe41c00120f8cc0218,2024-09-06T20:23:48.690000 CVE-2024-24988,0,0,74b8e9b9bae0b532768d5857c0d83160975e281bd61a0e187400101505fbc03f,2025-01-10T15:38:05.187000 -CVE-2024-24989,0,1,f047be98a40360e6029f683752a6eb630adb3ff7c0f90a26caacf979b129e4eb,2025-01-24T16:02:33.600000 +CVE-2024-24989,0,0,f047be98a40360e6029f683752a6eb630adb3ff7c0f90a26caacf979b129e4eb,2025-01-24T16:02:33.600000 CVE-2024-2499,0,0,58df8167ded63ef11aaf8fbfc99b0704fcf662a903d318b087b95eac1c8b0467,2024-11-21T09:09:53.297000 -CVE-2024-24990,0,1,d17c58908f77733e52782cecb6917383244c4086dd34cba8e966554b94ce38ed,2025-01-24T16:01:36.367000 +CVE-2024-24990,0,0,d17c58908f77733e52782cecb6917383244c4086dd34cba8e966554b94ce38ed,2025-01-24T16:01:36.367000 CVE-2024-24991,0,0,ab571423a1a6309b0495c9db088adb19784d1783badb8b28c84a771e894ba6a8,2024-11-21T09:00:05.867000 CVE-2024-24992,0,0,7e6c184fe11d55e75cf8acbe2688410429d81c016034216dd125188eaae17636,2025-01-07T01:15:06.780000 CVE-2024-24993,0,0,705a08374da6010fc88afad1a4ae031351a7f03de838c5465f09adbda3ac0c72,2024-11-21T09:00:06.103000 @@ -250704,10 +250705,10 @@ CVE-2024-25024,0,0,94dc9c631d2c500a02ba69e3d14eb503fd049554240337a94df3486bd1e16 CVE-2024-25026,0,0,55a3a6330c68c45602e09e0075b2dfc62f34bd03a295eb50853e9132b5b631a8,2024-11-21T09:00:08.747000 CVE-2024-25027,0,0,2fd12127e4643c673f529161cf53e4588b217516e68f1d873bb50001abb5936c,2024-11-21T09:00:08.870000 CVE-2024-25029,0,0,b687f5b3fdfbde494167fcb1f03a00ea37c9c79db373d46255ea84ad0b785fd3,2024-11-21T09:00:09.010000 -CVE-2024-2503,0,1,0a8ceaf40ee6d348134f20a61aab597ac54c9e02f02542b8489429dec92d39ae,2025-01-24T16:37:14.727000 +CVE-2024-2503,0,0,0a8ceaf40ee6d348134f20a61aab597ac54c9e02f02542b8489429dec92d39ae,2025-01-24T16:37:14.727000 CVE-2024-25030,0,0,3bf7cf36ab25986b6901ce978418ca57d6fa819b3639e450fc36c96ac4859d66,2024-11-21T09:00:09.137000 CVE-2024-25031,0,0,336ae1209bec97edf2f576f0dbcab4e5fecb1cf28a1e1d867216b37694f08f50,2024-11-21T09:00:09.263000 -CVE-2024-25034,1,1,f5b28464f63bf6a635d09fad6f3f1990324805f265725d58c032aeae574b0cd7,2025-01-24T16:15:34.747000 +CVE-2024-25034,0,0,f5b28464f63bf6a635d09fad6f3f1990324805f265725d58c032aeae574b0cd7,2025-01-24T16:15:34.747000 CVE-2024-25035,0,0,b7214df75690f8a2c0cde375218fa064c6af31099cab5de418b369cfbfb53d96,2024-12-11T03:36:11.700000 CVE-2024-25036,0,0,a0130984c78d987e616d5d6732535de3078a91e4d686daa4bfe8d88a169b88cd,2024-12-11T03:35:51.663000 CVE-2024-25037,0,0,406a4670a9668946e91205c5e64e1ad1fa02a4e9c65ab719dde554f47a137fd7,2025-01-07T16:15:32.937000 @@ -250994,7 +250995,7 @@ CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab5 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 CVE-2024-2547,0,0,90d41a91a54e213f02614de06ba4c678c4303a08116eb3638a1bbb2663fbedeb,2024-11-21T09:09:59.170000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 -CVE-2024-2550,0,1,6a5e4b4549d1691f69895d2ae26aa3089594f6d4a17f1da19b8f974387ae9a14,2025-01-24T16:02:49.703000 +CVE-2024-2550,0,0,6a5e4b4549d1691f69895d2ae26aa3089594f6d4a17f1da19b8f974387ae9a14,2025-01-24T16:02:49.703000 CVE-2024-25501,0,0,39a441609204709047cecad828c175f01310d82b43dc4ea230772a5942f74b33,2024-11-21T09:00:51.913000 CVE-2024-25502,0,0,307ee5d9dbe09c1fb27075518c1665746aaca342b4f56014c6a6529979fd95f3,2024-11-21T09:00:52.117000 CVE-2024-25503,0,0,889bc4d1c9a45aa9bb9b859681955c4aaa1d9acb88f2328fb5f6d57fdc289c41,2024-11-21T09:00:52.333000 @@ -251002,7 +251003,7 @@ CVE-2024-25506,0,0,99ccba7c267fe812ca9bb7b28c69f180daff3656f6e44ea9e8ba74241c00e CVE-2024-25507,0,0,9fb695733a659130193b6dffa9945f8a8ed837feb8d0501e96411ebc99ee0c9b,2024-11-21T09:00:52.790000 CVE-2024-25508,0,0,92100c80cbaf3affd555a0268d09dfe8052603ae7230d3e82684e82ae3278479,2024-11-21T09:00:53.027000 CVE-2024-25509,0,0,42166eaef9b6e11f6e136286cd09ec43584b64bdc7ebb8394c0e539c7275369d,2024-11-21T09:00:53.257000 -CVE-2024-2551,0,1,265d4243e402b72fe267bf4eb2a65ff02428a95be8eae67fcec28c9de21f40ca,2025-01-24T16:03:41.910000 +CVE-2024-2551,0,0,265d4243e402b72fe267bf4eb2a65ff02428a95be8eae67fcec28c9de21f40ca,2025-01-24T16:03:41.910000 CVE-2024-25510,0,0,ca023eb62a1f2d2a8dd2eb69618a6578d9837cb201f68ac0878463bdd7e27af3,2024-11-21T09:00:53.473000 CVE-2024-25511,0,0,89fd33cc6ec57359271fc422a4771012156ebcebdb7a3eea44ebed0d5ba8b4c7,2024-11-21T09:00:53.693000 CVE-2024-25512,0,0,277e44ad57d9c06ac5cb7ec6742b1e6099c94bdafef27e62796fbd5ad12758bb,2024-11-21T09:00:53.923000 @@ -251012,7 +251013,7 @@ CVE-2024-25515,0,0,68d38ba96813124a972695601e0dbed999c1c927ad3b2b72d0939a042cbb3 CVE-2024-25517,0,0,7b2cb83aafad7b6071344c5946ae488491fb26c2ebef9e68b6df4f0888ce2420,2024-11-21T09:00:54.813000 CVE-2024-25518,0,0,4cb317decfcfaf4255d5f51287437d15cd0df33ab197dad7a3fbf21ce3f3bd38,2024-11-21T09:00:55.037000 CVE-2024-25519,0,0,0a91b08bad19e0fdbaaa75835b391d59df452a42edd620ce62fa3db0b15f6e6f,2024-11-21T09:00:55.263000 -CVE-2024-2552,0,1,e1e47af2cca581ed3c1d289a84cebed34b8405ef991311017d33f7466c7f2211,2025-01-24T16:04:14.430000 +CVE-2024-2552,0,0,e1e47af2cca581ed3c1d289a84cebed34b8405ef991311017d33f7466c7f2211,2025-01-24T16:04:14.430000 CVE-2024-25520,0,0,a042afc7146d2009d90a801983c0709f5132afaabcb5d2ca82f1fb2a77ed3c12,2024-11-21T09:00:55.510000 CVE-2024-25521,0,0,083c1f1eb4798ffdb4595c966aa895d7396995d2d4ba0cc9823f1dd5e3910e90,2024-11-21T09:00:55.743000 CVE-2024-25522,0,0,7e799b51e7c62296447ba9d773094e12c4d4d2ce84aff929f4a3c4d9a1ead2cf,2024-11-21T09:00:55.970000 @@ -251311,7 +251312,7 @@ CVE-2024-25933,0,0,10c4dcd1d4877c2c5d9d0ce4b63a969433dc4656fa5c7f916b0ffa00f975f CVE-2024-25934,0,0,62ea49431b2bed66fcc156f5ea3cdf41723ad0795ba3206bf55318a5498e2cb0,2024-11-21T09:01:36.283000 CVE-2024-25935,0,0,66be2dcb22fbb70c35c4ddb4f21e1f6946a1ef5585b5ff1ae05a77950d584a36,2024-11-21T09:01:36.420000 CVE-2024-25936,0,0,883e76a8e3b646c5fa72740a548a845a65d2a06142b661c1322ccee0cc64fa50,2024-11-21T09:01:36.543000 -CVE-2024-25937,0,0,4a230436a25eac73576fb55323081965d02a72d906dba6ad6dce5bea33a52350,2024-11-21T09:01:36.667000 +CVE-2024-25937,0,1,ff95c9e0762c8748df9a9a290ad15a2baaab9ad61fd50aa6f8e199feb077d8a3,2025-01-24T18:42:26.510000 CVE-2024-25938,0,0,1d865435e59bdefe0610d67720b1f7a1a1a64e9177daafdb2de5f4c0e3a2169a,2024-11-21T09:01:36.797000 CVE-2024-25939,0,0,fb4f39370672b53a09e47b6058fdff83594ffb1956fa31c3b1a3b0c65c6d3f89,2024-08-14T17:49:14.177000 CVE-2024-2594,0,0,21f2f45d3be94b17d49078e4bde55faa65299c07cf2be6edec5fcc2f64e73c73,2024-11-21T09:10:05.157000 @@ -252121,11 +252122,11 @@ CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6 CVE-2024-26882,0,0,bbe489ee29c0a7bd46d4fc46f3291be28306717f3a37638640e3b60d051438f5,2024-12-20T13:15:20.370000 CVE-2024-26883,0,0,d72e5c2a08cc96112a7158053aecf4ca442365affa186e749544aa6413017d60,2024-11-21T09:03:17.527000 CVE-2024-26884,0,0,90485ab2ad08ce5980bd35da2176ba31c8ca763f26d4fd993f1e3d22b12d7886,2024-11-21T09:03:17.677000 -CVE-2024-26885,0,1,643e9d45f6fe64f6adea383a4fb760538978a2ffe2a06c1ba228c5eda0e1253b,2025-01-24T16:15:35.030000 -CVE-2024-26886,0,1,dd647380a56ebf8acf36498a32884a21c01f77b53c500fad9b448c6df387a244,2025-01-24T16:15:35.193000 +CVE-2024-26885,0,0,643e9d45f6fe64f6adea383a4fb760538978a2ffe2a06c1ba228c5eda0e1253b,2025-01-24T16:15:35.030000 +CVE-2024-26886,0,0,dd647380a56ebf8acf36498a32884a21c01f77b53c500fad9b448c6df387a244,2025-01-24T16:15:35.193000 CVE-2024-26887,0,0,3251ccc7a70790e196686afa8951af70ae741b2291763bea2e84a28b5f78b248,2025-01-07T17:14:41.810000 CVE-2024-26888,0,0,74846900da7a6f8b09026caa9be4b4eccab844d24d851aaa854a0bea0b7158e6,2025-01-07T16:43:58.107000 -CVE-2024-26889,0,1,a7b27130d8d4ed99b70cd338114a084bdd22e0e2f2a4841c89823888e896a69a,2025-01-24T16:15:35.380000 +CVE-2024-26889,0,0,a7b27130d8d4ed99b70cd338114a084bdd22e0e2f2a4841c89823888e896a69a,2025-01-24T16:15:35.380000 CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc962,2024-11-21T09:10:17.947000 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 @@ -252160,7 +252161,7 @@ CVE-2024-26917,0,0,2cd003a990279a581d2d89032bc7892ff8b5c3defd3bdb12211a8ce1d0734 CVE-2024-26918,0,0,e7bb26f389a5a5916198efb78afb6d12bb2b7711e670c6a544e944a53023f715,2024-11-21T09:03:22.790000 CVE-2024-26919,0,0,65366cfef00379b1cbe89481caef89d7fa303ec7586e98fe947563381980ec11,2024-11-21T09:03:22.987000 CVE-2024-2692,0,0,0147b94a8d9835cd65a90208a5c856899384f5cde751849e0130c33d80995457,2024-11-21T09:10:18.387000 -CVE-2024-26920,0,1,d7279416a2894cecfbf8fec270bbcabcd7898c281d7286399c579e20cfbc82db,2025-01-24T16:15:35.563000 +CVE-2024-26920,0,0,d7279416a2894cecfbf8fec270bbcabcd7898c281d7286399c579e20cfbc82db,2025-01-24T16:15:35.563000 CVE-2024-26921,0,0,2afae4822481354b5c521dafcaca57284a34ebeac04955d03f942de62a10c47a,2024-11-21T09:03:23.263000 CVE-2024-26922,0,0,543a9fc4951028adeeb3e4bf5579492cfa9752e9d6e40dd32a1bedf23a9912cf,2024-11-21T09:03:23.400000 CVE-2024-26923,0,0,71b5d2ab6b3f50fc994e954b457014743a33a8f1bd86858c18a8e502b92aa99b,2024-11-21T09:03:23.543000 @@ -252270,7 +252271,7 @@ CVE-2024-27019,0,0,5376b356b11038167465eeb2add854ab08687e91e3f620fcda48466da383a CVE-2024-2702,0,0,93cfdbae0cec94a9921e2ac66017ddca8c7776b570e8e1183b2d27c638693971,2024-11-21T09:10:19.753000 CVE-2024-27020,0,0,d0573a58ce4f9e18709c724e71edef68802be0cf8cb8b98309fa06e708a79451,2024-11-21T09:03:40.660000 CVE-2024-27021,0,0,9883d71920346bcc78c175d4fa4a33fc9cadf8ed29ca97ea798bc9656135691e,2024-11-21T09:03:40.883000 -CVE-2024-27022,0,1,dbd739de33657415c11414e3e66c989817b265db76abc8d2ca1d25c1fa75795d,2025-01-24T16:15:35.707000 +CVE-2024-27022,0,0,dbd739de33657415c11414e3e66c989817b265db76abc8d2ca1d25c1fa75795d,2025-01-24T16:15:35.707000 CVE-2024-27023,0,0,2aaf37192bcf19ff82447827ef1a65b2dac0157dd2feeef8bad9a358df7f5392,2024-11-21T09:03:41.150000 CVE-2024-27024,0,0,ebee5e148de6b3dde2fcaa8816a9f4f8ed64a771f098565be007ca61974f2619,2024-12-23T19:22:58.463000 CVE-2024-27025,0,0,5c3859f46c671ad7ffd95b4676d27d7a5d64666b3d74e9808cc4d7ce65e2e8ff,2024-12-23T19:24:12.370000 @@ -253126,7 +253127,7 @@ CVE-2024-28045,0,0,3250b5241cb3eb30591229d8a728ec2919682fc73063bc0b93558e23a7537 CVE-2024-28046,0,0,08ac6a41262a30c05ef763f8296b9175ae9831f9fdea62d8c95f9945b9c74715,2024-09-06T18:40:14.330000 CVE-2024-28048,0,0,166375921280a7285874abcdec0584c225aafe530cd2ca9bad02a6525a8cff07,2024-11-21T09:05:41.997000 CVE-2024-28049,0,0,4191140b72d68518c43bb961f8171d2b3da1a3878f82c679e5f952ecd7437a12,2024-11-15T14:00:09.720000 -CVE-2024-2805,0,0,8ecad45915398d24f37061e78ef8f9001522cf312dd74ab2eb009b6f6baaac4c,2024-11-21T09:10:33.803000 +CVE-2024-2805,0,1,fe8f764c46018c0437f3ff224d0879dfaff251abe0ca32544a20cce1c4a57b33,2025-01-24T18:45:05.873000 CVE-2024-28050,0,0,f3643cbdb49a4c7574b6516a7598c57183183b47fe304523dd186648f5cfdc84,2024-09-06T18:38:11.353000 CVE-2024-28051,0,0,7601c11101569664a5b4d443a5b495681a8340b0f1a4c210fa382ed043fbb231,2024-11-15T14:00:09.720000 CVE-2024-28052,0,0,c091e5a10488583b0029fed7f1a8e4d1e6cdb2795bd026298532c166c3b5f4bd,2024-11-21T09:05:42.417000 @@ -253265,7 +253266,7 @@ CVE-2024-28189,0,0,60ed687c41a6d075b26b2f0112d4217df779ccc45bc9e63ca6d0ed32ad3da CVE-2024-2819,0,0,119e8a694e0c71b2df88a1c46090c184a6155f60a9ebd588d2a9454017e4751d,2025-01-21T19:14:24.217000 CVE-2024-28190,0,0,70b823e132fdaf915de1928040350b0ea87b81d33aa6e2ce37203b7b5b322bfd,2025-01-16T19:54:16.763000 CVE-2024-28191,0,0,5b6c074ab018067c965562c5bbc6ca0ef417251157d63225a65bdafc747bece3,2025-01-17T15:39:22.060000 -CVE-2024-28192,0,1,7508d9021ccc1565db3035af688147509fee676c90504fc13b4f73c460b6ef3c,2025-01-24T15:11:10.747000 +CVE-2024-28192,0,0,7508d9021ccc1565db3035af688147509fee676c90504fc13b4f73c460b6ef3c,2025-01-24T15:11:10.747000 CVE-2024-28193,0,0,8d227e8eb16fb4de0e704d7a312f2e5ac3bfb0063d0e3bd7134246d61929666c,2025-01-24T14:56:33.120000 CVE-2024-28194,0,0,919f980bb3d86b49fd10405531eb8e0036001d5d3499843f594d6737b1cc5add,2024-11-21T09:06:00.183000 CVE-2024-28195,0,0,1c8cd56ede5413ee2e3fc3f8a72d5ad055ccc2245b1d55d162ea0bb57080f1c2,2024-11-21T09:06:00.303000 @@ -253705,7 +253706,7 @@ CVE-2024-28948,0,0,1666ae581c80c38aac0ccf842fe7ca7d976d37f538b8ec7b216cab7a6078b CVE-2024-28949,0,0,1f3684a855e01293d9c0333b231907267ad216e334a79f7ff99fcfcf991a1b22,2024-12-12T21:38:08.237000 CVE-2024-2895,0,0,4bca94af9c633d3a7edc0e2eccaef4b77d246f77b868137a5fc657e7e56cfaac,2025-01-22T17:53:34.827000 CVE-2024-28950,0,0,1a05508e6285963097a3b72b652266b51c45af88f660c467f1463d180a5b37f5,2024-11-15T14:00:09.720000 -CVE-2024-28951,0,1,96f71bdb0bc6bde80209013921c3a1a19a755665bc8f70524936963fccce5587,2025-01-24T16:25:21.360000 +CVE-2024-28951,0,0,96f71bdb0bc6bde80209013921c3a1a19a755665bc8f70524936963fccce5587,2025-01-24T16:25:21.360000 CVE-2024-28952,0,0,a3c4c6996f99d6d10f644fb690635fed6d4bd8920a537bc08e5b50bd933cd304,2024-11-15T14:00:09.720000 CVE-2024-28953,0,0,c901751ea2f147779352c1e947dd13228802aa9d79715e869d0c3f0d67f4b2c7,2024-08-14T17:49:14.177000 CVE-2024-28955,0,0,d25f942d0189970997c9beaa87ecae40becc3e717d61eb7169e70ed01f911452,2024-11-26T08:15:05.043000 @@ -253752,7 +253753,7 @@ CVE-2024-29000,0,0,7a305cccd175671343b97767d7c882563f2afc3a0fbb62aa579187b27944a CVE-2024-29001,0,0,33e499e26ccfffab77e2a9a0196071af4053eafb3c7b487e58f86d3831f9cb69,2024-11-21T09:07:20.983000 CVE-2024-29003,0,0,aa0448857305ef8166f64d09b6a0aecfc681d4d8ef2dd604c70ca9d26cf84df4,2024-11-21T09:07:21.100000 CVE-2024-29004,0,0,e71f6941edb707c0c3bbd70c4cb5ee173fdefaf8a4d65799390c385e184d1124,2024-11-21T09:07:21.257000 -CVE-2024-29006,0,1,b854f8b85619d78705c55720c54f26685cd56b5a90de3e8463a68d60f0834fc9,2025-01-24T16:19:05.217000 +CVE-2024-29006,0,0,b854f8b85619d78705c55720c54f26685cd56b5a90de3e8463a68d60f0834fc9,2025-01-24T16:19:05.217000 CVE-2024-29007,0,0,9467d08502d3e36b2d3e90e284f19d567ff6430ff612d29071e043652d272704,2024-11-21T09:07:21.500000 CVE-2024-29008,0,0,ca0aecdf68c77dbd22be28cfa60b571dde82304762578b0f93292832da2ce951,2024-11-21T09:07:21.670000 CVE-2024-29009,0,0,d62ab061bcc3cb61c24bc6f5800368ca076909ddd0e49b565343116fd7600952,2024-11-21T09:07:21.850000 @@ -254258,7 +254259,7 @@ CVE-2024-29830,0,0,3f9252519d26c2a44915f75e911a6f26ff92e77c813067ee428ba5c495fa5 CVE-2024-29831,0,0,e6c66beb73404b95bd012a575dfe2fbe460731a7b1a9e842d9b5a35c457e6ea5,2024-11-21T09:08:25.767000 CVE-2024-29832,0,0,6056032a590f7abd34bd12f5925c086bdf38bbd060ac2b171db2d160a1e2f453,2024-11-21T09:08:25.963000 CVE-2024-29833,0,0,749e9d8c64909205659cff602c4225d0cb6353f71312c1f77d5c97e9e9c104c1,2024-11-21T09:08:26.100000 -CVE-2024-29834,0,1,de32c83406ee0a8ef1956073d47bb9c94eff55af17248af2c5763cb541959bb5,2025-01-24T16:21:24.170000 +CVE-2024-29834,0,0,de32c83406ee0a8ef1956073d47bb9c94eff55af17248af2c5763cb541959bb5,2025-01-24T16:21:24.170000 CVE-2024-29836,0,0,d83ba4e00c62b6e0545f19626ba78475a56ba67b33e57c14cb3ed18d1ffd828a,2024-11-21T09:08:26.370000 CVE-2024-29837,0,0,40cae44464abb484ced0c952d98fd9bc0888dd0bbe7a5abfcd18020cd2f2ce0d,2024-11-21T09:08:26.500000 CVE-2024-29838,0,0,ae26f6d4b8133e525797109d96340fbc53824063f004cbc1496ef814c2ba32fd,2024-11-21T09:08:26.630000 @@ -254290,16 +254291,16 @@ CVE-2024-29865,0,0,9ff88181cc09011dacc69644a77d36e95923b0be430e91548467a246755f0 CVE-2024-29866,0,0,8fc166448f3fbecaecd8b7ed9d6aa230d3bb984af892d0077240e75b9b6f7a9a,2024-11-21T09:08:30.190000 CVE-2024-29868,0,0,654a536670a62fb45b5203eb432335632fdfc103e225c6be2f801ded9b3b1341,2024-11-21T09:08:30.413000 CVE-2024-2987,0,0,e4d4968f2ab326fc6f93467dbe0c42753ad32258cee7fd3257881b95a825941e,2025-01-14T15:10:15.733000 -CVE-2024-29870,0,0,f8c04c6c860883287026761e02a7bcfabed6c07c84fceff4342be642ee21b337,2024-11-21T09:08:30.620000 -CVE-2024-29871,0,0,989e1381a8dc06be676a6ba6c4ddabc54db1fcedff30400327c02511241f43bc,2024-11-21T09:08:30.760000 -CVE-2024-29872,0,0,84310ffec4fc1702045588faf8db3ec33c4a1efba43800e263515150c11c972e,2024-11-21T09:08:30.903000 -CVE-2024-29873,0,0,0c5b47bae91ac11a1aafd1753d1db7c73d0a16841d4d829e3dde0490e0f56fe3,2024-11-21T09:08:31.040000 -CVE-2024-29874,0,0,ee3f63eec73f584797f83666ce56e01cc701369f2ae6d02d340294ef94220eac,2024-11-21T09:08:31.167000 -CVE-2024-29875,0,0,3fabda0854a01664c244e974b54fea116b54513e5bf599ffed63bd652f7c0382,2024-11-21T09:08:31.310000 -CVE-2024-29876,0,0,70109742fa01d4e14cd93c315ff2ba7253b14de66fcd9c032431e31084c94d64,2024-11-21T09:08:31.723000 -CVE-2024-29877,0,0,1774d4393b3ff2ccfcfc5a29fc6ef0d37b991c57ff8178133ee1c75ebd25cee2,2024-11-21T09:08:31.857000 -CVE-2024-29878,0,0,b112e821bf25760d8f5117d180bbfc649df8c2437b8c0edc8c25982c8862833e,2024-11-21T09:08:31.983000 -CVE-2024-29879,0,0,1b8943394f9c1e900ed5064335f48840161d8b3aac0cefe300ca3a232ca4d80c,2024-11-21T09:08:32.130000 +CVE-2024-29870,0,1,b73bbe674034b941cb1de42af16181f829d1cbe733c707402192e9d9f2c3eec7,2025-01-24T18:18:36.670000 +CVE-2024-29871,0,1,61f4b4d6f5a977f77b612c4fe0dcdf35eb10ba2cd3db813456ced514fcadbcf3,2025-01-24T18:18:34.350000 +CVE-2024-29872,0,1,d4e4aff44522db648daf879beddf04b8eec6f8628a65f3da5471f851ccb907f2,2025-01-24T18:18:31.603000 +CVE-2024-29873,0,1,bf0f80e52c044b0af95eaf9546edffe28d428f032f83759d6cf4605c55b106c0,2025-01-24T18:18:29.537000 +CVE-2024-29874,0,1,deb4673e1cd798c1cbaa54a5aa0e3d21cc21e45db970c79bbc8edeab04a40389,2025-01-24T18:18:27.523000 +CVE-2024-29875,0,1,bbf120dab2bab4c06c3bc81a694740691f6ab47c4b437a16caf1820ebf9b3df0,2025-01-24T18:18:25.493000 +CVE-2024-29876,0,1,7f6f19b24f771554c14edae445fc4f018b98ec2bedb6f2a808f719f93fc2e44f,2025-01-24T18:18:23.223000 +CVE-2024-29877,0,1,88a069f8ee7c95e6c1d2db12276ee28ef36ce6e54fca833122b22a39a3dda5e8,2025-01-24T18:17:39.100000 +CVE-2024-29878,0,1,a568e7af6c22d4b342eb4140b83b64cff76bc59e0f04aa4842c0668e0d651796,2025-01-24T18:17:36.817000 +CVE-2024-29879,0,1,e2c2757fa86f08980c5086f1a721230bdf2268c46bff1d92e73e717d38f3624f,2025-01-24T18:17:54.427000 CVE-2024-2988,0,0,82667b43a39fa361897af5e745219c302675a25631d3c63cfb07aea1cd122ce4,2025-01-15T18:20:41.567000 CVE-2024-29880,0,0,9ac6e81333477f282048eba209d47dc5f78b687ca71971db5702c5608a33ba05,2024-12-16T15:37:50.093000 CVE-2024-29881,0,0,26411cffafa6bc6e69a94607cec3788fdb2462e04af812e3926cbb73aee7ce39,2024-11-21T09:08:32.393000 @@ -255268,7 +255269,7 @@ CVE-2024-31074,0,0,01d64d0a51bf3ec3df5d6c59c3da5338deaaf4325178cfa318378ec4fdf90 CVE-2024-31076,0,0,1293d87671585f621e57738a562115aa8563ab94cc4beb2163a9d49bb681d6cc,2024-11-21T09:12:48.140000 CVE-2024-31077,0,0,289d0fa87ed9966f075d7cf387e3721edb9b2f366b0ec4a722be692dbf847080,2024-11-21T09:12:48.273000 CVE-2024-31078,0,0,c685657ef2ddb5a5f6950813502d56bfa1502d3b4d479876fa59d79cc3cba853,2025-01-02T19:04:58.017000 -CVE-2024-31079,0,1,165a2aa326e41b281850472925f9b409c38425124b3d29959aeb9d8da9b7e905,2025-01-24T16:01:04.653000 +CVE-2024-31079,0,0,165a2aa326e41b281850472925f9b409c38425124b3d29959aeb9d8da9b7e905,2025-01-24T16:01:04.653000 CVE-2024-3108,0,0,0a457dab289bbab6cbbf64df7736b6d0a7c3250fc6713e73c93a6029760a47aa,2024-11-21T09:28:54.970000 CVE-2024-31080,0,0,7985776399695af271a70402c55211a3aadc068d82c4a7fe69b7a47377da62a8,2024-11-21T09:12:48.727000 CVE-2024-31081,0,0,7c181540445311d712c076a10a1507066bfbca47351c61f292adbf4f85ec7de1,2024-11-21T09:12:48.930000 @@ -255500,7 +255501,7 @@ CVE-2024-31306,0,0,6640a1f5d3e61d5729b7ac83396c8252af4bb85df21a084877c89baf912ca CVE-2024-31307,0,0,fe5c146bc2e01b31d10c8798aabeced41a593f46147cc701844fecf521def462,2024-11-21T09:13:14.583000 CVE-2024-31308,0,0,e26bc58410205067bb8d8db3d33abfda2da6af578804048a337db59e83ec9878,2024-11-21T09:13:14.700000 CVE-2024-31309,0,0,4d74e223b139d85cacb1e8588eca9fc311ad79bf20795c25cd105fa0c27c32c5,2024-11-21T09:13:14.817000 -CVE-2024-3131,0,1,8e22343554e72698845385d242f6afc12ef95d3f497368a317d0c8f996647b47,2025-01-24T16:27:37.137000 +CVE-2024-3131,0,0,8e22343554e72698845385d242f6afc12ef95d3f497368a317d0c8f996647b47,2025-01-24T16:27:37.137000 CVE-2024-31310,0,0,098c3633a4927790e31a6001c9d03c9b41631dbc55201432e5beb837f265765f,2024-12-17T16:31:31.697000 CVE-2024-31311,0,0,1a44e686db557c94dba0ef9b706e10f4ecfa786c8cdc2e5becafc8a2a70a2a92,2024-12-17T17:43:28.493000 CVE-2024-31312,0,0,a6faac328a1918a99ef8645176673fc9899bc26b8ba45d4fcf17774fe9f22e11,2024-12-17T17:32:22.067000 @@ -255582,7 +255583,7 @@ CVE-2024-31386,0,0,3acde958c7031a742cbc4a99febff02b326329be42acd0fe4f94a0fb89ff5 CVE-2024-31387,0,0,51d389c45d4eb19a80768936b92f81f13e6db6da9d727cedb95f8cea10cfa082,2024-11-21T09:13:25.507000 CVE-2024-31388,0,0,969b791e4fda50e2951bfa1c1b7c4b19f1267ec11ef79ab157b990117c9e8ad5,2024-11-21T09:13:25.633000 CVE-2024-31389,0,0,08af152747ff407e3026afce016704b24317def223e62ecb4990aa88b6ae4f5e,2024-11-21T09:13:25.770000 -CVE-2024-3139,0,1,ee5d1f7884fa2b89f120299c3dc630a0c1e25c56358d05f6bf675aa682ed34cb,2025-01-24T16:29:06.287000 +CVE-2024-3139,0,0,ee5d1f7884fa2b89f120299c3dc630a0c1e25c56358d05f6bf675aa682ed34cb,2025-01-24T16:29:06.287000 CVE-2024-31390,0,0,09006f43013da697eb3ff65b55900b18a5bda9bb9eed07955cb886886fd9d7be,2024-11-21T09:13:25.903000 CVE-2024-31391,0,0,dd8e3986c0c7ad42b6bd64a59897a93d1a52069456c096537e64f413a47a9f44,2024-11-21T09:13:26.040000 CVE-2024-31392,0,0,2cf7bb0bb7b3840b5de6d2fa2cf618e252d13dcf4ceb1d56e669ff5d64f29037,2024-11-21T09:13:26.240000 @@ -255593,7 +255594,7 @@ CVE-2024-31396,0,0,12070261c9f4beb75949d082f0abbcd14c87a6065f52201897e85d3106040 CVE-2024-31397,0,0,4669b8c9ee6bff7627f3fabe734097169262ab8e925a351364e2643d116f2d6e,2024-11-21T09:13:27.013000 CVE-2024-31398,0,0,4e751e8f01cc9ca800cdcce821680e0d055f3ced6a85206b209df594140fe40e,2024-11-21T09:13:27.210000 CVE-2024-31399,0,0,69c671b3f2b9824d1d3b88c3a428d3e5889527feac06c7757b6605ccc0413fd9,2024-11-21T09:13:27.323000 -CVE-2024-3140,0,1,581a061887974455c3125abcbc00c0e0813a872379e447821195f0f7416d7105,2025-01-24T16:30:02.737000 +CVE-2024-3140,0,0,581a061887974455c3125abcbc00c0e0813a872379e447821195f0f7416d7105,2025-01-24T16:30:02.737000 CVE-2024-31400,0,0,7e4080f10aa278ce8df7d9488317404c2dff8e1c3510182a88eb3f049386223f,2024-11-21T09:13:27.470000 CVE-2024-31401,0,0,d23bc7e26f4f52e4438758e09d0f4ed266aeb8096cfa9dc7f40d19524690ebfb,2024-11-21T09:13:27.653000 CVE-2024-31402,0,0,29278ec71a42a5755be62c4a283dfbe343c94fd25ddd8f5774b75d48aeecc828,2024-11-21T09:13:27.833000 @@ -256314,7 +256315,7 @@ CVE-2024-32506,0,0,b107e8ddd51e583a9d0ff0af499834d62f7eab2b21288816ce4e8a42d2480 CVE-2024-32507,0,0,adfaa8d5d3c430c1e863ff4b449d0566f7cb0a7900c0306a1fa64b604809d5e4,2024-11-21T09:15:03.640000 CVE-2024-32508,0,0,da8422fd7cf2877f70a79ee64ae7196ed8b1f7a8a2342467127e545489027ed3,2024-11-21T09:15:03.767000 CVE-2024-32509,0,0,d7ae0abbffa293f67efb9678c0e0a3733d5c85e86821f6192484d815522412b8,2024-11-21T09:15:03.920000 -CVE-2024-3251,0,1,ad4b385dcf805009255a9412683a7584ffc14abb490dbd9ef4ef7d4beccc9013,2025-01-24T16:31:37.807000 +CVE-2024-3251,0,0,ad4b385dcf805009255a9412683a7584ffc14abb490dbd9ef4ef7d4beccc9013,2025-01-24T16:31:37.807000 CVE-2024-32510,0,0,d00b602fa3d5cf5b31ed40fc54835d9b4e6454dd89336228be943571d234b5a1,2024-11-21T09:15:04.043000 CVE-2024-32511,0,0,a0a3a03646a71f253902044309a5364d8e403c32206228ffa6c7031f0665cc88,2024-11-21T09:15:04.177000 CVE-2024-32512,0,0,0961b4b29cc71ae859aa6470f1f6fbdb19a6dff97b7a4bce9c9e3de7e85cebde,2024-11-21T09:15:04.307000 @@ -256569,7 +256570,7 @@ CVE-2024-32757,0,0,e90481642b590121fcf0c24df5d47bcb06a24fb8762f227ffbd72b326a384 CVE-2024-32758,0,0,4dff72018711e9f974dd46e5998fd183163f8264bf88908bc63121e1c7db8ae0,2024-08-09T19:00:17.183000 CVE-2024-32759,0,0,b6eb576e54af0c681685d9c2daa75b3ba79d7722c015ec50f117e0f6b8f5a968,2024-11-21T09:15:40.380000 CVE-2024-3276,0,0,231307f572bf201867b6e192771acf6a099f0f7f8523272307912246a8f3de31,2024-11-21T09:29:18.153000 -CVE-2024-32760,0,1,82505ca8c02cbf457bf78fabc824ccbae8b38186bf945e09d78ea0ddc383e5aa,2025-01-24T16:21:55.993000 +CVE-2024-32760,0,0,82505ca8c02cbf457bf78fabc824ccbae8b38186bf945e09d78ea0ddc383e5aa,2025-01-24T16:21:55.993000 CVE-2024-32761,0,0,c1bc30bb1c2e53c2b9b8f210dc65959b2a2346754df853ce010dd8c7e6d36dc4,2024-11-21T09:15:40.690000 CVE-2024-32762,0,0,e2e8b9ba690b7f1e2af2675ee1c4b7f2fa71ca55130e86054a01c63799cb3895,2024-09-13T21:10:30.137000 CVE-2024-32763,0,0,b233e95fe29930be363344f15fe06fe28d2e5c9aeaf866c0ce31a2c3b28d8537,2024-09-20T16:49:08.883000 @@ -257336,18 +257337,18 @@ CVE-2024-33819,0,0,7e61d4c0dd3553f64a2e5fef11b92143383472dd77b567ea2aea59f5055da CVE-2024-3382,0,0,2806fc89766558764c830c6154793a1d7167aad2ece415e69784f0d03afe9946,2025-01-22T15:44:24.527000 CVE-2024-33820,0,0,cfee89ad7ad37aa0a23734591a3b5cbc350282c1f511c40effb3edcabf5bfacf,2024-11-21T09:17:33.030000 CVE-2024-33829,0,0,29c77d19540accb450598443b67b5c2e3910197757a370c151dd370ee4356fa7,2024-11-21T09:17:33.210000 -CVE-2024-3383,0,1,2fa83abdea40282e20ea0cdf839990a0c3e4b3915404b86d2e06d5f4bf568349,2025-01-24T15:29:26.313000 +CVE-2024-3383,0,0,2fa83abdea40282e20ea0cdf839990a0c3e4b3915404b86d2e06d5f4bf568349,2025-01-24T15:29:26.313000 CVE-2024-33830,0,0,f1012ab730edcfd864a0644722071cb6ff41ee64e585601d191df590a20be372,2024-11-21T09:17:33.390000 CVE-2024-33831,0,0,f91f34cdd2bcb6e6adcab72045795af979a1b6ad2c28fa652db7625dedd4f35d,2024-11-21T09:17:33.660000 CVE-2024-33832,0,0,4a7de24f1ee6133b608740a244d388457220575de4659dfa0b317191ab265879,2024-11-21T09:17:33.847000 CVE-2024-33835,0,0,3e192c85c2f13a4a00101e791f822c9888ae665f140c80028c35765adbfb6897,2024-11-21T09:17:34.033000 CVE-2024-33836,0,0,e9fdefa6cfdfda12401c899a902faeb54477882eb31bdafd3c99df2e5bfe597c,2024-11-21T09:17:34.227000 -CVE-2024-3384,0,1,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000 +CVE-2024-3384,0,0,c4b2f8ab6758117062890bee73e21a93e57f567211e04646223f4e021cdfaa57,2025-01-24T15:54:56.557000 CVE-2024-33844,0,0,35a52a8744d0fcdfd12df4f953c97083a2e6c4facdb84d82a049304cd05dc966,2024-11-21T09:17:34.417000 CVE-2024-33847,0,0,0e33780554413dd547d01d3bde95dd663b7322b2900748aca98a0a4892461080,2024-11-21T09:17:34.583000 CVE-2024-33848,0,0,02c22cad364477c78ca36f2128f6569adfb33ef435429cacb39caed0aa330e57,2024-09-23T14:43:46.237000 CVE-2024-33849,0,0,780116ff508c226f1ec4e1d18c7cd90231176db688bd866197c7b6a90bb43e99,2024-11-21T09:17:34.747000 -CVE-2024-3385,0,1,1aefdc6b5adf132a22499a5db66a392a65541d9eaeac4085c3e4e238dd690ba5,2025-01-24T15:55:48.127000 +CVE-2024-3385,0,0,1aefdc6b5adf132a22499a5db66a392a65541d9eaeac4085c3e4e238dd690ba5,2025-01-24T15:55:48.127000 CVE-2024-33850,0,0,d09f2897d6295f52c3c2bcac5bbc4ea50c81fb3650ae3bf505c5df1d1445b584,2024-11-21T20:15:40.613000 CVE-2024-33851,0,0,71d753e61b781c59c22b9dcc54d2b5b30979e95171405bf3f58ea335895d1b3f,2024-11-21T09:17:35.070000 CVE-2024-33852,0,0,507aa966348da8ffb990bc6335d57ea0b339c67384a70120be46bd5c3cf932c1,2024-08-23T18:46:51.787000 @@ -257357,7 +257358,7 @@ CVE-2024-33856,0,0,4f23026493aa3877de0959a38f0b86bb379d7d08470341d0e7ad0ace3b563 CVE-2024-33857,0,0,77d01ceb40c93381f5acf7785a3b669a32af207819ec7333304ce5c0e7a2e411,2024-11-21T09:17:36.067000 CVE-2024-33858,0,0,9114223c43a141912be3f128bc3c8cb62d8a96efd25edc1ab707d8e062b8eb25,2024-11-21T20:15:41.053000 CVE-2024-33859,0,0,dc5b9c20e404e47a5cfff66ccd56d92eacfeafd390052398162be12ecbafe303,2024-11-21T09:17:36.450000 -CVE-2024-3386,0,1,a8c12d05fe38ea5271d49d6a9061440dfc3e3d5a3564de9e097b07b4653f5670,2025-01-24T15:58:52.233000 +CVE-2024-3386,0,0,a8c12d05fe38ea5271d49d6a9061440dfc3e3d5a3564de9e097b07b4653f5670,2025-01-24T15:58:52.233000 CVE-2024-33860,0,0,95d43169914403ddcee8d89556509183f9c1c43beb33a9c60855306e26cd6805,2024-11-21T09:17:36.627000 CVE-2024-33862,0,0,bdf330956f292e5af5ddd4f626be2d578dc200b215e50ea65f571e34b29e7064,2024-11-21T09:17:36.807000 CVE-2024-33863,0,0,8463f6379dae00b0b06c14f4b48691e4c00a201a624d971dc6b59809a30da84a,2024-11-21T09:17:37.030000 @@ -257378,7 +257379,7 @@ CVE-2024-33876,0,0,b28633b24e587cf6186cb32ca1f492f3221dfc1bf43fa8aa10c129f615def CVE-2024-33877,0,0,8b1243ef0c134393a090955101488ff5279f60f5bc7848f732464fde40e97709,2024-11-21T09:17:39.600000 CVE-2024-33878,0,0,feb8ae1feff70622d1e1a8722fc435816940bd9a5d61c3251757968e032c5925,2024-05-14T15:38:10.657000 CVE-2024-33879,0,0,6af65bc1296155ce6dcbc637906c4c848f8f160031b78a70bd743f7c6e9a6239,2024-11-21T09:17:39.790000 -CVE-2024-3388,0,1,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae372,2025-01-24T16:16:18.310000 +CVE-2024-3388,0,0,e9b6f72b0b1c0b7f2c418e35fbf58cf2690eb64e09bf5e3388b48417000ae372,2025-01-24T16:16:18.310000 CVE-2024-33880,0,0,e592b0fcc1945574e62b07791cd81dcd61e6efd0a8817280337b8ece817c4469,2024-11-21T09:17:39.983000 CVE-2024-33881,0,0,c1b886fc16abf7aae010d3cd0b6df126ac4a7dacff52bac3f012a72388bd5eb6,2024-11-21T09:17:40.110000 CVE-2024-33883,0,0,a60b6dbe01d0df4525fad217549abc289e2dc3142ec07f81c8d9b45c0506b159,2024-11-21T09:17:40.303000 @@ -257638,7 +257639,7 @@ CVE-2024-34155,0,0,cab98877c86710a24b6232356801c572b3fbc0a3514fafb0f172bdc4e8b16 CVE-2024-34156,0,0,7adeaae3b1acb009065f3eb01e3a00f28dacbe2579f28ba7266c18d1b1e4fbb5,2024-11-21T09:18:12.853000 CVE-2024-34158,0,0,7398f1d9c16e74fe70c443b0a6b141e3a955771017d6bb32731341838047519c,2024-11-21T09:18:13.030000 CVE-2024-3416,0,0,8990a84aa9eece03906a1db0c985ac2a5152501ffa5352a5a85cc2cf3c3c378a,2025-01-17T15:43:40.360000 -CVE-2024-34161,0,1,5868cb2dcd63f0a51da1d8108fc281d18ffadd9e8c16186a6ec7c8d4a07ea395,2025-01-24T16:20:57.617000 +CVE-2024-34161,0,0,5868cb2dcd63f0a51da1d8108fc281d18ffadd9e8c16186a6ec7c8d4a07ea395,2025-01-24T16:20:57.617000 CVE-2024-34162,0,0,99e5e0e47ea9cc892ad1a2752ae2eba8b11fb682968d0009729fc7651fc4cff4,2024-11-26T08:15:06.123000 CVE-2024-34163,0,0,ba58e172d2c30fa83f64389865749b115811be245ceff1f9c6ba324a80e84b91,2024-09-12T18:59:30.753000 CVE-2024-34164,0,0,713b6728aabcc03c74788824e129ab8b5a3e89826a8ad42af15ae45f0c2b806c,2024-11-15T14:00:09.720000 @@ -258314,6 +258315,7 @@ CVE-2024-35117,0,0,775edc85fc6292ca975b97313cb5e23af42f4ca9689462af06c7300c98306 CVE-2024-35118,0,0,4324926efe207392a4ed876fb67f7b1d20226a5f3a177cb56ee4d7f8d8101687,2024-09-19T15:53:25.123000 CVE-2024-35119,0,0,d30b5118f01127b72a967e41cbcd9127e0dc9e2965ef5097a86f08236d88d108,2024-11-21T09:19:48.800000 CVE-2024-3512,0,0,d94170bf3eeacc29f71f3655c6497a6a8a80969c9ad074c1a71bef4e5d51d46d,2024-04-25T13:15:51.663000 +CVE-2024-35122,1,1,de59a9b5e0157ef4689680697859cb84bcd3a44a0711e096a42fc3b28dff992d,2025-01-24T18:15:31.680000 CVE-2024-35124,0,0,a922d1c3a3958629dbb0cd51b2de664bb7e7c9433c590d1267fd4128399d23a0,2024-08-22T13:31:16.353000 CVE-2024-3513,0,0,f3b60a2341228082c6b2c058a60950acb3fa7e0ac56c3c9b7f478ff2d11ae041,2024-11-21T09:29:45.410000 CVE-2024-35133,0,0,c27bb2f028f480c71f80a658c5187f1d60bf9d11ef3f138f496564d01c9e391f,2024-09-21T10:15:05.527000 @@ -258373,7 +258375,7 @@ CVE-2024-35197,0,0,d5326fe560ecdd602b2f0cfc8c145fa46d88dbe6cb9b3721815d62fb2c64f CVE-2024-35198,0,0,4455bf7a526d840df73bfb7cb5145186815eead54fae8f5c2849b9d59aba3f6d,2024-11-21T09:19:54.920000 CVE-2024-35199,0,0,4bd67b951a6f1baf7a94820b27d8bf9d3eee00ee1362d6edb0456c2376e74606,2024-11-21T09:19:55.093000 CVE-2024-3520,0,0,dea180350db432968451fca16d84d4384456cbdf80b62e14d7f4e13191f01e06,2024-11-21T09:29:46.280000 -CVE-2024-35200,0,1,89736880248ef57599b5706810af385cc709879fc2cb2afd23c2bd6b336a283e,2025-01-24T16:15:15.340000 +CVE-2024-35200,0,0,89736880248ef57599b5706810af385cc709879fc2cb2afd23c2bd6b336a283e,2025-01-24T16:15:15.340000 CVE-2024-35201,0,0,f8a5b90459cbd11135685faf5240cf25c70e3c2501ebe9a37ca8eacd936ed565,2024-11-15T14:00:09.720000 CVE-2024-35202,0,0,f3502ac16a142c6fa2605a574809aaea3b9f27445139dcbf89ce87db4f63c852,2024-10-15T12:58:51.050000 CVE-2024-35204,0,0,d1b368734e3dc18cc976cbdce89dadd38ac33f61db7221474e1ea942ad215f21,2024-11-21T09:19:55.753000 @@ -259033,7 +259035,7 @@ CVE-2024-35991,0,0,e0023617065fc6765387efe6164edb62b49cf60b15228846cbcdf1b9ebe00 CVE-2024-35992,0,0,bfbb7854dade209905bdfce5443e18018e21600807fcef0e644a216c759cf1dd,2024-11-21T09:21:22.950000 CVE-2024-35993,0,0,25bf5df43ffabcc1c3c39e9ec80b13fc57305035ece44241ce5ce26a94ff2287,2024-11-21T09:21:23.090000 CVE-2024-35994,0,0,fd24b6c74f07d76959a4e5c7dc8fd8b5418060428f4844117d8af41ee7dd54c0,2024-11-21T09:21:23.207000 -CVE-2024-35995,0,1,ae0f8c909a8564a625fbf71718d334962c0ebfd15c0e8945ee50dbebfde18cf8,2025-01-24T16:15:35.870000 +CVE-2024-35995,0,0,ae0f8c909a8564a625fbf71718d334962c0ebfd15c0e8945ee50dbebfde18cf8,2025-01-24T16:15:35.870000 CVE-2024-35996,0,0,a13038760306c3b9a1782c7a096c6830b6a7c18e69a72b02346120583ee4f780,2024-11-21T09:21:23.480000 CVE-2024-35997,0,0,54bb78c20a7d36c25a4fa0a0731a01d5a6be6d1d88ff50f6dfa8cc7bf2ee119f,2025-01-16T21:15:15.603000 CVE-2024-35998,0,0,73b2fdecdb97facc7eba42971cd617fe0100b4ccdfc7142094bbd0d48c338c30,2025-01-10T18:12:11.843000 @@ -261038,7 +261040,7 @@ CVE-2024-38475,0,0,cffda6a953163d4e08000545cbd4d92ba2e5d3654b5efce5be8544cd35b12 CVE-2024-38476,0,0,96df90db5dbf5efcc1d36711d52981a73ed110b8dfbeaa5665e3f3feb3c366d0,2024-12-02T17:36:33.403000 CVE-2024-38477,0,0,61c016535771a81220fcf93e40f52301771e6724b3cd648d2be13687108c8516,2024-11-21T09:26:03.687000 CVE-2024-38479,0,0,c70847aedbd201cfc354e550e0b90cec56f97441e95e9c598b1abef167a9ff30,2024-11-15T13:58:08.913000 -CVE-2024-3848,0,0,e7dead380f886044a08047d056a49634ecf97de7a75df88d6c834dfea33aa5ad,2024-11-21T09:30:32.090000 +CVE-2024-3848,0,1,1bb91ee395c277a929aef5b89902a90b679e2d6a3388b7e9b3f685b088b1075c,2025-01-24T17:28:21.717000 CVE-2024-38480,0,0,8fa161912c0761a853152d1feac8fbf447a9a2c195060b213f1ea7b76eade0d8,2024-11-21T09:26:04.080000 CVE-2024-38481,0,0,e569c1b2683e1d59dfe394dee132f7375b3825578031c3d522810bc8473f889e,2024-08-02T13:54:44.360000 CVE-2024-38482,0,0,23aec5fa68b4dca4b432634d8e07eea61a04bf96b789d1627bdb6ec4b3c1f391,2024-09-05T16:04:53.577000 @@ -262513,7 +262515,7 @@ CVE-2024-40689,0,0,41d3e4691112f48676cdb44eacf0cb30b856617ce94bb50310ea65e78ab40 CVE-2024-4069,0,0,94f7ce6ab537b8de29354ee99519ed1e16c84a745bc6420413a49d7a75f78144,2024-11-21T09:42:07.833000 CVE-2024-40690,0,0,ac3fd8879f79e94d956d55740e068f2d064b41dedd1ece8ce64e710fe502e9c1,2024-11-21T09:31:28.197000 CVE-2024-40691,0,0,ac3d9a2c16ecf56eb2b1909a87f2673e6fa5961b82ba378fe17aa1da2a76ba35,2024-12-11T03:29:39.627000 -CVE-2024-40693,1,1,a766486a4da8958f3b124ddec503f3d492382c471c0f01cbbb61129bd406d6ad,2025-01-24T16:15:36.003000 +CVE-2024-40693,0,0,a766486a4da8958f3b124ddec503f3d492382c471c0f01cbbb61129bd406d6ad,2025-01-24T16:15:36.003000 CVE-2024-40695,0,0,0d717382495ca983a078932b58ed2224b4fa40332fd067474a8fe684c9650d24,2024-12-20T14:15:24.063000 CVE-2024-40697,0,0,9675ffc87015078088b6658ddad78e8bbe317856a9033b7e633b65273e34d419,2024-08-22T13:27:20.743000 CVE-2024-4070,0,0,228e3a9486746eb131dc1faba8cea69af4b69cb949a0fc5caabe789181f2b9b7,2024-11-21T09:42:07.967000 @@ -262521,7 +262523,7 @@ CVE-2024-40702,0,0,0010d40778f1fffdc1b0664781c513393e67c7620d1ff605f896e7ca8cbe8 CVE-2024-40703,0,0,e703b61d3f8dfe06de226d6f2873ad12453588e6ae0585ecf895673088efbbbb,2024-09-27T16:49:46.177000 CVE-2024-40704,0,0,f1eefecca06d931cc6fa5c315f3cff483d4ea73258582e293da29f36971e3c43,2024-08-15T20:03:13.530000 CVE-2024-40705,0,0,498d1b36f9941cc45abf0a56c450cafece4560bbcc29015fb60565ec3b88fad7,2024-08-15T19:57:34.780000 -CVE-2024-40706,1,1,899648529268b5dd7aa0120ebdf92941e2befeda4e533507eb9ea8893dac3b53,2025-01-24T16:15:36.150000 +CVE-2024-40706,0,0,899648529268b5dd7aa0120ebdf92941e2befeda4e533507eb9ea8893dac3b53,2025-01-24T16:15:36.150000 CVE-2024-40709,0,0,fc599183e9661cbcade523183f2c327fbd248e82b89d065b196cf8d66176a6c5,2024-09-09T15:35:08.283000 CVE-2024-4071,0,0,6b7a15c8812d01f9851365bf0640804d8a54a0d07fe306e122faf1e050f7c253,2024-11-21T09:42:08.097000 CVE-2024-40710,0,0,770af878a2a59ef82e06d03d07cf0408429abb3e03291325079d2d5ef2519547,2024-09-09T17:35:04.207000 @@ -263294,7 +263296,7 @@ CVE-2024-41745,0,0,6dba06d9ea0cc08ac8425e0341c71668811a6cd02139664e48e7481acbda9 CVE-2024-41746,0,0,989806c900ffd11c21b1fa6f91d833c84f6c1680e4b868bdf0c4c4b2010f26cb,2025-01-16T18:15:22.863000 CVE-2024-4175,0,0,5386392290fa38470dd8910cd3753515f25308d1edd31217aca2a63897449a15,2024-11-21T09:42:20.143000 CVE-2024-41752,0,0,04e93d2aa0d5f5c09f5bd50535183c7216d854c9071e1cb65e129028f085fb9a,2025-01-10T19:33:46.213000 -CVE-2024-41757,1,1,86dee1a63b802864828bfad45904e2d060e928dbf41010ac4693c86a77817ec1,2025-01-24T16:15:36.297000 +CVE-2024-41757,0,0,86dee1a63b802864828bfad45904e2d060e928dbf41010ac4693c86a77817ec1,2025-01-24T16:15:36.297000 CVE-2024-4176,0,0,bbebb00d63b41a3619ef35d6461fab3b8fd8271367eb9c2415dbdbc268e57b15,2024-11-21T09:42:20.253000 CVE-2024-41761,0,0,183a2cec18f466d5717e002f6cd6d2700ac207cbdcd434bf78d86f226e394a03,2024-11-23T03:15:08.333000 CVE-2024-41762,0,0,4c983f99fd9207aedd2243856187958b4b9b76b67049382df79da756be6d51c0,2024-12-07T14:15:17.560000 @@ -263560,8 +263562,8 @@ CVE-2024-42063,0,0,1dc0e3eceec7c966a308f5bfbc1a1d7a5f8943e8860cb77572c15e6b32124 CVE-2024-42064,0,0,08c155819ebfecce7f7615d05475c569dcabf51be068ac4564908cf8f26d89ca,2024-11-21T09:33:30.947000 CVE-2024-42065,0,0,6181e79e1aacfa9bc47ded361ef72811ee4410260f401ba29eb5ef6fa08c30a9,2024-11-21T09:33:31.073000 CVE-2024-42066,0,0,3043da0f70a79c3b3b252165c7c5d6ab2c1406becd4a98d662e2104c5401a393,2024-11-21T09:33:31.197000 -CVE-2024-42067,0,1,e74017cb9121badb3d2fb0a06ac82142e7bfc44125b2552e8a4ea29e749cb404,2025-01-24T16:15:36.447000 -CVE-2024-42068,0,1,277da9d740ac387d5e0541658098326e17d362c859a2c3c2006284fac9f14160,2025-01-24T16:15:36.613000 +CVE-2024-42067,0,0,e74017cb9121badb3d2fb0a06ac82142e7bfc44125b2552e8a4ea29e749cb404,2025-01-24T16:15:36.447000 +CVE-2024-42068,0,0,277da9d740ac387d5e0541658098326e17d362c859a2c3c2006284fac9f14160,2025-01-24T16:15:36.613000 CVE-2024-42069,0,0,cce7976497f81a51a3dd28cdcacd5370bce9230faf00619a631b18a83e5d7104,2024-11-21T09:33:31.603000 CVE-2024-4207,0,0,df3204f1d50e212998336445794942adb13216ee6fcfe240a316951ee02db716,2024-09-18T12:41:29.313000 CVE-2024-42070,0,0,0685d29562caf5ed6e4b1e9abe3b5dd5d6edcc1735e178c343170c909a2fcce3,2024-11-21T09:33:31.740000 @@ -263708,7 +263710,7 @@ CVE-2024-42226,0,0,2d5e76969c1f0b438bed45c61874cec36b686b80128dcef7f9f95043b4a13 CVE-2024-42227,0,0,8f8280088a8c0ede77f59a0730412c09092742973c6824d19b85621f8ae00ec6,2024-11-21T09:33:45.603000 CVE-2024-42228,0,0,92788e39cba87c835c9cabe6851309d5340678792b1ac27b66afecf40c40bcaa,2024-11-21T09:33:45.750000 CVE-2024-42229,0,0,c1c650d90eaf3fa2ef9945c918f4dda3a135157b3aee095f9634b361e69f9fd9,2024-11-21T09:33:45.887000 -CVE-2024-4223,0,0,f239d638f1a1fa2f732889bbbc2bfa031f9f5e4bc1f2886895c6fa77c9fcf6d9,2024-11-21T09:42:25.150000 +CVE-2024-4223,0,1,7df3d4d8fecbcaa41ae361583a055efd573240af607d639184c8dcc4400884d6,2025-01-24T17:58:19.593000 CVE-2024-42230,0,0,af18a5f3770b456af2935d52b15bbcd492e35d3cfa9de0f42d41a4d6820163d6,2024-11-21T09:33:46.033000 CVE-2024-42231,0,0,46d7e508d0762971c3dcb5dad30392c8ef5fbe6250f39349c1d5f7c8bf43d923,2024-11-21T09:33:46.177000 CVE-2024-42232,0,0,4b8ab3cb19ac6cb852312db2d77d9d89e0d1af7971d031fc08f420eb02008759,2024-08-08T15:02:09.750000 @@ -264157,7 +264159,7 @@ CVE-2024-42786,0,0,85b09a5221a9594253db9b9c3fd2feaef5f83a51f4ec409ed7a5ba9e257e8 CVE-2024-42787,0,0,45f3ed868cc942437c0852e8b40e0543958b0fc69835a95cf364d4a1d605228a,2024-08-26T16:35:12.107000 CVE-2024-42788,0,0,eba477bbf8d922176673502f714569bef804f50992bdb2fc80a6d0ebf1d9500e,2024-08-26T19:35:29.970000 CVE-2024-42789,0,0,c3abb16e8c30602e0f327e18fd3c7a168c3a85d869c1621845f272b05306d65e,2024-08-27T20:35:34.673000 -CVE-2024-4279,0,0,3ee031c9aaac21d66b3a854911ccc3c116834aaaad04b75afa6cfbf601156373,2024-11-21T09:42:32.043000 +CVE-2024-4279,0,1,390066ee801519493819202272b1f7a405622ecc07038505d51a6828e138138a,2025-01-24T17:03:18.140000 CVE-2024-42790,0,0,539360a9beda973ab08fb912d592087f677c6fb9a6fff6589cd7f5b776b9bd5a,2024-09-05T18:36:04.237000 CVE-2024-42791,0,0,9ffda97a3c4e9d2b1bb65c6c60f82add6cc6a53f4f8ba5cf10604ce57358e9f9,2024-08-26T19:35:30.910000 CVE-2024-42792,0,0,d46d80558cda01ef420339b2588d51cdd59e10dffb1a2c4145461835bf0c2904,2024-09-05T18:35:24.220000 @@ -264382,7 +264384,7 @@ CVE-2024-4317,0,0,5b5e9e74799ba1a2d6d19fd0e10c6f6a1617c77f3e3ad0fc8833212ed75eb5 CVE-2024-43173,0,0,d8d2ac885c1902e546063772016f5d0005860b114ffe9d7489140ac6cd8bfc67,2024-10-25T15:40:19.977000 CVE-2024-43176,0,0,67ef639d68302e5458cf789165bf8b534cafee061131b6437c0c7535ddbce0f4,2025-01-09T15:15:15.737000 CVE-2024-43177,0,0,0d4884cc3bb5ef316ac2268cbd50954452c99cbd34944a23e957f2b36af6ec01,2024-10-25T16:05:15.777000 -CVE-2024-4318,0,0,0db2ca16a90821eae8b7b8535a1668ac54b91665e1ea3e5a748f4f131a1b3ce0,2024-11-21T09:42:36.927000 +CVE-2024-4318,0,1,fc62d21c2c8b26ac8e0d1cd9f3141fb17772267ec7a232271f2e38a2b9942358,2025-01-24T17:11:02.097000 CVE-2024-43180,0,0,6670a14096e07d80379b771c9a47c08fb6325e7824dc7bd81cd7b9a209c280c1,2024-09-20T17:28:06.617000 CVE-2024-43188,0,0,35ee6e8501322911378089524ec540a5a184dc89828aed8181b5a2e26a216c66,2024-09-29T00:24:49.103000 CVE-2024-43189,0,0,167da65acb79f1d31d6282e0f7371fa322d7e1ea30726b85e9e01b0a45ea77c4,2024-11-18T17:11:56.587000 @@ -265697,7 +265699,7 @@ CVE-2024-44945,0,0,afde5b91f3a8664304268059f4cbadc9815691eec0e16cc58397d9e7c1e15 CVE-2024-44946,0,0,2216be89407f69b7a66d357b00256c887df360d9639d29eeba9dcf5caa3453d6,2024-09-04T12:15:05.150000 CVE-2024-44947,0,0,8f801ba5159e9b8f9b3c4016ab8510468b13ef5ef3423053d9ce1c290e857f10,2024-11-23T23:15:03.810000 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 -CVE-2024-44949,0,1,828c604fa57423408676f510060dbc029847256085d4490faaea8281224c06bb,2025-01-24T16:15:36.763000 +CVE-2024-44949,0,0,828c604fa57423408676f510060dbc029847256085d4490faaea8281224c06bb,2025-01-24T16:15:36.763000 CVE-2024-4495,0,0,2c130c223b9972e591566196e9584b086727f4fd658b1edaeec00471e6f0d275,2024-11-21T09:42:56.860000 CVE-2024-44950,0,0,27e2180bd27b63f0d75864bb94426d70ed574ad49ccac5abe47c96450a1c2433,2024-12-14T21:15:24.140000 CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000 @@ -265831,7 +265833,7 @@ CVE-2024-45073,0,0,ddb4c27340658cb42df2ff98e474d882b5cca95df6d9db84fd1527d0e88d9 CVE-2024-45074,0,0,dd8d54c9d4e8a90203500f3837f7a68f83edce575be9eeb01abe4aedec3f0b62,2024-09-06T16:45:32.767000 CVE-2024-45075,0,0,03a325d99e9aaae9ce6cdcda7dc19958a7d4699a1b3c50bb69b2322eb1c7ef52,2024-09-06T16:45:12.980000 CVE-2024-45076,0,0,eb3cee64fe130784cdfbc414736fb4f58d6d633f4eb84170ae099934a833c82b,2024-09-06T16:44:52.310000 -CVE-2024-45077,1,1,b92089d8550178d65063b1d30e3e18ecf0fca6b3a4158f542d9106bdf20baf20,2025-01-24T16:15:36.903000 +CVE-2024-45077,0,0,b92089d8550178d65063b1d30e3e18ecf0fca6b3a4158f542d9106bdf20baf20,2025-01-24T16:15:36.903000 CVE-2024-4508,0,0,7ab716d1977417cf41aa4b0c86b8c6174f947212dc2b37b9a7b838a9393e9bd5,2024-11-21T09:42:58.970000 CVE-2024-45082,0,0,654e2014bb8a40c3daa06199b4082ee25f295dbbc2190046fcaf39d42d46c651,2025-01-10T19:34:56.253000 CVE-2024-45085,0,0,d83665b902e695b0351a452cf13e24b78d2419ea7439e442327b57c582a16d2d,2024-11-08T15:13:11.307000 @@ -266530,7 +266532,7 @@ CVE-2024-4614,0,0,eca609b72f6d0dbdf3e2930a517382c618b783ca5f3bbd2f9a2c62afa1f7de CVE-2024-4615,0,0,2ef0c847a0e7928efb8e726ca9f8d3082fb4a8f69966f52e098782a2c92ae089,2024-11-21T09:43:13.227000 CVE-2024-4616,0,0,c88a5bb19ffab0b116976f147bd01e0835cf9dd78a3350693b45be3922df36ca,2024-11-21T09:43:13.370000 CVE-2024-4617,0,0,591f2f27c42c02f697911ff625983cd1e4eaf8f3a464b0dba65cf73eb6c11bdb,2024-11-21T09:43:13.580000 -CVE-2024-4618,0,1,344fb57e11ecc3269da0e852eb09c883837fdcaedda34c53b2be452ba9572fa9,2025-01-24T16:37:51.287000 +CVE-2024-4618,0,0,344fb57e11ecc3269da0e852eb09c883837fdcaedda34c53b2be452ba9572fa9,2025-01-24T16:37:51.287000 CVE-2024-4619,0,0,14bb5af1dc671627629008d94a085bd654debd474fde8162d072b32fcf392846,2025-01-24T14:20:44.467000 CVE-2024-4620,0,0,ba6cb8b4b90a19279ffa16a083d9166077215ec27ed0288a47d1ce2ebcacc327,2024-11-21T09:43:13.923000 CVE-2024-46209,0,0,d3bbc915447ec1fe735ec63d5553d0fa25a7e9df2ec6f6285302779d3f6b2f93,2025-01-07T16:15:33.800000 @@ -267659,7 +267661,7 @@ CVE-2024-4768,0,0,549226b47b403dfb616cfdbc2bfe8fadde448b645debb0528dd2ce2cac6cac CVE-2024-47680,0,0,030785e66a4655efa22271cb7b52dcbe897f8c08a5d6064b3e7976d571357bc0,2024-10-24T13:28:28.393000 CVE-2024-47681,0,0,f5a0c6d7379c2cad3ebee4df0e49687fd7f34e91d3784a0eb776da1767bac770,2024-10-22T14:57:47.973000 CVE-2024-47682,0,0,578e24bb5cba83e014986f820ac82ef2b2265b290f4e6502badb63c6fb77e601,2024-10-23T14:57:12.700000 -CVE-2024-47683,0,1,8e07ecf8c6937a7659114533b03ec09306e7de866b68b7b273df6c55b4b98c6f,2025-01-24T16:15:37.083000 +CVE-2024-47683,0,0,8e07ecf8c6937a7659114533b03ec09306e7de866b68b7b273df6c55b4b98c6f,2025-01-24T16:15:37.083000 CVE-2024-47684,0,0,b54a4e64cdf3e2bc4834fecf66556953ac1a50c50eb47e473d91ef6f2eea793f,2024-11-08T16:15:24.967000 CVE-2024-47685,0,0,b4bf99dd84b095e7c0c1dd8bbaa3a6859323c974d3b8d63ad8cb9c5a9a115236,2024-11-08T16:15:25.083000 CVE-2024-47686,0,0,2a051325bb279ce8e81b7086b0e59d3484d9b1441269242f1c6b37a81c55805b,2024-10-23T15:34:50.460000 @@ -269113,7 +269115,7 @@ CVE-2024-49922,0,0,ffc68b36562765fec5170fe1e0345c28c5823e3d8a8ddcb742f1b9dae7699 CVE-2024-49923,0,0,0f879d7a00fcee7bb1596b66dff50f9095438a70fdececb4efcc2dcf410de9a0,2024-10-24T19:43:27.327000 CVE-2024-49924,0,0,dcce4a3a65c168bafbc9d3100a7b0a269bb75445a6fd618835da94050af45267,2024-11-08T16:15:31.683000 CVE-2024-49925,0,0,714d6927cfc4e01a3d694ffed5bbf41505a35a8867ce843e92b14a9ec84eaca2,2024-12-14T21:15:29.247000 -CVE-2024-49926,0,1,200369179196012f1051a8d57336f17c55ea7365fe200ed02fb52ba0bbdf5804,2025-01-24T16:15:37.237000 +CVE-2024-49926,0,0,200369179196012f1051a8d57336f17c55ea7365fe200ed02fb52ba0bbdf5804,2025-01-24T16:15:37.237000 CVE-2024-49927,0,0,d71d574fea6a132e82c12d79453e1a4258a4764d322896864b5eee383c464ecf,2024-11-13T14:58:48.243000 CVE-2024-49928,0,0,cbd6f5f7036a08151d0cdd6cb88f8285591e668c3162320f6d7af1526d159580,2024-10-25T15:22:31.013000 CVE-2024-49929,0,0,373487af66ee96a2d91c144d51abdd656512f5d6c2ef6d16a533e7a3b7e765be,2024-12-14T21:15:30.213000 @@ -269205,7 +269207,7 @@ CVE-2024-50007,0,0,667122f12c20fa78b46cd561aca3115ac4d299b30eab5d8c4c8a5542dd18e CVE-2024-50008,0,0,f218db06e1ea7e9d5e29318f9612994b0254f3a209a365a01b5f859f8d83363d,2024-11-08T16:15:40.927000 CVE-2024-50009,0,0,b4455754b28034e2990cb3358768fa5fb8479755556ce799fd088ea9116c3114,2024-11-01T15:32:35.593000 CVE-2024-5001,0,0,abc48e4949856934e47c869686db6fc0c0e7242aa23f73e6816a27082e1ac83e,2024-11-21T09:46:45.277000 -CVE-2024-50010,0,1,f2a20aee1e173e2c6989ba644c1d78faf848bcef6e57ac701eaa0329ec04b670,2025-01-24T16:15:37.430000 +CVE-2024-50010,0,0,f2a20aee1e173e2c6989ba644c1d78faf848bcef6e57ac701eaa0329ec04b670,2025-01-24T16:15:37.430000 CVE-2024-50011,0,0,725742d7fb4e740c5027236798b3fe82e1773849d90ded256f9fbd8f0d2a5093,2024-11-01T15:31:48.550000 CVE-2024-50012,0,0,5d59aefb4911863bceaba776dd1be933288e12b3985d3b249b25aeb5d365a9ad,2024-11-08T16:15:41.333000 CVE-2024-50013,0,0,6ed41fb2b9c26cab9746dc35ed920e0024449440410a4f2cef87abdfa896244c,2024-10-25T19:49:36.863000 @@ -269500,7 +269502,7 @@ CVE-2024-50279,0,0,57b9eb4bee2e4b8c746696d2f77e4b7a23b660ba2233137329bda9edd3e5a CVE-2024-5028,0,0,dd1dfc08c8c4ad0249eff6068a8953d40d7e70c3ce4697c65d3cb70a1f48c49d,2024-11-21T09:46:48.530000 CVE-2024-50280,0,0,b6a13b4a1bf730cfee2fa214d3a5f3f7f9268a884bdb652dd0a2e1369ec157e6,2024-12-11T15:15:14.733000 CVE-2024-50281,0,0,9089d0de95391a0377f6af8be3fbc8b5c88017f220930e10bade7b480247946e,2024-11-21T19:27:19.097000 -CVE-2024-50282,0,1,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000 +CVE-2024-50282,0,0,367c60d00902691cdb758438489880cd1d46074aa3eed6b968ca8c1faa501adb,2025-01-24T16:15:37.570000 CVE-2024-50283,0,0,f017f793453930cb04082ccfcfbd81c76f41fa2bfe137a71097ab2aa218aa805,2024-12-14T21:15:34.663000 CVE-2024-50284,0,0,0dd2f3e0d578dbadc046954dcf53364b51273841493d336e73c7cec144ecffef,2024-11-27T16:20:08.917000 CVE-2024-50285,0,0,57dd7110572199115d76d8b0594b83deda57634c8161b67a640ec65820d64279,2024-11-27T15:31:58.063000 @@ -273075,6 +273077,7 @@ CVE-2024-56378,0,0,fab67c7f7143f85c88660814de01440f680c12a24f807e1e2e38a3d85020b CVE-2024-5638,0,0,4a64496852c4ee147220588b5d1940917ce749a1b3dd56d16a77a8cf3ed54b84,2024-11-21T09:48:04.153000 CVE-2024-5639,0,0,78123d59d6ff1062d5cdcc1456c84b89eb240e57bd822aee818d4edc5bb804e5,2024-11-21T09:48:04.290000 CVE-2024-5640,0,0,01c62801966d56f9308a985efd017779bd36dfe950ad675d920936fb65a56c1f,2024-11-21T09:48:04.440000 +CVE-2024-56404,1,1,9f4deeafebabc745cc3dff480f380c557b4dfe89dbcbcbad779f703d0f976d17,2025-01-24T18:15:31.883000 CVE-2024-56408,0,0,231c67f9fc1f41f9606578a75272e2c2a9d506190f72a4802346eacd6c714911,2025-01-03T19:15:12.533000 CVE-2024-56409,0,0,a0be310b5d957146d6a04dd3071b8b9ffcc804a6eb6f1cb89943675a6d183542,2025-01-03T19:15:12.627000 CVE-2024-5641,0,0,2dd93bc7f72d9dace7fe09cc2f2eb2c7de91223a0269467571863f0c170a0712,2024-11-21T09:48:04.573000 @@ -273495,7 +273498,7 @@ CVE-2024-57161,0,0,a5c89c4fcaf2013dde33803c2e35f39270b837cce1b452b06abc4903399ec CVE-2024-57162,0,0,60c182cc7bdecdf8663a17fa18a906ebc08420924403492f251bb25cb53c4f36,2025-01-17T18:15:27.240000 CVE-2024-5717,0,0,fb2d4ea07d345b00fdb2b42ddabd6660deece1c7e8bb1f887295d0c9d91575e3,2024-11-22T20:15:10.227000 CVE-2024-5718,0,0,5319c47b63a6835fedbdcd43dc1fd8b869ba81977081921f790378b370cee719,2024-11-22T20:15:10.340000 -CVE-2024-57184,0,1,565cb1daf3da7d9569f4e11c18c75b0033fb6d108d599aa1c7bcfb5bc83ec4a1,2025-01-24T15:15:10.523000 +CVE-2024-57184,0,0,565cb1daf3da7d9569f4e11c18c75b0033fb6d108d599aa1c7bcfb5bc83ec4a1,2025-01-24T15:15:10.523000 CVE-2024-5719,0,0,3d2db656c5d1f0a79b62bae36bd1cd10161f3160ac0d855266c2bbd4d021243f,2024-11-22T20:15:10.450000 CVE-2024-5720,0,0,eb323a155cad85d456bd7c0f7894b5f9589ce98c04e2db5736a7c40744f539a9,2024-11-22T20:15:10.563000 CVE-2024-5721,0,0,f143dbbb695fa9f83fd9d3c9d9d3aaa920ced069d4617f7e2c69a39cb694b5ad,2024-11-22T20:15:10.677000 @@ -273915,14 +273918,14 @@ CVE-2024-5909,0,0,752d08318e9e6996c653a0326b8d95c79f41544af48e9d464337fb383cdb6a CVE-2024-5910,0,0,809032c1554caf15adc6ef3696e5c072f55bc8cbc0c3da859c4558e159670420,2024-11-27T17:23:02.910000 CVE-2024-5911,0,0,bb61927263d2341e1e4d29b238efafb06329a5341e4f6454fe7fa777b88bca98,2024-11-21T09:48:34.027000 CVE-2024-5912,0,0,f1baa69f560eb481c58139293216d53ba8d136d42bf8e87cbef3628e1730e90c,2024-11-21T09:48:34.157000 -CVE-2024-5913,0,1,7b1aa68ac0a4e9d9faa00942977fd6e9a638109385352a73d7f7681b334c4e01,2025-01-24T16:00:42.420000 +CVE-2024-5913,0,0,7b1aa68ac0a4e9d9faa00942977fd6e9a638109385352a73d7f7681b334c4e01,2025-01-24T16:00:42.420000 CVE-2024-5914,0,0,3ca964506b372b7ffd07173f52014abfedaf98e8c4cf22e70771102b1e6d61bf,2024-08-20T16:22:06.357000 CVE-2024-5915,0,0,73dadb526b2278e8453a98017da373ea86e9cba97e030683507d80a084bc54bb,2024-08-20T16:23:10.493000 CVE-2024-5916,0,0,449c4ba8257ad29baaab31d93eb064a26b6b13371041c634469bfc65dbf3a0e5,2024-08-20T19:30:11.980000 -CVE-2024-5917,0,1,0374c61ca43711fa0007048763452cf624fe05803520f6b8df2b2915e1805e7c,2025-01-24T16:04:54.887000 +CVE-2024-5917,0,0,0374c61ca43711fa0007048763452cf624fe05803520f6b8df2b2915e1805e7c,2025-01-24T16:04:54.887000 CVE-2024-5918,0,0,81bdc2190125b670e90203f3548cb48aebcc8fef030a219189e3db9809744209,2024-11-15T13:58:08.913000 -CVE-2024-5919,0,1,943f6ef8006790db3993b9e7e6be9754f42ed6ca13d49343ae1cb352e31363f6,2025-01-24T16:06:00.323000 -CVE-2024-5920,0,1,ecad2ed64a53475eca59c712b0209a60d186710654efe9484b614512aad9b560,2025-01-24T16:06:43.023000 +CVE-2024-5919,0,0,943f6ef8006790db3993b9e7e6be9754f42ed6ca13d49343ae1cb352e31363f6,2025-01-24T16:06:00.323000 +CVE-2024-5920,0,0,ecad2ed64a53475eca59c712b0209a60d186710654efe9484b614512aad9b560,2025-01-24T16:06:43.023000 CVE-2024-5921,0,0,7b078ebfa77a04f80dea3bb6728403f1db96a3dfaed7c57f149ae4e2d1706244,2024-11-27T04:15:14.687000 CVE-2024-5922,0,0,695f58e2e058442a55c514d990c8f571599bfa26e88ff8cd313f759acf5777fc,2024-11-21T09:48:35.113000 CVE-2024-5924,0,0,317522f79ef7e40c3687a78a629fe3c643f265f4648ccabd8de5057b9325f402,2024-11-23T00:42:38.983000 @@ -275447,7 +275450,7 @@ CVE-2024-7628,0,0,4bd4e14d76545c2e8bcfc51a6645f197df19cd176fabd50da5276351688734 CVE-2024-7629,0,0,7bc9d72619eba9ce5af5b25ffde36344f5d4d93091888459c631aca72d1ccb16,2024-09-27T17:32:43.853000 CVE-2024-7630,0,0,33c672fc773a2e63190d08a9eecf4698c94fc6c6c155959cec5f133d4ce8f81f,2024-08-19T13:00:23.117000 CVE-2024-7633,0,0,3b1df1487eb71af2061753f656e2660f3fdd60b89404cd84fa2c01a4dff29ee6,2024-08-12T13:38:45.690000 -CVE-2024-7634,0,1,b54395f95ee21bd46b61f00e1c7ee926a7e23332c8330b5915a810a5ca726cf2,2025-01-24T16:14:16.497000 +CVE-2024-7634,0,0,b54395f95ee21bd46b61f00e1c7ee926a7e23332c8330b5915a810a5ca726cf2,2025-01-24T16:14:16.497000 CVE-2024-7635,0,0,e36460d792c677fe4e87c32f8cc026963fda07d9440df512b0c7708b6927bc4e,2024-08-15T18:12:33.270000 CVE-2024-7636,0,0,60015977cfe4883a2345c9a11b46d14d60bae0b5a7fde2defe825bd04da7318c,2024-08-15T18:13:23.327000 CVE-2024-7637,0,0,10c37678741a2b4d17f774df181bb3827d620076d9c9c2981d772a89161feb4c,2024-08-15T18:15:15.667000 @@ -276981,16 +276984,16 @@ CVE-2024-9486,0,0,1b452503ede893d3e65a266241174108341b71fe44b15ee4fda7b816f6d955 CVE-2024-9487,0,0,ef00514eadc513cfacaedd7ee676be1805a7bd58524a19dd000f6c5f96f55cef,2024-11-15T16:57:10.080000 CVE-2024-9488,0,0,24a104ee042d409dac1b47e91dfe4fa3675de573a6d9c7b27917f05025555890,2024-11-06T14:57:04.457000 CVE-2024-9489,0,0,9258045c083103dfa924748299ab5c4dd4ec8da1f0d3cf12ca2c7454235f3440,2024-11-01T16:27:25.937000 -CVE-2024-9490,1,1,ab04b668e0c521a847b2aaa11d06587bbc09a902c191754c9e97a565e768a21e,2025-01-24T15:15:10.683000 -CVE-2024-9491,1,1,43c6b9a8aae248ac81ab7c5ee79c7044433359d7194a08285887dccec0f3f64c,2025-01-24T15:15:10.817000 -CVE-2024-9492,1,1,c68cb05c88b87e0dbb6f1ef756e5ab375c960cba332e04db69b17600fd8fa21e,2025-01-24T15:15:10.940000 -CVE-2024-9493,1,1,67366c07e7940df3be3d897e23f91d98274f158210428d808e8254875dbf3ac6,2025-01-24T15:15:11.070000 -CVE-2024-9494,1,1,66ef413896e37aa12e9f09732f37c9583004eac0a8813940db7445ea3b2cfdc6,2025-01-24T15:15:11.197000 -CVE-2024-9495,1,1,206dfae85689a14dde9f1c44758dc5f3f38f42fe28c7091bf63cd6ff42092e3c,2025-01-24T15:15:11.323000 -CVE-2024-9496,1,1,077109bca2695469d58b8fc88ae0bb712c25d887c3c51c44fe8c2d8e4b6352e7,2025-01-24T15:15:11.450000 -CVE-2024-9497,1,1,1e774906922e0bfcf1efa1909937432401699e57994a4a391072037afa9afc9d,2025-01-24T15:15:11.620000 -CVE-2024-9498,1,1,ef5be852619c204f6c541782d054b5851ae0a2d2a7d6f85fa22e6b6571a9188c,2025-01-24T15:15:11.793000 -CVE-2024-9499,1,1,eedfc8112fc604ecadcde80d6d4015b8d7b2c82dbba54f9ae94def5859549ccc,2025-01-24T15:15:11.967000 +CVE-2024-9490,0,0,ab04b668e0c521a847b2aaa11d06587bbc09a902c191754c9e97a565e768a21e,2025-01-24T15:15:10.683000 +CVE-2024-9491,0,0,43c6b9a8aae248ac81ab7c5ee79c7044433359d7194a08285887dccec0f3f64c,2025-01-24T15:15:10.817000 +CVE-2024-9492,0,0,c68cb05c88b87e0dbb6f1ef756e5ab375c960cba332e04db69b17600fd8fa21e,2025-01-24T15:15:10.940000 +CVE-2024-9493,0,0,67366c07e7940df3be3d897e23f91d98274f158210428d808e8254875dbf3ac6,2025-01-24T15:15:11.070000 +CVE-2024-9494,0,0,66ef413896e37aa12e9f09732f37c9583004eac0a8813940db7445ea3b2cfdc6,2025-01-24T15:15:11.197000 +CVE-2024-9495,0,0,206dfae85689a14dde9f1c44758dc5f3f38f42fe28c7091bf63cd6ff42092e3c,2025-01-24T15:15:11.323000 +CVE-2024-9496,0,0,077109bca2695469d58b8fc88ae0bb712c25d887c3c51c44fe8c2d8e4b6352e7,2025-01-24T15:15:11.450000 +CVE-2024-9497,0,0,1e774906922e0bfcf1efa1909937432401699e57994a4a391072037afa9afc9d,2025-01-24T15:15:11.620000 +CVE-2024-9498,0,0,ef5be852619c204f6c541782d054b5851ae0a2d2a7d6f85fa22e6b6571a9188c,2025-01-24T15:15:11.793000 +CVE-2024-9499,0,0,eedfc8112fc604ecadcde80d6d4015b8d7b2c82dbba54f9ae94def5859549ccc,2025-01-24T15:15:11.967000 CVE-2024-9500,0,0,d281910094387755c33adda8658eb046790675cd4af5161b6589be051fe5cd55,2024-11-18T17:11:17.393000 CVE-2024-9501,0,0,6a54c1f4c2f1d131dc91aaf803ea2d16e3173972cc5357c7b11859daf18eeb84,2024-10-28T13:58:09.230000 CVE-2024-9502,0,0,e3fb711f67887d1258017667f51437e489fede52d407ba36dbc6fd6d3d71d276,2025-01-07T07:15:28.360000 @@ -277657,9 +277660,12 @@ CVE-2025-0648,0,0,f9d79465ad3803b75ff57d725f789e40aa0e726161afba05440d8db3881a47 CVE-2025-0650,0,0,c255caf8716f9fc68172a701cd0571e8e2d98976a4a7a688b3c43cb943fe86cc,2025-01-23T18:15:33.110000 CVE-2025-0651,0,0,8c67aa0f80c9f1e30412c542495f9f971e1fa118a8f80db65a60da0b955bdf05,2025-01-22T18:15:20.363000 CVE-2025-0693,0,0,2dbd0ee2fa3f9bda7df2c547c0b425cdbbb9ef75c33ee753ae3804f02fa74725,2025-01-23T22:15:15.397000 -CVE-2025-0697,1,1,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000 -CVE-2025-0698,1,1,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000 -CVE-2025-0699,1,1,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000 +CVE-2025-0697,0,0,2b300d6fe20cc05389e1f1da76da10c584853d80e73da80ea6280f5fc93d0276,2025-01-24T15:15:12.130000 +CVE-2025-0698,0,0,41b2c00dd6b2e11497e6ad0d5935ff7e418c7e8ce23cb7590bf86289758b8bd6,2025-01-24T16:15:37.717000 +CVE-2025-0699,0,0,a52cce5fc729b9f7c244ab5c5dc069fe63ab6c6e0e5e97843aece40a8ddee923,2025-01-24T16:15:37.977000 +CVE-2025-0700,1,1,aab49e7b57968ae9bb6bdc55a4a334c3e455c1fe53b7d97f3c04ebd86124676b,2025-01-24T17:15:14.517000 +CVE-2025-0701,1,1,ed54a30cd5bec9a382b4386379ee73a17b4fb606ffc8ee86cda1de75e134fd3c,2025-01-24T17:15:14.730000 +CVE-2025-0702,1,1,13a501903b381eeb26ae5972c4ea5e951078e29cd62f66fcd05996ed0a782b66,2025-01-24T18:15:32.087000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277993,7 +277999,7 @@ CVE-2025-21650,0,0,8999d80331f22604edddfd75667fe17eab77150206057afd0258b361cf1da CVE-2025-21651,0,0,08b0d285d803ce14ca95c51ff0bb6822af7a1dfa543a30bb044ccb678d352dfa,2025-01-19T11:15:10.733000 CVE-2025-21652,0,0,781ce4cdff4e60cfb6f8b0eb373b8634b7b2c8bf54de4c678c30aac3d57ceb30,2025-01-19T11:15:10.830000 CVE-2025-21653,0,0,e35c4eae1c7c810cbfb3e7931a2f36e3cb97bd011910726fd74483aea7a0d58a,2025-01-23T17:15:26.243000 -CVE-2025-21654,0,1,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000 +CVE-2025-21654,0,0,4ec90f1484bdb180e8872bd379989357ef5549f6f68655399ae0221a6a448c8e,2025-01-24T16:15:38.177000 CVE-2025-21655,0,0,e5a98c6155ef95beaa77c8f70c04ef1a52b9c9b57ffc8aa737b1a8a15dabbd07,2025-01-20T14:15:27.027000 CVE-2025-21656,0,0,e08de214fec57f5455004c22ab31652820945256042ce332af5f60bc4ee6b0eb,2025-01-21T13:15:09.240000 CVE-2025-21657,0,0,58d21ab8ed420cad449dc9439925bd7a4bd93e784737aa1340191a73104f8bd9,2025-01-21T13:15:09.340000 @@ -278209,9 +278215,14 @@ CVE-2025-22597,0,0,42b7f0ad3f97eec140e81e3432e0004fde0e857d31ddfb4970711f713c779 CVE-2025-22598,0,0,71a9628cd5b8a378efc6a4f0fbba9bc5be356eced51ee0c58585106238174184,2025-01-10T16:15:30.540000 CVE-2025-22599,0,0,b57c2c3eae861ece051af1f1ef69acd0bb3a29c0b52e5a721d4d190a6e483927,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f0b1,2025-01-10T16:15:30.940000 -CVE-2025-22605,1,1,8133d836964af94521533e50666e61283a9b57a268e19bb256ac814dc1dfcd5e,2025-01-24T15:15:12.330000 -CVE-2025-22606,1,1,3d923e303b156c53bd4343472a4e5b113d35cd4273c3f9114587d96dd8d17f7e,2025-01-24T16:15:38.307000 -CVE-2025-22607,1,1,168bb9e66a3ed8b4ee8d63dbea88df36b4ba59b92d437413a77aabe7acfe1fcf,2025-01-24T16:15:38.470000 +CVE-2025-22605,0,0,8133d836964af94521533e50666e61283a9b57a268e19bb256ac814dc1dfcd5e,2025-01-24T15:15:12.330000 +CVE-2025-22606,0,0,3d923e303b156c53bd4343472a4e5b113d35cd4273c3f9114587d96dd8d17f7e,2025-01-24T16:15:38.307000 +CVE-2025-22607,0,0,168bb9e66a3ed8b4ee8d63dbea88df36b4ba59b92d437413a77aabe7acfe1fcf,2025-01-24T16:15:38.470000 +CVE-2025-22608,1,1,0c7ef24982b3f5eceaa10491abc354cc7f9eb2cf42b3660392d310512b6c0ec8,2025-01-24T17:15:14.960000 +CVE-2025-22609,1,1,02fe93f2e652a6bff4b8791eb8a4f4685c6bd9820625fffe434bf0e411d383f5,2025-01-24T17:15:15.100000 +CVE-2025-22610,1,1,5ae4b17a409ea68afd6223ae506d5dd4fa1ee84ef818aa22d33763454c9ebdd6,2025-01-24T17:15:15.237000 +CVE-2025-22611,1,1,e166844a80d71db30b3de346ec9a551ff3258f0fef744eb0ff7f0d563752126d,2025-01-24T17:15:15.410000 +CVE-2025-22612,1,1,61993c9ea9d32d9a679dfa0319d3a1ed694b0c900dac40afe946dd2becfee666,2025-01-24T17:15:15.570000 CVE-2025-22613,0,0,aad2f12635038b5a8cde416e18c507c3fb94ff08ed3ac7216fed29e0755971c1,2025-01-14T01:15:17.580000 CVE-2025-22614,0,0,d656f7b32b5f198b4bb45970b1a94ba1a87474675109e3354122f9cf920f1c84,2025-01-13T21:15:14.967000 CVE-2025-22615,0,0,2a8f7e50fe035fc366011623a2b600d00f80d19938ec5c5a0af1c9fd13d1c4e2,2025-01-13T21:15:15.110000 @@ -278408,6 +278419,7 @@ CVE-2025-23218,0,0,0d9a220919abe3a17ac7afcfc75e9654aeb452859503c7554f342466bfb43 CVE-2025-23219,0,0,7bfc816a66d36eeb8427d1e438890d0ae6033f069415e0175c799b53ab2c0b1e,2025-01-21T15:15:15.247000 CVE-2025-23220,0,0,7594bd1f2d5770c36a55b5b9fd690b04bf7606bfe4b3acd2181f9cbade146b08,2025-01-21T15:15:15.430000 CVE-2025-23221,0,0,b9e220051865326d7bce5e6fa27b18637659ac0f27be03003737cde64e90648d,2025-01-20T17:15:07.987000 +CVE-2025-23222,1,1,6e6cf8752e018e416c67330a2d8c338b5d549b55c5c98add2ee5e3a6cab2ac5a,2025-01-24T17:15:15.730000 CVE-2025-23227,0,0,75fe948a80947a9372caedcd96d18d272ac6c356759cc5bc5433fe8af18f71c1,2025-01-23T18:15:33.440000 CVE-2025-23237,0,0,d204c5fb01db488a0f6e27659293f1738cb1ba3c0404ed666043b41f571f334e,2025-01-22T06:15:14.480000 CVE-2025-23366,0,0,3312897ce94f2285a7d2a9ec8c23b065acb503e3b2f9a747e3e7ca809adbfbea,2025-01-14T18:16:06.290000 @@ -278749,7 +278761,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,fc7e5999f530a14a10296c13e28375f3f98dfdb4b4ec37b22cf284eaa57194f2,2025-01-22T15:15:26.950000 -CVE-2025-23991,1,1,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 +CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 CVE-2025-23992,0,0,b353942bf3f0d4eb4ddb991ecb2094a0114d56869df6885590beeb621557c514,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,70f6bae30845c345a2a47659ac6161a5d38902de51586bdd3566df0acd6686b4,2025-01-21T18:15:17.313000 CVE-2025-23996,0,0,ae90e408390ff598631802aba137fcf08482552e78b237e33cc88a7d0fe325b3,2025-01-21T18:15:17.503000 @@ -278766,12 +278778,16 @@ CVE-2025-24018,0,0,253cb165de2151aa99c00e094e395864d5f28218ab550c9418de5b539f47c CVE-2025-24019,0,0,d677e8b4264557b8de91d13cc1839d782f81c7838cdf1014e4423ff0e2378420,2025-01-21T18:15:17.933000 CVE-2025-24020,0,0,d1d82909cc1d36cd28a38444ff637a664659fd65670255997925f7aeb54551d2,2025-01-21T18:15:18.157000 CVE-2025-24024,0,0,cc1a55cdc4aa0884265065c04ec8fcbe647c671a5eda489d6e2b90242b0234c1,2025-01-21T20:15:46.617000 +CVE-2025-24025,1,1,ba0a50ab42754ad7310c91bd7b375b61cce55c348a10f0db06fba7898b24397c,2025-01-24T17:15:15.900000 CVE-2025-24027,0,0,b4b9d72fc8e3425a087a0a1486908f265d010b0a775752f732c367a7acbbe48d,2025-01-22T15:15:27.090000 CVE-2025-24030,0,0,e2fd122b8248f003d111dc0b5ddf9576f531248dec679d6a485c837f76e061a9,2025-01-23T04:15:07.100000 CVE-2025-24033,0,0,5298ddf90a31dd5bed434b92ade2e1e1f159bb928c748f338aa55ed871c1edd6,2025-01-23T18:15:33.610000 CVE-2025-24034,0,0,01368f671e1ddc2c3ae3eb7ad36c77d52e8bbadd88990239d386e351378f82b1,2025-01-23T18:15:33.793000 CVE-2025-24337,0,0,07d30bbea6dfa209bcd4c6bc43756d477d6586721f50f7d7909041753d5deb68,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,10800d697e68cd55cff6432e6a23d04d139654b7a35f7e8dc56fa2c5247f6ece,2025-01-23T18:15:33.990000 +CVE-2025-24355,1,1,df091ddf8aeeb5f247d7b78b7e73863226f57cadf3f514eb1d8aa9b7831cf7ba,2025-01-24T17:15:16.047000 +CVE-2025-24359,1,1,fe898aa41d1a6ecee2652ccd06e899fa4186d85ca361d42c0af02e968484e3d0,2025-01-24T17:15:16.197000 +CVE-2025-24362,1,1,bd0008c19e13cbed43d9a180a0c8a1357e3b6112b693da2df160b4b2a8f315e9,2025-01-24T18:15:32.383000 CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000 CVE-2025-24398,0,0,17fdec77669ad9ad2442f8bfcba68e0f31676d9e19986be37cb27c2c0527b869,2025-01-23T16:15:40.920000 CVE-2025-24399,0,0,5022626df407f9335397c8d8aa775d254829312030eabbf3f85ce199b116608f,2025-01-23T15:15:13.440000 @@ -278787,3 +278803,107 @@ CVE-2025-24460,0,0,97eab806c8a3d30547891d4eaab3684701aff9d96e2ee7ed4dd851798df98 CVE-2025-24461,0,0,4661385da2b0856294db236374b642678d50c8f98ffe4c271a944c44e0c44892,2025-01-21T18:15:19.260000 CVE-2025-24529,0,0,7459c8f6ea6572438be054043522f6ad7d47bb47712c68b14b3279374ca9499e,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,26bcbc2a7fc8ce39ab2344c25221d31ecec6ecd190428b8d21eb1bedd98340f6,2025-01-23T06:15:27.893000 +CVE-2025-24542,1,1,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 +CVE-2025-24543,1,1,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 +CVE-2025-24546,1,1,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 +CVE-2025-24547,1,1,c177583f7b4a7259791b6ebcff6a352143f7ed52e1ea2f3eabe18b6e76e995e9,2025-01-24T18:15:33.063000 +CVE-2025-24552,1,1,5836fd4cff67061da1a022b37868b2f3c365d2f5d165ede2a999174e0f3c027d,2025-01-24T18:15:33.257000 +CVE-2025-24555,1,1,d47f17b8e2e295cf6139e94a64e84d237163885ad2ad17216990f34a21e900fe,2025-01-24T18:15:33.440000 +CVE-2025-24561,1,1,c698bd2c648564da7cb8a5ead03f00bdcfe0f5e2d45f91fef21ce218041ca538,2025-01-24T18:15:33.623000 +CVE-2025-24562,1,1,f5a2b27ad0b893f9e361ae02017813ce34418cc837106061d965034991fc502e,2025-01-24T18:15:33.810000 +CVE-2025-24568,1,1,76160f57a35703cc1bc60dd8f4bddda882f344202b02d103baf733d8125cff67,2025-01-24T18:15:33.987000 +CVE-2025-24570,1,1,c28f0a95c222bf88ff7e9dd87509b02b35c9c870ecf7971f96c34cc8feb983a7,2025-01-24T18:15:34.147000 +CVE-2025-24571,1,1,12bfb570d5dbb7308e59de1fd0e176919ad5f022d4e611da786987fff50f0ad8,2025-01-24T18:15:34.320000 +CVE-2025-24572,1,1,e3ac7a79beb24ee51d610adb2cb92f6370de0683b7c71a16d0715c9b9818df2d,2025-01-24T18:15:34.477000 +CVE-2025-24573,1,1,a36ec8cef6808cd3d1fb49d9f183a488e91ea170f05b12416bdf37b36e6a11dd,2025-01-24T18:15:34.640000 +CVE-2025-24575,1,1,b03818ba1e4c3aeeb27298e818e610b716ce9803fac1b0ad6bda5ddd15380e71,2025-01-24T18:15:34.793000 +CVE-2025-24578,1,1,9ebad620682ffd1f3787c587a27256d6a506f18cbd8a1ce1d1120fd892563b95,2025-01-24T18:15:34.947000 +CVE-2025-24579,1,1,39320e1ca3cff811d077bb02f394492c461e2541554c51a875dd94da458bac42,2025-01-24T18:15:35.090000 +CVE-2025-24580,1,1,ab85777d568cb058beb30f27c69bfb0e37c8ac9491945266f51ef971bad94724,2025-01-24T18:15:35.247000 +CVE-2025-24582,1,1,209ec204e7084e59b84c8b89cb45a02f8bb82fd1340ff31459e78d9843eb29cf,2025-01-24T18:15:35.397000 +CVE-2025-24585,1,1,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6fc0,2025-01-24T18:15:35.550000 +CVE-2025-24587,1,1,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 +CVE-2025-24588,1,1,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 +CVE-2025-24589,1,1,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 +CVE-2025-24591,1,1,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 +CVE-2025-24594,1,1,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 +CVE-2025-24595,1,1,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 +CVE-2025-24596,1,1,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 +CVE-2025-24604,1,1,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 +CVE-2025-24610,1,1,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 +CVE-2025-24611,1,1,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 +CVE-2025-24613,1,1,a70c00764d3411f7b1338b628fc12a47b1328b33b9da5afc488f76f92c8b96df,2025-01-24T18:15:37.277000 +CVE-2025-24618,1,1,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914cb5,2025-01-24T18:15:37.430000 +CVE-2025-24622,1,1,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 +CVE-2025-24623,1,1,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 +CVE-2025-24625,1,1,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 +CVE-2025-24627,1,1,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 +CVE-2025-24633,1,1,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 +CVE-2025-24634,1,1,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 +CVE-2025-24636,1,1,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 +CVE-2025-24638,1,1,771d55a14f39075844370a6399a01b34d18de7f194d5cd5f84255753a3dd779b,2025-01-24T18:15:38.670000 +CVE-2025-24644,1,1,5a47ee9c1d078a6ab6544254498806ccdab795bbe804f919ad0351c4bf3bd942,2025-01-24T18:15:38.833000 +CVE-2025-24647,1,1,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a07d,2025-01-24T18:15:39.007000 +CVE-2025-24649,1,1,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 +CVE-2025-24650,1,1,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 +CVE-2025-24652,1,1,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 +CVE-2025-24657,1,1,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 +CVE-2025-24658,1,1,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 +CVE-2025-24659,1,1,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 +CVE-2025-24663,1,1,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 +CVE-2025-24666,1,1,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 +CVE-2025-24668,1,1,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 +CVE-2025-24669,1,1,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 +CVE-2025-24672,1,1,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 +CVE-2025-24673,1,1,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 +CVE-2025-24674,1,1,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 +CVE-2025-24675,1,1,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 +CVE-2025-24678,1,1,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 +CVE-2025-24679,1,1,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 +CVE-2025-24681,1,1,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 +CVE-2025-24682,1,1,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 +CVE-2025-24683,1,1,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 +CVE-2025-24687,1,1,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 +CVE-2025-24691,1,1,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 +CVE-2025-24693,1,1,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 +CVE-2025-24695,1,1,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 +CVE-2025-24696,1,1,1bb0ad0f28b2f0aa4961a30841714ea0e1b020038a68374887cd31646c83c0a0,2025-01-24T18:15:42.900000 +CVE-2025-24698,1,1,5c6684bbe39da2344d05dc8369ce68303ac286e14087e1cfdab558d06ff959cb,2025-01-24T18:15:43.050000 +CVE-2025-24701,1,1,dea6057bf9aed9ebbded4621add56011ab64912e4c0c93cfb43244bc165ca256,2025-01-24T18:15:43.207000 +CVE-2025-24702,1,1,fa01a1892360f33df64499b6533d30d0eda438a0d10cb84aa1d78d8bdca1c3af,2025-01-24T18:15:43.360000 +CVE-2025-24703,1,1,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f4111a,2025-01-24T18:15:43.520000 +CVE-2025-24704,1,1,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 +CVE-2025-24705,1,1,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 +CVE-2025-24706,1,1,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 +CVE-2025-24709,1,1,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 +CVE-2025-24711,1,1,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 +CVE-2025-24712,1,1,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 +CVE-2025-24713,1,1,8966c71c53790b1b9ead199719a98f45f6076ff08526301a47eed7a249ba7a5b,2025-01-24T18:15:44.630000 +CVE-2025-24714,1,1,01c79f3d6975fa00ca9de87ee51395e5de6793c68e48bd2909badc648a193078,2025-01-24T18:15:44.773000 +CVE-2025-24715,1,1,918d31ff258da35c7d5a3cb0c4c244eba5a3169754271f2070db9f98a76d2e96,2025-01-24T18:15:44.913000 +CVE-2025-24716,1,1,b60cda0ae81f3b0923fa7b26df1f0e620ddd729d40eb70ccadd9577c7ee769ce,2025-01-24T18:15:45.057000 +CVE-2025-24717,1,1,192c45824352b7ecf8a017aadf0ae5aeb9949e337e41e88029f7cee314070cf4,2025-01-24T18:15:45.210000 +CVE-2025-24719,1,1,b6a5eaae7b6b9dac2df9124e88387d1f1ef87c3d0c79dd412c3d005280b66ed8,2025-01-24T18:15:45.360000 +CVE-2025-24720,1,1,9c714f59d0192e69fce2a5027c9e7738070e04ddd86e75e44b28cff60eb7786a,2025-01-24T18:15:45.523000 +CVE-2025-24721,1,1,87c237eedc92baee03d4c2c20cc1d540e9d333bd80081e1b8926ab4576af7541,2025-01-24T18:15:45.667000 +CVE-2025-24722,1,1,106540240b595e1aec5b8fa9e09f91f9ee3b9bb7a5c4be42b1402891197f70b9,2025-01-24T18:15:45.840000 +CVE-2025-24723,1,1,e34ffe38900ed8b7d4bc696f0229b29b7d1ca4b5fb0c61b9dd36098e52476bca,2025-01-24T18:15:46 +CVE-2025-24724,1,1,0c3c230f2335636de94b352c856fdddbd7ec4c077414cf5b34eb16c72c531ba3,2025-01-24T18:15:46.170000 +CVE-2025-24725,1,1,39badf212b726e7acaa4e97dbd766cb1126545014d5a091f440369ce9c726ba9,2025-01-24T18:15:46.357000 +CVE-2025-24726,1,1,0c0816fefa045232d048f04bb8178baf633ca23ec380c328b637ada0a73cedca,2025-01-24T18:15:46.530000 +CVE-2025-24727,1,1,f6ea1216d7a0db8d183fdda471a5a76fe0233610c79b1707065671886662a268,2025-01-24T18:15:46.707000 +CVE-2025-24728,1,1,84aa2685db206700b76b940bbded488e49e9d7953e58eaddab9851c7759e111a,2025-01-24T18:15:46.877000 +CVE-2025-24729,1,1,d4888141917a917f0b67ea47914b3667525b7d5bb6bec0dc6db20c9739de0d40,2025-01-24T18:15:47.037000 +CVE-2025-24730,1,1,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b007,2025-01-24T18:15:47.193000 +CVE-2025-24731,1,1,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 +CVE-2025-24732,1,1,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 +CVE-2025-24733,1,1,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 +CVE-2025-24736,1,1,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 +CVE-2025-24738,1,1,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 +CVE-2025-24739,1,1,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 +CVE-2025-24746,1,1,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 +CVE-2025-24750,1,1,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 +CVE-2025-24751,1,1,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 +CVE-2025-24753,1,1,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 +CVE-2025-24755,1,1,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 +CVE-2025-24756,1,1,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000