diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json index c1c6c45029d..8f8f9acbdc0 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12233.json @@ -2,8 +2,8 @@ "id": "CVE-2017-12233", "sourceIdentifier": "psirt@cisco.com", "published": "2017-09-29T01:34:48.827", - "lastModified": "2024-11-21T03:09:05.490", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:59:51.937", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json index c61c6e56343..d4ae752464e 100644 --- a/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json +++ b/CVE-2017/CVE-2017-122xx/CVE-2017-12234.json @@ -2,8 +2,8 @@ "id": "CVE-2017-12234", "sourceIdentifier": "psirt@cisco.com", "published": "2017-09-29T01:34:48.857", - "lastModified": "2024-11-21T03:09:05.637", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:59:57.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json b/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json index 7f225fbbaa4..52cf019f6d5 100644 --- a/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json +++ b/CVE-2018/CVE-2018-145xx/CVE-2018-14558.json @@ -2,8 +2,8 @@ "id": "CVE-2018-14558", "sourceIdentifier": "cve@mitre.org", "published": "2018-10-30T18:29:00.580", - "lastModified": "2024-11-21T03:49:18.470", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:28:06.513", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json b/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json index e0c2329e0c0..80a63b47239 100644 --- a/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json +++ b/CVE-2018/CVE-2018-158xx/CVE-2018-15811.json @@ -2,8 +2,8 @@ "id": "CVE-2018-15811", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-03T17:15:10.110", - "lastModified": "2024-11-21T03:51:29.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:22:20.060", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json b/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json index 519ee7204e9..2095647b3a8 100644 --- a/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json +++ b/CVE-2018/CVE-2018-183xx/CVE-2018-18325.json @@ -2,8 +2,8 @@ "id": "CVE-2018-18325", "sourceIdentifier": "cve@mitre.org", "published": "2019-07-03T17:15:10.250", - "lastModified": "2024-11-21T03:55:42.947", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:25:19.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json index 9051c821bb7..35b218ce84d 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19320.json @@ -2,8 +2,8 @@ "id": "CVE-2018-19320", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.493", - "lastModified": "2024-11-21T03:57:43.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:14:57.503", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json index 9261c551330..791e7624d9a 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19321.json @@ -2,8 +2,8 @@ "id": "CVE-2018-19321", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.573", - "lastModified": "2024-11-21T03:57:43.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:15:03.737", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json index 055349b9e08..acc033af784 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19322.json @@ -2,8 +2,8 @@ "id": "CVE-2018-19322", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.650", - "lastModified": "2024-11-21T03:57:43.340", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:15:10.263", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json index f54ee8d8eef..a642c0a682f 100644 --- a/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json +++ b/CVE-2018/CVE-2018-193xx/CVE-2018-19323.json @@ -2,8 +2,8 @@ "id": "CVE-2018-19323", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-21T23:29:00.730", - "lastModified": "2024-11-21T03:57:43.510", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:15:16.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json b/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json index 8c4263a129a..c3afe2d9df9 100644 --- a/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json +++ b/CVE-2018/CVE-2018-200xx/CVE-2018-20062.json @@ -2,8 +2,8 @@ "id": "CVE-2018-20062", "sourceIdentifier": "cve@mitre.org", "published": "2018-12-11T18:29:00.197", - "lastModified": "2024-11-21T04:00:49.783", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:27:54.640", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json b/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json index 23bbaccee31..4f5aca48fd6 100644 --- a/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json +++ b/CVE-2018/CVE-2018-207xx/CVE-2018-20753.json @@ -2,8 +2,8 @@ "id": "CVE-2018-20753", "sourceIdentifier": "cve@mitre.org", "published": "2019-02-05T06:29:00.593", - "lastModified": "2024-11-21T04:02:05.987", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:15:26.790", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json index a92141c0db6..92a7cd4d1d0 100644 --- a/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json +++ b/CVE-2018/CVE-2018-65xx/CVE-2018-6530.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6530", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-06T20:29:00.987", - "lastModified": "2024-11-21T04:10:50.700", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:28:32.227", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json index 4bdf9ee0d85..86a5119c4e3 100644 --- a/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json +++ b/CVE-2018/CVE-2018-67xx/CVE-2018-6789.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6789", "sourceIdentifier": "cve@mitre.org", "published": "2018-02-08T23:29:01.170", - "lastModified": "2024-11-21T04:11:12.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:28:21.723", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { diff --git a/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json b/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json index 72663b99a82..7eff461dab2 100644 --- a/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json +++ b/CVE-2018/CVE-2018-68xx/CVE-2018-6882.json @@ -2,8 +2,8 @@ "id": "CVE-2018-6882", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-27T16:29:00.530", - "lastModified": "2024-11-21T04:11:21.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:28:13.887", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "baseScore": 6.1, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", diff --git a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json index 4da1ec74574..a05380b6eeb 100644 --- a/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json +++ b/CVE-2018/CVE-2018-74xx/CVE-2018-7445.json @@ -2,8 +2,8 @@ "id": "CVE-2018-7445", "sourceIdentifier": "cve@mitre.org", "published": "2018-03-19T21:29:01.083", - "lastModified": "2024-11-21T04:12:09.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:28:38.260", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -16,13 +16,13 @@ } ], "metrics": { - "cvssMetricV30": [ + "cvssMetricV31": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { - "version": "3.0", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "baseScore": 9.8, "baseSeverity": "CRITICAL", "attackVector": "NETWORK", diff --git a/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json b/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json index cbe2b44d202..8071f179807 100644 --- a/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json +++ b/CVE-2020/CVE-2020-103xx/CVE-2020-10370.json @@ -2,7 +2,7 @@ "id": "CVE-2020-10370", "sourceIdentifier": "cve@mitre.org", "published": "2024-11-11T00:15:13.707", - "lastModified": "2024-11-12T13:55:21.227", + "lastModified": "2025-01-27T18:15:28.260", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -15,7 +15,30 @@ "value": "Ciertos chips combinados inal\u00e1mbricos Cypress (y Broadcom) como CYW43455, cuando no hay una actualizaci\u00f3n de firmware Bluetooth del 26/01/2021, permiten una interrupci\u00f3n del Bluetooth a trav\u00e9s de un ataque \"Spectra\"." } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2052676", diff --git a/CVE-2021/CVE-2021-340xx/CVE-2021-34076.json b/CVE-2021/CVE-2021-340xx/CVE-2021-34076.json index 4e8b7157ff4..a6edb4477a1 100644 --- a/CVE-2021/CVE-2021-340xx/CVE-2021-34076.json +++ b/CVE-2021/CVE-2021-340xx/CVE-2021-34076.json @@ -2,7 +2,7 @@ "id": "CVE-2021-34076", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T12:15:09.070", - "lastModified": "2024-11-21T06:09:52.990", + "lastModified": "2025-01-27T17:15:08.853", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-434" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-434" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json index b5be96d2c5b..f2167540b94 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46759.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46759", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.240", - "lastModified": "2024-11-21T06:34:39.520", + "lastModified": "2025-01-27T18:15:28.957", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "PHYSICAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 0.9, + "impactScore": 5.2 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json index f6ede999c27..5294a258b0a 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46760.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46760", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.283", - "lastModified": "2024-11-21T06:34:39.797", + "lastModified": "2025-01-27T18:15:29.347", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-119" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json b/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json index 5abc00a98ff..5122cf3a3f6 100644 --- a/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json +++ b/CVE-2021/CVE-2021-467xx/CVE-2021-46765.json @@ -2,7 +2,7 @@ "id": "CVE-2021-46765", "sourceIdentifier": "psirt@amd.com", "published": "2023-05-09T20:15:12.327", - "lastModified": "2024-11-21T06:34:40.437", + "lastModified": "2025-01-27T18:15:29.550", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-125" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json index d421e32a647..3a8014dce9b 100644 --- a/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json +++ b/CVE-2022/CVE-2022-206xx/CVE-2022-20685.json @@ -2,7 +2,7 @@ "id": "CVE-2022-20685", "sourceIdentifier": "psirt@cisco.com", "published": "2024-11-15T16:15:21.910", - "lastModified": "2024-11-18T17:11:56.587", + "lastModified": "2025-01-27T18:15:29.790", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,27 @@ "cvssMetricV31": [ { "source": "psirt@cisco.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", @@ -49,6 +69,16 @@ "value": "CWE-190" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-190" + } + ] } ], "references": [ diff --git a/CVE-2022/CVE-2022-471xx/CVE-2022-47129.json b/CVE-2022/CVE-2022-471xx/CVE-2022-47129.json index 6dcba72769b..dfca63e07d5 100644 --- a/CVE-2022/CVE-2022-471xx/CVE-2022-47129.json +++ b/CVE-2022/CVE-2022-471xx/CVE-2022-47129.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47129", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T14:15:19.623", - "lastModified": "2024-11-21T07:31:32.930", + "lastModified": "2025-01-27T17:15:09.930", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "configurations": [ diff --git a/CVE-2022/CVE-2022-478xx/CVE-2022-47880.json b/CVE-2022/CVE-2022-478xx/CVE-2022-47880.json index 840206077f7..b7a12a89581 100644 --- a/CVE-2022/CVE-2022-478xx/CVE-2022-47880.json +++ b/CVE-2022/CVE-2022-478xx/CVE-2022-47880.json @@ -2,7 +2,7 @@ "id": "CVE-2022-47880", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T14:15:09.613", - "lastModified": "2024-11-21T07:32:27.520", + "lastModified": "2025-01-27T17:15:10.117", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.6, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", + "baseScore": 6.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 4.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-522" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20877.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20877.json index cdc8bebf647..c70075ec40b 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20877.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20877.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20877", "sourceIdentifier": "security@vmware.com", "published": "2023-05-12T21:15:09.043", - "lastModified": "2024-11-21T07:41:44.253", + "lastModified": "2025-01-27T18:15:32.293", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20878.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20878.json index 89dc364177d..1fbf5260aed 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20878.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20878.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20878", "sourceIdentifier": "security@vmware.com", "published": "2023-05-12T21:15:09.093", - "lastModified": "2024-11-21T07:41:44.370", + "lastModified": "2025-01-27T18:15:32.473", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-502" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20879.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20879.json index 274589bb308..24a82f36cbd 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20879.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20879.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20879", "sourceIdentifier": "security@vmware.com", "published": "2023-05-12T21:15:09.133", - "lastModified": "2024-11-21T07:41:44.493", + "lastModified": "2025-01-27T17:15:10.337", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-208xx/CVE-2023-20880.json b/CVE-2023/CVE-2023-208xx/CVE-2023-20880.json index dae0de67877..fac062a7fbd 100644 --- a/CVE-2023/CVE-2023-208xx/CVE-2023-20880.json +++ b/CVE-2023/CVE-2023-208xx/CVE-2023-20880.json @@ -2,7 +2,7 @@ "id": "CVE-2023-20880", "sourceIdentifier": "security@vmware.com", "published": "2023-05-12T21:15:09.173", - "lastModified": "2024-11-21T07:41:44.600", + "lastModified": "2025-01-27T18:15:32.653", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 0.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 6.7, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 0.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-231xx/CVE-2023-23169.json b/CVE-2023/CVE-2023-231xx/CVE-2023-23169.json index 339df7e8dbb..be1665c8384 100644 --- a/CVE-2023/CVE-2023-231xx/CVE-2023-23169.json +++ b/CVE-2023/CVE-2023-231xx/CVE-2023-23169.json @@ -2,7 +2,7 @@ "id": "CVE-2023-23169", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.727", - "lastModified": "2024-11-21T07:45:55.340", + "lastModified": "2025-01-27T17:15:10.540", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,6 +69,20 @@ "value": "CWE-918" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + }, + { + "lang": "en", + "value": "CWE-918" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-250xx/CVE-2023-25005.json b/CVE-2023/CVE-2023-250xx/CVE-2023-25005.json index 520236656b0..b44916133e5 100644 --- a/CVE-2023/CVE-2023-250xx/CVE-2023-25005.json +++ b/CVE-2023/CVE-2023-250xx/CVE-2023-25005.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25005", "sourceIdentifier": "psirt@autodesk.com", "published": "2023-05-12T21:15:09.220", - "lastModified": "2024-11-21T07:48:55.020", + "lastModified": "2025-01-27T18:15:33.127", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-427" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-427" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-253xx/CVE-2023-25309.json b/CVE-2023/CVE-2023-253xx/CVE-2023-25309.json index 956884d161a..e637132ba38 100644 --- a/CVE-2023/CVE-2023-253xx/CVE-2023-25309.json +++ b/CVE-2023/CVE-2023-253xx/CVE-2023-25309.json @@ -2,7 +2,7 @@ "id": "CVE-2023-25309", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T18:15:12.360", - "lastModified": "2024-11-21T07:49:24.593", + "lastModified": "2025-01-27T17:15:10.743", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-272xx/CVE-2023-27238.json b/CVE-2023/CVE-2023-272xx/CVE-2023-27238.json index c23ded9535c..03539620c92 100644 --- a/CVE-2023/CVE-2023-272xx/CVE-2023-27238.json +++ b/CVE-2023/CVE-2023-272xx/CVE-2023-27238.json @@ -2,7 +2,7 @@ "id": "CVE-2023-27238", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T11:15:12.810", - "lastModified": "2024-11-21T07:52:30.387", + "lastModified": "2025-01-27T17:15:10.970", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "NVD-CWE-noinfo" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-444" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28325.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28325.json index e17239c4399..d671d929118 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28325.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28325.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28325", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:09.830", - "lastModified": "2024-11-21T07:54:50.803", + "lastModified": "2025-01-27T17:15:11.180", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.5 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-287" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28356.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28356.json index 4c8b7b7200b..a5f880ebcdd 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28356.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28356.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28356", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:09.887", - "lastModified": "2024-11-21T07:54:55.040", + "lastModified": "2025-01-27T17:15:11.420", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-400" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28357.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28357.json index 7a4eac1c936..02881516edd 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28357.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28357.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28357", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:09.940", - "lastModified": "2024-11-21T07:54:55.147", + "lastModified": "2025-01-27T18:15:33.477", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-200" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28358.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28358.json index 59a1b0dd1aa..202145029e8 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28358.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28358.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28358", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:09.993", - "lastModified": "2024-11-21T07:54:55.243", + "lastModified": "2025-01-27T17:15:11.633", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28359.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28359.json index 3f25808594a..ca7f76e2dae 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28359.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28359.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28359", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:10.057", - "lastModified": "2024-11-21T07:54:55.353", + "lastModified": "2025-01-27T17:15:11.823", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28360.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28360.json index 88ade4e098c..a79f74791cd 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28360.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28360.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28360", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:10.120", - "lastModified": "2024-11-21T07:54:55.440", + "lastModified": "2025-01-27T17:15:12.027", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 } ] }, diff --git a/CVE-2023/CVE-2023-283xx/CVE-2023-28361.json b/CVE-2023/CVE-2023-283xx/CVE-2023-28361.json index c88c947bb04..65d2119981d 100644 --- a/CVE-2023/CVE-2023-283xx/CVE-2023-28361.json +++ b/CVE-2023/CVE-2023-283xx/CVE-2023-28361.json @@ -2,7 +2,7 @@ "id": "CVE-2023-28361", "sourceIdentifier": "support@hackerone.com", "published": "2023-05-11T22:15:10.187", - "lastModified": "2024-11-21T07:54:55.543", + "lastModified": "2025-01-27T17:15:12.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -55,6 +75,16 @@ "value": "CWE-352" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-352" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-298xx/CVE-2023-29863.json b/CVE-2023/CVE-2023-298xx/CVE-2023-29863.json index 5a9b0578b0b..4b26a3c51f4 100644 --- a/CVE-2023/CVE-2023-298xx/CVE-2023-29863.json +++ b/CVE-2023/CVE-2023-298xx/CVE-2023-29863.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29863", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T13:15:13.670", - "lastModified": "2024-11-21T07:57:36.093", + "lastModified": "2025-01-27T17:15:12.450", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-299xx/CVE-2023-29986.json b/CVE-2023/CVE-2023-299xx/CVE-2023-29986.json index bb966ea99a3..61c4cd4ed84 100644 --- a/CVE-2023/CVE-2023-299xx/CVE-2023-29986.json +++ b/CVE-2023/CVE-2023-299xx/CVE-2023-29986.json @@ -2,7 +2,7 @@ "id": "CVE-2023-29986", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T02:15:08.780", - "lastModified": "2024-11-21T07:57:43.767", + "lastModified": "2025-01-27T17:15:12.680", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30172.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30172.json index 8f1642659ea..8e60712d5d7 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30172.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30172.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30172", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T02:15:08.880", - "lastModified": "2024-11-21T07:59:51.253", + "lastModified": "2025-01-27T17:15:12.883", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-301xx/CVE-2023-30192.json b/CVE-2023/CVE-2023-301xx/CVE-2023-30192.json index 15c81329223..f0f469e1219 100644 --- a/CVE-2023/CVE-2023-301xx/CVE-2023-30192.json +++ b/CVE-2023/CVE-2023-301xx/CVE-2023-30192.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30192", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-12T00:15:06.447", - "lastModified": "2024-11-21T07:59:52.850", + "lastModified": "2025-01-27T17:15:13.077", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,6 +52,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -65,6 +85,16 @@ "value": "CWE-89" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-302xx/CVE-2023-30256.json b/CVE-2023/CVE-2023-302xx/CVE-2023-30256.json index 017af673162..83ea3f9fcc4 100644 --- a/CVE-2023/CVE-2023-302xx/CVE-2023-30256.json +++ b/CVE-2023/CVE-2023-302xx/CVE-2023-30256.json @@ -2,7 +2,7 @@ "id": "CVE-2023-30256", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T11:15:09.047", - "lastModified": "2024-11-21T07:59:56.697", + "lastModified": "2025-01-27T17:15:13.280", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-307xx/CVE-2023-30765.json b/CVE-2023/CVE-2023-307xx/CVE-2023-30765.json index 62395e37e28..c922ba84789 100644 --- a/CVE-2023/CVE-2023-307xx/CVE-2023-30765.json +++ b/CVE-2023/CVE-2023-307xx/CVE-2023-30765.json @@ -2,13 +2,13 @@ "id": "CVE-2023-30765", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-07-10T20:15:15.237", - "lastModified": "2024-11-21T08:00:51.507", + "lastModified": "2025-01-27T17:15:13.467", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "\n\u200bDelta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation.\n\n" + "value": "\u200bDelta Electronics InfraSuite Device Master versions prior to 1.0.7 contain improper access controls that could allow an attacker to alter privilege management configurations, resulting in privilege escalation." } ], "metrics": { @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-269" } ] } diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31442.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31442.json index 3a678b9a6a1..d5ed4cd14e4 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31442.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31442.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31442", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T02:15:09.060", - "lastModified": "2024-11-21T08:01:52.387", + "lastModified": "2025-01-27T17:15:13.690", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31473.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31473.json index d127e2d2956..392015ba852 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31473.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31473.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31473", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T11:15:09.100", - "lastModified": "2024-11-21T08:01:56.547", + "lastModified": "2025-01-27T18:15:33.730", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31475.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31475.json index 1d1ccb77122..856d981f712 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31475.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31475.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31475", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T11:15:09.147", - "lastModified": "2024-11-21T08:01:56.893", + "lastModified": "2025-01-27T18:15:33.980", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.0, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.2, + "impactScore": 6.0 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-120" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31477.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31477.json index 3f6838a790e..828ffd369a1 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31477.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31477.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31477", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T02:15:09.103", - "lastModified": "2024-11-21T08:01:57.210", + "lastModified": "2025-01-27T18:15:34.210", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-22" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-22" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31497.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31497.json index a41175e3876..c5fb610dc83 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31497.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31497.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31497", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T21:15:10.340", - "lastModified": "2024-11-21T08:01:59.110", + "lastModified": "2025-01-27T18:15:34.437", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-314xx/CVE-2023-31498.json b/CVE-2023/CVE-2023-314xx/CVE-2023-31498.json index ce090aa736f..a722879398f 100644 --- a/CVE-2023/CVE-2023-314xx/CVE-2023-31498.json +++ b/CVE-2023/CVE-2023-314xx/CVE-2023-31498.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31498", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T11:15:09.193", - "lastModified": "2024-11-21T08:01:59.240", + "lastModified": "2025-01-27T18:15:34.630", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-384" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-384" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31502.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31502.json index 01e2e2ca82e..0e43bb53d5d 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31502.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31502.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31502", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T22:15:11.457", - "lastModified": "2024-11-21T08:01:59.377", + "lastModified": "2025-01-27T18:15:34.863", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 } ] }, diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31528.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31528.json index ea75275d6e2..f3b106f6258 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31528.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31528.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31528", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T22:15:11.573", - "lastModified": "2024-11-21T08:02:00.223", + "lastModified": "2025-01-27T17:15:13.867", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31529.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31529.json index f7453dc6a26..4617ca2f5a0 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31529.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31529.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31529", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T22:15:11.630", - "lastModified": "2024-11-21T08:02:00.367", + "lastModified": "2025-01-27T17:15:14.060", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31530.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31530.json index 668ba8f4445..b77d2a7bd3e 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31530.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31530.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31530", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T22:15:11.687", - "lastModified": "2024-11-21T08:02:00.513", + "lastModified": "2025-01-27T17:15:14.233", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31531.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31531.json index 93038ed1dbd..1901343f298 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31531.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31531.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31531", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T22:15:11.740", - "lastModified": "2024-11-21T08:02:00.643", + "lastModified": "2025-01-27T17:15:14.460", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-77" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json index 7eee7e3c341..e3d48d40cde 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31556.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31556", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.367", - "lastModified": "2024-11-21T08:02:01.697", + "lastModified": "2025-01-27T18:15:35.040", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json index 4369114e9e3..d48ee65eca3 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31566.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31566", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.567", - "lastModified": "2024-11-21T08:02:01.847", + "lastModified": "2025-01-27T18:15:35.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-416" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json index 4febb92e4e2..b84c1b39746 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31567.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31567", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.720", - "lastModified": "2024-11-21T08:02:01.977", + "lastModified": "2025-01-27T18:15:35.427", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json index 00f657e66a0..3817c76fdb7 100644 --- a/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json +++ b/CVE-2023/CVE-2023-315xx/CVE-2023-31568.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31568", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T16:15:12.810", - "lastModified": "2024-11-21T08:02:02.110", + "lastModified": "2025-01-27T18:15:35.597", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json b/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json index 95f1610466d..5583b013b55 100644 --- a/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json +++ b/CVE-2023/CVE-2023-319xx/CVE-2023-31906.json @@ -2,7 +2,7 @@ "id": "CVE-2023-31906", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-10T15:15:10.187", - "lastModified": "2024-11-21T08:02:22.553", + "lastModified": "2025-01-27T18:15:35.793", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -45,6 +65,16 @@ "value": "CWE-787" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] } ], "configurations": [ diff --git a/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json b/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json index adb7cf7e0e3..e20181b65c9 100644 --- a/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json +++ b/CVE-2023/CVE-2023-320xx/CVE-2023-32070.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32070", "sourceIdentifier": "security-advisories@github.com", "published": "2023-05-10T18:15:10.003", - "lastModified": "2024-11-21T08:02:39.167", + "lastModified": "2025-01-27T18:15:35.993", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -52,13 +52,33 @@ }, "exploitabilityScore": 2.8, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, "weaknesses": [ { "source": "security-advisories@github.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", @@ -68,6 +88,16 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "description": [ { diff --git a/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json b/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json index 134f0765b70..c34bab090dd 100644 --- a/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json +++ b/CVE-2023/CVE-2023-326xx/CVE-2023-32668.json @@ -2,7 +2,7 @@ "id": "CVE-2023-32668", "sourceIdentifier": "cve@mitre.org", "published": "2023-05-11T06:15:10.000", - "lastModified": "2024-11-21T08:03:48.710", + "lastModified": "2025-01-27T17:15:14.650", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -32,6 +32,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-343xx/CVE-2023-34316.json b/CVE-2023/CVE-2023-343xx/CVE-2023-34316.json index e6e975f0b55..49e0c1ec5e3 100644 --- a/CVE-2023/CVE-2023-343xx/CVE-2023-34316.json +++ b/CVE-2023/CVE-2023-343xx/CVE-2023-34316.json @@ -2,7 +2,7 @@ "id": "CVE-2023-34316", "sourceIdentifier": "ics-cert@hq.dhs.gov", "published": "2023-07-10T20:15:15.310", - "lastModified": "2024-11-21T08:06:59.807", + "lastModified": "2025-01-27T17:15:14.840", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -62,7 +62,7 @@ "description": [ { "lang": "en", - "value": "CWE-284" + "value": "CWE-552" } ] } diff --git a/CVE-2023/CVE-2023-429xx/CVE-2023-42929.json b/CVE-2023/CVE-2023-429xx/CVE-2023-42929.json index 8555f5c569e..1baed9403ea 100644 --- a/CVE-2023/CVE-2023-429xx/CVE-2023-42929.json +++ b/CVE-2023/CVE-2023-429xx/CVE-2023-42929.json @@ -2,7 +2,7 @@ "id": "CVE-2023-42929", "sourceIdentifier": "product-security@apple.com", "published": "2024-01-10T22:15:50.417", - "lastModified": "2024-11-21T08:23:32.073", + "lastModified": "2025-01-27T18:15:36.240", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json index 979bf8ad149..c0bd7c1ab42 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43555.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43555", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.420", - "lastModified": "2024-11-21T08:24:22.017", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:59:53.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,3247 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6FCE91-BF38-49ED-8FFB-429BAFEE7832" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "715A9F94-5F9E-45E5-B07B-699410C01478" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CDE1CBDE-3D28-463C-B215-AA7DF373EF09" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "66BD3B88-7CF9-482D-A2DD-67F6ACF4CC57" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D89F035A-2388-48FC-AEBB-8429C6880F4A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA13EF4E-AAE6-45F4-9E41-78310E37CE81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:msm8996au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8CA1E7B0-782B-4757-B118-802943798984" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:msm8996au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95CB08EC-AE12-4A54-AA3C-998F01FC8763" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E16994A-6DBA-426C-ADD2-B1E8B49FEDBF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*", + "matchCriteriaId": "47E674DE-55AB-44E5-8E00-C804FC9D4DC0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A344E78F-D15A-460E-8EF8-7C6FC39F2D5E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FF5EC23-4884-4C2B-8E77-50B1E8E28A3D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95AFC483-1468-43FC-96FA-A56165C290E0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0A963FDF-6FF4-4F48-834E-2A14D241716D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04F574BC-9AB2-4B83-A466-556ECEBBD3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A34D021D-C043-4EFD-9AB3-B2174528CBA3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "886124F6-B397-4EB6-8E01-6012E468ABE9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "93ED74CE-6BF2-4983-8780-07D5336745B3" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6564au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B59672A0-2FA6-46CC-B75A-C599B842AFB9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6564au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3847F4A5-90A5-4C84-B43F-0DDD81BD79CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "828CFB37-76A6-4927-9D00-AF9A1C432DD6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11405993-5903-4716-B452-370281034B42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4325_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F2D8044B-D4E5-4174-A0FB-478F8434EE8F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4325:-:*:*:*:*:*:*:*", + "matchCriteriaId": "163FE96E-DF5B-4B67-8EDE-44A5B9A8492D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "646B241B-2971-4929-9FB6-7A4CBF801CBB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5654FFB5-9A89-4399-AFAB-0A26726DEC81" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65303C2D-C6BF-47CB-8146-E240CB8BBE42" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A6B03022-497A-4F42-BB4D-5624EA7DF1B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DC43BB27-0516-4750-A4C2-C45298441398" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*", + "matchCriteriaId": "969585DE-93D6-4406-A632-D838ECD4D5AD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E634F59C-6817-4898-A141-082044E66836" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "29762819-EC90-499C-A8C6-1423DE3FE6B9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFF23DDB-98A0-4343-ADD3-5AB9C2383E7E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5ACB8AFB-5B91-4AA1-BA3A-1AF0B3503080" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:215_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "492AAB72-7E31-4711-9873-D97B76D77F53" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:215_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "12B165C3-4EE1-4E0B-9255-913AC805D141" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "25811F6A-AC23-4DCC-A987-B91E98EA7FB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB0C4385-336B-4E10-B776-0AE51EBB6A12" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50FAF626-07C9-42CB-B92B-C263D66CF27D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D55041D-7CD4-446D-B6F2-EB89EF75D10F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C66671C1-AE1A-44BE-9DB2-0B09FF4417DB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "74AA3929-3F80-4D54-B13A-9B070D5C03BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "054F77D6-FC66-4151-9005-DC7ECDB5C722" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ED3F589-16D9-46A7-A539-C9862473EE0D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8DC40C14-3B2D-4E00-9E0F-86E6BDBF2D81" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0514D433-162C-4680-8912-721D19BE6201" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A71D74B0-0963-49FD-8E97-148C8993B263" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "910CBFA4-50F7-4C7A-B9B9-B88C8A919827" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69C1B02F-8D2D-42E7-B70D-41F4D9844FD1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEACAA9-C061-4713-9A54-37D8BFC0B00B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C8648B38-2597-401A-8F53-D582FA911569" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A01CD59B-8F21-4CD6-8A1A-7B37547A8715" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "51BC0A66-493B-43BE-B51F-640BDF2FF32E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D8DA4D12-7ABF-4A04-B44E-E1D68C8E58AB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd730_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC4DA7EA-DB81-4C71-A875-2612D8D7D726" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd730:-:*:*:*:*:*:*:*", + "matchCriteriaId": "48F26F64-98D4-420A-8918-E5E56ABA1D47" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd855_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "42B30014-95AB-4F24-A7A5-60A907502609" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd855:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F562ED3D-CBE3-4DCC-BFBB-DE0AD2425A9C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "72433485-B229-46A6-BCA4-394AA4EEA683" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "04D40EC4-BF31-4BFD-8D0A-8193F541AF02" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sg4150p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9279F02F-6C30-4891-8941-97003DE9C8C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sg4150p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FFA7BB42-305C-451F-92D8-0718DF68A012" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FACA2BF1-85D3-447F-A08D-B90330A22550" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2ABA18D-82C1-4366-B1D7-DED42DD3D5C5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7250p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "76DB5472-DF51-4144-8A69-9B231CF782DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7250p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D395018-251C-45AA-9EE8-A638CAB0B508" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm8550p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4CDD6A2-5A3C-4572-8CE1-2F102333BB79" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm8550p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699E5D17-6144-4F0A-8D52-1E8C83990E52" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "227113B6-BED5-4415-ACE5-192315EC214E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_1_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "65A640F4-373F-4358-92A6-F10C96A209AA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C120BFA0-D702-4305-817E-AEF5859D16A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD9E9B05-12C3-4CE4-BA00-656021ABA4AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_460_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "94AD752A-551D-4FAB-9274-CB2164C857D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_460_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8842CC5B-C753-47D9-BE13-723A4163FF8C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7289102B-C117-4CB3-9DBA-66BACC9FE193" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "666B4CAD-FE81-4EDF-BB6F-CD260692A60B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_480\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8DF4C4E-182D-472E-97AE-987203EE9057" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_480\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5C8879AF-2AEE-49DB-BC00-8EF7E3C9A0F4" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_662_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B099F64-FCD9-43F1-A066-A4FAE6738C5A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_662_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0A285E2-E2CE-4488-8E3D-F5D5331D992C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_680_4g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D957EE2B-0964-4806-A55B-D6EDE64F4B2B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_680_4g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13B91E86-CBB8-4561-A983-0199B4491085" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_685_4g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E5BFA049-4B7C-4B94-B48B-5770E05B7486" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_685_4g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BD0F530-6F6D-4507-9A64-31DC64E601CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_690_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68A8C971-F15A-43DA-B0CB-E5DFFD38CC67" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_690_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6186C3B6-BAE1-4858-9E6A-6610AC2CE557" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_695_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C0D8E82-3425-4605-B220-068F36A190CE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_695_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "187FA325-AC3A-476B-9250-2B5B0368D28E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_720g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0FD385E-E449-4188-88CE-2710D547D8DA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_720g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2823F2C7-811A-4839-9F85-A49E11E2BBA8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FA9BDF1-C4E1-4820-BF42-C02348D8F9C7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "917D4DBB-A92B-4358-99E2-5B77B210DE16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_730g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "769EAF36-C661-473E-84F2-0708CCFC3C1B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_730g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "62203044-75B4-4283-8D96-2AC4EC158178" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_732g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2948781-8EE5-49A5-83F1-632CBF310A80" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_732g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE017277-5D70-4853-B804-391D5B37D72E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B0D23A8E-06DE-4DE2-ADAD-9D9B7CA09F7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B00B72F0-6E85-40D6-A162-66908A570F46" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_765g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "16B75F00-99B2-4C63-81F0-39257002630A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_765g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D3D004-F706-4D66-993A-B72AB0F9D129" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_768g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A7E183E-2BD3-4745-81EA-21A357C14E0D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_768g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D1BF63E3-8673-463E-BF55-3F9B32EF9A29" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0E4E3E9-0BF2-47D1-BCC1-2254A5480759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD1EC478-D2DA-43AA-9302-B6BC99AB69E9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643FA101-D9EB-4B92-ABF1-70FEE2E8968E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73CF3FE5-6139-4537-8CDD-9039C4F8FA41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D31E13FF-84CC-443D-8299-BE3F950B21B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CBA070-8BAE-4915-8E74-07224641A474" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B96B9F8F-8B71-41A1-985B-45678BC4334D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3018C28E-A5E5-4AEA-A209-4A3A4BBA208E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13AF1A58-3121-4F06-9B13-D7D94A8A10A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "629264C3-8EA3-475F-88D5-4407691499DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "863BA6B8-5F2D-4D97-BBBE-EAD5B35AB3AA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_2_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2E0344CF-A15E-4734-852F-9553E780644B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "28D14A7F-F116-416B-A359-32D395F706D4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_2_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B67D19B-E1B0-41A2-B122-FBA6D797F3C8" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_820_automotive_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73954A37-654B-4EE2-B14F-A70A992CA807" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_820_automotive:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AC6A42E7-0D95-4697-9088-41E92600C16A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F83F4E9E-481F-4275-BCB2-0706D52D8DEE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1B49C835-2316-49CA-B87C-790C19D81688" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_855\\+_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0B3A4256-DBA0-4981-A6EE-BEA06AF3C1D8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_855\\+_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C200D712-451B-4748-B0DE-5EBCFB591045" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_860_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F9FC371A-F67E-466C-BE01-F867EE587078" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_860_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4A2FAB27-2BDF-4FED-872D-9622050992CF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0627B052-B244-492C-9257-9E85ACCE0B19" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6285755-E27F-4538-8F48-5F9DCDC4CB09" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8130D33F-B5B7-439D-A35B-AD662C35B690" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A89428FC-0EB0-4121-B674-664EAD761DD0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE2EBD77-F5C5-43DE-BD01-788471DB8262" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4C666B23-5049-424C-80A5-BC45F579DECD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F461BDE7-E847-4FF4-8D05-598FBF76D7B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC46263-C6FF-4BC0-83A5-D5A17954DB5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F2F6A7B-053D-4C18-883E-32DD0E317D04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60739810-16B9-48FA-8DB5-E0AD336F6912" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A0F761E3-62F7-4A70-A3CA-09FF283ABD9C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F6136853-B719-4DA2-B6C9-C9E8EF02B35A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_wear_4100\\+_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA1AEB2C-F420-46A6-8804-A35870153BAA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_wear_4100\\+:-:*:*:*:*:*:*:*", + "matchCriteriaId": "20746D0A-8D06-4483-AE84-2E0232259171" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DD56A4A-BBE6-4AE4-A4C1-4914E997F08C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6DE28E8F-0A21-497B-9082-79EB74E1CF33" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "665811D8-F648-4F32-A375-FAF9C9E928B3" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_xr2_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A537932-6EAD-411B-83FF-48CF050F603A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA1BF9BB-AF11-46A7-A71C-F7D289E76E3F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B8455D6-287D-4934-8E4D-F4127A9C0449" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DB599A9F-0305-4FE4-8623-0F86630FEDCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EEB883BF-68B2-4C25-84DC-5DA953BFAA2F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9F9FA3B1-E4E4-4D9B-A99C-7BF958D4B993" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*", + "matchCriteriaId": "95762B01-2762-45BD-8388-5DB77EA6139C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9326_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3A2FAD34-B7C5-400A-8575-A12CDE65ACBE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9326:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5A39A2E5-6D8D-4F6E-98CB-96DB1975A4BC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE852339-1CAE-4983-9757-8F00EDEF1141" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D9E96B3-F1BB-46F8-B715-7DF90180F1E1" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "896F1C04-9957-440F-BF01-C3772CC3B3DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A90555EB-47A7-4717-92D5-35B561825F06" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "699056F6-1517-4F25-AE07-4FFCF6923B9F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4C023D2-6FF5-4FFC-B9F2-895979166580" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3610_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DAFD64E7-3F13-4DCA-8C46-6E8FE0C6F798" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3610:-:*:*:*:*:*:*:*", + "matchCriteriaId": "044A14FB-64F6-4200-AC85-8DC91C31BD16" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3615_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9590EF1F-E821-4525-943B-4A315ACAEFFC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3615:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7A7D32B3-325E-4B1F-8649-3D0071396BBA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB37B5DB-2493-4082-B2BF-60385B7E027C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6BCD2FE2-11F2-4B2A-9BD7-EB26718139DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0755F669-6D7E-454A-95DA-D60FA0696FD9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE861CE7-B530-4698-A9BC-43A159647BF2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9C6E9038-9B18-4958-BE1E-215901C9B4B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B36D3274-F8D0-49C5-A6D5-95F5DC6D1950" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CA33DE15-C177-43B3-AD50-FF797753D12E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AE1A5841-5BCB-4033-ACB9-23F3FCA65309" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5B47BF35-3AA0-4667-842E-19B0FE30BF3C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8A071672-9405-4418-9141-35CEADBB65AF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BB7CF473-8B25-4851-91F2-1BD693CCDC85" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "91E591F2-8F72-4A5A-9264-2742EB2DABDA" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json index 2e0eae0994c..aea2d99017c 100644 --- a/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json +++ b/CVE-2023/CVE-2023-435xx/CVE-2023-43556.json @@ -2,8 +2,8 @@ "id": "CVE-2023-43556", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.673", - "lastModified": "2024-11-21T08:24:22.213", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:58:31.183", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 6.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.0, + "impactScore": 6.0 } ] }, @@ -49,16 +69,1870 @@ "value": "CWE-120" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-120" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C88B9C86-2E8E-4DCE-A30C-02977CC00F00" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EE473A5A-5CFC-4F08-A173-30717F8BD0D7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "82B82E87-F3F4-466F-A76B-C8809121FF6F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*", + "matchCriteriaId": "419A132E-E42C-4395-B74B-788A39DF1D13" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E670F500-9B71-4BBE-B5DA-221D35803C89" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9ADEB5C5-B79A-4F45-B7D3-75945B38DB6C" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3053D68-C5D8-4D47-A4F0-9F3AF2289E1D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*", + "matchCriteriaId": "638DBC7F-456F-487D-BED2-2214DFF8BEE2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:flight_rb5_5g_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AD5C60F1-5B7F-4AB0-9863-720A1972563E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:flight_rb5_5g:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C43A4F08-1E8A-4CEF-8E61-4152ED78E600" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C2D9E281-B382-41AC-84CB-5B1063E5AC51" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "44EBEBD5-98C3-493B-A108-FD4DE6FFBE97" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "83B53119-1B2F-4978-B7F5-33B84BE73B68" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FEBC0C5-CAA1-475C-96C2-B8D24B2E4536" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D527E2B1-2A46-4FBA-9F7A-F5543677C8FB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8374DDB3-D484-4141-AE0C-42333D2721F6" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643EC76D-2836-48E6-81DA-78C4883C33CA" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*", + "matchCriteriaId": "477F6529-4CE1-44FC-B6EE-D24D44C71AE7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0AE207DB-9770-40ED-961D-FDA75965826F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0E23922D-C37F-476F-A623-4C1458A9156F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5FA1F8F4-EAF2-4704-A8A6-19AD3CA1B577" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B3F7853D-09EE-476F-B48D-BB30AEB4A67D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1D1C53DC-D2F3-4C92-9725-9A85340AF026" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ED0585FF-E390-46E8-8701-70964A4057BB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2FA8F9DA-1386-4961-B9B2-484E4347852A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*", + "matchCriteriaId": "117289C8-7484-4EAE-8F35-A25768F00EED" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DA506489-4338-44DF-8F92-12E60AF0048C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A8718C37-A82A-4A08-A887-3F22B37601A9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EC5F81B-AA24-4E3C-9FC8-53E010AC977E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B5C66DAD-0D85-46B8-92D7-6D68B9429E9A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ADD6D51E-5787-42A6-8A02-4EBBAFFF9C94" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "99AA0291-B822-4CAD-BA17-81B632FC3FEF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn6024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A49DBE04-E2EA-4DA1-B774-A878A71524AC" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn6024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "69E98386-3BB2-4E8C-AD00-E05123608439" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9306C34D-47E4-40CF-89F4-BA5263655D13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*", + "matchCriteriaId": "02BA009F-24E1-4953-BA95-2A5BC1CDBDBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "61F34DD2-9DC0-49E5-BC85-1543EA199477" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1A06879F-6FE9-448A-8186-8347D76F872B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcn9024_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A64CDA49-19BF-413F-A0E0-2B9729E45E25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcn9024:-:*:*:*:*:*:*:*", + "matchCriteriaId": "345CCD64-C09E-407D-AAA2-311C4CCFE24F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs4490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3336CDD7-9E7B-4FFB-A5CE-594B19B63A6C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs4490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1197E229-1E27-4CA3-A386-B77FAE5DFE1A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B6926498-667C-4866-B3DD-A7E20B8F4D7F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CEFEBC7A-80C0-4E4F-B9C7-53EECF86B6B5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "403AE561-6C9E-49F3-A5D6-C48DDD51D663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6FAC140F-FC5E-4C88-B777-7F5EBF49A695" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs7230_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B92C311A-306B-43C9-ACBA-B1B390927C6A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs7230:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F68F9B33-6BA5-46E1-A370-547CDA626985" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qcs8250_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1CDDD37F-4C3A-4955-9AFB-7774021A0198" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qcs8250:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D13E375-0562-4263-8452-53E117F14E83" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D9CC1C8B-F642-4068-B9E3-ECE027486E45" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A60F8378-B827-4557-B891-A8A02F8F2A25" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qrb5165n_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "97BB1EB7-D194-4FE2-B4F6-A7A52F344DDE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qrb5165n:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA2C90E7-0F3A-43BB-ABF7-63CEA7A85ADA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qsm8350_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1894F6B9-31DA-44E8-AA28-064F73EBEE8D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qsm8350:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8AA23845-D9F5-4035-8A93-F475D865586F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc3_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "77397AFD-F4B1-437E-AB50-99EE6F305859" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc3:-:*:*:*:*:*:*:*", + "matchCriteriaId": "50FAF626-07C9-42CB-B92B-C263D66CF27D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:video_collaboration_vc5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B4A3D6E5-8D3B-41D8-A6A6-596F35E34D7C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:video_collaboration_vc5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "5D55041D-7CD4-446D-B6F2-EB89EF75D10F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:robotics_rb5_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "71CFA659-DE2C-4AA0-8AAD-75033B2F4663" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:robotics_rb5:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0C3E952A-9CA6-4A41-820C-9756B453DECF" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A19659B-A0C3-44B7-8D54-BA21729873A4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F978041A-CE28-4BDF-A7DB-F0360F1A5F14" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8FE8B62D-83B4-4326-8A53-FED5947D5FFE" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2D6F8899-136A-4A57-9F02-BD428E1663DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sd888_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "79219DA5-0D09-4CEF-AEFD-917F269AE7DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sd888:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4D30BACF-71C1-4A6D-8811-9AD708A98307" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sdx57m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "18431C93-7497-4A2C-9B5A-B9E4C7F88B7D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sdx57m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BF0FFBA-73EC-4615-98D2-BA62D67353DB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7315_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A4508742-7D97-43D8-B8F5-041F4C588723" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7315:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF8C63E8-169F-4164-BD49-348ED894813F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sm7325p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4BEC725F-19B1-4078-B13D-CE624BE23344" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sm7325p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4EA43E38-A12D-49C3-B05C-A2AF07ED2710" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_4_gen_2_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C120BFA0-D702-4305-817E-AEF5859D16A2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_4_gen_2_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FD9E9B05-12C3-4CE4-BA00-656021ABA4AC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D0E4E3E9-0BF2-47D1-BCC1-2254A5480759" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "DD1EC478-D2DA-43AA-9302-B6BC99AB69E9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_778g\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "643FA101-D9EB-4B92-ABF1-70FEE2E8968E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_778g\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "73CF3FE5-6139-4537-8CDD-9039C4F8FA41" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_780g_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D31E13FF-84CC-443D-8299-BE3F950B21B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_780g_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "68CBA070-8BAE-4915-8E74-07224641A474" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_782g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B96B9F8F-8B71-41A1-985B-45678BC4334D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_782g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3018C28E-A5E5-4AEA-A209-4A3A4BBA208E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "C4A050CA-8514-400A-A6B3-F513CC93CA14" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD850305-1E76-4952-A3FB-F6229CBF7FE9" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13AF1A58-3121-4F06-9B13-D7D94A8A10A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "629264C3-8EA3-475F-88D5-4407691499DA" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_8\\+_gen_1_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "30C5328F-51FE-4EFB-BFA4-5BA9D504AC6D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_8\\+_gen_1_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E50675-727A-4749-B8BB-3BCF507C4468" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F461BDE7-E847-4FF4-8D05-598FBF76D7B6" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0BC46263-C6FF-4BC0-83A5-D5A17954DB5F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3F2F6A7B-053D-4C18-883E-32DD0E317D04" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile:-:*:*:*:*:*:*:*", + "matchCriteriaId": "60739810-16B9-48FA-8DB5-E0AD336F6912" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sc8280xp-abbb_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7EA3A08-8624-4B78-AD75-828A3DF4CC52" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sc8280xp-abbb:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57E75758-F191-45B7-86A8-7F4EC08D2965" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_ar2_gen_1_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7BB4A33E-6647-447E-BDA3-24246D49C5DD" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_ar2_gen_1:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1046CC3E-FB12-4527-9978-DCC40EEE8938" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x65_5g_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9DE2CE-4765-4696-ABFE-4808EF77C8D9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x65_5g_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8031F868-16B3-4173-835A-0F818471CF4F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:snapdragon_x70_modem-rf_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "622C649D-4FD7-45DA-A2F1-852DB977FB93" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:snapdragon_x70_modem-rf:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49304982-775B-46BB-A273-5732AF91B7C0" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2115p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A146E52D-4AFC-47B4-920F-DAC76077DF25" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2115p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2BA4BA00-C8D1-4DAC-8030-CB5EEC7D4591" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:ssg2125p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EA41907C-1CDE-42F3-B21D-5D53B2F06AF7" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:ssg2125p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EDC270A7-205C-41EB-A2E5-2A381A16BFBB" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr1230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BE3236D6-0D01-4D05-B580-8888B99BAA5D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr1230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E1753FC-F3CD-4B50-886D-8E16D9301A84" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CD6444F6-A477-4B4C-8A09-C22C47CCE45B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F3E20681-4FC4-46E2-AF77-BCF03BC8E77E" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1295D869-F4DD-4766-B4AA-3513752F43B4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B98784DC-3143-4D38-AD28-DBBDCCAB4272" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "34143ABA-7D09-429F-A65C-3A33438BF62C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9D56DFE3-5EF1-4B23-BBD5-0203FBF9CCEC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "70292B01-617F-44AD-AF77-1AFC1450523D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FA94C6D6-85DB-4031-AAF4-C399019AE16D" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "92B17201-8185-47F1-9720-5AB4ECD11B22" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E1FA2EB9-416F-4D69-8786-386CC73978AE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3FEF2DB6-00F5-4B07-953B-EF58B31267F1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*", + "matchCriteriaId": "120E8F0F-EBEB-4565-9927-2D473F783EF7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4BFB25F-013B-48E3-99FF-3E8687F94423" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF676C5B-838B-446C-A689-6A25AB8A87E2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wcn6740_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FB5DB2B8-25E1-4C0F-8AFB-7627FF9A04E1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wcn6740:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9BB21B3F-6D07-4B45-8A71-DC5490176296" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "15307882-7039-43E9-9BA3-035045988B99" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*", + "matchCriteriaId": "AA85B322-E593-4499-829A-CC6D70BAE884" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E839A0B9-64C3-4C7A-82B7-D2AAF65928F8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7E870D82-DE3B-4199-A730-C8FB545BAA98" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "11B69595-E488-4590-A150-CE5BE08B5E13" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BF680174-5FA6-47D9-8EAB-CC2A37A7BD42" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7ACAD26E-B79E-4659-91A5-D301281F7D36" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F0E46DA6-9494-4D92-A4AE-A272AF6ACCCC" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F80BC68E-7476-4A40-9F48-53722FE9A5BF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6B36F4B2-BAA3-45AD-9967-0EB482C99708" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json b/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json index 0e68728ae37..78a98f27277 100644 --- a/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json +++ b/CVE-2024/CVE-2024-04xx/CVE-2024-0445.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0445", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T14:40:29.537", - "lastModified": "2024-11-21T08:46:36.333", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:41:19.177", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,65 +36,163 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "5BFEFE69-71B2-407D-B3A8-C63D0A045DAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "8053B06E-E10B-4519-9018-B0E19ECBC10A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_flip_box.php#L2323", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_info_box.php#L2928", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_pricing_table.php#L2942", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_flip_box.php#L2388", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_info_box.php#L2997", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_pricing_table.php#L2960", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a412e682-869a-46ba-a2d0-d84ed542adc9?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_flip_box.php#L2323", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_info_box.php#L2928", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.3.4/modules/widgets/tp_pricing_table.php#L2942", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_flip_box.php#L2388", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_info_box.php#L2997", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_pricing_table.php#L2960", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a412e682-869a-46ba-a2d0-d84ed542adc9?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-05xx/CVE-2024-0506.json b/CVE-2024/CVE-2024-05xx/CVE-2024-0506.json index e79d7239de8..b014e158627 100644 --- a/CVE-2024/CVE-2024-05xx/CVE-2024-0506.json +++ b/CVE-2024/CVE-2024-05xx/CVE-2024-0506.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0506", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:17.420", - "lastModified": "2024-11-21T08:46:44.900", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:38:46.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "3.19.0", + "matchCriteriaId": "E9033953-8DEC-4A8A-8B75-35146CA87DB1" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/elementor/tags/3.18.3/includes/controls/groups/image-size.php#L119", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/elementor/tags/3.18.3/includes/controls/media.php#L381", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3024999/elementor/trunk/includes/controls/groups/image-size.php", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4473d3f6-e324-40f5-b92b-167f76b17332?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/elementor/tags/3.18.3/includes/controls/groups/image-size.php#L119", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/elementor/tags/3.18.3/includes/controls/media.php#L381", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3024999/elementor/trunk/includes/controls/groups/image-size.php", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4473d3f6-e324-40f5-b92b-167f76b17332?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0616.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0616.json index a6f9c7dc35b..e4d2875f00b 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0616.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0616.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0616", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:23.320", - "lastModified": "2024-11-21T08:47:00.490", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:30:18.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpchill:passster:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.2.6.3", + "matchCriteriaId": "97DD3FD3-1696-4FA9-97C5-4EE60BC5AE0A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3032195%40content-protector%2Ftrunk&old=3020439%40content-protector%2Ftrunk&sfp_email=&sfph_mail=#file3", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00b81467-8d00-4816-895a-89d67c541c17?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3032195%40content-protector%2Ftrunk&old=3020439%40content-protector%2Ftrunk&sfp_email=&sfph_mail=#file3", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/00b81467-8d00-4816-895a-89d67c541c17?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0620.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0620.json index 0740564c1b8..ea3437683e0 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0620.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0620.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0620", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:23.493", - "lastModified": "2024-11-21T08:47:01.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:28:48.890", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:passwordprotectwp:password_protect_wordpress:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.0", + "matchCriteriaId": "579C0428-FCC3-4DC3-B50A-BB8854B10D3B" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3032733%40password-protect-page%2Ftrunk&old=3010000%40password-protect-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41299927-2ed9-4cbe-b2b0-f306dc0e4a58?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3032733%40password-protect-page%2Ftrunk&old=3010000%40password-protect-page%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/41299927-2ed9-4cbe-b2b0-f306dc0e4a58?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-06xx/CVE-2024-0656.json b/CVE-2024/CVE-2024-06xx/CVE-2024-0656.json index 6fd2feb49a5..9b7654fe965 100644 --- a/CVE-2024/CVE-2024-06xx/CVE-2024-0656.json +++ b/CVE-2024/CVE-2024-06xx/CVE-2024-0656.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0656", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:24.613", - "lastModified": "2024-11-21T08:47:05.200", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:24:42.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 1.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.7, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:wpexperts:password_protected:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.6.7", + "matchCriteriaId": "42181B2A-4E9D-4560-9A86-09FBCE5D570D" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034934%40password-protected&new=3034934%40password-protected&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aba36c3b-beae-4c47-8aa8-5012a7a838ce?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3034934%40password-protected&new=3034934%40password-protected&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/aba36c3b-beae-4c47-8aa8-5012a7a838ce?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-07xx/CVE-2024-0792.json b/CVE-2024/CVE-2024-07xx/CVE-2024-0792.json index 8914402f256..923e9503079 100644 --- a/CVE-2024/CVE-2024-07xx/CVE-2024-0792.json +++ b/CVE-2024/CVE-2024-07xx/CVE-2024-0792.json @@ -2,8 +2,8 @@ "id": "CVE-2024-0792", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:29.090", - "lastModified": "2024-11-21T08:47:22.940", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:20:20.283", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,41 +36,115 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "7.0.2", + "matchCriteriaId": "2107A362-9A1C-4589-BCD3-C5FAFF3162C2" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/feed.php#L49", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/feed.php#L78", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3026377/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d8c043c-e347-4dc8-8a72-943a7e6c4394?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/feed.php#L49", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/feed.php#L78", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3026377/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d8c043c-e347-4dc8-8a72-943a7e6c4394?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json b/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json index 063756da15a..13b71ddd779 100644 --- a/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json +++ b/CVE-2024/CVE-2024-118xx/CVE-2024-11826.json @@ -2,7 +2,7 @@ "id": "CVE-2024-11826", "sourceIdentifier": "security@wordfence.com", "published": "2025-01-07T12:15:23.200", - "lastModified": "2025-01-07T12:15:23.200", + "lastModified": "2025-01-27T18:15:36.540", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,27 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Primary", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 6.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.1, + "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N", @@ -49,6 +69,16 @@ "value": "CWE-79" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12740.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12740.json new file mode 100644 index 00000000000..7341a2d6318 --- /dev/null +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12740.json @@ -0,0 +1,88 @@ +{ + "id": "CVE-2024-12740", + "sourceIdentifier": "security@ni.com", + "published": "2025-01-27T18:15:36.743", + "lastModified": "2025-01-27T18:15:36.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Vision related software from NI used a third-party library for image processing that exposes several vulnerabilities. These vulnerabilities may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:X/V:X/RE:X/U:X", + "baseScore": 7.0, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "PASSIVE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NO", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "security@ni.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "references": [ + { + "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/dependency-on-vulnerable-third-party-component-exposes-vulnerabi.html", + "source": "security@ni.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-127xx/CVE-2024-12773.json b/CVE-2024/CVE-2024-127xx/CVE-2024-12773.json index 9319972439a..83af2fabb07 100644 --- a/CVE-2024/CVE-2024-127xx/CVE-2024-12773.json +++ b/CVE-2024/CVE-2024-127xx/CVE-2024-12773.json @@ -2,7 +2,7 @@ "id": "CVE-2024-12773", "sourceIdentifier": "contact@wpscan.com", "published": "2025-01-27T06:15:22.747", - "lastModified": "2025-01-27T06:15:22.747", + "lastModified": "2025-01-27T17:15:15.290", "vulnStatus": "Received", "cveTags": [], "descriptions": [ @@ -11,7 +11,30 @@ "value": "The Altra Side Menu WordPress plugin through 2.0 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks" } ], - "metrics": {}, + "metrics": { + "cvssMetricV31": [ + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, "references": [ { "url": "https://wpscan.com/vulnerability/fab64105-599f-49a4-b01d-c873ff34b590/", diff --git a/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json b/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json index b67670257f5..f21b2ff3432 100644 --- a/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json +++ b/CVE-2024/CVE-2024-13xx/CVE-2024-1389.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1389", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-29T01:43:49.353", - "lastModified": "2024-11-21T08:50:28.477", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T17:15:51.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,30 +39,78 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:cozmoslabs:membership_\\&_content_restriction_-_paid_member_subscriptions:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "2.11.2", + "matchCriteriaId": "AF386728-7F5D-424F-B3D8-0027914BC828" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/paid-member-subscriptions/trunk/includes/gateways/stripe/admin/functions-admin-connect.php#L11", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3034497%40paid-member-subscriptions%2Ftrunk&old=3031453%40paid-member-subscriptions%2Ftrunk&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd5f5861-5be4-456d-915d-bafb7bff2110?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/paid-member-subscriptions/trunk/includes/gateways/stripe/admin/functions-admin-connect.php#L11", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3034497%40paid-member-subscriptions%2Ftrunk&old=3031453%40paid-member-subscriptions%2Ftrunk&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd5f5861-5be4-456d-915d-bafb7bff2110?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1808.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1808.json index a411cd09a0a..5597a3c4e71 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1808.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1808.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1808", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T13:15:07.803", - "lastModified": "2024-11-21T08:51:22.030", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:44:15.527", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:getshortcodes:shortcodes_ultimate:*:*:*:*:-:wordpress:*:*", + "versionEndExcluding": "7.0.4", + "matchCriteriaId": "85409D35-C52D-44E2-8E9C-E459786C44C3" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset/3041647/shortcodes-ultimate", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96769a0e-d4a9-4196-8ded-b600046c0943?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset/3041647/shortcodes-ultimate", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/96769a0e-d4a9-4196-8ded-b600046c0943?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-18xx/CVE-2024-1861.json b/CVE-2024/CVE-2024-18xx/CVE-2024-1861.json index 318a2e9266e..9f13c7fe64d 100644 --- a/CVE-2024/CVE-2024-18xx/CVE-2024-1861.json +++ b/CVE-2024/CVE-2024-18xx/CVE-2024-1861.json @@ -2,8 +2,8 @@ "id": "CVE-2024-1861", "sourceIdentifier": "security@wordfence.com", "published": "2024-02-28T10:15:09.483", - "lastModified": "2024-11-21T08:51:28.707", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T17:45:40.267", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -39,22 +39,64 @@ } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:billminozzi:anti_hacker:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "4.53", + "matchCriteriaId": "36B45351-7370-4693-A7E0-80104B6DA601" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040447%40antihacker&new=3040447%40antihacker&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b80c8888-e8d6-4458-ae93-8e4182060590?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3040447%40antihacker&new=3040447%40antihacker&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/b80c8888-e8d6-4458-ae93-8e4182060590?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json index 202487e3e78..ce9a51ccb57 100644 --- a/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json +++ b/CVE-2024/CVE-2024-214xx/CVE-2024-21478.json @@ -2,8 +2,8 @@ "id": "CVE-2024-21478", "sourceIdentifier": "product-security@qualcomm.com", "published": "2024-06-03T10:15:11.907", - "lastModified": "2024-11-21T08:54:30.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:53:05.400", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,360 @@ "value": "CWE-704" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-476" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "3723C7B1-A7E2-401F-8D6D-189350F6BCA5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "B12B89EF-7B12-481E-BCBC-F12B9D16321A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "295E75BD-2A6C-4A76-A376-A9977DDB17FF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "BD37AA1A-B911-45BF-9BCC-C772FA83E657" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "49B2DF91-BE6B-4E9E-B63C-98DADD29AD6B" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "58170126-928F-4AE5-B5AF-5ED4710F9BA2" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "F8673334-5E11-4E95-B33D-3029499F71DF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC0B32F6-5EF0-4591-99D7-D0E9B09DEC5A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CE03AB2A-3ED9-4489-8E5B-4FCF8BAA8559" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "9E646738-6A87-4470-9640-6A5A1DF3AF78" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "EC6E268D-C4AF-4950-9223-39EA36D538A8" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "073C1A81-D02B-4F2F-9378-CD1B2DCE0E5B" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E0E807AA-5646-48AD-9A5C-B0B13E222AA9" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "45FBB72B-B850-4E3F-ACBB-9392157FF131" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "781CCC31-C08F-499B-BE73-6C7DB70437AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "75AFAA21-0589-4C6A-9418-34EE8A61BBAD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "1C79595B-1259-4431-96F9-C5A24E624305" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0F2F3431-9CD7-4D4F-833D-DD4D3ACF94C7" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A024AB04-B213-4018-A4C1-FA467C7BA775" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2A8AB7C-5D34-4794-8C06-2193075B323F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "0CD199F5-DA68-4BEB-AA99-11572DA26B4F" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8ACA2D4D-FC77-4C1A-8278-1C27B3EA3303" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E4B29E7F-8BFE-466A-B357-63F8A2160C4E" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*", + "matchCriteriaId": "6D55CC7D-2E65-4CA9-9892-B6FBCC087E6F" + } + ] + } + ] } ], "references": [ { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "product-security@qualcomm.com" + "source": "product-security@qualcomm.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] }, { "url": "https://docs.qualcomm.com/product/publicresources/securitybulletin/june-2024-bulletin.html", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-215xx/CVE-2024-21546.json b/CVE-2024/CVE-2024-215xx/CVE-2024-21546.json index 0eeaa371a3a..7b2aa586c48 100644 --- a/CVE-2024/CVE-2024-215xx/CVE-2024-21546.json +++ b/CVE-2024/CVE-2024-215xx/CVE-2024-21546.json @@ -2,7 +2,7 @@ "id": "CVE-2024-21546", "sourceIdentifier": "report@snyk.io", "published": "2024-12-18T06:15:22.850", - "lastModified": "2024-12-18T06:15:22.850", + "lastModified": "2025-01-27T18:15:36.990", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,6 +80,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ] }, @@ -93,6 +113,16 @@ "value": "CWE-94" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "description": [ + { + "lang": "en", + "value": "CWE-94" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json index 35af2ade22d..6f42b02ef88 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22029.json @@ -2,7 +2,7 @@ "id": "CVE-2024-22029", "sourceIdentifier": "meissner@suse.de", "published": "2024-10-16T14:15:04.500", - "lastModified": "2024-10-16T16:38:14.557", + "lastModified": "2025-01-27T18:15:37.237", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-732" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-732" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json index e56bb1fa82b..07dbd44a539 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22064.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22064", "sourceIdentifier": "psirt@zte.com.cn", "published": "2024-05-14T14:56:40.160", - "lastModified": "2024-11-21T08:55:29.303", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:36:59.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "ADJACENT_NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,62 @@ "value": "CWE-1051" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-665" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:zte:zxun-epdg_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "5.20.20", + "matchCriteriaId": "A5DD1547-50E5-46B1-9E6F-CFE9EBCE6B39" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:zte:zxun-epdg:-:*:*:*:*:*:*:*", + "matchCriteriaId": "2A0BFF58-BA88-4BE2-9E7A-ACD6A28F8E1C" + } + ] + } + ] } ], "references": [ { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035524", - "source": "psirt@zte.com.cn" + "source": "psirt@zte.com.cn", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://support.zte.com.cn/support/news/LoopholeInfoDetail.aspx?newsId=1035524", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json b/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json index 97f99805070..baf0008f95b 100644 --- a/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json +++ b/CVE-2024/CVE-2024-220xx/CVE-2024-22092.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22092", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:41.700", - "lastModified": "2024-11-21T08:55:33.710", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T17:54:44.350", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.1, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N", + "baseScore": 7.4, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.0 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-290" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-290" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "3.2.4", + "matchCriteriaId": "A7ABA6ED-85C6-4D9E-8461-E9D17E8F5B04" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json b/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json index 530f2ade5bc..c0c5267da61 100644 --- a/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json +++ b/CVE-2024/CVE-2024-221xx/CVE-2024-22180.json @@ -2,8 +2,8 @@ "id": "CVE-2024-22180", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:42.340", - "lastModified": "2024-11-21T08:55:44.260", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T17:58:03.073", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "4.0", + "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json index be3c9e0ef38..1159b78f381 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23125.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23125", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.100", - "lastModified": "2024-11-21T08:56:59.570", + "lastModified": "2025-01-27T18:15:37.520", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted SLDPRT file when parsed ODXSW_DLL.dll through Autodesk AutoCAD can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted SLDPRT file when parsed ODXSW_DLL.dll through Autodesk applications can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json index b4112af6ef5..10efd51c80c 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23126.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23126", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T03:15:08.170", - "lastModified": "2024-11-21T08:56:59.750", + "lastModified": "2025-01-27T18:15:37.747", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted CATPART file in CC5Dll.dll when parsed through Autodesk AutoCAD can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process.\n" + "value": "A maliciously crafted CATPART file when parsed CC5Dll.dll through Autodesk applications can be used to cause a Stack-based Overflow. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json index c4ec824e4df..dd475eacc34 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23132.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23132", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.857", - "lastModified": "2024-11-21T08:57:00.897", + "lastModified": "2025-01-27T18:15:37.980", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP file in atf_dwg_consumer.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n" + "value": "A maliciously crafted STP file in atf_dwg_consumer.dll when parsed through Autodesk applications can lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json index 10f13850238..e8f59a63683 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23133.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23133", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T04:15:08.917", - "lastModified": "2024-11-21T08:57:01.087", + "lastModified": "2025-01-27T18:15:38.187", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk AutoCAD could lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process.\n" + "value": "A maliciously crafted STP file in ASMDATAX228A.dll when parsed through Autodesk applications can lead to a memory corruption vulnerability by write access violation. This vulnerability in conjunction with other vulnerabilities could lead to code execution in the context of the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json b/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json index d3e2ab72713..c5e05788aa4 100644 --- a/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json +++ b/CVE-2024/CVE-2024-231xx/CVE-2024-23135.json @@ -2,13 +2,13 @@ "id": "CVE-2024-23135", "sourceIdentifier": "psirt@autodesk.com", "published": "2024-02-22T05:15:09.357", - "lastModified": "2024-11-21T08:57:01.513", + "lastModified": "2025-01-27T18:15:38.410", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { "lang": "en", - "value": "A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk AutoCAD can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process.\n" + "value": "A maliciously crafted SLDPRT file in ASMkern228A.dll when parsed through Autodesk applications can be used in user-after-free vulnerability. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process." }, { "lang": "es", @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "psirt@autodesk.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", diff --git a/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json b/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json index 5d5a6eb3a76..9156ccc84fa 100644 --- a/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json +++ b/CVE-2024/CVE-2024-245xx/CVE-2024-24581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-24581", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:42.560", - "lastModified": "2024-11-21T08:59:28.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:00:59.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.0, "impactScore": 4.0 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-787" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "4.0", + "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25946.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25946.json index ac9823615f3..1575ca685bf 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25946.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25946.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25946", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.010", - "lastModified": "2024-11-21T09:01:37.653", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:57:59.197", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powermax_eem:5978:*:*:*:*:*:*:*", + "matchCriteriaId": "A6945B14-B9EC-41C3-9F62-623A3034140B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.4.6", + "matchCriteriaId": "880C4ED7-3D39-4FFF-A35A-49D249A544CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:unisphere_for_powermax_virtual_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.4.9", + "matchCriteriaId": "424665FA-37F4-4D36-91CC-0CDAC4749912" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000223609/dsa-2024-108-dell-powermaxos-5978-dell-powermax-os-10-0-1-5-dell-powermax-os-10-1-0-2-dell-unisphere-360-unisphere-powermax-unisphere-powermax-vapp-dell-solutions-enabler-vapp-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000223609/dsa-2024-108-dell-powermaxos-5978-dell-powermax-os-10-0-1-5-dell-powermax-os-10-1-0-2-dell-unisphere-360-unisphere-powermax-unisphere-powermax-vapp-dell-solutions-enabler-vapp-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25955.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25955.json index f36ac729cf9..48e24008001 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25955.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25955.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25955", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:47.790", - "lastModified": "2024-11-21T09:01:38.580", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:57:51.763", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,61 @@ "value": "CWE-78" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-77" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powermax_eem:5978:*:*:*:*:*:*:*", + "matchCriteriaId": "A6945B14-B9EC-41C3-9F62-623A3034140B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:solutions_enabler_virtual_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.4.6", + "matchCriteriaId": "880C4ED7-3D39-4FFF-A35A-49D249A544CF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:unisphere_for_powermax_virtual_appliance:*:*:*:*:*:*:*:*", + "versionEndExcluding": "9.2.4.9", + "matchCriteriaId": "424665FA-37F4-4D36-91CC-0CDAC4749912" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000223609/dsa-2024-108-dell-powermaxos-5978-dell-powermax-os-10-0-1-5-dell-powermax-os-10-1-0-2-dell-unisphere-360-unisphere-powermax-unisphere-powermax-vapp-dell-solutions-enabler-vapp-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000223609/dsa-2024-108-dell-powermaxos-5978-dell-powermax-os-10-0-1-5-dell-powermax-os-10-1-0-2-dell-unisphere-360-unisphere-powermax-unisphere-powermax-vapp-dell-solutions-enabler-vapp-and-dell-powermax-eem-security-update-for-multiple-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-259xx/CVE-2024-25971.json b/CVE-2024/CVE-2024-259xx/CVE-2024-25971.json index 5ff78aee14e..8e105336ef2 100644 --- a/CVE-2024/CVE-2024-259xx/CVE-2024-25971.json +++ b/CVE-2024/CVE-2024-259xx/CVE-2024-25971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-25971", "sourceIdentifier": "security_alert@emc.com", "published": "2024-03-28T19:15:48.373", - "lastModified": "2024-11-21T09:01:40.500", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:55:14.810", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.2, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.2 } ] }, @@ -51,14 +71,38 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:powerprotect_data_manager:*:*:*:*:*:*:*:*", + "versionEndExcluding": "19.16", + "matchCriteriaId": "E4F26D64-9012-4136-92F7-53E6A8FBF3A2" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000223556/dsa-2024-132-security-update-dell-power-protect-data-manager-for-multiple-security-vulnerabilities", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000223556/dsa-2024-132-security-update-dell-power-protect-data-manager-for-multiple-security-vulnerabilities", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json index ec644bd1c93..1fe4f0f6176 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2546.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2546", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T02:15:06.190", - "lastModified": "2024-11-21T09:09:59.040", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T17:05:46.703", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,89 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.07.09:*:*:*:*:*:*:*", + "matchCriteriaId": "7F318BF3-E1D1-4FDF-8016-8B8E1790BD1C" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256999", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256999", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/A18/fromSetWirelessRepeat_a.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.256999", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required" + ] }, { "url": "https://vuldb.com/?id.256999", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json b/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json index d65babc8a4e..c9d5ed1ceaf 100644 --- a/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json +++ b/CVE-2024/CVE-2024-25xx/CVE-2024-2547.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2547", "sourceIdentifier": "cna@vuldb.com", "published": "2024-03-17T04:15:06.750", - "lastModified": "2024-11-21T09:09:59.170", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T17:03:24.857", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,32 +94,93 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ac18_firmware:15.03.05.05:*:*:*:*:*:*:*", + "matchCriteriaId": "4D5CB727-FC6B-4212-A61E-2888A0DADFB0" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*", + "matchCriteriaId": "CF9F8AF9-F921-4348-922B-EE5E6037E7AC" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257000", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AC18/R7WebsSecurityHandler.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.257000", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.257000", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json b/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json new file mode 100644 index 00000000000..ca0b535adf5 --- /dev/null +++ b/CVE-2024/CVE-2024-263xx/CVE-2024-26317.json @@ -0,0 +1,29 @@ +{ + "id": "CVE-2024-26317", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T18:15:38.613", + "lastModified": "2025-01-27T18:15:38.613", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In illumos illumos-gate 2024-02-15, an error occurs in the elliptic curve point addition algorithm that uses mixed Jacobian-affine coordinates, causing the algorithm to yield a result of POINT_AT_INFINITY when it should not. A man-in-the-middle attacker could use this to interfere with a connection, resulting in an attacked party computing an incorrect shared secret." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://drive.google.com/file/d/1aGLAFz20-fc7ZLiWouegyK_65jCkGTDb/view?usp=sharing", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/illumos/illumos-gate", + "source": "cve@mitre.org" + }, + { + "url": "https://rashidkhanpathan.github.io/posts/CVE-2024-26317-Elliptic-curve-point-addition-error/", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-272xx/CVE-2024-27256.json b/CVE-2024/CVE-2024-272xx/CVE-2024-27256.json new file mode 100644 index 00000000000..7a250303e4a --- /dev/null +++ b/CVE-2024/CVE-2024-272xx/CVE-2024-27256.json @@ -0,0 +1,86 @@ +{ + "id": "CVE-2024-27256", + "sourceIdentifier": "psirt@us.ibm.com", + "published": "2025-01-27T17:15:15.443", + "lastModified": "2025-01-27T17:15:15.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "IBM MQ Container 3.0.0, 3.0.1, 3.1.0 through 3.1.3 CD, 2.0.0 LTS through 2.0.22 LTS and\u00a02.4.0 through 2.4.8, 2.3.0 through 2.3.3, 2.2.0 through 2.2.2 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 5.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "psirt@us.ibm.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-327" + } + ] + } + ], + "references": [ + { + "url": "https://www.ibm.com/support/pages/node/7157667", + "source": "psirt@us.ibm.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json b/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json index a1ba3ad11df..e836e92479e 100644 --- a/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json +++ b/CVE-2024/CVE-2024-27xx/CVE-2024-2785.json @@ -2,8 +2,8 @@ "id": "CVE-2024-2785", "sourceIdentifier": "security@wordfence.com", "published": "2024-05-14T15:20:50.620", - "lastModified": "2024-11-21T09:10:30.790", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:23:00.010", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,33 +36,107 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "5BFEFE69-71B2-407D-B3A8-C63D0A045DAA" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:pro:wordpress:*:*", + "versionEndExcluding": "5.5.0", + "matchCriteriaId": "8053B06E-E10B-4519-9018-B0E19ECBC10A" + } + ] + } + ] + } + ], "references": [ { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_age_gate.php?annotate=blame#L2389", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076733%40the-plus-addons-for-elementor-page-builder&new=3076733%40the-plus-addons-for-elementor-page-builder&sfp_email=&sfph_mail=", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0117436-7a2a-42f3-8c05-75dfddfb9d09?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/5.5.0/modules/widgets/tp_age_gate.php?annotate=blame#L2389", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Product" + ] }, { "url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076733%40the-plus-addons-for-elementor-page-builder&new=3076733%40the-plus-addons-for-elementor-page-builder&sfp_email=&sfph_mail=", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0117436-7a2a-42f3-8c05-75dfddfb9d09?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json b/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json index b948573c26f..4de62777a8c 100644 --- a/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json +++ b/CVE-2024/CVE-2024-282xx/CVE-2024-28226.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28226", "sourceIdentifier": "scy@openharmony.io", "published": "2024-04-02T07:15:44.840", - "lastModified": "2024-11-21T09:06:02.767", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:01:43.667", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*", + "versionStartIncluding": "3.2", + "versionEndIncluding": "4.0", + "matchCriteriaId": "46936F6A-F704-4D4B-8360-6F34BAB93CA3" + } + ] + } + ] } ], "references": [ { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "scy@openharmony.io" + "source": "scy@openharmony.io", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2024/2024-04.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-287xx/CVE-2024-28781.json b/CVE-2024/CVE-2024-287xx/CVE-2024-28781.json index 5bdfe618d6a..0ec99236338 100644 --- a/CVE-2024/CVE-2024-287xx/CVE-2024-28781.json +++ b/CVE-2024/CVE-2024-287xx/CVE-2024-28781.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28781", "sourceIdentifier": "psirt@us.ibm.com", "published": "2024-05-14T15:14:41.887", - "lastModified": "2024-11-21T09:06:55.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:31:09.747", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.3, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -51,22 +71,83 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:devops_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "8.0.0.0", + "versionEndExcluding": "8.0.1.0", + "matchCriteriaId": "D6EE6B16-69D2-4346-BA42-C2C802747BDC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.0.0.0", + "versionEndExcluding": "7.0.5.21", + "matchCriteriaId": "9CDB4B82-A3E1-4905-9372-1C95FE4A1AA1" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.1.0.0", + "versionEndExcluding": "7.1.2.17", + "matchCriteriaId": "015364EF-C0CE-408E-A2C5-3A011C689EAE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.2.0.0", + "versionEndExcluding": "7.2.3.10", + "matchCriteriaId": "CF86D6F3-550E-4E89-83E8-014089803E4E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*", + "versionStartIncluding": "7.3.0.0", + "versionEndExcluding": "7.3.2.5", + "matchCriteriaId": "11643F05-5EE8-420A-9DB6-FBED56E25BA4" + } + ] + } + ] + } + ], "references": [ { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285654", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150747", - "source": "psirt@us.ibm.com" + "source": "psirt@us.ibm.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/285654", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "VDB Entry", + "Vendor Advisory" + ] }, { "url": "https://www.ibm.com/support/pages/node/7150747", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-289xx/CVE-2024-28971.json b/CVE-2024/CVE-2024-289xx/CVE-2024-28971.json index 9ab4e8a568c..e9a3cac2552 100644 --- a/CVE-2024/CVE-2024-289xx/CVE-2024-28971.json +++ b/CVE-2024/CVE-2024-289xx/CVE-2024-28971.json @@ -2,8 +2,8 @@ "id": "CVE-2024-28971", "sourceIdentifier": "security_alert@emc.com", "published": "2024-05-08T16:15:08.747", - "lastModified": "2024-11-21T09:07:17.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:43:23.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 0.9, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", + "baseScore": 4.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.2, + "impactScore": 3.6 } ] }, @@ -49,16 +69,51 @@ "value": "CWE-256" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-522" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:dell:openmanage_enterprise_update_manager:*:*:*:*:*:*:*:*", + "versionStartIncluding": "1.4.0", + "versionEndExcluding": "1.5.1", + "matchCriteriaId": "606BE978-AF58-43F8-896B-758F9496B14B" + } + ] + } + ] } ], "references": [ { "url": "https://www.dell.com/support/kbdoc/en-us/000224849/dsa-2024-209-security-update-for-dell-update-manager-plugin-vulnerability", - "source": "security_alert@emc.com" + "source": "security_alert@emc.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.dell.com/support/kbdoc/en-us/000224849/dsa-2024-209-security-update-for-dell-update-manager-plugin-vulnerability", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json index 7af16a2f609..3de4ccc6932 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30258.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30258", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:22:15.163", - "lastModified": "2024-11-21T09:11:34.120", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:19:29.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,32 +69,99 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.6.8", + "matchCriteriaId": "25329FD4-C1B1-4531-9D30-6ED8E1962020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "853DA35B-E938-4744-9342-EB4057ED7FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.13.0", + "versionEndExcluding": "2.13.5", + "matchCriteriaId": "34FCC01E-72D0-4CF2-A849-C869BB9CA898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E1186C20-32E4-45D1-8CBA-63BFA962441B" + } + ] + } + ] } ], "references": [ { "url": "https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/commit/65236f93e9c4ea3ff9a49fba4dfd9e43eb94037b", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://drive.google.com/file/d/19W5UC52hPnAqVq_boZWO45d1TJ4WoCSh/view?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/commit/65236f93e9c4ea3ff9a49fba4dfd9e43eb94037b", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Patch" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-53xw-465j-rxfh", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json b/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json index 13e35f7f9d9..26f47acce39 100644 --- a/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json +++ b/CVE-2024/CVE-2024-302xx/CVE-2024-30259.json @@ -2,8 +2,8 @@ "id": "CVE-2024-30259", "sourceIdentifier": "security-advisories@github.com", "published": "2024-05-14T15:22:15.967", - "lastModified": "2024-11-21T09:11:34.253", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:16:00.440", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 4.2 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -53,32 +73,99 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2.6.8", + "matchCriteriaId": "25329FD4-C1B1-4531-9D30-6ED8E1962020" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.10.0", + "versionEndExcluding": "2.10.4", + "matchCriteriaId": "853DA35B-E938-4744-9342-EB4057ED7FC7" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:*:*:*:*:*:*:*:*", + "versionStartIncluding": "2.13.0", + "versionEndExcluding": "2.13.5", + "matchCriteriaId": "34FCC01E-72D0-4CF2-A849-C869BB9CA898" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:eprosima:fast_dds:2.14.0:*:*:*:*:*:*:*", + "matchCriteriaId": "E1186C20-32E4-45D1-8CBA-63BFA962441B" + } + ] + } + ] } ], "references": [ { "url": "https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://vimeo.com/907641887?share=copy", - "source": "security-advisories@github.com" + "source": "security-advisories@github.com", + "tags": [ + "Exploit" + ] }, { "url": "https://drive.google.com/file/d/1Y2bGvP3UIOJCLh_XEURLdhrM2Sznlvlp/view?usp=sharing", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] }, { "url": "https://github.com/eProsima/Fast-DDS/security/advisories/GHSA-qcj9-939p-p662", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit", + "Vendor Advisory" + ] }, { "url": "https://vimeo.com/907641887?share=copy", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Exploit" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json b/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json index ac87be8d88b..7e234f9a1d5 100644 --- a/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json +++ b/CVE-2024/CVE-2024-30xx/CVE-2024-3037.json @@ -2,8 +2,8 @@ "id": "CVE-2024-3037", "sourceIdentifier": "eb41dac7-0af8-4f84-9f6d-0272772514f4", "published": "2024-05-14T15:39:48.660", - "lastModified": "2024-11-21T09:28:44.220", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:05:07.223", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 1.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 } ] }, @@ -49,16 +69,68 @@ "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-552" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:papercut:papercut_mf:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.0.9", + "matchCriteriaId": "7AE8A9B5-11C6-4FE2-B672-0EC6EF8075CC" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:papercut:papercut_ng:*:*:*:*:*:*:*:*", + "versionEndExcluding": "23.0.9", + "matchCriteriaId": "BA96610E-7518-4215-B5FF-1B4444BE2DA4" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA" + } + ] + } + ] } ], "references": [ { "url": "https://www.papercut.com/kb/Main/Security-Bulletin-May-2024/", - "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4" + "source": "eb41dac7-0af8-4f84-9f6d-0272772514f4", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.papercut.com/kb/Main/security-bulletin-may-2024/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json b/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json index 3b019a126ab..249d0731aad 100644 --- a/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json +++ b/CVE-2024/CVE-2024-351xx/CVE-2024-35171.json @@ -2,8 +2,8 @@ "id": "CVE-2024-35171", "sourceIdentifier": "audit@patchstack.com", "published": "2024-05-14T15:39:41.900", - "lastModified": "2024-11-21T09:19:51.723", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:08:26.833", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:kodezen:academy_lms:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "1.9.26", + "matchCriteriaId": "33CB0FAE-9405-4215-8B80-BF69326D5823" + } + ] + } + ] } ], "references": [ { "url": "https://patchstack.com/database/vulnerability/academy/wordpress-academy-lms-plugin-1-9-25-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "audit@patchstack.com" + "source": "audit@patchstack.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://patchstack.com/database/vulnerability/academy/wordpress-academy-lms-plugin-1-9-25-sensitive-data-exposure-vulnerability?_s_id=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-352xx/CVE-2024-35244.json b/CVE-2024/CVE-2024-352xx/CVE-2024-35244.json index 6247b454eb7..d7cca0c36c6 100644 --- a/CVE-2024/CVE-2024-352xx/CVE-2024-35244.json +++ b/CVE-2024/CVE-2024-352xx/CVE-2024-35244.json @@ -2,7 +2,7 @@ "id": "CVE-2024-35244", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-26T08:15:06.273", - "lastModified": "2024-11-26T08:15:06.273", + "lastModified": "2025-01-27T18:15:38.900", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-362xx/CVE-2024-36248.json b/CVE-2024/CVE-2024-362xx/CVE-2024-36248.json index 8cde4be0176..31413b1088f 100644 --- a/CVE-2024/CVE-2024-362xx/CVE-2024-36248.json +++ b/CVE-2024/CVE-2024-362xx/CVE-2024-36248.json @@ -2,7 +2,7 @@ "id": "CVE-2024-36248", "sourceIdentifier": "vultures@jpcert.or.jp", "published": "2024-11-26T08:15:06.430", - "lastModified": "2024-11-26T08:15:06.430", + "lastModified": "2025-01-27T18:15:39.113", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 5.2 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.2 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-798" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-798" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json index c72ec861f63..2c59a767e23 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36372.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36372", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:24.450", - "lastModified": "2024-11-21T09:22:02.920", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:40:38.827", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 6.1, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2023.05.6", + "matchCriteriaId": "2F6034D9-7173-4804-9D4F-1BCF75F960E1" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json index 105381c9d2f..0a7db6bd6f7 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36373.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36373", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:24.670", - "lastModified": "2024-11-21T09:22:03.053", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:41:16.957", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json index 6611e97bc70..67ade08fe94 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36374.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36374", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:24.883", - "lastModified": "2024-11-21T09:22:03.193", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:41:45.113", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.1, "impactScore": 2.5 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-79" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json index 040cab8425d..d7dae698ce7 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36375.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36375", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:25.097", - "lastModified": "2024-11-21T09:22:03.320", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:42:56.590", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-209" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-209" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json index 9008fb30d07..134f548c44a 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36376.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36376", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:25.343", - "lastModified": "2024-11-21T09:22:03.450", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:43:34.573", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-863" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json index 2b5fc10bd4f..45b40a0d5e8 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36377.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36377", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:25.573", - "lastModified": "2024-11-21T09:22:03.580", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:44:59.970", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json b/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json index ecaaadc17a1..9ea947db071 100644 --- a/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json +++ b/CVE-2024/CVE-2024-363xx/CVE-2024-36378.json @@ -2,8 +2,8 @@ "id": "CVE-2024-36378", "sourceIdentifier": "cve@jetbrains.com", "published": "2024-05-29T14:15:25.787", - "lastModified": "2024-11-21T09:22:03.713", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:45:58.190", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.2, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.6 } ] }, @@ -49,16 +69,50 @@ "value": "CWE-770" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:jetbrains:teamcity:*:*:*:*:*:*:*:*", + "versionEndExcluding": "2024.03.2", + "matchCriteriaId": "DE3A72D8-740D-44FC-94D7-801AF18DFDBF" + } + ] + } + ] } ], "references": [ { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "cve@jetbrains.com" + "source": "cve@jetbrains.com", + "tags": [ + "Vendor Advisory" + ] }, { "url": "https://www.jetbrains.com/privacy-security/issues-fixed/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-41xx/CVE-2024-4113.json b/CVE-2024/CVE-2024-41xx/CVE-2024-4113.json index d77c3284180..57c365d724c 100644 --- a/CVE-2024/CVE-2024-41xx/CVE-2024-4113.json +++ b/CVE-2024/CVE-2024-41xx/CVE-2024-4113.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4113", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-24T15:15:48.890", - "lastModified": "2024-11-21T09:42:12.717", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:22:15.977", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:tx9_pro_firmware:22.03.02.10:*:*:*:*:*:*:*", + "matchCriteriaId": "4D7650EF-9C51-400B-96A8-342D1DF8A601" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:tx9_pro:-:*:*:*:*:*:*:*", + "matchCriteriaId": "086A4597-3A8E-4F94-98A8-D31C46453E15" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261856", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261856", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317217", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/TX9/fromSetSysTime.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.261856", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.261856", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.317217", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4237.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4237.json index ac135da11d3..dd862c4fd3f 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4237.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4237.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4237", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T19:15:47.713", - "lastModified": "2024-11-21T09:42:26.740", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:30:46.217", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "578F9769-EF24-4B52-83D3-9AA2C91A503D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA44369-A513-474F-8DD0-A81B598F5B07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262128", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319231", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/R7WebsSecurityHandler.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262128", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262128", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319231", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4238.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4238.json index 2c3425af556..5e923717ce0 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4238.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4238.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4238", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T20:15:07.537", - "lastModified": "2024-11-21T09:42:26.877", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:30:38.047", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "578F9769-EF24-4B52-83D3-9AA2C91A503D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA44369-A513-474F-8DD0-A81B598F5B07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262129", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262129", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319232", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetDeviceName_devName.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262129", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262129", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319232", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4239.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4239.json index 36036750bc9..65ef57bc710 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4239.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4239.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4239", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T21:15:50.003", - "lastModified": "2024-11-21T09:42:27.000", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:30:27.657", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:ax1806_firmware:1.0.0.1:*:*:*:*:*:*:*", + "matchCriteriaId": "578F9769-EF24-4B52-83D3-9AA2C91A503D" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:ax1806:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ACA44369-A513-474F-8DD0-A81B598F5B07" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262130", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319235", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/AX/AX1806/formSetRebootTimer.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262130", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262130", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319235", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4240.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4240.json index 0543948647a..12f16842845 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4240.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4240.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4240", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T21:15:50.280", - "lastModified": "2024-11-21T09:42:27.130", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:30:07.563", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2C2E04EE-4493-4CCB-9EB6-7E0D033920A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D015C5A3-DF6D-45B7-B669-9CCD50C5E704" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262131", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262131", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319822", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_auto.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262131", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262131", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319822", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4241.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4241.json index 5eb6f293d84..15c6f54bc73 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4241.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4241.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4241", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T21:15:50.507", - "lastModified": "2024-11-21T09:42:27.257", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:29:59.080", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2C2E04EE-4493-4CCB-9EB6-7E0D033920A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D015C5A3-DF6D-45B7-B669-9CCD50C5E704" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262132", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262132", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319823", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formQosManageDouble_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262132", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262132", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319823", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4242.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4242.json index 459a71afc07..205a8edddf2 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4242.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4242.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4242", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T21:15:50.727", - "lastModified": "2024-11-21T09:42:27.383", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:29:46.497", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2C2E04EE-4493-4CCB-9EB6-7E0D033920A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D015C5A3-DF6D-45B7-B669-9CCD50C5E704" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262133", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262133", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319824", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDget.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262133", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262133", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319824", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4243.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4243.json index 52d07bb2f0b..3e8d60b8bbb 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4243.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4243.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4243", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T22:15:08.640", - "lastModified": "2024-11-21T09:42:27.497", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:28:50.187", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2C2E04EE-4493-4CCB-9EB6-7E0D033920A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D015C5A3-DF6D-45B7-B669-9CCD50C5E704" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262134", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319825", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/formwrlSSIDset.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262134", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262134", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319825", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4244.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4244.json index 1a9a02419f3..4c59a207810 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4244.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4244.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4244", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-26T22:15:08.867", - "lastModified": "2024-11-21T09:42:27.643", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:28:39.927", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:w9_firmware:1.0.0.7\\(4456\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2C2E04EE-4493-4CCB-9EB6-7E0D033920A1" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:w9:-:*:*:*:*:*:*:*", + "matchCriteriaId": "D015C5A3-DF6D-45B7-B669-9CCD50C5E704" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262135", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262135", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319826", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/W9/fromDhcpSetSer.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262135", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319826", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4245.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4245.json index 981245aa8a0..8fc68fd66d8 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4245.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4245.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4245", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T08:15:06.277", - "lastModified": "2024-11-21T09:42:27.793", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:28:31.410", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_auto.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262136", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262136", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319830", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_auto.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262136", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262136", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319830", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4246.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4246.json index 8c16a57e4e9..f7ea088f64e 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4246.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4246.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4246", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T09:15:09.307", - "lastModified": "2024-11-21T09:42:27.920", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:28:04.913", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262137", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262137", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319831", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManageDouble_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262137", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262137", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319831", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4247.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4247.json index 7b3d445111a..c9885ba1bc5 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4247.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4247.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4247", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T10:15:08.730", - "lastModified": "2024-11-21T09:42:28.047", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:27:53.547", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262138", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319832", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_auto.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262138", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262138", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319832", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4248.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4248.json index 1b4f4c1069c..186d1c2aaa8 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4248.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4248.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4248", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T11:15:06.500", - "lastModified": "2024-11-21T09:42:28.180", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:25:53.377", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262139", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319833", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formQosManage_user.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262139", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262139", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319833", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4249.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4249.json index 726b640efdc..d3d32cbe42e 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4249.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4249.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4249", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T12:15:10.740", - "lastModified": "2024-11-21T09:42:28.310", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:25:30.817", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262140", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319834", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDget.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262140", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262140", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319834", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4250.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4250.json index 5c520b524f5..49e0f3dc01a 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4250.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4250.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4250", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T12:15:10.963", - "lastModified": "2024-11-21T09:42:28.443", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:24:21.787", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262141", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319835", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formwrlSSIDset.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262141", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262141", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319835", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4251.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4251.json index 9e8574c9843..a061f75f896 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4251.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4251.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4251", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T13:15:09.850", - "lastModified": "2024-11-21T09:42:28.590", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:22:36.203", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262142", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319836", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/fromDhcpSetSer.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262142", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262142", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319836", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-42xx/CVE-2024-4252.json b/CVE-2024/CVE-2024-42xx/CVE-2024-4252.json index 8a792833e23..f81e18349db 100644 --- a/CVE-2024/CVE-2024-42xx/CVE-2024-4252.json +++ b/CVE-2024/CVE-2024-42xx/CVE-2024-4252.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4252", "sourceIdentifier": "cna@vuldb.com", "published": "2024-04-27T14:15:07.067", - "lastModified": "2024-11-21T09:42:28.720", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:27:19.633", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i22_firmware:1.0.0.3\\(4687\\):*:*:*:*:*:*:*", + "matchCriteriaId": "5F879BB6-4F6E-4E81-A24A-3037DBD1A5B2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i22:-:*:*:*:*:*:*:*", + "matchCriteriaId": "52D94207-DFC8-478C-BA6B-F0A64BBB3E67" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262143", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319840", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i22/formSetUrlFilterRule.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.262143", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.262143", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.319840", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4491.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4491.json index 8dc4715a8e1..b85526d17c8 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4491.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4491.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4491", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T00:15:07.373", - "lastModified": "2024-11-21T09:42:56.097", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:35:34.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263080", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323600", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formGetDiagnoseInfo.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263080", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323600", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4492.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4492.json index a5d825d0f3b..57c4b39e0a0 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4492.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4492.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4492", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T01:15:06.380", - "lastModified": "2024-11-21T09:42:56.243", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:35:21.830", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,112 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link", + "Third Party Advisory" + ] }, { "url": "https://vuldb.com/?ctiid.263081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263081", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323601", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formOfflineSet.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263081", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323601", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4493.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4493.json index 2bfeec0d007..0ca86e544a0 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4493.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4493.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4493", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T03:15:07.340", - "lastModified": "2024-11-21T09:42:56.477", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:35:12.380", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263082", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263082", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323602", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetAutoPing.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263082", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323602", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4494.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4494.json index d87388dbc89..5899be5130f 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4494.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4494.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4494", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T05:15:06.530", - "lastModified": "2024-11-21T09:42:56.687", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:35:05.170", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263083", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263083", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323604", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formSetUplinkInfo.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263083", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323604", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4495.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4495.json index c9945b81521..f2f54f060b3 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4495.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4495.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4495", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T06:15:06.637", - "lastModified": "2024-11-21T09:42:56.860", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:34:53.583", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263084", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263084", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323605", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterGet.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263084", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323605", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4496.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4496.json index c83442e50cb..7fffed02b08 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4496.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4496.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4496", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T06:15:08.027", - "lastModified": "2024-11-21T09:42:57.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:34:21.687", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterSet.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263085", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263085", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323606", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formWifiMacFilterSet.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263085", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323606", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-44xx/CVE-2024-4497.json b/CVE-2024/CVE-2024-44xx/CVE-2024-4497.json index 7af47576427..4e987ba058e 100644 --- a/CVE-2024/CVE-2024-44xx/CVE-2024-4497.json +++ b/CVE-2024/CVE-2024-44xx/CVE-2024-4497.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4497", "sourceIdentifier": "cna@vuldb.com", "published": "2024-05-05T07:15:06.463", - "lastModified": "2024-11-21T09:42:57.170", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:28:00.433", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.8, "impactScore": 5.9 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 8.8, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.9 } ], "cvssMetricV2": [ @@ -74,40 +94,111 @@ "value": "CWE-121" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "configurations": [ + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:tenda:i21_firmware:1.0.0.14\\(4656\\):*:*:*:*:*:*:*", + "matchCriteriaId": "2A8E6370-3A83-4813-A1D8-A106DB130DCB" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:tenda:i21:-:*:*:*:*:*:*:*", + "matchCriteriaId": "ECC76541-E312-4C4E-A906-C41951FADAD9" + } + ] + } + ] } ], "references": [ { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263086", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323607", - "source": "cna@vuldb.com" + "source": "cna@vuldb.com", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Tenda/i/i21/formexeCommand.md", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Broken Link" + ] }, { "url": "https://vuldb.com/?ctiid.263086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Permissions Required", + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?id.263086", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] }, { "url": "https://vuldb.com/?submit.323607", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory", + "VDB Entry" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json b/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json index 4593abacb20..1497162a3b8 100644 --- a/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json +++ b/CVE-2024/CVE-2024-45xx/CVE-2024-4581.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4581", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-04T09:15:09.587", - "lastModified": "2024-11-21T09:43:09.063", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:21:15.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "C2E14EAD-42C2-4EA3-9CCE-BEC7BFCB9645" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.sliderrevolution.com/documentation/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a99b8eb9-1511-4ec0-98f4-c0e0c989fa28?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sliderrevolution.com/documentation/changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/a99b8eb9-1511-4ec0-98f4-c0e0c989fa28?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json b/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json index 705784047c6..13419d49181 100644 --- a/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json +++ b/CVE-2024/CVE-2024-466xx/CVE-2024-46666.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46666", "sourceIdentifier": "psirt@fortinet.com", "published": "2025-01-14T14:15:31.647", - "lastModified": "2025-01-14T14:15:31.647", + "lastModified": "2025-01-27T18:15:39.467", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -36,6 +36,26 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, @@ -49,6 +69,16 @@ "value": "CWE-770" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-770" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json index 91ffca777c4..333f58edeba 100644 --- a/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json +++ b/CVE-2024/CVE-2024-468xx/CVE-2024-46887.json @@ -2,7 +2,7 @@ "id": "CVE-2024-46887", "sourceIdentifier": "productcert@siemens.com", "published": "2024-10-08T09:15:16.447", - "lastModified": "2024-10-10T12:56:30.817", + "lastModified": "2025-01-27T18:15:39.660", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -80,19 +80,49 @@ }, "exploitabilityScore": 3.9, "impactScore": 1.4 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 } ] }, "weaknesses": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "description": [ { "lang": "en", "value": "CWE-288" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-862" + } + ] } ], "references": [ diff --git a/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json b/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json index a86339296b6..a802078751e 100644 --- a/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json +++ b/CVE-2024/CVE-2024-46xx/CVE-2024-4637.json @@ -2,8 +2,8 @@ "id": "CVE-2024-4637", "sourceIdentifier": "security@wordfence.com", "published": "2024-06-04T10:15:12.503", - "lastModified": "2024-11-21T09:43:15.697", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:22:19.963", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,25 +36,87 @@ }, "exploitabilityScore": 3.1, "impactScore": 2.7 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", + "baseScore": 5.4, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "REQUIRED", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.3, + "impactScore": 2.7 } ] }, + "weaknesses": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:themepunch:slider_revolution:*:*:*:*:*:wordpress:*:*", + "versionEndExcluding": "6.7.11", + "matchCriteriaId": "C2E14EAD-42C2-4EA3-9CCE-BEC7BFCB9645" + } + ] + } + ] + } + ], "references": [ { "url": "https://www.sliderrevolution.com/documentation/changelog/", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/457b5066-da37-4877-9abe-c912bc201f29?source=cve", - "source": "security@wordfence.com" + "source": "security@wordfence.com", + "tags": [ + "Third Party Advisory" + ] }, { "url": "https://www.sliderrevolution.com/documentation/changelog/", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Release Notes" + ] }, { "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/457b5066-da37-4877-9abe-c912bc201f29?source=cve", - "source": "af854a3a-2127-422b-91ae-364da2661108" + "source": "af854a3a-2127-422b-91ae-364da2661108", + "tags": [ + "Third Party Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json new file mode 100644 index 00000000000..154000e1a5c --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48416.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48416", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:15.770", + "lastModified": "2025-01-27T17:15:15.770", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/fromSetLanDhcpsClientbinding." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://edimax.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48416.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json new file mode 100644 index 00000000000..366cd7f6359 --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48417.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48417", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:15.867", + "lastModified": "2025-01-27T17:15:15.867", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Cross Site Scripting (XSS) in : /bin/goahead via /goform/setStaticRoute, /goform/fromSetFilterUrlFilter, and /goform/fromSetFilterClientFilter." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://edimax.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48417.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json new file mode 100644 index 00000000000..0840aa0b04e --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48418.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48418", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:15.960", + "lastModified": "2025-01-27T17:15:15.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06, the request /goform/fromSetDDNS does not properly handle special characters in any of user provided parameters, allowing an attacker with access to the web interface to inject and execute arbitrary shell commands." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://edimax.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48418.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json new file mode 100644 index 00000000000..dfb97f732a0 --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48419.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48419", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.053", + "lastModified": "2025-01-27T17:15:16.053", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 suffers from Command Injection issues in /bin/goahead. Specifically, these issues can be triggered through /goform/tracerouteDiagnosis, /goform/pingDiagnosis, and /goform/fromSysToolPingCmd Each of these issues allows an attacker with access to the web interface to inject and execute arbitrary shell commands, with \"root\" privileges." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://edimax.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48419.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json b/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json new file mode 100644 index 00000000000..f6de9041087 --- /dev/null +++ b/CVE-2024/CVE-2024-484xx/CVE-2024-48420.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-48420", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.153", + "lastModified": "2025-01-27T17:15:16.153", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Edimax AC1200 Wi-Fi 5 Dual-Band Router BR-6476AC 1.06 is vulnerable to Buffer Overflow via /goform/getWifiBasic." + } + ], + "metrics": {}, + "references": [ + { + "url": "http://edimax.com", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/SpikeReply/advisories/blob/c271ddb997bc0263274118acc380bc71ce9c316b/cve/edimax/cve-2024-48420.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-503xx/CVE-2024-50313.json b/CVE-2024/CVE-2024-503xx/CVE-2024-50313.json index 16c39234291..aed6bbdf9ba 100644 --- a/CVE-2024/CVE-2024-503xx/CVE-2024-50313.json +++ b/CVE-2024/CVE-2024-503xx/CVE-2024-50313.json @@ -2,8 +2,8 @@ "id": "CVE-2024-50313", "sourceIdentifier": "productcert@siemens.com", "published": "2024-11-12T13:15:11.910", - "lastModified": "2024-11-15T17:12:44.410", - "vulnStatus": "Analyzed", + "lastModified": "2025-01-27T18:15:39.980", + "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { @@ -63,7 +63,7 @@ "cvssMetricV31": [ { "source": "productcert@siemens.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", @@ -83,6 +83,26 @@ }, { "source": "nvd@nist.gov", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", + "baseScore": 4.8, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 2.5 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Primary", "cvssData": { "version": "3.1", @@ -113,6 +133,16 @@ "value": "CWE-362" } ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-362" + } + ] } ], "configurations": [ diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json new file mode 100644 index 00000000000..962169db859 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54145.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-54145", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T17:15:16.240", + "lastModified": "2025-01-27T17:15:16.240", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the get_discovery_results function of automation_devices.php using the network parameter. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-fh3x-69rr-qqpp", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json b/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json new file mode 100644 index 00000000000..039538b0413 --- /dev/null +++ b/CVE-2024/CVE-2024-541xx/CVE-2024-54146.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2024-54146", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T17:15:16.380", + "lastModified": "2025-01-27T17:15:16.380", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", + "baseScore": 7.6, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 4.7 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-vj9g-p7f2-4wqj", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55227.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55227.json new file mode 100644 index 00000000000..81bcc4f013b --- /dev/null +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55227.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-55227", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.523", + "lastModified": "2025-01-27T17:15:16.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the Events/Agenda module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Dqtdqt/9762466cd6ec541ea265ba33b09489ff", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/56710ce9b79a97df093f586c90bdaf6cce6a5808", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/9aa24d9d9aeab36358c725dae3fe20c9631082e7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/c0250e4c9106b5c889e512a4771f0205d4f99b99", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/security/policy", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json b/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json new file mode 100644 index 00000000000..c5a2bfe0514 --- /dev/null +++ b/CVE-2024/CVE-2024-552xx/CVE-2024-55228.json @@ -0,0 +1,37 @@ +{ + "id": "CVE-2024-55228", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.633", + "lastModified": "2025-01-27T17:15:16.633", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A cross-site scripting (XSS) vulnerability in the Product module of Dolibarr v21.0.0-beta allows attackers to execute arbitrary web scripts or HTMl via a crafted payload injected into the Title parameter." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://gist.github.com/Dqtdqt/a942bbce9a5fc851dce366902411c768", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/56710ce9b79a97df093f586c90bdaf6cce6a5808", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/9aa24d9d9aeab36358c725dae3fe20c9631082e7", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/commit/c0250e4c9106b5c889e512a4771f0205d4f99b99", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/Dolibarr/dolibarr/security/policy", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json new file mode 100644 index 00000000000..6840a306f38 --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57272.json @@ -0,0 +1,21 @@ +{ + "id": "CVE-2024-57272", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.730", + "lastModified": "2025-01-27T17:15:16.730", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "SecuSTATION Camera V2.5.5.3116-S50-SMA-B20160811A and lower is vulnerable to Cross Site Scripting (XSS)." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/kklzzcun/Camera/blob/main/SecureSTATION%20%E5%AD%98%E5%9C%A8%E5%8F%8D%E5%B0%84%E5%BD%A2XSS%E6%BC%8F%E6%B4%9E.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json b/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json new file mode 100644 index 00000000000..5d7c27b4b5f --- /dev/null +++ b/CVE-2024/CVE-2024-572xx/CVE-2024-57276.json @@ -0,0 +1,25 @@ +{ + "id": "CVE-2024-57276", + "sourceIdentifier": "cve@mitre.org", + "published": "2025-01-27T17:15:16.827", + "lastModified": "2025-01-27T17:15:16.827", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "In Electronic Arts Dragon Age Origins 1.05, the DAUpdaterSVC service contains an unquoted service path vulnerability. This service is configured with insecure permissions, allowing users to modify the executable file path used by the service. The service runs with NT AUTHORITY\\SYSTEM privileges, enabling attackers to escalate privileges by replacing or placing a malicious executable in the service path." + } + ], + "metrics": {}, + "references": [ + { + "url": "https://github.com/yamerooo123/CVE/blob/main/CVE-2024-57276/Description.md", + "source": "cve@mitre.org" + }, + { + "url": "https://github.com/yamerooo123/ResearchNBugBountyEncyclopedia/blob/main/Researches/Dragon%20Age%20Origins/Description.md", + "source": "cve@mitre.org" + } + ] +} \ No newline at end of file diff --git a/CVE-2024/CVE-2024-89xx/CVE-2024-8914.json b/CVE-2024/CVE-2024-89xx/CVE-2024-8914.json index 686836c701d..5968968187b 100644 --- a/CVE-2024/CVE-2024-89xx/CVE-2024-8914.json +++ b/CVE-2024/CVE-2024-89xx/CVE-2024-8914.json @@ -2,7 +2,7 @@ "id": "CVE-2024-8914", "sourceIdentifier": "security@wordfence.com", "published": "2024-09-25T01:15:47.470", - "lastModified": "2024-11-21T09:53:46.390", + "lastModified": "2025-01-27T18:15:40.230", "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ @@ -19,7 +19,7 @@ "cvssMetricV31": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", @@ -36,13 +36,43 @@ }, "exploitabilityScore": 3.9, "impactScore": 2.7 + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, "weaknesses": [ { "source": "security@wordfence.com", - "type": "Secondary", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-79" + } + ] + }, + { + "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", + "type": "Primary", "description": [ { "lang": "en", diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0729.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0729.json new file mode 100644 index 00000000000..9232870381b --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0729.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0729", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-27T17:15:16.917", + "lastModified": "2025-01-27T17:15:16.917", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to clickjacking. The attack may be initiated remotely. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", + "baseScore": 4.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", + "baseScore": 5.0, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "NONE", + "integrityImpact": "PARTIAL", + "availabilityImpact": "NONE" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 10.0, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-451" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20clickjacking.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293507", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293507", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.478451", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tp-link.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0730.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0730.json new file mode 100644 index 00000000000..2a65cbc5fa1 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0730.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-0730", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-27T17:15:17.133", + "lastModified": "2025-01-27T17:15:17.133", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-598" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20sensitive%20info%20in%20GET.md", + "source": "cna@vuldb.com" + }, + { + "url": "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.293508", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293508", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.478465", + "source": "cna@vuldb.com" + }, + { + "url": "https://www.tp-link.com/", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0732.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0732.json new file mode 100644 index 00000000000..4daa33e5791 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0732.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2025-0732", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-27T18:15:40.550", + "lastModified": "2025-01-27T18:15:40.550", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, has been found in Discord up to 1.0.9177 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 3.5, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.293510", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293510", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.481209", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-07xx/CVE-2025-0733.json b/CVE-2025/CVE-2025-07xx/CVE-2025-0733.json new file mode 100644 index 00000000000..383803438e4 --- /dev/null +++ b/CVE-2025/CVE-2025-07xx/CVE-2025-0733.json @@ -0,0 +1,133 @@ +{ + "id": "CVE-2025-0733", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-01-27T18:15:40.760", + "lastModified": "2025-01-27T18:15:40.760", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability, which was classified as problematic, was found in Postman up to 11.20 on Windows. This affects an unknown part in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 2.0, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 4.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "HIGH", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 1.0, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:L/AC:H/Au:S/C:P/I:P/A:P", + "baseScore": 3.5, + "accessVector": "LOCAL", + "accessComplexity": "HIGH", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 1.5, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-426" + } + ] + } + ], + "references": [ + { + "url": "https://vuldb.com/?ctiid.293511", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.293511", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.481185", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json index 99a31383b0d..90d8f469a9d 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21178.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21178", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:30.847", - "lastModified": "2025-01-14T18:15:30.847", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:42:39.560", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,7 +42,7 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", @@ -53,12 +53,80 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2017:*:*:*:*:*:*:*:*", + "versionStartIncluding": "15.0", + "versionEndExcluding": "15.9.69", + "matchCriteriaId": "2B35392C-DFB3-4AEE-AB3C-09CE3D2B7A7D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2019:*:*:*:*:*:-:*:*", + "versionStartIncluding": "16.0", + "versionEndExcluding": "16.11.43", + "matchCriteriaId": "17DF3758-1A21-494C-B450-FC70FB246428" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.6.0", + "versionEndExcluding": "17.6.22", + "matchCriteriaId": "4C373831-8981-462F-8A57-9C71D1839052" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.8.0", + "versionEndExcluding": "17.8.17", + "matchCriteriaId": "9CA6DD18-569B-449D-82FF-4BE3A57E7150" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.10.0", + "versionEndExcluding": "17.10.10", + "matchCriteriaId": "EDA7CDF2-DB37-4C34-9D5F-E09B34B83B1A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*", + "versionStartIncluding": "17.12.0", + "versionEndExcluding": "17.12.4", + "matchCriteriaId": "4CDB41EA-38E1-4325-8DE7-27E187C1695B" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21178", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json index daf499ff91a..b4f8e609d41 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21186.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21186", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.020", - "lastModified": "2025-01-14T18:15:31.020", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:42:32.637", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,90 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*", + "matchCriteriaId": "3259EBFE-AE2D-48B8-BE9A-E22BBDB31378" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*", + "matchCriteriaId": "CD25F492-9272-4836-832C-8439EBE64CCF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:access:2016:*:*:*:*:*:*:*", + "matchCriteriaId": "0E42DC73-F1D0-47CD-BED8-DB2C6E044E2D" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:x64:*", + "matchCriteriaId": "68F37A38-9BC3-43FD-8E71-4EED079156D4" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2019:*:*:*:*:-:x86:*", + "matchCriteriaId": "AFFA09D5-9992-462F-B52E-A1DDE2462064" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x64:*", + "matchCriteriaId": "1AC0C23F-FC55-4DA1-8527-EB4432038FB0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:*:x86:*", + "matchCriteriaId": "A719B461-7869-46D0-9300-D0A348DC26A5" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x64:*", + "matchCriteriaId": "19F65776-446D-404C-A830-990D4232791A" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:*:x86:*", + "matchCriteriaId": "017875F7-5396-4069-9F9F-0BDA05143A25" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21186", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json index df93484d026..cd58da05bad 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21189.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21189", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.377", - "lastModified": "2025-01-14T18:15:31.377", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:42:24.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-41" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21189", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json b/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json index b6211a10e23..e136abf9dfd 100644 --- a/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json +++ b/CVE-2025/CVE-2025-211xx/CVE-2025-21193.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21193", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.637", - "lastModified": "2025-01-14T18:15:31.637", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:42:17.480", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,75 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-352" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21193", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json index 23916d99d58..c31778f0506 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21202.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21202", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:31.827", - "lastModified": "2025-01-14T18:15:31.827", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:41:27.647", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,134 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21202", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json index a6122fb0d03..2b2bc7c3cad 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21207.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21207", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.027", - "lastModified": "2025-01-14T18:15:32.027", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:41:10.137", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,104 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21207", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json index f9ff8d651a7..6a17a70f580 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21210.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21210", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.207", - "lastModified": "2025-01-14T18:15:32.207", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:41:01.470", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-636" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21210", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json index 9defb9b7235..67a1f03a613 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21211.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21211", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.410", - "lastModified": "2025-01-14T18:15:32.410", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:40:51.233", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21211", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json index e76d9155cc0..21e8f88e7b4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21213.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21213", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.600", - "lastModified": "2025-01-14T18:15:32.600", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:40:41.820", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-284" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21213", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json index 33994bea417..c5dd2e39227 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21214.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21214", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.777", - "lastModified": "2025-01-14T18:15:32.777", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:40:22.427", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-200" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21214", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json index 876f3ea6a06..f312a2a74cc 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21215.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21215", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:32.973", - "lastModified": "2025-01-14T18:15:32.973", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:38:36.757", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21215", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json index 3059e21102d..b78aba1db97 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21217.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21217", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.193", - "lastModified": "2025-01-14T18:15:33.193", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:45:20.030", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21217", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json index bb6c93c4e44..3da47789af1 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21218.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21218", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.370", - "lastModified": "2025-01-14T18:15:33.370", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:46:14.487", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,85 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21218", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json index db0a97c55e0..18ca0d46df5 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21219.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21219", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.547", - "lastModified": "2025-01-14T18:15:33.547", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:45:30.370", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,134 @@ "value": "CWE-41" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21219", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json index 14a0b2723c3..22f0f140b3a 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21220.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21220", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.750", - "lastModified": "2025-01-14T18:15:33.750", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:45:48.310", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-908" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21220", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json index a0983957fe9..aaaae80fe09 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21223.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21223", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:33.947", - "lastModified": "2025-01-14T18:15:33.947", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:45:59.727", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21223", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json index 818319836d5..5e469fa1b8b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21224.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21224", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.150", - "lastModified": "2025-01-14T18:15:34.150", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:46:27.673", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,12 +53,86 @@ "value": "CWE-591" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21224", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json index a3da4e89669..9ef257ad4a4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21225.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21225", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.367", - "lastModified": "2025-01-14T18:15:34.367", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:46:45.813", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,75 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-843" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21225", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json index 003e38b2e0a..1b9661ea1e5 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21226.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21226", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.560", - "lastModified": "2025-01-14T18:15:34.560", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:06.843", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21226", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json index 814d64e1492..1f1184e589b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21227.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21227", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.753", - "lastModified": "2025-01-14T18:15:34.753", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:16.717", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21227", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json index 9ddc493b95c..9bc9b1aac7d 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21228.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21228", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:34.950", - "lastModified": "2025-01-14T18:15:34.950", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:27.603", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21228", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json index 0f1e03ba267..e225a08a60e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21229.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21229", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.153", - "lastModified": "2025-01-14T18:15:35.153", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:37.697", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21229", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json index 91d2b7217a3..354b1008574 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21230.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21230", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.333", - "lastModified": "2025-01-14T18:15:35.333", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:46.557", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,12 +53,154 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21230", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json index 8f23aacbb98..86ef7457b99 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21231.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21231", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:35.513", - "lastModified": "2025-01-14T18:15:35.513", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:47:57.930", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21231", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json index 5260992d78b..74f18e6844d 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21255.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21255", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.437", - "lastModified": "2025-01-14T18:15:43.437", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:48:06.630", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21255", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json index afef9e4c8a6..737851448b4 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21256.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21256", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.730", - "lastModified": "2025-01-14T18:15:43.730", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:48:24.467", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,12 +53,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21256", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json index f57949384e7..2a596815cac 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21257.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21257", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:43.990", - "lastModified": "2025-01-14T18:15:43.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:48:34.057", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,122 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21257", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json index ec0879783a8..67357fd1744 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21258.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21258", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:44.660", - "lastModified": "2025-01-14T18:15:44.660", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:48:41.780", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21258", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json index 387e2ef1282..91d94913851 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21260.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21260", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:44.927", - "lastModified": "2025-01-14T18:15:44.927", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:48:49.733", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21260", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json index b3eaf91fa74..2315f464273 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21261.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21261", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.137", - "lastModified": "2025-01-14T18:15:45.137", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:49:17.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21261", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json index 8c0e003ac6e..2f7a2379bef 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21263.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21263", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.337", - "lastModified": "2025-01-14T18:15:45.337", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:49:27.097", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21263", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json index b0788a6a88e..ef6334f4b0e 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21265.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21265", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.583", - "lastModified": "2025-01-14T18:15:45.583", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:50:59.243", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-125" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21265", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json index 452aa67bb21..449e684935b 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21266.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21266", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:45.797", - "lastModified": "2025-01-14T18:15:45.797", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:49:46.980", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21266", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json index 28368c9a474..8a2f2627306 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21268.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21268", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.023", - "lastModified": "2025-01-14T18:15:46.023", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:49:59.800", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-41" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21268", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json index 5b85d3bef2e..21cbad1d95f 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21269.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21269", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.290", - "lastModified": "2025-01-14T18:15:46.290", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:50:21.237", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-41" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21269", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json index 3b6edb1a784..1ffe97b25c0 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21270.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21270", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.503", - "lastModified": "2025-01-14T18:15:46.503", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:50:32.540", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-400" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21270", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json index e7267476a3e..abfcae858ed 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21271.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21271", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.747", - "lastModified": "2025-01-14T18:15:46.747", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:38:24.280", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,81 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21271", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json index 4fe7543cc44..d8717a1ca6f 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21272.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21272", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:46.987", - "lastModified": "2025-01-14T18:15:46.987", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:38:15.907", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-908" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21272", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json index 58e747f79ea..08d8bc81b9c 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21273.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21273", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.240", - "lastModified": "2025-01-14T18:15:47.240", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:38:07.567", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21273", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json index 76abb284180..356be19d069 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21274.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21274", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.487", - "lastModified": "2025-01-14T18:15:47.487", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:38:00.530", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,139 @@ "value": "CWE-59" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21274", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json index 2eb3d9a19ea..7b7a83fd70d 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21275.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21275", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:47.723", - "lastModified": "2025-01-14T18:15:47.723", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:37:53.767", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,86 @@ "value": "CWE-285" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21275", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json index 837c8586e21..d2d02cdfbe1 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21276.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21276", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.013", - "lastModified": "2025-01-14T18:15:48.013", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:36:56.850", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -53,12 +53,154 @@ "value": "CWE-693" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21276", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json index 8f9350ad91c..ccb94820dfd 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21277.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21277", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.260", - "lastModified": "2025-01-14T18:15:48.260", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:36:45.660", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-126" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21277", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json index 0e237e58d07..de2b8fbfafa 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21278.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21278", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.480", - "lastModified": "2025-01-14T18:15:48.480", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:36:32.000", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -36,6 +36,26 @@ }, "exploitabilityScore": 2.5, "impactScore": 3.6 + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 5.5, + "baseSeverity": "MEDIUM", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 3.6 } ] }, @@ -49,12 +69,144 @@ "value": "CWE-362" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21278", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json index 6f92944c92b..3aa31cb3892 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21280.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21280", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.690", - "lastModified": "2025-01-14T18:15:48.690", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:35:04.940", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,134 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21280", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json index f409f1206a6..a238b57b9c8 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21281.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21281", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:48.897", - "lastModified": "2025-01-14T18:15:48.897", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:34:57.020", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,144 @@ "value": "CWE-416" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21281", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json index 70afc9eb9a6..2fa21735b07 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21282.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21282", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.110", - "lastModified": "2025-01-14T18:15:49.110", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:34:49.270", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,154 @@ "value": "CWE-122" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*", + "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", + "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", + "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", + "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21282", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json b/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json index 2316a8cb7cf..b684fa0db51 100644 --- a/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json +++ b/CVE-2025/CVE-2025-212xx/CVE-2025-21284.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21284", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:49.317", - "lastModified": "2025-01-14T18:15:49.317", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:34:41.180", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,134 @@ "value": "CWE-20" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "D5C2C390-24E9-42C9-84BF-EE28670CAB30" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.10240.20890", + "matchCriteriaId": "C0B9C790-A26D-4EBD-B5CA-F0C628835A21" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21284", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json index cf1615495ae..899c481c77b 100644 --- a/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json +++ b/CVE-2025/CVE-2025-213xx/CVE-2025-21314.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21314", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:15:55.163", - "lastModified": "2025-01-14T18:15:55.163", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:34:32.613", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -49,12 +49,122 @@ "value": "CWE-451" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DE0F44E5-40C1-4BE3-BBA4-507564182682" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "83F40BB6-BBAE-4CD4-A5FE-1DAF690101AB" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "1BB028F9-A802-40C7-97BF-1D169291678F" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "9F077951-8177-4FEE-A49A-76E51AE48CE0" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19044.5371", + "matchCriteriaId": "5D64D2C7-51C3-47EB-B86E-75172846F4DF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.19045.5371", + "matchCriteriaId": "BC92CC57-B18C-43C3-8180-9A2108407433" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22621.4751", + "matchCriteriaId": "D84EDF98-16E1-412A-9879-2C2FEF87FB2B" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.22631.4751", + "matchCriteriaId": "282E3839-E953-4B14-A860-DBACC1E99AFF" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "78A3F671-95DC-442A-A511-1E875DF93546" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.14393.7699", + "matchCriteriaId": "DA4426DD-B748-4CC4-AC68-88AD963E5F0C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.17763.6775", + "matchCriteriaId": "8F604C79-6A12-44C9-B69D-A2E323641079" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.20348.3091", + "matchCriteriaId": "7B8C9C82-359E-4318-A10D-AA47CDFB38FE" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*", + "versionEndExcluding": "10.0.25398.1369", + "matchCriteriaId": "E3E0C061-2DA7-4237-9607-F6792DC92DD3" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*", + "versionEndExcluding": "10.0.26100.2894", + "matchCriteriaId": "2CFD18D5-3C1F-4E3A-A143-EE3F1FFBB880" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21314", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json index babc7c9c63e..369488d61f1 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21402.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21402", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.190", - "lastModified": "2025-01-14T18:16:04.190", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:34:23.127", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,60 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-641" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2021:*:*:*:ltsc:macos:*:*", + "matchCriteriaId": "0DF36AFA-B48C-4423-AD1C-78EEFF85EF2C" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:office:2024:*:*:*:ltsc:macos:*:*", + "matchCriteriaId": "873BD998-9D5A-4C09-A3B3-4DB12ABB6F72" + }, + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:onenote:-:*:*:*:*:macos:*:*", + "matchCriteriaId": "C4EC14DE-82C6-495B-BFD8-8D1FA781D50F" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21402", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json b/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json index 538d1654b31..71f74a287f0 100644 --- a/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json +++ b/CVE-2025/CVE-2025-214xx/CVE-2025-21403.json @@ -2,8 +2,8 @@ "id": "CVE-2025-21403", "sourceIdentifier": "secure@microsoft.com", "published": "2025-01-14T18:16:04.350", - "lastModified": "2025-01-14T18:16:04.350", - "vulnStatus": "Undergoing Analysis", + "lastModified": "2025-01-27T18:34:10.050", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -42,19 +42,51 @@ "weaknesses": [ { "source": "secure@microsoft.com", - "type": "Primary", + "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-863" } ] + }, + { + "source": "nvd@nist.gov", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "NVD-CWE-noinfo" + } + ] + } + ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:microsoft:on-prem_data_gateway:*:*:*:*:*:*:*:*", + "versionEndExcluding": "3000.246", + "matchCriteriaId": "7E21FEA9-30D1-446A-B33D-8B0DF8E0E985" + } + ] + } + ] } ], "references": [ { "url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21403", - "source": "secure@microsoft.com" + "source": "secure@microsoft.com", + "tags": [ + "Patch", + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json b/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json new file mode 100644 index 00000000000..940bec5a670 --- /dev/null +++ b/CVE-2025/CVE-2025-226xx/CVE-2025-22604.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-22604", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T17:15:17.307", + "lastModified": "2025-01-27T17:15:17.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "baseScore": 9.1, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.3, + "impactScore": 6.0 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-78" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-c5j8-jxj3-hh36", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json index 7ddeff0a777..7242efdc579 100644 --- a/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json +++ b/CVE-2025/CVE-2025-229xx/CVE-2025-22980.json @@ -2,8 +2,8 @@ "id": "CVE-2025-22980", "sourceIdentifier": "cve@mitre.org", "published": "2025-01-22T15:15:15.130", - "lastModified": "2025-01-22T15:15:15.130", - "vulnStatus": "Received", + "lastModified": "2025-01-27T18:15:40.933", + "vulnStatus": "Awaiting Analysis", "cveTags": [], "descriptions": [ { @@ -20,6 +20,10 @@ { "url": "https://github.com/slims/slims9_bulian/issues/270", "source": "cve@mitre.org" + }, + { + "url": "https://mebroccoli.blogspot.com/2025/01/sql-injection-vulnerability-in-senayan.html", + "source": "cve@mitre.org" } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json b/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json index 32105f171e7..a84f61dbf9d 100644 --- a/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json +++ b/CVE-2025/CVE-2025-230xx/CVE-2025-23006.json @@ -2,8 +2,8 @@ "id": "CVE-2025-23006", "sourceIdentifier": "PSIRT@sonicwall.com", "published": "2025-01-23T12:15:28.523", - "lastModified": "2025-01-25T02:00:01.990", - "vulnStatus": "Awaiting Analysis", + "lastModified": "2025-01-27T18:41:17.650", + "vulnStatus": "Analyzed", "cveTags": [], "descriptions": [ { @@ -17,6 +17,26 @@ ], "metrics": { "cvssMetricV31": [ + { + "source": "nvd@nist.gov", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 3.9, + "impactScore": 5.9 + }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary", @@ -55,10 +75,227 @@ ] } ], + "configurations": [ + { + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:a:sonicwall:sma8200v:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4.3-02854", + "matchCriteriaId": "5F558E7D-E784-406B-B290-3A969DE5DB93" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sma6200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4.3-02854", + "matchCriteriaId": "7B32A454-15AF-4D1F-9B2E-47FA49C54944" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sma6200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "57B3C90F-F633-41B9-855E-902F6DC8ACA5" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sma6210_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4.3-02854", + "matchCriteriaId": "03BAE67D-9500-48C3-9A57-4ACDC78ED2AF" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sma6210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "7B24D300-1154-49A1-A1F3-FB0CC717166A" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sma7200_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4.3-02854", + "matchCriteriaId": "5EB0E0F9-14CC-4B29-8026-6A4D3E73B46A" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sma7200:-:*:*:*:*:*:*:*", + "matchCriteriaId": "4F7B4ED9-7A57-48DC-AAEC-A2C2EAFF3B64" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sma7210_firmware:*:*:*:*:*:*:*:*", + "versionEndExcluding": "12.4.3-02854", + "matchCriteriaId": "6C94E32E-8FE8-43C4-B86B-CC7DBD0A9973" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sma7210:-:*:*:*:*:*:*:*", + "matchCriteriaId": "E9B414C5-C376-4216-A267-ABC0930905CE" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sra_ex6000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "12.4.3-02804", + "matchCriteriaId": "C1E84DDC-2CDB-447D-8403-C93FE16098C5" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sra_ex6000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "8115B7AF-C785-4F68-9728-A19536EB363F" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sra_ex7000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "12.4.3-02804", + "matchCriteriaId": "2F33335D-F5C2-4F1C-819D-452381DC5656" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sra_ex7000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "13952D02-29BB-465C-8A5C-6B25CB1BAECD" + } + ] + } + ] + }, + { + "operator": "AND", + "nodes": [ + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": true, + "criteria": "cpe:2.3:o:sonicwall:sra_ex9000_firmware:*:*:*:*:*:*:*:*", + "versionEndIncluding": "12.4.3-02804", + "matchCriteriaId": "5C85D8D6-5330-4B9D-A870-5A43E49CEDB2" + } + ] + }, + { + "operator": "OR", + "negate": false, + "cpeMatch": [ + { + "vulnerable": false, + "criteria": "cpe:2.3:h:sonicwall:sra_ex9000:-:*:*:*:*:*:*:*", + "matchCriteriaId": "FDFDE82F-600E-48C7-AB15-ADDDFFBFC114" + } + ] + } + ] + } + ], "references": [ { "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2025-0002", - "source": "PSIRT@sonicwall.com" + "source": "PSIRT@sonicwall.com", + "tags": [ + "Vendor Advisory" + ] } ] } \ No newline at end of file diff --git a/CVE-2025/CVE-2025-231xx/CVE-2025-23197.json b/CVE-2025/CVE-2025-231xx/CVE-2025-23197.json new file mode 100644 index 00000000000..56759ac7193 --- /dev/null +++ b/CVE-2025/CVE-2025-231xx/CVE-2025-23197.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-23197", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.037", + "lastModified": "2025-01-27T18:15:41.037", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "matrix-hookshot is a Matrix bot for connecting to external services like GitHub, GitLab, JIRA, and more. When Hookshot 6 version 6.0.1 or below, or Hookshot 5 version 5.4.1 or below, is configured with GitHub support, it is vulnerable to a Denial of Service (DoS) whereby it can crash on restart due to a missing check. The impact is greater to you untrusted users can add their own GitHub organizations to Hookshot in order to connect their room to a repository. This vulnerability is fixed in 6.0.2 and 5.4.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.6 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-754" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/matrix-org/matrix-hookshot/commit/e51d8210233ac759e7f7dfebc2c4f1bf6ce94802", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/matrix-org/matrix-hookshot/security/advisories/GHSA-cr4q-jf47-3645", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24354.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24354.json new file mode 100644 index 00000000000..74c2a30876b --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24354.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24354", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.197", + "lastModified": "2025-01-27T18:15:41.197", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "imgproxy is server for resizing, processing, and converting images. Imgproxy does not block the 0.0.0.0 address, even with IMGPROXY_ALLOW_LOOPBACK_SOURCE_ADDRESSES set to false. This can expose services on the local host. This vulnerability is fixed in 3.27.2." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-918" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/imgproxy/imgproxy/commit/3d4fed6842aa8930ec224d0ad75b0079b858e081", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/imgproxy/imgproxy/security/advisories/GHSA-j2hp-6m75-v4j4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24356.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24356.json new file mode 100644 index 00000000000..c2941bb65cf --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24356.json @@ -0,0 +1,106 @@ +{ + "id": "CVE-2025-24356", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.347", + "lastModified": "2025-01-27T18:15:41.347", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "fastd is a VPN daemon which tunnels IP packets and Ethernet frames over UDP. When receiving a data packet from an unknown IP address/port combination, fastd will assume that one of its connected peers has moved to a new address and initiate a reconnect by sending a handshake packet. This \"fast reconnect\" avoids having to wait for a session timeout (up to ~90s) until a new connection is established. Even a 1-byte UDP packet just containing the fastd packet type header can trigger a much larger handshake packet (~150 bytes of UDP payload). Including IPv4 and UDP headers, the resulting amplification factor is roughly 12-13. By sending data packets with a spoofed source address to fastd instances reachable on the internet, this amplification of UDP traffic might be used to facilitate a Distributed Denial of Service attack. This vulnerability is fixed in v23." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "NONE", + "vulnerableSystemIntegrity": "NONE", + "vulnerableSystemAvailability": "NONE", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "LOW", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-405" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/neocturne/fastd/commit/1f233bee76b722c0b3f9024f2c39c72e9f7e5843", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/3940150e801d0c91460491bec32cbcc5bbc89d5f", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/5f63fcfc18ae9cad023fa463b152d5e14192b5a8", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/9df7e516378441d2d17b89f9db5c27c8312d8f12", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/c1a07b3f2b9066c3713c68547da700b85d60f4f7", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/ce1b79b12dbfa796743b5f3a50789ade965b7023", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/commit/d03a0a17347efb5293e42fde7d982781e90f14ef", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/neocturne/fastd/security/advisories/GHSA-pggg-vpfv-4rcv", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24357.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24357.json new file mode 100644 index 00000000000..147c5c76079 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24357.json @@ -0,0 +1,68 @@ +{ + "id": "CVE-2025-24357", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.523", + "lastModified": "2025-01-27T18:15:41.523", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "vLLM is a library for LLM inference and serving. vllm/model_executor/weight_utils.py implements hf_model_weights_iterator to load the model checkpoint, which is downloaded from huggingface. It uses the torch.load function and the weights_only parameter defaults to False. When torch.load loads malicious pickle data, it will execute arbitrary code during unpickling. This vulnerability is fixed in v0.7.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.5, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.6, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-502" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/vllm-project/vllm/commit/d3d6bb13fb62da3234addf6574922a4ec0513d04", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vllm-project/vllm/pull/12366", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/vllm-project/vllm/security/advisories/GHSA-rh4j-5rhw-hr54", + "source": "security-advisories@github.com" + }, + { + "url": "https://pytorch.org/docs/stable/generated/torch.load.html", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24364.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24364.json new file mode 100644 index 00000000000..371e2c29e9a --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24364.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24364", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.690", + "lastModified": "2025-01-27T18:15:41.690", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker with authenticated access to the vaultwarden admin panel can execute arbitrary code in the system. The attacker could then change some settings to use sendmail as mail agent but adjust the settings in such a way that it would use a shell command. It then also needed to craft a special favicon image which would have the commands embedded to run during for example sending a test email. This vulnerability is fixed in 1.33.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "HIGH", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.2, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-h6cc-rc6q-23j4", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24365.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24365.json new file mode 100644 index 00000000000..66fe9010579 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24365.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-24365", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:41.847", + "lastModified": "2025-01-27T18:15:41.847", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "vaultwarden is an unofficial Bitwarden compatible server written in Rust, formerly known as bitwarden_rs. Attacker can obtain owner rights of other organization. Hacker should know the ID of victim organization (in real case the user can be a part of the organization as an unprivileged user) and be the owner/admin of other organization (by default you can create your own organization) in order to attack. This vulnerability is fixed in 1.33.0." + } + ], + "metrics": { + "cvssMetricV31": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "baseScore": 8.1, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.8, + "impactScore": 5.2 + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/dani-garcia/vaultwarden/releases/tag/1.33.0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/dani-garcia/vaultwarden/security/advisories/GHSA-j4h8-vch3-f797", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json new file mode 100644 index 00000000000..b20569b4390 --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24367.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-24367", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:42.003", + "lastModified": "2025-01-27T18:15:42.003", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 8.7, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "HIGH", + "vulnerableSystemIntegrity": "HIGH", + "vulnerableSystemAvailability": "HIGH", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-144" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-fxrq-fr7h-9rqq", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json b/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json new file mode 100644 index 00000000000..a3206f6881e --- /dev/null +++ b/CVE-2025/CVE-2025-243xx/CVE-2025-24368.json @@ -0,0 +1,82 @@ +{ + "id": "CVE-2025-24368", + "sourceIdentifier": "security-advisories@github.com", + "published": "2025-01-27T18:15:42.157", + "lastModified": "2025-01-27T18:15:42.157", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "security-advisories@github.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnerableSystemConfidentiality": "LOW", + "vulnerableSystemIntegrity": "LOW", + "vulnerableSystemAvailability": "LOW", + "subsequentSystemConfidentiality": "NONE", + "subsequentSystemIntegrity": "NONE", + "subsequentSystemAvailability": "NONE", + "exploitMaturity": "NOT_DEFINED", + "confidentialityRequirements": "NOT_DEFINED", + "integrityRequirements": "NOT_DEFINED", + "availabilityRequirements": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", + "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", + "modifiedVulnerableSystemAvailability": "NOT_DEFINED", + "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", + "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", + "modifiedSubsequentSystemAvailability": "NOT_DEFINED", + "safety": "NOT_DEFINED", + "automatable": "NOT_DEFINED", + "recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ] + }, + "weaknesses": [ + { + "source": "security-advisories@github.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/Cacti/cacti/commit/c7e4ee798d263a3209ae6e7ba182c7b65284d8f0", + "source": "security-advisories@github.com" + }, + { + "url": "https://github.com/Cacti/cacti/security/advisories/GHSA-f9c7-7rc3-574c", + "source": "security-advisories@github.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index 43f423f1269..21c971af83d 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-01-27T17:00:41.178643+00:00 +2025-01-27T19:00:26.917942+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-01-27T16:56:47.900000+00:00 +2025-01-27T18:59:57.733000+00:00 ``` ### Last Data Feed Release @@ -33,69 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -279084 +279111 ``` ### CVEs added in the last Commit -Recently added CVEs: `46` +Recently added CVEs: `27` -- [CVE-2025-24540](CVE-2025/CVE-2025-245xx/CVE-2025-24540.json) (`2025-01-27T15:15:13.753`) -- [CVE-2025-24590](CVE-2025/CVE-2025-245xx/CVE-2025-24590.json) (`2025-01-27T15:15:13.947`) -- [CVE-2025-24593](CVE-2025/CVE-2025-245xx/CVE-2025-24593.json) (`2025-01-27T15:15:14.090`) -- [CVE-2025-24600](CVE-2025/CVE-2025-246xx/CVE-2025-24600.json) (`2025-01-27T15:15:14.233`) -- [CVE-2025-24603](CVE-2025/CVE-2025-246xx/CVE-2025-24603.json) (`2025-01-27T15:15:14.437`) -- [CVE-2025-24606](CVE-2025/CVE-2025-246xx/CVE-2025-24606.json) (`2025-01-27T15:15:14.587`) -- [CVE-2025-24626](CVE-2025/CVE-2025-246xx/CVE-2025-24626.json) (`2025-01-27T15:15:14.777`) -- [CVE-2025-24628](CVE-2025/CVE-2025-246xx/CVE-2025-24628.json) (`2025-01-27T15:15:14.923`) -- [CVE-2025-24653](CVE-2025/CVE-2025-246xx/CVE-2025-24653.json) (`2025-01-27T15:15:15.070`) -- [CVE-2025-24662](CVE-2025/CVE-2025-246xx/CVE-2025-24662.json) (`2025-01-27T15:15:15.227`) -- [CVE-2025-24665](CVE-2025/CVE-2025-246xx/CVE-2025-24665.json) (`2025-01-27T15:15:15.427`) -- [CVE-2025-24667](CVE-2025/CVE-2025-246xx/CVE-2025-24667.json) (`2025-01-27T15:15:15.563`) -- [CVE-2025-24671](CVE-2025/CVE-2025-246xx/CVE-2025-24671.json) (`2025-01-27T15:15:15.703`) -- [CVE-2025-24680](CVE-2025/CVE-2025-246xx/CVE-2025-24680.json) (`2025-01-27T15:15:15.863`) -- [CVE-2025-24689](CVE-2025/CVE-2025-246xx/CVE-2025-24689.json) (`2025-01-27T15:15:16.073`) -- [CVE-2025-24708](CVE-2025/CVE-2025-247xx/CVE-2025-24708.json) (`2025-01-27T15:15:16.230`) -- [CVE-2025-24734](CVE-2025/CVE-2025-247xx/CVE-2025-24734.json) (`2025-01-27T15:15:16.390`) -- [CVE-2025-24740](CVE-2025/CVE-2025-247xx/CVE-2025-24740.json) (`2025-01-27T15:15:16.537`) -- [CVE-2025-24741](CVE-2025/CVE-2025-247xx/CVE-2025-24741.json) (`2025-01-27T15:15:16.680`) -- [CVE-2025-24742](CVE-2025/CVE-2025-247xx/CVE-2025-24742.json) (`2025-01-27T15:15:16.830`) -- [CVE-2025-24743](CVE-2025/CVE-2025-247xx/CVE-2025-24743.json) (`2025-01-27T15:15:16.977`) -- [CVE-2025-24744](CVE-2025/CVE-2025-247xx/CVE-2025-24744.json) (`2025-01-27T15:15:17.117`) -- [CVE-2025-24747](CVE-2025/CVE-2025-247xx/CVE-2025-24747.json) (`2025-01-27T15:15:17.253`) -- [CVE-2025-24782](CVE-2025/CVE-2025-247xx/CVE-2025-24782.json) (`2025-01-27T15:15:17.450`) -- [CVE-2025-24783](CVE-2025/CVE-2025-247xx/CVE-2025-24783.json) (`2025-01-27T15:15:17.610`) +- [CVE-2024-27256](CVE-2024/CVE-2024-272xx/CVE-2024-27256.json) (`2025-01-27T17:15:15.443`) +- [CVE-2024-48416](CVE-2024/CVE-2024-484xx/CVE-2024-48416.json) (`2025-01-27T17:15:15.770`) +- [CVE-2024-48417](CVE-2024/CVE-2024-484xx/CVE-2024-48417.json) (`2025-01-27T17:15:15.867`) +- [CVE-2024-48418](CVE-2024/CVE-2024-484xx/CVE-2024-48418.json) (`2025-01-27T17:15:15.960`) +- [CVE-2024-48419](CVE-2024/CVE-2024-484xx/CVE-2024-48419.json) (`2025-01-27T17:15:16.053`) +- [CVE-2024-48420](CVE-2024/CVE-2024-484xx/CVE-2024-48420.json) (`2025-01-27T17:15:16.153`) +- [CVE-2024-54145](CVE-2024/CVE-2024-541xx/CVE-2024-54145.json) (`2025-01-27T17:15:16.240`) +- [CVE-2024-54146](CVE-2024/CVE-2024-541xx/CVE-2024-54146.json) (`2025-01-27T17:15:16.380`) +- [CVE-2024-55227](CVE-2024/CVE-2024-552xx/CVE-2024-55227.json) (`2025-01-27T17:15:16.523`) +- [CVE-2024-55228](CVE-2024/CVE-2024-552xx/CVE-2024-55228.json) (`2025-01-27T17:15:16.633`) +- [CVE-2024-57272](CVE-2024/CVE-2024-572xx/CVE-2024-57272.json) (`2025-01-27T17:15:16.730`) +- [CVE-2024-57276](CVE-2024/CVE-2024-572xx/CVE-2024-57276.json) (`2025-01-27T17:15:16.827`) +- [CVE-2025-0729](CVE-2025/CVE-2025-07xx/CVE-2025-0729.json) (`2025-01-27T17:15:16.917`) +- [CVE-2025-0730](CVE-2025/CVE-2025-07xx/CVE-2025-0730.json) (`2025-01-27T17:15:17.133`) +- [CVE-2025-0732](CVE-2025/CVE-2025-07xx/CVE-2025-0732.json) (`2025-01-27T18:15:40.550`) +- [CVE-2025-0733](CVE-2025/CVE-2025-07xx/CVE-2025-0733.json) (`2025-01-27T18:15:40.760`) +- [CVE-2025-22604](CVE-2025/CVE-2025-226xx/CVE-2025-22604.json) (`2025-01-27T17:15:17.307`) +- [CVE-2025-23197](CVE-2025/CVE-2025-231xx/CVE-2025-23197.json) (`2025-01-27T18:15:41.037`) +- [CVE-2025-24354](CVE-2025/CVE-2025-243xx/CVE-2025-24354.json) (`2025-01-27T18:15:41.197`) +- [CVE-2025-24356](CVE-2025/CVE-2025-243xx/CVE-2025-24356.json) (`2025-01-27T18:15:41.347`) +- [CVE-2025-24357](CVE-2025/CVE-2025-243xx/CVE-2025-24357.json) (`2025-01-27T18:15:41.523`) +- [CVE-2025-24364](CVE-2025/CVE-2025-243xx/CVE-2025-24364.json) (`2025-01-27T18:15:41.690`) +- [CVE-2025-24365](CVE-2025/CVE-2025-243xx/CVE-2025-24365.json) (`2025-01-27T18:15:41.847`) +- [CVE-2025-24367](CVE-2025/CVE-2025-243xx/CVE-2025-24367.json) (`2025-01-27T18:15:42.003`) +- [CVE-2025-24368](CVE-2025/CVE-2025-243xx/CVE-2025-24368.json) (`2025-01-27T18:15:42.157`) ### CVEs modified in the last Commit -Recently modified CVEs: `25` +Recently modified CVEs: `194` -- [CVE-2021-47183](CVE-2021/CVE-2021-471xx/CVE-2021-47183.json) (`2025-01-27T15:03:17.013`) -- [CVE-2023-35888](CVE-2023/CVE-2023-358xx/CVE-2023-35888.json) (`2025-01-27T15:18:19.737`) -- [CVE-2023-52646](CVE-2023/CVE-2023-526xx/CVE-2023-52646.json) (`2025-01-27T15:09:48.333`) -- [CVE-2024-10360](CVE-2024/CVE-2024-103xx/CVE-2024-10360.json) (`2025-01-27T15:19:13.047`) -- [CVE-2024-12774](CVE-2024/CVE-2024-127xx/CVE-2024-12774.json) (`2025-01-27T15:15:09.803`) -- [CVE-2024-2131](CVE-2024/CVE-2024-21xx/CVE-2024-2131.json) (`2025-01-27T15:20:06.373`) -- [CVE-2024-2255](CVE-2024/CVE-2024-22xx/CVE-2024-2255.json) (`2025-01-27T15:26:09.810`) -- [CVE-2024-2558](CVE-2024/CVE-2024-25xx/CVE-2024-2558.json) (`2025-01-27T16:56:47.900`) -- [CVE-2024-2559](CVE-2024/CVE-2024-25xx/CVE-2024-2559.json) (`2025-01-27T16:50:41.160`) -- [CVE-2024-26863](CVE-2024/CVE-2024-268xx/CVE-2024-26863.json) (`2025-01-27T15:05:39.390`) -- [CVE-2024-26866](CVE-2024/CVE-2024-268xx/CVE-2024-26866.json) (`2025-01-27T15:08:19.563`) -- [CVE-2024-26879](CVE-2024/CVE-2024-268xx/CVE-2024-26879.json) (`2025-01-27T15:12:45.210`) -- [CVE-2024-26893](CVE-2024/CVE-2024-268xx/CVE-2024-26893.json) (`2025-01-27T15:14:28.090`) -- [CVE-2024-29101](CVE-2024/CVE-2024-291xx/CVE-2024-29101.json) (`2025-01-27T16:21:01.500`) -- [CVE-2024-29106](CVE-2024/CVE-2024-291xx/CVE-2024-29106.json) (`2025-01-27T16:11:23.087`) -- [CVE-2024-29920](CVE-2024/CVE-2024-299xx/CVE-2024-29920.json) (`2025-01-27T15:20:38.483`) -- [CVE-2024-34562](CVE-2024/CVE-2024-345xx/CVE-2024-34562.json) (`2025-01-27T15:20:56.620`) -- [CVE-2024-3879](CVE-2024/CVE-2024-38xx/CVE-2024-3879.json) (`2025-01-27T16:24:40.757`) -- [CVE-2024-3880](CVE-2024/CVE-2024-38xx/CVE-2024-3880.json) (`2025-01-27T16:24:26.973`) -- [CVE-2024-3881](CVE-2024/CVE-2024-38xx/CVE-2024-3881.json) (`2025-01-27T16:25:02.423`) -- [CVE-2024-3882](CVE-2024/CVE-2024-38xx/CVE-2024-3882.json) (`2025-01-27T16:24:52.420`) -- [CVE-2024-4111](CVE-2024/CVE-2024-41xx/CVE-2024-4111.json) (`2025-01-27T16:25:51.970`) -- [CVE-2024-4112](CVE-2024/CVE-2024-41xx/CVE-2024-4112.json) (`2025-01-27T16:25:42.507`) -- [CVE-2024-4114](CVE-2024/CVE-2024-41xx/CVE-2024-4114.json) (`2025-01-27T16:37:59.997`) -- [CVE-2024-50697](CVE-2024/CVE-2024-506xx/CVE-2024-50697.json) (`2025-01-27T16:15:31.423`) +- [CVE-2025-21260](CVE-2025/CVE-2025-212xx/CVE-2025-21260.json) (`2025-01-27T18:48:49.733`) +- [CVE-2025-21261](CVE-2025/CVE-2025-212xx/CVE-2025-21261.json) (`2025-01-27T18:49:17.243`) +- [CVE-2025-21263](CVE-2025/CVE-2025-212xx/CVE-2025-21263.json) (`2025-01-27T18:49:27.097`) +- [CVE-2025-21265](CVE-2025/CVE-2025-212xx/CVE-2025-21265.json) (`2025-01-27T18:50:59.243`) +- [CVE-2025-21266](CVE-2025/CVE-2025-212xx/CVE-2025-21266.json) (`2025-01-27T18:49:46.980`) +- [CVE-2025-21268](CVE-2025/CVE-2025-212xx/CVE-2025-21268.json) (`2025-01-27T18:49:59.800`) +- [CVE-2025-21269](CVE-2025/CVE-2025-212xx/CVE-2025-21269.json) (`2025-01-27T18:50:21.237`) +- [CVE-2025-21270](CVE-2025/CVE-2025-212xx/CVE-2025-21270.json) (`2025-01-27T18:50:32.540`) +- [CVE-2025-21271](CVE-2025/CVE-2025-212xx/CVE-2025-21271.json) (`2025-01-27T18:38:24.280`) +- [CVE-2025-21272](CVE-2025/CVE-2025-212xx/CVE-2025-21272.json) (`2025-01-27T18:38:15.907`) +- [CVE-2025-21273](CVE-2025/CVE-2025-212xx/CVE-2025-21273.json) (`2025-01-27T18:38:07.567`) +- [CVE-2025-21274](CVE-2025/CVE-2025-212xx/CVE-2025-21274.json) (`2025-01-27T18:38:00.530`) +- [CVE-2025-21275](CVE-2025/CVE-2025-212xx/CVE-2025-21275.json) (`2025-01-27T18:37:53.767`) +- [CVE-2025-21276](CVE-2025/CVE-2025-212xx/CVE-2025-21276.json) (`2025-01-27T18:36:56.850`) +- [CVE-2025-21277](CVE-2025/CVE-2025-212xx/CVE-2025-21277.json) (`2025-01-27T18:36:45.660`) +- [CVE-2025-21278](CVE-2025/CVE-2025-212xx/CVE-2025-21278.json) (`2025-01-27T18:36:32.000`) +- [CVE-2025-21280](CVE-2025/CVE-2025-212xx/CVE-2025-21280.json) (`2025-01-27T18:35:04.940`) +- [CVE-2025-21281](CVE-2025/CVE-2025-212xx/CVE-2025-21281.json) (`2025-01-27T18:34:57.020`) +- [CVE-2025-21282](CVE-2025/CVE-2025-212xx/CVE-2025-21282.json) (`2025-01-27T18:34:49.270`) +- [CVE-2025-21284](CVE-2025/CVE-2025-212xx/CVE-2025-21284.json) (`2025-01-27T18:34:41.180`) +- [CVE-2025-21314](CVE-2025/CVE-2025-213xx/CVE-2025-21314.json) (`2025-01-27T18:34:32.613`) +- [CVE-2025-21402](CVE-2025/CVE-2025-214xx/CVE-2025-21402.json) (`2025-01-27T18:34:23.127`) +- [CVE-2025-21403](CVE-2025/CVE-2025-214xx/CVE-2025-21403.json) (`2025-01-27T18:34:10.050`) +- [CVE-2025-22980](CVE-2025/CVE-2025-229xx/CVE-2025-22980.json) (`2025-01-27T18:15:40.933`) +- [CVE-2025-23006](CVE-2025/CVE-2025-230xx/CVE-2025-23006.json) (`2025-01-27T18:41:17.650`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 1e276315fff..bd64c51fcf8 100644 --- a/_state.csv +++ b/_state.csv @@ -96024,8 +96024,8 @@ CVE-2017-1223,0,0,5b8b0a6cbbf48148ada2d0dc2e20aaa67822d19e60059050ac95bc1af1f52c CVE-2017-12230,0,0,14b86b12d9dcd83f80c4be089d86af612d242701aa05308b19941c547dc562fa,2024-11-21T03:09:05.040000 CVE-2017-12231,0,0,544b1c4611401b9bb5e409fbc12641cb8fb951a9fab3f5ea6167f6abd2f35f54,2024-11-21T03:09:05.157000 CVE-2017-12232,0,0,924714f42ff84b79647fa508302532106d76e452dc41bc791c47b4c8aa262633,2024-11-21T03:09:05.340000 -CVE-2017-12233,0,0,8212c0d7ec6fc1ec2ca35af5df8b1b76c6667c4521ea6964bee6fc8bb42ebd71,2024-11-21T03:09:05.490000 -CVE-2017-12234,0,0,3b59adb569435ed3ce0967530657dffada46d8a9b7a44d379517d8e420d50951,2024-11-21T03:09:05.637000 +CVE-2017-12233,0,1,c144b2d3ed80b372d1cee9532049bad7c31514d5d0c964bb01617bbee48fcc66,2025-01-27T18:59:51.937000 +CVE-2017-12234,0,1,ec4cc782c85720d13be77533daf23d2d0677643cc085c0f1a8b3cf87a32db834,2025-01-27T18:59:57.733000 CVE-2017-12235,0,0,90bab106134e0c8c997f22657c2042597ae2c0f595f94bd8f743906d3da3ff76,2024-11-21T03:09:05.773000 CVE-2017-12236,0,0,9a77dfe72bedaac732dcba583747a3b2269964cfdfc1febd018b484e88dac90f,2024-11-21T03:09:05.913000 CVE-2017-12237,0,0,66ed1ce86aba229da728f169033035c0a74ac19eb5ac41cc8625712e124040ff,2024-11-21T03:09:06.030000 @@ -115248,7 +115248,7 @@ CVE-2018-14550,0,0,99c0db74db43e5443cbc9cac7d0f5e6911d5b8ea377d685a015e7ebafeb63 CVE-2018-14551,0,0,1f19f905b662ca1e1211748de9f0de400587e766778a7ae1aa72726d2ad8228e,2024-11-21T03:49:17.997000 CVE-2018-14553,0,0,b6b74001b2d7004ef7003afce5a73a5c2477e2c39760f6b12b89ae194a7e3127,2024-11-21T03:49:18.147000 CVE-2018-14557,0,0,b5e4dc02e9e11e37916a7e28d35e29c6b0e06bedff7b8e148c75fd6078ac2cc8,2024-11-21T03:49:18.313000 -CVE-2018-14558,0,0,0d8a31df5c46f0bdb2c0a504945afff27b346c4496c925df4e078bb09b1434c2,2024-11-21T03:49:18.470000 +CVE-2018-14558,0,1,2dda3bdf9e3a97b34f545badbac5724ace8bafe6648db477ce65882d856e1e81,2025-01-27T18:28:06.513000 CVE-2018-14559,0,0,6db4f73f9af2691e88c20fda2da2354892e6e8e0acc853164c4d546cbabf847f,2024-11-21T03:49:18.637000 CVE-2018-1456,0,0,31e9d2940ed2b773662bb48db0b75832e2ef817efcccbc8aff6f9648fbc92888,2024-11-21T03:59:51.323000 CVE-2018-14562,0,0,f5242b98ddcbec6109db88598fb47c79bdb99811dc46e7a65bea305be3ae17b9,2024-11-21T03:49:18.793000 @@ -116239,7 +116239,7 @@ CVE-2018-15807,0,0,4860614cde85e0da34784a34d1164133dcee109fa857a1d60d0bf8ae79b49 CVE-2018-15808,0,0,455d016e838e06912ba454dbc791b32313c6dce517a5a90a513152cae9a1cf43,2024-11-21T03:51:29.257000 CVE-2018-15809,0,0,d16fc4ec045ff884ac854a3295369387cc90fcfaf38ac1f078e3532c4f171b3c,2024-11-21T03:51:29.397000 CVE-2018-15810,0,0,c6fa6edee7f866d094f9f9f4cd68ea2fddd6850ba36412320a4439f6e9695a5a,2024-11-21T03:51:29.550000 -CVE-2018-15811,0,0,cc38408247d7aef00ccab549f1751f5ae3facf2f14c2287b16edb41d9fa26780,2024-11-21T03:51:29.710000 +CVE-2018-15811,0,1,074397607d7537e9d49773df059a0d9c5229987bf04b90c94c80b8a883cc06f6,2025-01-27T18:22:20.060000 CVE-2018-15812,0,0,aa48b9c7a99f71771f1ad1123f7f4d0f9d04fd2533dc0d140bdf0a1b07ecab3e,2024-11-21T03:51:29.867000 CVE-2018-15813,0,0,eeee8e2865764565421fb3cb76851a575dd32b95666b6744fb9f429381d54523,2024-11-21T03:51:30.023000 CVE-2018-15814,0,0,1a1c1d94303941d4f6e8b2bbf713356b09dc58da2f988827b40d4a22ad567104,2024-11-21T03:51:30.190000 @@ -118333,7 +118333,7 @@ CVE-2018-18320,0,0,97ef2131e3cf9d5d09d7522df5c0f116618a7d18e5a1434a7b0739869774c CVE-2018-18322,0,0,3ac5b0f2536f99c6b307b260d1a55cde391a8faf9e3fc736535c9ab4e3b5d2a0,2024-11-21T03:55:42.483000 CVE-2018-18323,0,0,4d898a4c393c16593efb56b95759cb197bbf4dcd3f95abb7dbd9c7c9428c7760,2024-11-21T03:55:42.640000 CVE-2018-18324,0,0,9c0c3ee8983950689ca89d0570c1a9e31ca8718e87fd93485d7bd8b7254f31bb,2024-11-21T03:55:42.797000 -CVE-2018-18325,0,0,287f5d89bbe8ea6a69b6e0b947894b1d3e82555f78170008c1701c4905aee4c6,2024-11-21T03:55:42.947000 +CVE-2018-18325,0,1,ed1635b5596e2f80b1c33f114466cd8c54983f648dea1f262fa445ee295d5998,2025-01-27T18:25:19.217000 CVE-2018-18326,0,0,db8f6cdd70338e3bbc4bc3623d3cc122d1e6769392767c9b840dc685704c6110,2024-11-21T03:55:43.100000 CVE-2018-18327,0,0,4566d95fb908418b3cf19ef5d0605251696471933c9dca1d2ce4ff8ff122a4a8,2024-11-21T03:55:43.250000 CVE-2018-18328,0,0,e4a1f93fd883ec209b4d0fa5026795c497287e16fe37865c3e21fd92f95f9bb2,2024-11-21T03:55:43.377000 @@ -119174,10 +119174,10 @@ CVE-2018-19312,0,0,1c8e029b6b42c6fbc1775f11f0f40e78f95b1caf8d4d297456eee86f22261 CVE-2018-19318,0,0,ebaad92e5971123dd0293a3fffc5122945edb6b10d6bd23b576d2bc857cbc055,2024-11-21T03:57:42.690000 CVE-2018-19319,0,0,87f293dd648e8b4192b597029c0b4964754967313838c5a72b6876c930ca452c,2024-11-21T03:57:42.843000 CVE-2018-1932,0,0,6c0cde956d2725b69f80d188ae5525fb1847b4478bdcdc1191e40ccdbb95b86e,2024-11-21T04:00:37.090000 -CVE-2018-19320,0,0,0dea2d1458ceafbe75a55a9b8f24f9fdb5d4cdac8a2d99d599e216c9453389ef,2024-11-21T03:57:43.017000 -CVE-2018-19321,0,0,526958171e63685a7bbd4313c58f063f933fba87732dc429c10efd6641588cb8,2024-11-21T03:57:43.190000 -CVE-2018-19322,0,0,16b177f3b88149c18695efb2af7d40cce54019e5a199aa6f90712acd06349928,2024-11-21T03:57:43.340000 -CVE-2018-19323,0,0,0ab760b69c882d39afe124ba6769dd8a80b47473ada4146ab7e6eb3817b3cb53,2024-11-21T03:57:43.510000 +CVE-2018-19320,0,1,acc480d1f6bf27bbff6e9a5ebb94a8f358d95bfae0e1bc18ec6de51d520e432f,2025-01-27T18:14:57.503000 +CVE-2018-19321,0,1,fc3124cf48730f21aa1118996d1e9879983da546091e3c086fb93a756cf23f84,2025-01-27T18:15:03.737000 +CVE-2018-19322,0,1,4fc57c214abe5d2259e7048516ec1cb4e576071b275f452fbf59757929751c46,2025-01-27T18:15:10.263000 +CVE-2018-19323,0,1,ec18ca66841923c406b32e1fb9c2504df926c0c01e7333c84002c902b08d8635,2025-01-27T18:15:16.073000 CVE-2018-19324,0,0,a4b3f0318092746133730405c4dd5d205cfe53944184c6cf90d024bf6c3b057c,2024-11-21T03:57:43.680000 CVE-2018-19325,0,0,b2a5a6e5fcabfb6fa759f56900963fe9f19791da60d9a95349b9cec66eb541cb,2023-11-07T02:55:31.520000 CVE-2018-19326,0,0,e77c0e353c9ba05b6fbbd0baa2d3d98edf9a7f463bf35c9be30a679470a6aab8,2024-11-21T03:57:43.850000 @@ -119833,7 +119833,7 @@ CVE-2018-20059,0,0,a51c9dc7c637cc654ff1697815121d270bdcff703f0c68f60fdcdc128d1e4 CVE-2018-2006,0,0,47aaf5fb46e012c3cfb603348c2121f9a9a743a62e7e9289ff736907f0b910fd,2024-11-21T04:03:34.943000 CVE-2018-20060,0,0,e1385d2fac30923e70f75b5e2c91f03777167fa23ae8a6a4823f87a95d33d42f,2024-12-27T16:15:22.593000 CVE-2018-20061,0,0,1f3af18deb366266af78da0ceefcafeb4c84a14e1efa3997c111e9f0e822cf58,2024-11-21T04:00:49.627000 -CVE-2018-20062,0,0,9022b0d79dc2c71be5b08959b8e668d85d4ca6bfc1aec83929ea3276de0d9e93,2024-11-21T04:00:49.783000 +CVE-2018-20062,0,1,5ef8789e6d03333d948828da6e909dfc80d1c6ee7047e50da005cd1d75bf826e,2025-01-27T18:27:54.640000 CVE-2018-20063,0,0,34f0aa6d0bd4f9600ecd5e922724926b6fd20feacc9a5c41e95ea24a58e17160,2024-11-21T04:00:49.940000 CVE-2018-20064,0,0,db5b51f009f055b35c9ae4c72e7ff854b051d67ecaaf7e317679acbf9d48d3ab,2024-11-21T04:00:50.090000 CVE-2018-20065,0,0,b70f15819a2df13416f828d9056d4d769ce048ef842f7ebe753c4b20dcf1d0e4,2024-11-21T04:00:50.243000 @@ -120410,7 +120410,7 @@ CVE-2018-2075,0,0,04ae20175fa41379533c077097f44ad5290a86f22266576bbfb9080ebffe37 CVE-2018-20750,0,0,d7386a7bc9084e2dbdef92ecfacaa2cd945e1cc8d752db23eda400648cba0cc6,2024-11-21T04:02:05.540000 CVE-2018-20751,0,0,4416da1e1ce022084a931adc64107115fa860281619c7d71dd9365a44468e1d8,2024-11-21T04:02:05.707000 CVE-2018-20752,0,0,b3f7d9989c9602731bee14b1b3f60d7bb821e5111fe0d3c0e301bc2461a867bd,2024-11-21T04:02:05.850000 -CVE-2018-20753,0,0,c0c83fb4d10189fa88d5620e61d1774a6bb9a4e6de86494681790d06dc7bf763,2024-11-21T04:02:05.987000 +CVE-2018-20753,0,1,33dcf883621da29fe8eff12f574f4242aa0c72b31205afa4e9f8e0bc928acd76,2025-01-27T18:15:26.790000 CVE-2018-20755,0,0,e5279a0d3d1b0b2e3c42db7cf4f4a38413b717edbb48e553e13b65e2083f6e4d,2024-11-21T04:02:06.133000 CVE-2018-20756,0,0,0e08beb6173db4d859f5499ba3f2699a6e6314fc67220033fb2b6dd826f607aa,2024-11-21T04:02:06.267000 CVE-2018-20757,0,0,2e1d8a354f0c0173c35a646a69a433ac315159663d58ea9c8719b6ff2c1ffe28,2024-11-21T04:02:06.410000 @@ -124808,7 +124808,7 @@ CVE-2018-6526,0,0,627c110862d95ff8842b42cec59a5f00b77e899d49f3e1fe365fa2bcabb794 CVE-2018-6527,0,0,df08b81d8e2dd3bb247c892668e5704c86d662c0dded8fdc70cb9a946abd3f6a,2024-11-21T04:10:50.220000 CVE-2018-6528,0,0,70ffd6161bcb38f4b10131d174ef7b9dee233f21c39eca2b95795ad832a6b17b,2024-11-21T04:10:50.380000 CVE-2018-6529,0,0,59c6b821ba792cb9f1c30f213ef3658f4121e4d3d63290830433b82142e741c2,2024-11-21T04:10:50.547000 -CVE-2018-6530,0,0,a4dcd841b74b13782e0b12177e2741ae463689f2fde6dd404dae1f0ff9679553,2024-11-21T04:10:50.700000 +CVE-2018-6530,0,1,b5fd5aec491a2a1fbcb2279fc37eb09620bf727f152a924e1eba204923687d47,2025-01-27T18:28:32.227000 CVE-2018-6532,0,0,0098bc11ec65a4448e11621d1d4b07425a474a5d524179df68dad484e4f8b50c,2024-11-21T04:10:50.850000 CVE-2018-6533,0,0,67274d1cde7810e946b1bad1e775e49ac51b5f29ff31d6f0f12e69892c30e3c5,2024-11-21T04:10:51.017000 CVE-2018-6534,0,0,98734f2f9b016654838bf55ca7b6207a616e63924d3a0e1f002a52c13901f3ac,2024-11-21T04:10:51.170000 @@ -124965,7 +124965,7 @@ CVE-2018-6785,0,0,6c7e7bc11704f8c3d91b7c10cb313079fe8fa6e7d92df3c5c58c523f8e1455 CVE-2018-6786,0,0,89ea0f37e5e461c606f651e1741269f34ab4cdb3815ad9a0c06e8df7b7d37800,2024-11-21T04:11:11.787000 CVE-2018-6787,0,0,013b30b87fb4b9bdf2ec7b099b88f944005996449d617518f20957ea5be835e5,2024-11-21T04:11:11.927000 CVE-2018-6788,0,0,86bfab0f7758c7d855f0c1245f7dcc34b71bbf81b8d398277d194377f158181e,2024-11-21T04:11:12.070000 -CVE-2018-6789,0,0,24a2f0ef45c763cdc7e1faead9dc6714992fa9a614363a33bd93e06a427addb6,2024-11-21T04:11:12.213000 +CVE-2018-6789,0,1,247425696988e1f9a4fb05839ea2531515de644898ee8a3ac44c9f3dc783db9b,2025-01-27T18:28:21.723000 CVE-2018-6790,0,0,49de97705dc7140310bdb87c0fe7398e9aba9f3c65bfa971a774636359ac2415,2024-11-21T04:11:12.390000 CVE-2018-6791,0,0,e29078b1c9f930ed3d1bbdfecb3f6d2966bcd20c8499903f8fe38415dc2f1b80,2024-11-21T04:11:12.530000 CVE-2018-6792,0,0,e304c5ab463987fd30ee683c2245f3a9ad060da07868aa369c46a29b4e0ea343,2024-11-21T04:11:12.677000 @@ -125033,7 +125033,7 @@ CVE-2018-6878,0,0,8957f99d3762ccb00009151816e281f869f98effe9ca63fe04ea9de9cb2b25 CVE-2018-6879,0,0,535972e839f19a8623193f36f9bc049bf1b81d9abb2b7b756c64ad6bd010f2c3,2024-11-21T04:11:21.263000 CVE-2018-6880,0,0,3cd50d6cbd17152daba6ccbe0e977ea9496f687c201aab9fa0ca5d3cbead7cd2,2024-11-21T04:11:21.400000 CVE-2018-6881,0,0,fc5797f0201f5f361e734a06ee788a23d6c71171471669dc4f057cc8b1ac663d,2024-11-21T04:11:21.543000 -CVE-2018-6882,0,0,d331634692bbc96388990f02e4ddbcff3e1f0e655e3fb001dedfcab94403afee,2024-11-21T04:11:21.710000 +CVE-2018-6882,0,1,5ff354a78184e4ef4a5b51fc922b9b7b7230f8975eb4b2c641b4230e7d5b2e3b,2025-01-27T18:28:13.887000 CVE-2018-6883,0,0,b930ea02e0047e1e851632c79fda9687060f683edc6bf626cf7a0b729b9ec264,2024-11-21T04:11:21.867000 CVE-2018-6885,0,0,da2abdf626c132f9442f8a46638932ae95142647389d6e91dd79ebe5ee8289d7,2024-11-21T04:11:22.017000 CVE-2018-6888,0,0,1a9bc092935e2b7e274904d4f2135ce42e3978c4a976bdcaf4e872c2086d4c6c,2024-11-21T04:11:22.163000 @@ -125464,7 +125464,7 @@ CVE-2018-7440,0,0,7ea5b07ad5127b0ae3dc069222c4ccb685abf8da25a39fc393633932c5bb36 CVE-2018-7441,0,0,4e30fada1c4190f9b9003e6db70040887742ec2ea2f387f50f23852c50349457,2024-11-21T04:12:08.567000 CVE-2018-7442,0,0,30c160f5cb765925283d7f4020356f1152edb27b556cb73940ead803a932f087,2024-11-21T04:12:08.717000 CVE-2018-7443,0,0,3262f59056861397d7f590f8444d6df0ea5143dcc2d2714f262c876ddb3a2abf,2024-11-21T04:12:08.867000 -CVE-2018-7445,0,0,dd41e9a27b20b5ac6ad4ed73b1323eb1665806e9086bec977e8cd45e77bc2e41,2024-11-21T04:12:09.040000 +CVE-2018-7445,0,1,4a235e11770d0473ea153fc081eec40163b483ef2bd0a55430326afe0229833c,2025-01-27T18:28:38.260000 CVE-2018-7447,0,0,756b3ded07b0cc53688b2384b1152c19b4ef2ab4bdc9aabb9cc313f5bdc652e1,2024-11-21T04:12:09.207000 CVE-2018-7448,0,0,340198419b7de0d57a83c2aa310c88721d23adb464271a72c180203d630c908f,2024-11-21T04:12:09.360000 CVE-2018-7449,0,0,3cf957f02f1e5deafab8088cb8dab66c60f34f1f1ab0d16ff1c62419613141cf,2024-11-21T04:12:09.510000 @@ -145537,7 +145537,7 @@ CVE-2020-10367,0,0,c93b79c3ba8d03c5e197fb3931e2b138d2077723568d7bb7a74f193eb314b CVE-2020-10368,0,0,b1e0ef89accf400dc50093086eaed4855297c2e622443b4b73a551ab910f6a17,2024-11-26T18:15:17.463000 CVE-2020-10369,0,0,548a8d6e928bec8880ebce32de0ec576d732e5d835230af13c8e56ab11b80a07,2024-11-26T18:15:17.697000 CVE-2020-1037,0,0,28616025b4adb963b44f3be5f03ff37746b2766bf3f6cc61f2ae87be838cf81d,2024-11-21T05:09:36.737000 -CVE-2020-10370,0,0,87a9fc1e81d9cf0f587d0be9933b7749c33d2f87fc425f3532bae1abe12eb056,2024-11-12T13:55:21.227000 +CVE-2020-10370,0,1,cc201fee2b1a750b17171a54a5fb2989bfb19697d40989060bf0292b1da4784f,2025-01-27T18:15:28.260000 CVE-2020-10372,0,0,49c3808aa47404e16f93640dcdb3cf4ec10d21a2cc72d7f8aeca6182b9a05fbd,2024-11-21T04:55:10.310000 CVE-2020-10374,0,0,bdbcb76db820ea3e747ddd655d2663b851c2bdeae97b69812f68e1b450f06e23,2024-11-21T04:55:10.480000 CVE-2020-10375,0,0,44bde7041692ae98933b499802356f06d595f344ae836d5b7fc8a9dc8ae4ca42,2024-11-21T04:55:10.630000 @@ -177681,7 +177681,7 @@ CVE-2021-34071,0,0,89ba7165dc0de1ea0335bc00642a4fa74dd9a1cabdd592f47512f03021439 CVE-2021-34073,0,0,d82c2391c80f7817c6bcd6f047e0591d8360944a08a93f60551c10d1096fc56f,2024-11-21T06:09:52.513000 CVE-2021-34074,0,0,87a57011fcd440edd8ad98bd09cb14f5a521f9c0b857d4d4991e3874da02e765,2024-11-21T06:09:52.680000 CVE-2021-34075,0,0,8516ba3b4d3fd920ab58cb41e706502bffbbb650819ed5dd9a72e71582129d19,2024-11-21T06:09:52.833000 -CVE-2021-34076,0,0,c4baa5cbd43585e3db2f3f1023b09e42d95d7f38662bfaec1404f3f20e49220e,2024-11-21T06:09:52.990000 +CVE-2021-34076,0,1,e1094f2a4347c2d9582acc7416d906a5fa8435cd61404a17e5246e6475014273,2025-01-27T17:15:08.853000 CVE-2021-34078,0,0,b7e7d7d4edeb9b787c786adb983df23aa2e53a68907b8a8a6519922fd1d36fe1,2024-11-21T06:09:53.150000 CVE-2021-34079,0,0,89656003e664db672399b16001e300b7bc89871dbb563c659f3f93413f54186c,2024-11-21T06:09:53.300000 CVE-2021-3408,0,0,260c25dec18719c5eb68241660eb2dde49d64e0dd37cd639e5c15e914610d19d,2023-11-07T03:37:59.247000 @@ -187024,13 +187024,13 @@ CVE-2021-46755,0,0,c544c754b4881728b6daf09ae7628d8e4cda68f2b744f9d3351feca6d0151 CVE-2021-46756,0,0,4b62f6001d47f3e1b3afa4b8d344c7f30b91163fcb6dcc2223a8dcd3e10c8988,2024-11-21T06:34:38.833000 CVE-2021-46757,0,0,9bb395cfc6c2cc867004a009f9eeae811c297f927d63893e956b0fe116fa2946,2024-11-21T06:34:39.013000 CVE-2021-46758,0,0,61a2c8261647305cf0c168e689ef2547a9e118bcd79bbe37e35d6250fbc1a5ad,2024-11-21T06:34:39.233000 -CVE-2021-46759,0,0,e3f7f9a9ba4d4ae039f60ce90e585aca7b92c2fd14b85c3dcaf6e555403b558a,2024-11-21T06:34:39.520000 -CVE-2021-46760,0,0,967617ace1e0492de61ace99c2e429d7e19bd6e374159a31c33ceaa38971a52f,2024-11-21T06:34:39.797000 +CVE-2021-46759,0,1,ee41477de6aec6d8765a770d4587c30e8d34746d178e40b5c618fc67772ca7cb,2025-01-27T18:15:28.957000 +CVE-2021-46760,0,1,2a5c5d4614a8f99d6c513f4ec337736cb9c89dbc6c65e6108bb5f09456b91415,2025-01-27T18:15:29.347000 CVE-2021-46761,0,0,673565b132841f4e40fa9ef86a4bec9a270e19da8772bf1d5a2324269de3a1a0,2023-11-07T03:40:03.307000 CVE-2021-46762,0,0,a04b8facc1f877f06c93e09fdc65010cfefddf9144e2e823bf5ac7fdfff01198,2024-11-21T06:34:39.943000 CVE-2021-46763,0,0,b3a4154b5d3dda9491a8280f0f3a10f0f913a8350d28a8bbc092421ff8c661d5,2024-11-21T06:34:40.117000 CVE-2021-46764,0,0,137705b0985a360ec3fc7919a2b15c5294e6b50e2ed47e5fbefdae6ccb67aa23,2024-11-21T06:34:40.283000 -CVE-2021-46765,0,0,f8a7a0d727f5167979a0cfeeee30cb030e8d74ff969834167e21f757cd6c1ecf,2024-11-21T06:34:40.437000 +CVE-2021-46765,0,1,fe1e34ba3941eb547a595865103b1e703bc3945612d81406f9f99d9b9bfebcfa,2025-01-27T18:15:29.550000 CVE-2021-46766,0,0,bccf8c60bb6c6f348913cb8600a7bf05fbe599718b959086f4540fa76b250f22,2024-11-21T06:34:40.617000 CVE-2021-46767,0,0,ed28b18ceedfc909daa60b057d370b54ffe9be04b0322bfef58c76b097fce08b,2024-11-21T06:34:40.793000 CVE-2021-46768,0,0,3efc93a3218052c35679d8d9e65810db17d49b4d3976f82dd366c1c9a2d70b43,2024-11-21T06:34:40.917000 @@ -187405,7 +187405,7 @@ CVE-2021-47179,0,0,a8b6b384d1d3dd4500e62419e8055586dec0b9099243b3a6cfff7cfb16fe0 CVE-2021-47180,0,0,04d7ef49a6dbe27745e9ac88054127415a124aa60051eed7e0cd4e5e824fa8ec,2025-01-07T17:17:24.333000 CVE-2021-47181,0,0,c987c8c832cf3c59bca5d287fe34238d65206d3d339884f075eab0b776cf4e0a,2024-12-20T14:31:22.240000 CVE-2021-47182,0,0,639ad06be2a6517cd3152f844460c6d89d5631a9bb3a9b0d16574f25f9340342,2024-11-21T06:35:34.437000 -CVE-2021-47183,0,1,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000 +CVE-2021-47183,0,0,a6b52c941b31a268622bdcac7229e9ed96a7a8d63c15312452fa966d6e2d9693,2025-01-27T15:03:17.013000 CVE-2021-47184,0,0,d3f6da044f20b443e32a18293da1d6a01b702e6354de9a5b57ed13aafdd07dd1,2025-01-14T16:41:58.690000 CVE-2021-47185,0,0,45623a7520c43f2a5e6e681d610545dca832cc64c1f9e193f4443e9b4459ee0b,2024-11-21T06:35:34.797000 CVE-2021-47186,0,0,a394c86f0d639d2ea19b5f4049d6893cfec880c1b84d050667fdab1792f266c2,2024-11-21T06:35:35.017000 @@ -190454,7 +190454,7 @@ CVE-2022-20681,0,0,280bf92419fd301fbd908288efb43ca833598900fb53a9b6250a1ec7dddf6 CVE-2022-20682,0,0,1fa71ee857c33f00b556e052007e94caeb65b734be0c94eb81a75c820f03cb63,2024-11-21T06:43:18.730000 CVE-2022-20683,0,0,8bc8a3d3cd8a40fc693531753717605296f704be039710d68f204e467f0b5ea0,2024-11-21T06:43:18.867000 CVE-2022-20684,0,0,ab63b4c838f302c6526c81b8e341f0cfda8c2f5e8bb923caf295f3412a9c5f06,2024-11-21T06:43:19.027000 -CVE-2022-20685,0,0,88da035b80ca6e913d467d33fd80356656017857a0c91f6cf420a6ac13e42a94,2024-11-18T17:11:56.587000 +CVE-2022-20685,0,1,c86786a859663e3493a55c65640b10fbf182117a1ae0c0c1df0d8d5f2ed1e54d,2025-01-27T18:15:29.790000 CVE-2022-20686,0,0,600b7ff1394c351d716cddf546c26028d7ecb7ef8b18801ac32a7123861efb3c,2024-11-21T06:43:19.270000 CVE-2022-20687,0,0,5d18dbdb3617cc3203763429f5c75eebd258fe4458168c096533f5288bbfb8f0,2024-11-21T06:43:19.417000 CVE-2022-20688,0,0,6528ed176b6b729cf5d0d6c83ec1e5efbd5de1b84c9c813ad67aa56478111cbb,2024-11-21T06:43:19.557000 @@ -211660,7 +211660,7 @@ CVE-2022-47125,0,0,b2c9b6c6f7ba95285989623e74ccf11e0ea1506050d9f035b060f11669f7a CVE-2022-47126,0,0,6bd8779361f57d888b6cbdcf041bcc5a753f877ad3c0b8eab4ca47261f6114f3,2024-11-21T07:31:32.447000 CVE-2022-47127,0,0,7f3ddef080230aefa5fb7534e489e5c7ae2a0de3a449397f60fec48d88807fa9,2024-11-21T07:31:32.603000 CVE-2022-47128,0,0,1c75f578da3d63eba054764bcb40de25ddf5478d90329293e0999c80cdd0e217,2024-11-21T07:31:32.770000 -CVE-2022-47129,0,0,751b4295e87bfcd296450d3683f4824998985bd453f5a3777e6dc2df5188527c,2024-11-21T07:31:32.930000 +CVE-2022-47129,0,1,4c652cd2ffce48967a8cd7325eaea2ecc348166e165c9e28455b5502b2b2a42f,2025-01-27T17:15:09.930000 CVE-2022-47130,0,0,bd56e88146459760481d0502621f086dae384eadd306a52993ae9e272ff2d776,2024-11-21T07:31:33.110000 CVE-2022-47131,0,0,500afffdcc5849eb67e594b4d12078b5df9061108737a421b248eadc5474d012,2024-11-21T07:31:33.287000 CVE-2022-47132,0,0,0f9fdbceae624fe6ed848fd9cb9e9074b08d178eeca3f87a64b4af7c157e084d,2024-11-21T07:31:33.443000 @@ -212123,7 +212123,7 @@ CVE-2022-47877,0,0,f4f2fa3f9619bc52600ea7032a7ebd4771ed2cd68feb9a57717103525e5db CVE-2022-47878,0,0,96bb6067105e74676882f6a527181b82486d927c40bffd915863185ad4f54ac6,2024-11-21T07:32:27.203000 CVE-2022-47879,0,0,e171eb85302c2db35aabd0617a1925f41a68d1f3980643b9d1c66f3e17099e71,2025-01-24T16:15:28.653000 CVE-2022-4788,0,0,ae818ad2c7b032c533d8af8074501d3ba3cd4c515b256fa77825654e4447ddf5,2024-11-21T07:35:56.633000 -CVE-2022-47880,0,0,2b9b12298f1b7624f9ffa9e5b9503a4a9a483e57014d89d5abe2b7ada15e54e5,2024-11-21T07:32:27.520000 +CVE-2022-47880,0,1,6912960d6442fdd7ed92092a03e4fe22fbfc3cd1e68d8e2a73464e9293478ab9,2025-01-27T17:15:10.117000 CVE-2022-47881,0,0,34fa102bc5505e6f5f8a5f6eb9d86c65176a3776a73b2e6594f74a0441654a64,2024-11-21T07:32:27.750000 CVE-2022-4789,0,0,44a64395cbd23efda5f94654d2800ee9169619339d67c212a50911f80f7d1374,2024-11-21T07:35:56.747000 CVE-2022-47891,0,0,2f47c6b847a20229910a5de68a3507a4706502db4587eb25ec3e6a2c92cc8336,2024-11-21T07:32:28.007000 @@ -215714,11 +215714,11 @@ CVE-2023-20870,0,0,53354fedb863b4a0daf5619cfa6d0c81df2e9013346f8fe1f90d5736f64a0 CVE-2023-20871,0,0,2fbb971e42fe74cdeae8922dc5de09c390db2749e55cb7ad375b90260b6c6ffb,2024-11-21T07:41:43.900000 CVE-2023-20872,0,0,a3a2b3acaad89d86c5772a4d0c47007fab1ca268f0af9e3908521ea5b60dab16,2024-11-21T07:41:44.030000 CVE-2023-20873,0,0,cff16cf52797f467ed7c741f13305368b4aeab764d12cb3c66fbc1fcdfdb8ca9,2024-11-21T07:41:44.143000 -CVE-2023-20877,0,0,b1137b7a4eeb2839e9ccb1d52d41b83ecff55e9d480687605ddf1601b1de1f1a,2024-11-21T07:41:44.253000 -CVE-2023-20878,0,0,2b44a2f19288e0e47b5de5247c31e040ccee0af9e3dc60185cd935597e4e9887,2024-11-21T07:41:44.370000 -CVE-2023-20879,0,0,eea88eeb6a512c97a72206f821436dcf25752e98f66fc5c1c632c6621e574c15,2024-11-21T07:41:44.493000 +CVE-2023-20877,0,1,d073b7c4625cfb70ab10dd67170b99c7de935de57bdd4ee1508c3f6541c7c349,2025-01-27T18:15:32.293000 +CVE-2023-20878,0,1,f2082b625ccb81ae33606b752a75606744f21bcd16f52200465b26d0e34d2fe1,2025-01-27T18:15:32.473000 +CVE-2023-20879,0,1,186661f8dce118764be7856f12ad55f90b5489101150205b9fb14f39ab37c01d,2025-01-27T17:15:10.337000 CVE-2023-2088,0,0,24ce61252c8d92165fc18045e361791e8ad1d2941848cbdc61c8790fa17c0641,2025-01-24T16:15:31.020000 -CVE-2023-20880,0,0,b89bffd797ab3d3197d8fc9600fb55a084a937e4452f2b287a8d2721678172d5,2024-11-21T07:41:44.600000 +CVE-2023-20880,0,1,40e2706434da51d3cf80ba2a0b5da1ace8c921da958380dee2bef95699b223d0,2025-01-27T18:15:32.653000 CVE-2023-20881,0,0,28548a0f62d733f2b9bfce23b0d5259ba7f92cf2a2fb9432dc94d495c2741f09,2025-01-21T20:15:28.703000 CVE-2023-20882,0,0,1976a8fc4a44fc2bcd0b63f6d8b4f374b2bf769fbb5b3a6e0734bfa5f060d62d,2025-01-16T15:15:09.943000 CVE-2023-20883,0,0,7cab49bc516226b6c1fb7481af063e5cac32e4611c74a54a0dc91fd7f2b94301,2025-01-16T15:15:10.170000 @@ -217800,7 +217800,7 @@ CVE-2023-2316,0,0,aa36fde431a7f600ead0081f1bdfdb2a8e69c72d7a5efb41b395af051e5f24 CVE-2023-23161,0,0,afba8c84f46fe93d83f62f473fc26602885498403b148da1dac4fd844e736dd2,2024-11-21T07:45:54.870000 CVE-2023-23162,0,0,b20bbecb1ddd7809e09223e05360d838e5bc53ef0f6d9b676eddf3446787b096,2024-11-21T07:45:55.027000 CVE-2023-23163,0,0,1458181836164e7679eb7f3e8ac5f41970ae946d72a647b84e539780212eb764,2024-11-21T07:45:55.187000 -CVE-2023-23169,0,0,ad613f3c4d6493cd38ddd6d38f6f65972ce4b79010e0477560f51cfbcc1f605c,2024-11-21T07:45:55.340000 +CVE-2023-23169,0,1,791a52cb9b591ea24f33c4b882358e9e3dcce1c95586ca2f51ceb7fca194fddb,2025-01-27T17:15:10.540000 CVE-2023-2317,0,0,123c4e792b28a5ae6d6494008b4f3142fef261c41c817d2362203bf65f664828,2024-11-21T07:58:22.570000 CVE-2023-2318,0,0,fb97bf8b4b5f36ca495061b42db636e66acccf4d2f08f9b5a70bec2fb4dae7fd,2024-11-21T07:58:22.690000 CVE-2023-2319,0,0,04da81fe3df0bd6bdae2f4fe852fa7eb1353bd91d53a5a139d3794aba74258ca,2025-01-22T19:15:09.283000 @@ -219283,7 +219283,7 @@ CVE-2023-25001,0,0,4b6ef5d1672de6420599e1549dc23856a050bed3150d07cf0cf6bd271e3bd CVE-2023-25002,0,0,05d98309d4ba01ab62a26e2e37b08847dff9179b49bd841d1fb29dca3b558e49,2024-11-21T07:48:54.660000 CVE-2023-25003,0,0,297b20457154613e442e6580d1b0483f9176e6b0e009157fbdd46071985f01a2,2024-11-21T07:48:54.767000 CVE-2023-25004,0,0,dbbc283b91f6ad6a332d9cd1d90463d0f805f7f8fcb481a2ec535a2c5f47b4d0,2024-11-21T07:48:54.893000 -CVE-2023-25005,0,0,a4af3ee4f7aaa6243ca8568f13971e21ecd5ea682d692f71b836aa41bcef090c,2024-11-21T07:48:55.020000 +CVE-2023-25005,0,1,5a4bafcff224d64d57d5dfa23b734c346fd21ea19b9e23655e0dca831bc8a217,2025-01-27T18:15:33.127000 CVE-2023-25006,0,0,ae853a9109bdc39886707af4fba9fcba2895ea3fc5c03bcf7a7d0ae16349fec8,2025-01-24T20:15:28.567000 CVE-2023-25007,0,0,22e5e0ddf5d72f0ac6a83616236efd19f5942400446e93ab195f7deea283c4ac,2025-01-24T20:15:28.733000 CVE-2023-25008,0,0,350f0b19f640b9a36076dd4bd0035f87b878718f7e4ff571ff5c2fe7e18bb900,2025-01-24T20:15:28.890000 @@ -219544,7 +219544,7 @@ CVE-2023-25304,0,0,28a9fcfe9f8defd2b94db49ca3a63558bcf2cd3ca6efe7b0c3e6f407ffdde CVE-2023-25305,0,0,e034ff43c37edb7c066168ed0e8780cecf32ded05354e03285f0640dac3342bf,2024-11-21T07:49:24.173000 CVE-2023-25306,0,0,edcf081a190ce1746bf6344523ba03f49a546931e1f6e6192e742c750e584b96,2024-11-21T07:49:24.310000 CVE-2023-25307,0,0,169769ff3f98fbbb2d755cb83126804d404a380acff35a8f1b6aa4539f98db5c,2024-11-21T07:49:24.450000 -CVE-2023-25309,0,0,3ae624b3bf594f299704abf45ccd39e154c474acb3ced0f586b00ee9adb8bc0b,2024-11-21T07:49:24.593000 +CVE-2023-25309,0,1,12fb26cab8d54fb6e8bd69905a74bdb9e62d267a6541c74cf35ecd6b4a2c3007,2025-01-27T17:15:10.743000 CVE-2023-2531,0,0,a6425f0bed224abaaf3ff0019a68b7cad19db87c026c67e6739047930d76bcb2,2024-11-21T07:58:47.277000 CVE-2023-25313,0,0,fc2d3b66d2831ac9650d4535a5c966490d69a748a1e04859ff90c62f7073ce4c,2024-11-21T07:49:24.737000 CVE-2023-25314,0,0,713c1d209f85bc607917983156315b9580c4e3437434b7c235d8fb23eb605acd,2024-11-21T07:49:24.870000 @@ -221013,7 +221013,7 @@ CVE-2023-27233,0,0,994f850112ed4f229ea119f753b0d0f877886e6fcdd0f4225e5f9ce183fae CVE-2023-27234,0,0,8a7752bb1b30f5109f35237cc28f0ace1198d6b8423fb706790cd6275247ea06,2024-11-21T07:52:29.960000 CVE-2023-27235,0,0,c60453614f616d535021868dd641756962f30770bab77e2c62e439343b77ec43,2024-11-21T07:52:30.097000 CVE-2023-27237,0,0,e09f60848d34f83c21a67da1938fe74ef21b790eaeaa3d9fbd20f0f0b76350dd,2025-01-24T20:15:29.370000 -CVE-2023-27238,0,0,56534d066662ad2f46a3a8d5d8828a6ae1945f3cf9874425d0528759c2fa661c,2024-11-21T07:52:30.387000 +CVE-2023-27238,0,1,d98fc7eb90e07475353f284ec45b33ba5354b97f9b17f461e52280af1f4ddb4c,2025-01-27T17:15:10.970000 CVE-2023-27239,0,0,8bece8ac4b3711e3110c648e7b065b3c9db482f541d115b3820b8138bcb95a0f,2024-11-21T07:52:30.530000 CVE-2023-2724,0,0,2a19d858691970cc8211d9fd57ad5cb987dab827efcf2e326b77a55f6df6f404,2024-11-21T07:59:10.277000 CVE-2023-27240,0,0,31aeed1a9374cf18aa004fe480a20b0dc68d29dd270625d02ca4951e391124b2,2024-11-21T07:52:30.667000 @@ -221995,7 +221995,7 @@ CVE-2023-28321,0,0,84a5712501650fc080e3e4714a4486279a1375c4cec29218752858cbb3df6 CVE-2023-28322,0,0,74b3c0a6bc858952c9d99c23cd813d09b470cf6e86841cece3365f6eceaf5a86,2024-11-21T07:54:50.347000 CVE-2023-28323,0,0,bf5eb73316bcff59ec3c02d092a092bb62c93a173f0ff7642d8dcf4c35f30fa8,2024-11-21T07:54:50.513000 CVE-2023-28324,0,0,75d5038b340d60b2d014aa25c6c358b63d32398ba9cd34375df1a53d5f49f914,2024-11-21T07:54:50.630000 -CVE-2023-28325,0,0,af8ae05aa79d76a1d5d89daf6d945d95fd9a68dbc872ac468982e5198304a0c3,2024-11-21T07:54:50.803000 +CVE-2023-28325,0,1,b37e559107fa139413716e4112b676e7e8c4155678a9eeda3bcab33ab248b10d,2025-01-27T17:15:11.180000 CVE-2023-28326,0,0,cfe09ff9b391fe929c63cd1463570530efd97d330127a13377b2883017471318,2024-11-21T07:54:50.917000 CVE-2023-28327,0,0,d2ec18b36b7d70f68edb2ff5af57a87e9bacb7797885e631535bbee71c304e55,2024-11-21T07:54:51.080000 CVE-2023-28328,0,0,dd843376dceb5e9b44575661276782120b04055e1cb6a29a638ab41331d496ab,2024-11-21T07:54:51.207000 @@ -222028,13 +222028,13 @@ CVE-2023-28351,0,0,50b60ff9f1faa5d2ca368c1579644967d75a2b395c9eca0acd5f51573b7ba CVE-2023-28352,0,0,1a443039b61a68d544d1a0512eb2e6920cfd8fedbfd9e18ba8211df774fb7c7f,2025-01-13T21:15:11 CVE-2023-28353,0,0,b9f03e7e8468310452dfb419121e5c79b8d944fd6b5ca95145815aea3bdd5dd5,2025-01-13T21:15:11.170000 CVE-2023-28354,0,0,55fa67e02cd5514d889508ba929241d9873586e74c190e38ac1ee98890cd97b6,2025-01-10T18:15:18.530000 -CVE-2023-28356,0,0,967486c5afd6bfd56f9f6067f95ef83dbc3f859def71b093ac8380b71f320501,2024-11-21T07:54:55.040000 -CVE-2023-28357,0,0,bc7ede4bec083eb7ec94b4649c0f01ac039f5033bc14e4f5a817a37e30068799,2024-11-21T07:54:55.147000 -CVE-2023-28358,0,0,71c1b45895f15afdac93812eaf438c98b3f87254b8e0f80b3c2514485ece1906,2024-11-21T07:54:55.243000 -CVE-2023-28359,0,0,cd55c22312372fb6f15a04d4134b33870fb2934978c373a7db0c340ac2a081d6,2024-11-21T07:54:55.353000 +CVE-2023-28356,0,1,3f5706b7b06ffee6e72a9728683cf49aa020c5bfdb529d158154a489257b7996,2025-01-27T17:15:11.420000 +CVE-2023-28357,0,1,e93710556a6c43355f5828c345021177e544791172f46abfb36206af37abefd5,2025-01-27T18:15:33.477000 +CVE-2023-28358,0,1,12f9b7a35519bbddd070088333e4fc050c904a5edba6c2b7866622bcdf19ec7e,2025-01-27T17:15:11.633000 +CVE-2023-28359,0,1,dc926c3154899c436766f103a098ca1e45053a8d57046c231274429b0f6d10d7,2025-01-27T17:15:11.823000 CVE-2023-2836,0,0,e304035203056a4f4a3afb3be38115d5014b45bcaf46fcbecbc18c914bc80cef,2024-11-21T07:59:23.180000 -CVE-2023-28360,0,0,5ceb5d0d6176a83870db92b27e5fb686afcf6195e7abefc91242e0e5f5fa8572,2024-11-21T07:54:55.440000 -CVE-2023-28361,0,0,06fd1bf43032dd9213305815ba759914cce3eec23910c1687ab4d395be68b16d,2024-11-21T07:54:55.543000 +CVE-2023-28360,0,1,be0cedd6f0badbbc0b26905f2a39105bd3371c861e9f42a5172284a59e08fb4e,2025-01-27T17:15:12.027000 +CVE-2023-28361,0,1,3bab68c80d57a080767b3828045f0e6c78df15bef18d9a43893ef70181998c07,2025-01-27T17:15:12.240000 CVE-2023-28362,0,0,27177a8d408082bb8174e3277015cbad3f5c47547c0db03786e552334779b676,2025-01-09T22:15:26.737000 CVE-2023-28364,0,0,b8e69a33d67631d2c3d239f1c01280f5576d4f6621054c060df4f07489827dbc,2024-11-21T07:54:55.643000 CVE-2023-28365,0,0,4859f30e6a1c91c44b3748aad21832f67bb60327910ad2139bb1ab931e722eee,2024-12-12T18:54:11.327000 @@ -223313,7 +223313,7 @@ CVE-2023-2986,0,0,fd575d0d1fc5fd4e594291bb8d594452294ed760175b3a8b0c59fd6d69ed1f CVE-2023-29860,0,0,5c2742c261171840d6f34f370da60d924460a62e3a3def8de75e8ffa5cdc3f5c,2024-11-21T07:57:35.657000 CVE-2023-29861,0,0,82ff7cef243bfd86ee88a495dba3f937ac9fd2757a16b6cce4845e39b4ac8a62,2024-11-21T07:57:35.797000 CVE-2023-29862,0,0,f3fb95cc3ea88b0d8929aed37b61f94fee3729dbace9b5a662d7f9cdf473c874,2025-01-23T19:15:08.820000 -CVE-2023-29863,0,0,05285677abef102b7602b6076f12281310cd716a07fd1e8b43e12e7db9188249,2024-11-21T07:57:36.093000 +CVE-2023-29863,0,1,e333f8ba02c8bd89974f266d3b665d9ee7bebb3f15a52772bc68f9cb710a3ae1,2025-01-27T17:15:12.450000 CVE-2023-29867,0,0,975e88eef5071d267c2c1d4bc8c85e70a986eb2635e422c3d34892628c90c29d,2024-11-21T07:57:36.250000 CVE-2023-29868,0,0,0ac11385280fe4763bf4ef677575ed29c025d97d80cdab4699228502c19619ba,2024-11-21T07:57:36.387000 CVE-2023-2987,0,0,bffe3b4cac45ece38eb9c2f45bbce993afc7c21c9308f43d7128b111aad6b465,2024-11-21T07:59:42.340000 @@ -223370,7 +223370,7 @@ CVE-2023-2998,0,0,1b6ce606c073f2f25d79f3f75e5e06457895c01800a04a3eca245ac3c767f4 CVE-2023-29983,0,0,ed99309646d76794ed687f7b700598e0017fad6201e28c194a1b81153669a24f,2025-01-24T16:15:30.773000 CVE-2023-29984,0,0,849d1d8bb8d1c82dd4465e18dc063bc7bb7d4f6685f858666cc49d05da57a8b5,2024-11-21T07:57:43.273000 CVE-2023-29985,0,0,b12310c1ee5bbdc1261f7a8ed5e13634d33dba6518ddef2866864286487694ec,2025-01-22T17:15:10.717000 -CVE-2023-29986,0,0,c0a4da31bf6e6fcd318ed3581b7de177d3f4a8c74bca980aa70eef57c49d0ccc,2024-11-21T07:57:43.767000 +CVE-2023-29986,0,1,64cc8f6ff9f7ee9d5de9e041416351df6f2a7780a5ef5b034d6247b1456399c5,2025-01-27T17:15:12.680000 CVE-2023-2999,0,0,e84b86584803df914c413c71c789115543e508f0f37e047743cf55901a755646,2024-11-21T07:59:43.583000 CVE-2023-29994,0,0,0d588203ce56bb6ec198443b64e6307afb104e1a348d444db41d8a25f6f5d348,2024-11-21T07:57:43.897000 CVE-2023-29995,0,0,2d6cd6436f63429b8b10f2bc2a9f87707f989687a7f07a3ba0b594a20e4caaf4,2024-11-21T07:57:44.033000 @@ -223445,7 +223445,7 @@ CVE-2023-30153,0,0,6cf6ca3aa05eb847f8f4f95363208d4ed79f29e0f96b6c45b0c4226e18999 CVE-2023-30154,0,0,ec13d7eb78816b6f7fccc2afc2b9605ad3f4ccacd68312c17f5295c0f2e2af5f,2024-11-21T07:59:51.100000 CVE-2023-3016,0,0,6f0d74025bd389a247adba39cc5e9bdc2f343990210dfe25f8b2ea9fb714dd36,2024-11-21T08:16:14.903000 CVE-2023-3017,0,0,1ce0b9fe62b66cb32fa45359de13cc30aaa93f003e67de3952d12a79da4fcb85,2024-11-21T08:16:15.047000 -CVE-2023-30172,0,0,34dc2dce5443d412cd254a8a37f8e483f4f51381736802fff425c952bfb4c87a,2024-11-21T07:59:51.253000 +CVE-2023-30172,0,1,65582ac8341d53ad3e9e9eec8b819c727d7045e726ea51035e2615336b9156f6,2025-01-27T17:15:12.883000 CVE-2023-30177,0,0,d6d73aefc9c9a3ae7b61d42607fe438b612e64a949ce1031d6842dd9833d5211,2024-11-21T07:59:51.433000 CVE-2023-30179,0,0,46744e8234f672d70fe2e5e5fb2b6d1ce58497ee7875131f12c9e477e98e7940,2025-01-03T20:15:25.737000 CVE-2023-3018,0,0,be8083d871f0e1500a9cc749154dbf1ac3c7f3ac44dcf0f5e358fb220aa3b822,2024-11-21T08:16:15.200000 @@ -223458,7 +223458,7 @@ CVE-2023-30188,0,0,bd69c02b1b4277403197d9ae4a4d5755a2a34b9daf6c3dabe7b5765d14b0d CVE-2023-30189,0,0,bdf0f5a2ef0f70b767678ad27e05737c73c5e89f432a67f5d1894b312d6ba4ef,2025-01-23T17:15:10.700000 CVE-2023-3019,0,0,3f2eae215750afa5621e4e308f7ca75563ffc785802895ca3b7c64fecccce699,2024-11-21T08:16:15.360000 CVE-2023-30191,0,0,affd8afbdd3a1ff86c0284e22b7c40ba550b3c3af6460f8ab59c55f9734edd57,2025-01-22T18:15:16.863000 -CVE-2023-30192,0,0,76ef88ebb30e0eb7a330a15d67abe9acdd9b3732c18c14e5467f80708cef8059,2024-11-21T07:59:52.850000 +CVE-2023-30192,0,1,00df9b0cf612befd5850335068a6875ba0c131c650f8045e17fe4c98fce31dec,2025-01-27T17:15:13.077000 CVE-2023-30194,0,0,97916a3149d4accd5e7cecee33423a08e2cb7a42bf400ac1c6746cf4b6f8b95a,2024-11-21T07:59:53 CVE-2023-30195,0,0,9f6fd32b889ec86f9e06a9f333ca1033c4dc8bc185606c569140c5f599d8388a,2024-11-21T07:59:53.150000 CVE-2023-30196,0,0,d8afa1205a2ac923a0a6e9d60cd8b3febd3d3155dd6bbfd812d986f0a2f4474f,2025-01-13T20:15:26.557000 @@ -223490,7 +223490,7 @@ CVE-2023-30246,0,0,6dbb071f5e59c28eb4fadaf8cc46d1b6e0a4cacf509deac2c8135d3934a98 CVE-2023-30247,0,0,8c34575f00011ad3b8708c886000e65d3a750580164f5b9d5bee394c447af3c6,2025-01-24T20:15:30.177000 CVE-2023-3025,0,0,c446eec5a9db9b12bf1ed2b6e31a26a68cf8f29bc31a0a6681096b8631efaa39,2024-11-21T08:16:16.200000 CVE-2023-30253,0,0,75d2b84f9e9ecd963fdf5317e18b495d544993e124b5902f9ae167bc369b8b60,2025-01-14T17:15:11.487000 -CVE-2023-30256,0,0,0f007ec55ed468355a21fd6223d5b056f22a827eb3cdf0e2c5c0c4a50bee8cea,2024-11-21T07:59:56.697000 +CVE-2023-30256,0,1,9800eef94bd4efb03d7b6271e0e9561e4bd692dc23d99c05a3ab6fc1c514c5e2,2025-01-27T17:15:13.280000 CVE-2023-30257,0,0,2a8563275278c71f21dd4dfd3429d5107787f71cba116f45bd619ed7c8f3b134,2024-11-21T07:59:56.857000 CVE-2023-30258,0,0,0b551dde79ecca1fdde4cd38a3241a1940777165dd7784dadaac69672343badb,2024-11-21T07:59:56.997000 CVE-2023-30259,0,0,32c44058401c61de009be437804ef940eabc21574b12b4f81778fc4ee5b138c4,2024-11-21T07:59:57.140000 @@ -223924,7 +223924,7 @@ CVE-2023-30760,0,0,8ce1174080c412d47616cb62cc2689d1ae6e7692c25094a976eaf3d28ddfb CVE-2023-30762,0,0,65230d50da39d5769884a23cea215c219f87d24b734bb6f203bdf38965635705,2025-01-03T18:15:14.630000 CVE-2023-30763,0,0,bc7592b061aaf82c1eac06e9d5fa65a11d784ee282785556a956d5363d94499d,2024-11-21T08:00:51.257000 CVE-2023-30764,0,0,3ee96bc9ee7f0e63a06bf407115b05d6719bf9b6a46c01fc40dabda0589d48f9,2025-01-03T18:15:14.867000 -CVE-2023-30765,0,0,74e124605964f03fd6d00452514c12b5d209ca28601a39802d58daee3a6414be,2024-11-21T08:00:51.507000 +CVE-2023-30765,0,1,034a1ba4301dabf4122f455606fdadbac984b98c6fd6e089a5d998be76ef9c52,2025-01-27T17:15:13.467000 CVE-2023-30766,0,0,8bf2a8ec3becd9c2c60278b0287f7ad061689d072c486aa34c1cd936e3876f1b,2025-01-06T15:15:10.310000 CVE-2023-30767,0,0,85457cbadee2e525e1d99b0cb12376880ce917319783a448267ff8f0d4c5aed3,2024-11-21T08:00:51.763000 CVE-2023-30768,0,0,03c63ca37f99fc3a2814e35ea98ad3e5452a37b90886aeda01832015f682e93c,2024-11-21T08:00:51.883000 @@ -224444,7 +224444,7 @@ CVE-2023-31438,0,0,3726b6e286f72d60d8d2a50ce86e3f9f77d34b7c0ec484f35df8ee9bcadc8 CVE-2023-31439,0,0,71c5ca81c263f26893e008a16a18cf6cc6811e232fe39b6b1d8b56ee72d485bd,2024-11-21T08:01:52.097000 CVE-2023-3144,0,0,13312dea69babaa16688124c8963ccc0c3d3042ee3236638219215f53f650b10,2024-11-21T08:16:33.300000 CVE-2023-31441,0,0,31ba3f04728b3e018f7177d9f506a5f3215259327deb1a558991108968e399d5,2024-11-21T08:01:52.240000 -CVE-2023-31442,0,0,0c65150ce4f62971e851087f3160f1fa6ed15e6c018bd11ea431158e28888f96,2024-11-21T08:01:52.387000 +CVE-2023-31442,0,1,e620b4a8ea050d381ac679c88639cd42816debc6c034bb2d87dc20b8e407224e,2025-01-27T17:15:13.690000 CVE-2023-31444,0,0,ffe3d065b5ba561031fdfb6f463a0a06418aa217aacf6f7de918a606a9f09516,2024-11-21T08:01:52.523000 CVE-2023-31445,0,0,3ec11fd83d39e169aa494a2d6294e1eba3dc634e84e8b0e47171fc4669d38d21,2024-11-21T08:01:52.663000 CVE-2023-31446,0,0,355d87959b5bc897f91518742ab93eab54dfb8d8ac9a3053ee86fa4d1b32bb8f,2024-11-21T08:01:52.807000 @@ -224473,11 +224473,11 @@ CVE-2023-3147,0,0,56604f93dd20b44d8140c36ba767f07bd6ce689a7788f3df02be30ad8c574a CVE-2023-31470,0,0,6b71c2b980ed5d5dbc3b91dfa2ea1ede13ad6f5048623bf9c4020495f5186c9e,2024-11-21T08:01:56.047000 CVE-2023-31471,0,0,02d2648dc3933e038c140fe9c11414895553d97bc01c4564a249bde1dc4b873b,2024-11-21T08:01:56.187000 CVE-2023-31472,0,0,5645b9370a1f7e00e7b726c063c97dfd0116c47968a74e53567c3ecbd08a5068,2024-11-21T08:01:56.373000 -CVE-2023-31473,0,0,5de918860b031fd8c20271236d1b9a5b276b889a3c307efb255be121944b69f0,2024-11-21T08:01:56.547000 +CVE-2023-31473,0,1,92dce06491f3cf73c105ca654129799b1f28b48e831ec76f37a65ef951aaa511,2025-01-27T18:15:33.730000 CVE-2023-31474,0,0,6618e639f18b59368089da0a7a07e9e3ac46d59fc20022c2ef8a65ecff0dc29d,2024-11-21T08:01:56.720000 -CVE-2023-31475,0,0,6982cbd9f5779df43838a99764cd34b891563dbcdcc2b09d30a3c283f333e54f,2024-11-21T08:01:56.893000 +CVE-2023-31475,0,1,d951c773bb9751afa15b7c5979977675a78847a547c9e67d97edfbdf62ee6d70,2025-01-27T18:15:33.980000 CVE-2023-31476,0,0,05c7e36d9fd0a726f1f768659d92460a30b15dbaa547b6445f16aa8e5e4223e0,2024-11-21T08:01:57.070000 -CVE-2023-31477,0,0,fd61db3e967cd2974254c80eb9ad352183ef3369b70702d24259e74aef9ecdb1,2024-11-21T08:01:57.210000 +CVE-2023-31477,0,1,e10baebb415aa7ec15bcf01cba0d43652df664abd71fbb7953500b53d735e205,2025-01-27T18:15:34.210000 CVE-2023-31478,0,0,8cab9927a9286e171e37380c11c97fb5026d147c5204dfc439730166b7fd91f1,2024-11-21T08:01:57.383000 CVE-2023-3148,0,0,9236ef71fc0458d505ab03b01d49be5b44ba8909a5ef5119004368313b8abe3a,2024-11-21T08:16:33.907000 CVE-2023-31483,0,0,90c896255a77971ac7375f5d97d33ae506954cddccbc35ddb5f2b069a45b2dc7,2024-11-21T08:01:57.570000 @@ -224490,10 +224490,10 @@ CVE-2023-3149,0,0,c00821dd1818f517bfa5a1fd3e0f2f402c593877879e7a9264f9788304c549 CVE-2023-31490,0,0,ba44baa16933ee7fb56e5ca7ccdad5e45e5737c4603d73d73c9a43eddb4128bd,2024-11-21T08:01:58.593000 CVE-2023-31492,0,0,ab94b48b95747f1dd268773c2870b232f3ee8c1585864f065007fa8078479e18,2024-11-21T08:01:58.740000 CVE-2023-31493,0,0,8ae4f2f9882a91a3883f3e868300ce5a690269ec9f7f48649f5e5389dbd259b7,2024-10-16T19:35:04.040000 -CVE-2023-31497,0,0,d08062f5f8a7ccdb9d307d41f0321de3862b4516ad6e6dc6a00df081d2bfd38e,2024-11-21T08:01:59.110000 -CVE-2023-31498,0,0,c5fc738b878bbcd04ba26e9e6129c2ea0ecca3ff1fb3c0aedf4388752d8d8625,2024-11-21T08:01:59.240000 +CVE-2023-31497,0,1,80cf15c197eff3f01ea9605c6ed4248241b61d594f483b4431ef071d58c6a699,2025-01-27T18:15:34.437000 +CVE-2023-31498,0,1,0d4c1e7a0cd4aeddb32086ff86825f303b7dfae54d84ae71e39be1f2b0088f55,2025-01-27T18:15:34.630000 CVE-2023-3150,0,0,a3fa8d6069753cb23f1e5e11e86e9c466366dcc9f74d5d0a1459eb95f7a3bca8,2024-11-21T08:16:34.220000 -CVE-2023-31502,0,0,8ad46ae09b6f3604320fbada796fdfd8d599f549d9b5489d5397f3d20e818fe5,2024-11-21T08:01:59.377000 +CVE-2023-31502,0,1,7437bc1185aadcf6fd74fe6f6ac1b7bd1772021ffe7a2781f76a295aeea83081,2025-01-27T18:15:34.863000 CVE-2023-31505,0,0,4c07c8ce04347721c87f09b0872ae928000ece07aeeb0fd88ee56618ef7bf252,2024-11-21T08:01:59.510000 CVE-2023-31506,0,0,b69783c256e9b2fe4d3fd0bc3adaf237cfca0b69092218bcd86c0a612bc7a808,2024-11-21T08:01:59.647000 CVE-2023-31508,0,0,383f087cc1c90d8f094ea0cb33f3780c04e928cedb43e11082afe0e7450127cb,2023-11-07T04:14:20.410000 @@ -224502,11 +224502,11 @@ CVE-2023-31517,0,0,1d8d4dc687680917486b8f83f7d514574a637d13656773f6e6ed3f56dbf3d CVE-2023-31518,0,0,ed080de9ed280cf8671dee882339f98414ba288254d444d891e460bac10d9372,2024-11-21T08:01:59.950000 CVE-2023-31519,0,0,c7c3e2dd6ac487f6491ccfb052103ea5ca9da1ab6078826fb082db918527b824,2025-01-23T18:15:27.823000 CVE-2023-3152,0,0,76258561f7bdc822eccdbeeafbc62142c30393010515b59bd36d13db3dfea256,2024-11-21T08:16:34.520000 -CVE-2023-31528,0,0,424f6d85064ccc2aeae914f08f8355d76eb32654f487a8467d36b7af7d3d7cd5,2024-11-21T08:02:00.223000 -CVE-2023-31529,0,0,f0e35695691418d4dec774ea75f261c5534732cf5ae555842c0866c254dd0515,2024-11-21T08:02:00.367000 +CVE-2023-31528,0,1,5e0ac407c171e6d79543330153807b12dd0b8b88f1a16b3ec03f9b6d19f8fb2b,2025-01-27T17:15:13.867000 +CVE-2023-31529,0,1,a21c7d9a684766ef0495db5a31ac146a605708e6632389608f6662de20b7bb0b,2025-01-27T17:15:14.060000 CVE-2023-3153,0,0,3dac5c9e8c7817f4c5ff144086a66d106b21472b1e694119f96778f0a879c85b,2024-11-21T08:16:34.670000 -CVE-2023-31530,0,0,2fae295d708fe580539ddbe172e0574a57800334543cb377133ab29a7f73122f,2024-11-21T08:02:00.513000 -CVE-2023-31531,0,0,73f329f7740113f85ca0db0dd2e76e4ab86419f88f4d4df1f7434223fcae5c73,2024-11-21T08:02:00.643000 +CVE-2023-31530,0,1,773c640b7ad3bb762755d95dd4ffd8a838df2cbbc9e214a00e9609fefb91f908,2025-01-27T17:15:14.233000 +CVE-2023-31531,0,1,71c95805e4808ac809bead22ec1fd659d7a71e4b9ac6c709ab6042eba75f6828,2025-01-27T17:15:14.460000 CVE-2023-3154,0,0,f12e79b0edab5b714c3672e66ee998459e9439b4017d2975377b5b58e2779e92,2024-11-21T08:16:34.857000 CVE-2023-31541,0,0,5f43e93f9e91573768aef010f2dd479600781481967290b27c7d23c3054e2642,2025-01-03T20:15:26.650000 CVE-2023-31543,0,0,acd89f7ff8a60ad3a333e41c168630c9a8d84d8099d0facfb6903608880a21ec,2024-11-21T08:02:00.923000 @@ -224516,11 +224516,11 @@ CVE-2023-31548,0,0,9dd2a298b5b8dea10ec4226d5dde96f71c0e8b4f05bb1ebc8e2aa6ec30b19 CVE-2023-3155,0,0,48b61c646a094e90dc253ab9dbdf79b89fa98b30fb0d402353d971cb0c2ce10f,2024-11-21T08:16:35.090000 CVE-2023-31554,0,0,6330173d0cbdf170bffe3fbc80fdb4ff353d1952fb70eceef5ca3949c269d3c8,2023-11-07T04:14:20.517000 CVE-2023-31555,0,0,d525b1d2deae20646fe030cec5b4c1d0b61371f04068e2d8151dd3cd58ab3016,2024-11-21T08:02:01.557000 -CVE-2023-31556,0,0,7357d8cf44acb0da36e49bfb1e9d663f112bec22998bed36f0e51f19db6c0fc4,2024-11-21T08:02:01.697000 +CVE-2023-31556,0,1,3884f7acfa61bdc761a1bfd3338fded9cc64e8a797002678a76950268c6f8932,2025-01-27T18:15:35.040000 CVE-2023-31557,0,0,9ff81c72e5c99944b40baf92f5efc70583af95408712da3d96dd75bda624b581,2023-11-07T04:14:20.870000 -CVE-2023-31566,0,0,e871c886400ebd66446d3859338ecac61182d7101420a3f79ab1135a583d7062,2024-11-21T08:02:01.847000 -CVE-2023-31567,0,0,bd5d8de992a43d73ec75608eadc07f5a87c2d764e49c12e6d987a6adc631a187,2024-11-21T08:02:01.977000 -CVE-2023-31568,0,0,2a94cef32a460c46c54e6bf7baed4302e010b387a30baae3c629c416e075acb9,2024-11-21T08:02:02.110000 +CVE-2023-31566,0,1,23f9a558f62176fad46bfba0a706692f45e587d0a62799dd72ad569e0c19a50e,2025-01-27T18:15:35.240000 +CVE-2023-31567,0,1,97a4b43b08fa12114c3c4a699e1aa71a60c3a2a1739e8b8363b32fc2fe205710,2025-01-27T18:15:35.427000 +CVE-2023-31568,0,1,6088e6d5cfbf7a52352295f46a66ab468f7f9dab674b688535749faeead045ce,2025-01-27T18:15:35.597000 CVE-2023-31569,0,0,d077547b542d195c8f55da836f1c847ca9af82c0c370d8805e63fdff1b63da10,2025-01-08T16:15:29.143000 CVE-2023-31572,0,0,e7098774719d66b5a0a02084ed526feb7ef1e2e4076475b7abc938f374c3c6f2,2025-01-23T15:15:08.303000 CVE-2023-31576,0,0,01e7c0301dc42a340aa430911a48841247ee7d39206c03e14887589d56b04f98,2025-01-23T17:15:10.933000 @@ -224690,7 +224690,7 @@ CVE-2023-3190,0,0,7db86e04544f8eba511b6d963d5edd9521b55a2eef0f5beead6ede415eae6a CVE-2023-31902,0,0,4970407b0151e647b1b82c1825347a6db8937a2ca6f3d25b0a873338c17dd0bd,2025-01-22T17:15:11.717000 CVE-2023-31903,0,0,672e71598928bc83de5d90e02af4d013d4e062df79b7b118e381bc8f2a470b10,2024-11-21T08:02:22.280000 CVE-2023-31904,0,0,f318ebe4f1e995c606297cf984e3deb2bb7dae615c713345d091fe18a45204b8,2025-01-21T20:15:30.193000 -CVE-2023-31906,0,0,1590296e688e9fe8aaa247010cbdb299d1d8f018eb4ef5c7d242aa8db0b7a4a7,2024-11-21T08:02:22.553000 +CVE-2023-31906,0,1,aadab67cf767d0d7f94f9b2c6c9fcb1cc155aada60b8b6a419a0d0846b6786da,2025-01-27T18:15:35.793000 CVE-2023-31907,0,0,499f3cd90a76791b68a8afaa55122b520e5f406899634d10e3dcc99b6dc01b76,2024-11-21T08:02:22.690000 CVE-2023-31908,0,0,139c39aa0c7ae32cb32a7959314a2ee90226dedf13a661887cbe2b480137f543,2024-11-21T08:02:22.823000 CVE-2023-3191,0,0,6d5b8163594269d541d9b945b744164903108dc6d9fb58a1266c95089a1b3503,2024-11-21T08:16:39.710000 @@ -224822,7 +224822,7 @@ CVE-2023-32067,0,0,1a438f53a3d7481856538b460d3213e812429c3449af5aeb4c1c04c9a2004 CVE-2023-32068,0,0,e12d97137ba34ef1a8f1d585a2de30a00666102057092377dcc2fb5277eab4df,2024-11-21T08:02:38.940000 CVE-2023-32069,0,0,fc53d2e087dbedd7e939cca9a809435477a6c129dafa328c80630fec64b998cf,2024-11-21T08:02:39.053000 CVE-2023-3207,0,0,aed7226347c69fd8bfc1fe0ef2a511b1df8ba8632e54b1a24f4ba2428ecab33f,2024-08-16T20:15:09.710000 -CVE-2023-32070,0,0,1fcbbfc7de9d32a3a04f695cfb49cb730855e51abd01a6e6e931c18683d72ceb,2024-11-21T08:02:39.167000 +CVE-2023-32070,0,1,4ad789774727b7a1c26ceb7e9a23d45fecd61010217a74531217b6fc63fc56e9,2025-01-27T18:15:35.993000 CVE-2023-32071,0,0,5a89828bf698e1890f1003bba95964cea6c9de63d21bdd697ed94cc5b5552e5b,2024-11-21T08:02:39.280000 CVE-2023-32072,0,0,a05f266ff8ca54f9e27defde05f7a0cfaedcbec728519e353c5ea1c838f0a49b,2024-11-21T08:02:39.393000 CVE-2023-32073,0,0,b46b556ff58aedcaaf952a8baa67c99dda2e5fe6cbe37e2c6a2b3b60fa9a23b0,2024-11-21T08:02:39.513000 @@ -225439,7 +225439,7 @@ CVE-2023-32663,0,0,a788980c7b60a31fe4c1f4e34bc79d7b0ff65b16b7b79271d8727c4ee108a CVE-2023-32664,0,0,064dd9e1265142e48a3dc5f45b58aabb99b143a665cf5820e32230a28e7dfab2,2024-11-21T08:03:48.310000 CVE-2023-32665,0,0,034287426d5832e19ae58682852360c3e56dce47a5454f0bd1a1ee4057ec45b4,2024-11-21T08:03:48.437000 CVE-2023-32666,0,0,9344f89644ea8ba02b1266c39de9511998c641c2522a069b456e45a642a572a2,2024-11-21T08:03:48.577000 -CVE-2023-32668,0,0,f1e5cb1d4bd0c237d7fe038327d92296fceda9d72c026cd6600184de02eda355,2024-11-21T08:03:48.710000 +CVE-2023-32668,0,1,7c696af3b0f54cbc77f1c824882ca377aa25621d9fcf497e73dbb3b7068cc662,2025-01-27T17:15:14.650000 CVE-2023-32669,0,0,2751cd47d7aeee347abd951ac83ec98a03cd5bbf147410a8fb1ae165b07873d3,2024-11-21T08:03:48.870000 CVE-2023-3267,0,0,8913b949b4eab10183609320c13c519f524e04fee46edda94ab2756b4648e787,2024-11-21T08:16:51.730000 CVE-2023-32670,0,0,322cee038672d309feed5c353a890822fe4035390b26a1f1718875a8c5a0d2c5,2024-11-21T08:03:49 @@ -226797,7 +226797,7 @@ CVE-2023-34311,0,0,a93e4a6e12e53e897f90d598b9e7bc481d789fd2af799c57a1445fb0fd449 CVE-2023-34312,0,0,443247c34fb5fdd29ae4e4348cf5ce61af549f386bfc16c3b4b4ef357aec9518,2025-01-09T17:15:10.757000 CVE-2023-34314,0,0,78e82052be492c6cb71fedd8385b825ffb4f86961fede5bcf9258eaf01737e2b,2024-11-21T08:06:59.533000 CVE-2023-34315,0,0,d7e134dcc60888edf7812914f1fd263be02b8117a702f2bd76c4b4ac691e3cf0,2024-11-21T08:06:59.670000 -CVE-2023-34316,0,0,712701f3aa4dd7646f14528468aff56617b664d7bd54156f30fb2658c544a751,2024-11-21T08:06:59.807000 +CVE-2023-34316,0,1,e1d99c569a670017cde17d5e800a2863c775939e0a87b980880a6de31c35c780,2025-01-27T17:15:14.840000 CVE-2023-34317,0,0,4a6da1a33a5ab4c1869c1d7b02c6c5852d38d417ec979c6faa21773c5291bba5,2024-11-21T08:06:59.937000 CVE-2023-34318,0,0,6b9a1a5d0b8b652766c8052be84a50cb3974515b59c14bb09efc1969a0eff430,2024-11-21T08:07:00.080000 CVE-2023-34319,0,0,783fcf02574fb65df7c7585bd8dbfa6b385c91a41b20be9b8102c9053021301f,2024-11-21T08:07:00.227000 @@ -227738,7 +227738,7 @@ CVE-2023-35883,0,0,1e723e1a6d59575047eab3ce3444e746ff2622c5d1776b171d1151a445f40 CVE-2023-35884,0,0,18c3d22c18d47b7a585cf213aa70ca7b99505e03785725084d5822812652b215,2024-11-21T08:08:55.010000 CVE-2023-35885,0,0,9ca1f5f1779561172eaee3069b6e3eec6f3050b1039f21143b0b68665e5754fb,2024-12-09T19:15:11.947000 CVE-2023-35887,0,0,76a5831afd9a0cf68a148a72ecedb4d9f74013a2c1d65482318d9531cedc3be8,2024-11-21T08:08:55.333000 -CVE-2023-35888,0,1,9fdf7c421ec865773f38e3f577a45d6831a6864d4758ea608686063dbfc76618,2025-01-27T15:18:19.737000 +CVE-2023-35888,0,0,9fdf7c421ec865773f38e3f577a45d6831a6864d4758ea608686063dbfc76618,2025-01-27T15:18:19.737000 CVE-2023-3589,0,0,d4e4514f3594900f83558ac47011be53a0abfb4fdc67e271ca374ed1e8ec3bd7,2024-11-21T08:17:36.953000 CVE-2023-35890,0,0,433d02ca4cfc26d677083a7f98480f3491ee5b99d0da1e6d0efc9a9e16b48cbb,2024-11-21T08:08:56.057000 CVE-2023-35892,0,0,8eabf2f6b50eb1bf3eb04857e09c4cf1b264ae2300f41f7ac6297de2767c03ea,2024-11-21T08:08:56.190000 @@ -233415,7 +233415,7 @@ CVE-2023-42925,0,0,d2cdfc9934fba3521ca53b3953d07674531d44e76e318faa00d48bf43075c CVE-2023-42926,0,0,8392df43c2b4e28bd4ec17abdcb13df2d0cbcf9b6c0001ab69184a56ab75131e,2024-11-21T08:23:31.770000 CVE-2023-42927,0,0,14031071501231274e24e297950a9bf2d187da6694c43ed89fc9fa105221fcbf,2023-12-20T17:15:08.377000 CVE-2023-42928,0,0,09b31ffbb457522f85f851077716b61a6b3ab014cc929e3d598a183a03cc68c0,2024-12-04T22:34:44.777000 -CVE-2023-42929,0,0,94169558160f36066309836401abc8bcec607a9793fe01638e1c0e5f99958329,2024-11-21T08:23:32.073000 +CVE-2023-42929,0,1,22e391c78b0bc708ad36e097e0efa7984486dffc0ca1c4dde9bea2af85485826,2025-01-27T18:15:36.240000 CVE-2023-4293,0,0,9fec83a175e041c854dcb2a5fb9a0694cdd7b06bced71f7469a7fdafb589dbd9,2024-11-21T08:34:47.947000 CVE-2023-42930,0,0,c3000d0710eca7fcac206d7d07f55ef71a49336e4e8eba7db72184c755d073fa,2024-11-21T08:23:32.203000 CVE-2023-42931,0,0,1f1699814f13af297276399444ed2998af062ed9a892f7f5fa3b5215b4d8431f,2024-11-21T08:23:32.337000 @@ -233764,8 +233764,8 @@ CVE-2023-43551,0,0,a157c30beae7f42b7615b4b03b7b5aa84ccf826b2c2d379df2fc90f45c68c CVE-2023-43552,0,0,38cb56d152a8d870254bc3eaa790755a27f71e97952a9344763e34f6f72fbb94,2025-01-10T20:08:31.010000 CVE-2023-43553,0,0,682f7d23ef8b45bcf50fdf913eb41bf598d75002eaef8d47d9fc2f3b01a78ee5,2025-01-09T16:13:46.290000 CVE-2023-43554,0,0,ff9e342df67acc361772ce756ca6aa590135fd661810b5be1b959abd99f4154d,2024-11-21T08:24:21.780000 -CVE-2023-43555,0,0,5c8cd3bd5758e8f00854f3ced2a0991c790b25c5f96a0b2406374d870ad9ae03,2024-11-21T08:24:22.017000 -CVE-2023-43556,0,0,9c36c9570c30309af0cc558951802498dd47c746bdb31f671949b0d4c5ea42ce,2024-11-21T08:24:22.213000 +CVE-2023-43555,0,1,1a2b48b2838a7dd2a75ecd79b4999ef34a85e7cdb8cfd26ac65eecc1242a1941,2025-01-27T18:59:53.590000 +CVE-2023-43556,0,1,5baa9c2054696048bbdc5885b1f49e0805099b3a33616b99eb9f0888bda363c6,2025-01-27T18:58:31.183000 CVE-2023-4356,0,0,9719d22935ce167437ec0655a95c6618ec2beeebdbdc24d814c3720b3074151b,2024-11-21T08:34:55.257000 CVE-2023-43566,0,0,81571b84e500ab68959170ce2190e420c994b3c7934d24e3e7a8002218ffb05c,2024-11-21T08:24:22.360000 CVE-2023-43567,0,0,a35db43162d040baf942f97c5deae77b38054bc334ed451e01f58f7e6e3d54d1,2024-11-21T08:24:22.483000 @@ -236317,7 +236317,7 @@ CVE-2023-47148,0,0,125c9b6eff45b4c4f4e98898ffc8939f83bab8e9e7741dc73fd5013c70708 CVE-2023-47150,0,0,39b8e6e38790365133c91f98743cb6362cd9f47470d0fb8b0febb10399d2b26f,2024-11-21T08:29:52.247000 CVE-2023-47152,0,0,bcba57c6075b792d7c6cdc81b94418e9d986179abba79b9d2e8692a11a4bbb29,2024-11-21T08:29:52.370000 CVE-2023-47158,0,0,15f414bea2d2a1a9e4cade4c1576622ce6f6cb87ae101e48296a2d9c0094ad10,2024-11-21T08:29:52.553000 -CVE-2023-47159,1,1,37f2ba17452479059eca821b413951e8e971d7b14b3e1155d6ec2d0c5f4889c9,2025-01-27T16:15:29.593000 +CVE-2023-47159,0,0,37f2ba17452479059eca821b413951e8e971d7b14b3e1155d6ec2d0c5f4889c9,2025-01-27T16:15:29.593000 CVE-2023-4716,0,0,181493a0bc47d8b6179e4d7c992bfdb6e0ed0566be00ad76cc7e801ee98290ea,2024-11-21T08:35:49.137000 CVE-2023-47161,0,0,daeccb22b0ce16ed468a02cafa5602752c58c890bfe9c6e91d73aa4a0cf9b4c8,2024-11-21T08:29:52.717000 CVE-2023-47162,0,0,9399a8bd268b1083de4daf0bf90d8f0edb5f56b653ea68cb53c8ecf2c4beeb7e,2024-11-21T08:29:52.850000 @@ -239958,7 +239958,7 @@ CVE-2023-52289,0,0,e6a2e54dd3a1c3f4b065cdeb7cba7713e3add3ea64ff3d39a79ca5e040c82 CVE-2023-5229,0,0,18bbb0701fdfc1eb961720131b947089c1dc194f24cd377eeba5cbe489702c68,2024-11-21T08:41:20.133000 CVE-2023-52290,0,0,f81c1307f271823fe5b2fc9b059a6b49b0b523729ebd16ad87ea28109735272c,2024-11-21T08:39:31.530000 CVE-2023-52291,0,0,07bfceb67ee5ea6051410ea49ad7e6a77499d49c5dc75e901a99178dd8db6d04,2024-11-21T08:39:31.723000 -CVE-2023-52292,1,1,2888e8494b0d9dd8bcc835fa59297d8aa982fd13c5ac80d35d687e079ba17ad6,2025-01-27T16:15:29.767000 +CVE-2023-52292,0,0,2888e8494b0d9dd8bcc835fa59297d8aa982fd13c5ac80d35d687e079ba17ad6,2025-01-27T16:15:29.767000 CVE-2023-52296,0,0,f37bbfb20e2925224d0b3b1045f2a31ac4df06590656ad39807523ee035f1e98,2024-11-21T08:39:31.927000 CVE-2023-5230,0,0,3cf502703ae5b648f307f80b76738bfea8747ada0db2366c9923cb7b273a080e,2024-11-21T08:41:20.240000 CVE-2023-52302,0,0,3df11091ed3603d6054aae0b4f32b2cddf705616c93df1718ba0a0c79d96053f,2024-11-21T08:39:32.043000 @@ -240300,7 +240300,7 @@ CVE-2023-52642,0,0,05d60fedf578d1ba56385f5513e46bbdf0600669e68de5121a528e674c343 CVE-2023-52643,0,0,d50d31e5bb6a9cdf07b3e088fc3b5fda79f9ea816bd8b6d8c44559eebb408f0c,2025-01-14T14:58:40.580000 CVE-2023-52644,0,0,c34c6ce67f7bd1744e5ffb2bc7e1ab174b24b6c795ada11f0160dd6a25188de3,2024-11-21T08:40:16.333000 CVE-2023-52645,0,0,b7243e0650448847f32080e14db91cf203d54c57d7b28acbe818fbd2b13c53f4,2024-11-21T08:40:16.490000 -CVE-2023-52646,0,1,6ecde45ea86cb44e0829ef3156f414dfbbcea27ea88c5d6fcb6314e4210af497,2025-01-27T15:09:48.333000 +CVE-2023-52646,0,0,6ecde45ea86cb44e0829ef3156f414dfbbcea27ea88c5d6fcb6314e4210af497,2025-01-27T15:09:48.333000 CVE-2023-52647,0,0,e2976bef8bc92e0adeadd89937440a86e758817f278db22054eaa69f951695d6,2024-11-21T08:40:16.850000 CVE-2023-52648,0,0,bf327e16fd314087311880b9907320568dc951df7031e7a2a98e2b4c960ed3dc,2024-11-21T08:40:16.977000 CVE-2023-52649,0,0,a99e2d150671082fa4d3c37d35f0947b0eb528b79f37ab81343c41664ce0ad3a,2024-12-23T19:14:57.980000 @@ -242814,7 +242814,7 @@ CVE-2024-0440,0,0,9b41d4c42ff0b29e0c33a27150bc353ca04590e3373335ebb1c4da265e318a CVE-2024-0442,0,0,2ff92b8b200597432f6da5c6788d273b9eceb23b02f2972bbbcd8fd6e4cd3a3b,2025-01-08T18:48:34.583000 CVE-2024-0443,0,0,aeba6274837992658e2c4b7edb27871e8468430250a040ff0202a08869d47769,2024-11-21T08:46:36.010000 CVE-2024-0444,0,0,e6663164bed0caa54a1cce1846baba77384cf71afcffd2a64cf92ab0d873e3d8,2024-12-27T18:57:15.007000 -CVE-2024-0445,0,0,fdf465da519f470b46d3d155b33a739a4bb1a376e0a829e7b4d22f8adaaabf39,2024-11-21T08:46:36.333000 +CVE-2024-0445,0,1,7bdf4aad36e4a762070f2d5a62a4b8c11814b769ee88b7035b4639eded1b0516,2025-01-27T18:41:19.177000 CVE-2024-0446,0,0,8cd5e7f51f7c43d71d35806007add85f5722762bffd3331d410bf77bbd5badf2,2024-11-21T08:46:36.457000 CVE-2024-0447,0,0,ef82dbacc24448559fe1360e1922a6f76a74074d981e7a70149369df2daa3ad4,2024-11-21T08:46:36.667000 CVE-2024-0448,0,0,9120a64f9c77d8a38d373d6fe54e6100ce718af346116758489835a3dad287da,2024-11-21T08:46:36.780000 @@ -242873,7 +242873,7 @@ CVE-2024-0502,0,0,65b9c6e2277ad527c46de13484d465a9d3ec6b3d83639ed27f8935c88910ed CVE-2024-0503,0,0,49a9fa2cd07d0100f1301f9564e2bc30a1db68ed0af9da126ea778745aaa0f14,2024-11-21T08:46:44.463000 CVE-2024-0504,0,0,a4a5670dd43b4c4951ca0fd19083cea278f40faf4280f4c131436ab4dc63508f,2024-11-21T08:46:44.620000 CVE-2024-0505,0,0,e1ea2c5ba3f30f6d1e37c4060bdff171c4af7774d36a7b880c042fd8fef85fb1,2024-11-21T08:46:44.747000 -CVE-2024-0506,0,0,7eadcde6f87084dd140400f6715af827aa77b0f019b7df6ff5a4a8fb444b3fa1,2024-11-21T08:46:44.900000 +CVE-2024-0506,0,1,b20612a093e87e8164b3c4e3924d68d1d6ef8392cbf834bbd1109ffc5821875a,2025-01-27T17:38:46.180000 CVE-2024-0507,0,0,8322a70980417a75f0e893a752f20cd011a4b7d18c19d1e5d5c502fd3a1c7f0f,2024-11-21T08:46:45.020000 CVE-2024-0508,0,0,fb828139575889ebf62082bb28f21b390e9aeefcd9be5ef3ca074ce162a9d94f,2024-11-21T08:46:45.163000 CVE-2024-0509,0,0,ae6f4a89df25ecefd467b1e4b1ea8e47eae1d8bde1afc12005a53807d3d0f514,2024-11-21T08:46:45.313000 @@ -242980,11 +242980,11 @@ CVE-2024-0612,0,0,da64d0a677fd45a04382f6cbc2c145ee6f8fef3954e4d1e4ac27b2a8c4b9f2 CVE-2024-0613,0,0,da8643fc97b531c82d214469e3fab5ad51b81a35aa2fb83e969424e9e3503eb0,2024-11-21T08:47:00.130000 CVE-2024-0614,0,0,dc816c1d1fe6c5ffb6e3062f78c2256eeacd0ce1d937e1db26cea3016e29f597,2025-01-23T19:50:24.627000 CVE-2024-0615,0,0,16b5c5decb6d71dbe6d785869f09134f288020b8bd331b22733ef8d16c4513cf,2024-11-21T08:47:00.373000 -CVE-2024-0616,0,0,2d69fd8d6ceb0a472770c88c5b9765122553ff56ca45c5743d54383bc7fef52e,2024-11-21T08:47:00.490000 +CVE-2024-0616,0,1,b4aa1ac27c7ccbe9cff211329f2e6e452d4a75b64f512e2a799fce4b6ce5f5ca,2025-01-27T17:30:18.190000 CVE-2024-0617,0,0,efd125e5b2fb1e127ba81b6d2e9a7eb42489f0212a325253773851856ce45da4,2024-11-21T08:47:00.617000 CVE-2024-0618,0,0,c8d16847fce9f2cb03aec797634d2ee65c6d6118d484ea1e5f62d29664b2ea49,2024-11-21T08:47:00.750000 CVE-2024-0619,0,0,4ede4c2ce234de077beb2d58c2dd52c1638a5586c5e1ad672034f0e43cb50038,2024-11-21T08:47:00.873000 -CVE-2024-0620,0,0,355a1e00d61f9961beb511b92f493f468e3689d021c591b9b0d4e0b327edcc47,2024-11-21T08:47:01.020000 +CVE-2024-0620,0,1,01a806fc8fc8f79aae8137b86300824b12d7d0439315b4c96502fc26c172ec9e,2025-01-27T17:28:48.890000 CVE-2024-0621,0,0,83f0b75f1444310875240348160756eda3d14c967d83395652fdca0e3f1d1cf9,2024-11-21T08:47:01.137000 CVE-2024-0622,0,0,bef0e087ddfd4a0233efb4c38eaf0e60aea1ba239bed5e5e8e26c084ac2ea3e3,2025-01-23T16:52:07.417000 CVE-2024-0623,0,0,dd5f29435e15338dc985fb5551595a6e34d69131f116d209222d2e5d483144bc,2024-11-21T08:47:01.423000 @@ -243014,7 +243014,7 @@ CVE-2024-0652,0,0,195ef012775115613d9039d9144603ecee045545d38386a198ff35872771f2 CVE-2024-0653,0,0,51845d977401db0a3d03b464375ca482a4cd9bc2564fb92ef482448cbe700ff8,2024-11-21T08:47:04.787000 CVE-2024-0654,0,0,f5c9c0cc6adb45c4ee4ccb32c94a93e5b4b752ebb5ff8e90536da2b68b43d7c6,2024-11-21T08:47:04.907000 CVE-2024-0655,0,0,b45ce71828f08de5e906828c46c08f690573b8e416f2e010774f774288516f19,2024-11-21T08:47:05.057000 -CVE-2024-0656,0,0,1d7ce5c43cd9bcc89c56bed945f1189546264eb91e03c04ac0c18e510b9c3c36,2024-11-21T08:47:05.200000 +CVE-2024-0656,0,1,95391c4536a389d37f451ebd2930637a96631797f5ee6bd41f68ef3899f9f6f3,2025-01-27T17:24:42.410000 CVE-2024-0657,0,0,b5ce6fbcc9ad9c2ff39fcf9e66939ed62391e858e4a9f088a94fb15f49f59acd,2024-11-21T08:47:05.317000 CVE-2024-0658,0,0,9d86f25a746c2b8f08c389777490fe30f1744ace84d342e24ad642f0e78263c0,2024-11-21T08:47:05.453000 CVE-2024-0659,0,0,fe8a7eaab418313bc1e5318a9e1e5584a603d18b7cd2eac82b660bb45fec8a85,2024-11-21T08:47:05.570000 @@ -243144,7 +243144,7 @@ CVE-2024-0788,0,0,2afd42c91f1ba605a388b96bd23d5fd03abd028baced8b7385e1ff2c835e1d CVE-2024-0789,0,0,c67600573ecc3097c77788c6ae0cda6357f8e3377d052d819e0c319176f4a361,2024-11-21T08:47:22.570000 CVE-2024-0790,0,0,737fb3d65258b865fce83a1bdac88a418a748a3a7952d1530aa38cd1d1b67af4,2024-11-21T08:47:22.687000 CVE-2024-0791,0,0,c7daf57c81003d1623a1cdc030e906bc63c4d9e999bea45556a9ddce550a5b89,2024-11-21T08:47:22.820000 -CVE-2024-0792,0,0,5100291c23d13e8d087da03dd004872a471999150c8f544a4585283fcb1be43b,2024-11-21T08:47:22.940000 +CVE-2024-0792,0,1,e6f5ace211daae4cd08c801713ef9005ffe3299712d196e6ee04a21445d865da,2025-01-27T17:20:20.283000 CVE-2024-0793,0,0,ce235ac83142af1cdfa6c4408664e6f09ddfc183684d5936a2a5d8110b209ab7,2024-11-18T17:11:17.393000 CVE-2024-0794,0,0,18f798efc59f934bba3cf36f2d7f72c5a3048eda2b00aded39f663641c84ce77,2024-11-21T08:47:23.237000 CVE-2024-0795,0,0,302be25990a4b50df56d03c5f622452d4de374b3d6aa16e00526f305cc17a11d,2025-01-21T15:06:36.627000 @@ -243629,7 +243629,7 @@ CVE-2024-10355,0,0,edd144d42239514a5040e45977c91b9661e0e5e1ef732ff2d1a515e8bda77 CVE-2024-10356,0,0,c3e482948a6c3b0414b5e4eefd2b603eabb27c390a3ec36c480e9a647e34cbb6,2024-12-17T13:15:17.520000 CVE-2024-10357,0,0,f74db7863bca5ebee822970d3cc478c034d37a24b722ae5ec1659b0e7d8c1550,2024-10-28T13:58:09.230000 CVE-2024-1036,0,0,d25b8d26af000f07669729b06ebb447206ede2960015e2fed660e23eae75a886,2024-11-21T08:49:39.210000 -CVE-2024-10360,0,1,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 +CVE-2024-10360,0,0,49b9d570c045e2259e89921d406064d5e455c0a7c41e77df302b1e3e299adf2f,2025-01-27T15:19:13.047000 CVE-2024-10365,0,0,4fe48020ede3297b6900c2d074afa9cfc695d825a2faa2d82338ba40f9460ff8,2024-11-26T20:36:08.280000 CVE-2024-10367,0,0,047cdf86e80e6b3edd3a8f103515455deeb9cc4fb024de212789283fdbccd2cb,2024-11-01T12:57:03.417000 CVE-2024-10368,0,0,1229bdc9c63256465d1d199349299fe27e9ef0d56f2669e496ca7acd06a3962b,2024-10-30T16:46:30.783000 @@ -244944,7 +244944,7 @@ CVE-2024-1182,0,0,3f29301d892b117e83ef161f22ec91ec635f3f594205a460782ee4e3d4d857 CVE-2024-11820,0,0,851b7a45884f50f3792038cee6a0dd94b1414d7c7c3cad4aa15d26efb61c7827,2024-12-03T14:54:20.297000 CVE-2024-11823,0,0,c06b322c55c56e39da841e24dcfc245d4bbf700dd82f0350363e4100fb063133,2024-12-06T09:15:07.463000 CVE-2024-11825,0,0,96c5070e436ca13c0f485f1de873107f18b277abea2e3dfbe2f45da01b02ac60,2025-01-25T08:15:07.190000 -CVE-2024-11826,0,0,fdc4af07f6e7b5ee0b73f4d7d8a1219ddc213ce8e610dc5dd959d6ea49e4b678,2025-01-07T12:15:23.200000 +CVE-2024-11826,0,1,714757b0f1ee90efb73e13391b9bb62ff3eaf1b93791e1acd0225d6c5a53499e,2025-01-27T18:15:36.540000 CVE-2024-11827,0,0,56fd4585b95b5b001b477bafaf482165d34a68f8e4c23484879244ef8898da04,2024-12-13T12:15:19.050000 CVE-2024-11828,0,0,2182fcc94d5c2924b387611eabcc64629aff0d6ea201e85bc92b19a7228cc503,2024-12-12T21:07:04.270000 CVE-2024-1183,0,0,65ecfa5c3d2b221c19281f6b798c6cc7087d171223e10f3dd191314d09620aec,2024-11-21T08:49:58.950000 @@ -245671,6 +245671,7 @@ CVE-2024-12731,0,0,9ead76fed676036ea4435e20b944f4e5fd453782f229b14d9e0b35b47567c CVE-2024-12736,0,0,27dc2dca8ca80ab2c2f7728100c1c2ef462b0b1d9d1f7583591ae4131d8f4fb2,2025-01-09T16:15:36.680000 CVE-2024-12738,0,0,0cee8c1793928a32af812059d0c46039bd10d2c94f791e505cd74a43ef658897,2025-01-07T13:15:07.357000 CVE-2024-1274,0,0,8b1ee7c9f6e7817a23a525a715cd0c1ef18c567c26c711e49e1e872df04cda9a,2024-11-21T08:50:12.730000 +CVE-2024-12740,1,1,e5eb6d2a3bfe5e6895da621e98060e8342c616619238eca0bf7b4f7d8ca5daa6,2025-01-27T18:15:36.743000 CVE-2024-12741,0,0,c9f183fb88063863d511dd9a34a59e6fd50d2f3a53a8fd3b665d83eeabe6e5e3,2024-12-18T20:15:22.390000 CVE-2024-12744,0,0,db2cef6174f0f203336fd1a602951ac160bef125d0730a8230a23f49ec8a87b4,2024-12-26T15:15:06.290000 CVE-2024-12745,0,0,d39132eefd07723f30fb227ef12fb8aaf3a83b250d0f3b28d89ab1e076f94541,2024-12-26T15:15:06.527000 @@ -245685,8 +245686,8 @@ CVE-2024-12757,0,0,001b6506f2f8c2c25161ff7428c9761e0eb53687dc4724791aa2f4c1d0893 CVE-2024-1276,0,0,7fd672f8ab2d0313a55eef11978a3cbaaea942b78d4dfb1702b583b731b53a9a,2025-01-08T18:37:36.067000 CVE-2024-1277,0,0,fdccc6e1d66b4b759fea691d8a9a7ad4f8cc0afd5b2fb224e654b3bd9de12942,2024-11-21T08:50:13.170000 CVE-2024-12771,0,0,adaa7480d8738512efdcfd2f9f87c67eebbb8482c06b61f78400b2b84e02b742,2024-12-21T07:15:09.997000 -CVE-2024-12773,0,0,b7dc1716c8eea97c30add684f80026b79afc5415bfe8900c9ca4108d7f69e8bc,2025-01-27T06:15:22.747000 -CVE-2024-12774,0,1,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000 +CVE-2024-12773,0,1,3b6ccba6d5a0d86034acd0b69772715b708483a05c85a38abdbf411e59a1e181,2025-01-27T17:15:15.290000 +CVE-2024-12774,0,0,831f06cba5c40ca0ae40312b61d66a0fcc179465b4ec30109a7e37db55ec771b,2025-01-27T15:15:09.803000 CVE-2024-1278,0,0,304f88731c9c2e93f283a152f19a1ac852d3cf0fda0d38c9b82c242ac4604519,2024-11-21T08:50:13.287000 CVE-2024-12781,0,0,c74d8fa49d4e1ce3b752d35981d8b052a93e3f1d0fb27ff932f88f085f9b3bc6,2025-01-07T07:15:27.937000 CVE-2024-12782,0,0,a220a59df3c04cfe812d51b3c5d226e092dd063fd83863ac7ea9515a10725c6a,2024-12-27T08:15:04.917000 @@ -246260,7 +246261,7 @@ CVE-2024-1385,0,0,8d44f2ddcfbec761b90cec48d83e59f97d1a3c53ec848ed4ca09c1c2ed0050 CVE-2024-1386,0,0,0e88f4287d62ff6aff092302a9322ab713c8f07c6df5c6bed70e82252a8c824b,2024-11-21T08:50:28.063000 CVE-2024-1387,0,0,2c2f906637a61e38d38a9b0ca47ff4dc68c131d6fabb5f801315dfb2710ce089,2025-01-07T18:19:26.400000 CVE-2024-1388,0,0,4055ac29f5fc98e5c697dde8e9fd854a4a3e80aad935e1d1af922e2721330e53,2025-01-16T15:18:18.140000 -CVE-2024-1389,0,0,b25b6abc60548dc828f768ac6223a8aa030bc79b26b12ac2a18f098c1e39d1c9,2024-11-21T08:50:28.477000 +CVE-2024-1389,0,1,5e106d42b9fb09099831b6a056f4b884865b5f8856261bf266df1d2c53b2b342,2025-01-27T17:15:51.567000 CVE-2024-1390,0,0,4f3d9af8e4f645cacc042445b3c6c1015224ae23e87226c88c372fa7ef3e2644,2025-01-22T16:49:11.553000 CVE-2024-1391,0,0,fccbf24dfb651f372e2b51106217c90f4de85c1f936edcd91290184be12fa7b9,2025-01-17T19:52:57.843000 CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000 @@ -246651,7 +246652,7 @@ CVE-2024-1804,0,0,ac920f0514ab771b01277f413454aa542e7f03ee80e295a638eca8b6dbe9c7 CVE-2024-1805,0,0,ed10fc350751db7f4a95ffe560e12f60d492aa960fd0952807dc20c063b17638,2024-11-21T08:51:21.657000 CVE-2024-1806,0,0,cbb4f05e9915b2f71858faca723a06d4f1d1fe60ea7078c155499bcf18f29eb1,2025-01-23T19:51:58.287000 CVE-2024-1807,0,0,1f050d82d9f7a8122ed9bd1e63940675cf7b6b311e95ffc3270d6cdf7c01abb8,2024-11-21T08:51:21.910000 -CVE-2024-1808,0,0,22a2a1dff3d5fb32be4beef84322625993ed738cb82e673a1fba210bb29d5e9f,2024-11-21T08:51:22.030000 +CVE-2024-1808,0,1,df600e2d858a8b008d5588690b7696b2139695672fd4f2652937be7768212b4f,2025-01-27T17:44:15.527000 CVE-2024-1809,0,0,0695041dcd7996a752289634ae1652884b129f864a67876e9d511662212797d0,2024-11-21T08:51:22.140000 CVE-2024-1810,0,0,ef1b9d193b4b6ae88eae6ce0797e5ed9ebca91266d6d772b21365fa841ac4299,2024-11-21T08:51:22.260000 CVE-2024-1811,0,0,b058165d481733ff2f566034bd46cf5c38d757de178902f334844c3785c5239f,2024-11-21T08:51:22.387000 @@ -246700,7 +246701,7 @@ CVE-2024-1857,0,0,c5708d7f5b9aa52c50a089d9d955a2ad47405cd7286310e3cff153bb8ed9df CVE-2024-1858,0,0,37ac7b6ae641e6c33c9b784bc122314ccc3244d9e54ac1ed1c1eb9ce9272259b,2024-11-21T08:51:28.283000 CVE-2024-1859,0,0,68ed486ef8bc590af7f4ff2d77e8196bc5c8bb0caadbf80e7533449bb6bd0fd3,2024-11-21T08:51:28.423000 CVE-2024-1860,0,0,69be72e1c5a975e886b36f4274d3c53c2ee78083f2896e4b433e83abc3b14705,2024-11-21T08:51:28.567000 -CVE-2024-1861,0,0,9f754a796967e9b0ae6c09a3d15f65026ed1d42df6569e722178e7b9fda3b0bf,2024-11-21T08:51:28.707000 +CVE-2024-1861,0,1,2611d5d5d1b16c9183549a9cce1329a1665c4cae13a6be9eaba78a7b8e70adae,2025-01-27T17:45:40.267000 CVE-2024-1862,0,0,e172928a6f588b2c6d387317cb3474f1c84fac7de03055b99496b5e178eb7bc0,2024-11-21T08:51:28.833000 CVE-2024-1863,0,0,2458870e577036f8a527ffe6fedc1f5705014e9e40ac75930eea1e073fcc83fa,2024-11-21T08:51:28.963000 CVE-2024-1864,0,0,7540eb10c79c4178ff1d3d38ada50b4803bad985e5def6b198e727bc83e258b4,2024-02-27T22:15:14.807000 @@ -247982,7 +247983,7 @@ CVE-2024-21306,0,0,2a370a0aee5d92bbbe454d1fdf5ed058cd5c6c363a0e02cdc4a816823a09f CVE-2024-21307,0,0,6dc2710569e776546cc4f624cada8ba22376217566b47669f18adc9d69851b4e,2024-11-21T08:54:04.307000 CVE-2024-21308,0,0,f6a379d41c4cd5133050a31bdc4ca5e24f06dd737032839685d9ee434bfbe4a1,2025-01-15T22:44:09.030000 CVE-2024-21309,0,0,b3bb2afb81b8de5377de8c6125fbd52c99c699ccbea021f8b9db6bc7ca4cde8c,2024-11-21T08:54:04.583000 -CVE-2024-2131,0,1,70dc621cd4bbc2ffd43873ae60c48379095e55f2d69c7b86131d4107abb5914f,2025-01-27T15:20:06.373000 +CVE-2024-2131,0,0,70dc621cd4bbc2ffd43873ae60c48379095e55f2d69c7b86131d4107abb5914f,2025-01-27T15:20:06.373000 CVE-2024-21310,0,0,07e8f724d65a59640e46d5cde5e1148b80be9e027bb9661a3d8d6a1b12f33d89,2024-11-21T08:54:04.720000 CVE-2024-21311,0,0,4d6ad1816d0e66f3c61e7cdb92c11956c9e3c55be6ee8b7971fca359d0bb88cd,2024-11-21T08:54:04.860000 CVE-2024-21312,0,0,6bf7a111a639274be7bd1d96a6200472536c850ea46f2604e81064d0b20c2d44,2024-11-21T08:54:05.020000 @@ -248165,7 +248166,7 @@ CVE-2024-21474,0,0,b218af169c2e642b7eda7e04073a0efc6ce23a0bfafa6d2b17ba8b2205214 CVE-2024-21475,0,0,22e0c8b776cd8b4a3b8dffca5d971fe163b405bae692ce8d8c3447ff2da1356f,2025-01-15T16:57:17.370000 CVE-2024-21476,0,0,88f3b2624b73b0697d276a0e46a8d8f264f7f50721a37e526fe88d7f7eae3c20,2025-01-15T17:00:19.113000 CVE-2024-21477,0,0,b2675437622e0d5f1cc569cb7fa38a901ff4a03f6aac0073de9ab7112df630eb,2025-01-15T17:00:29.310000 -CVE-2024-21478,0,0,a8652e332d82c93fca77d4a10fb19864ab4c85990635f7e7d1f01e3098407881,2024-11-21T08:54:30.713000 +CVE-2024-21478,0,1,ed7da09478969853d2a9e9eb71a534fa701b0dd3e8260407e5a4888f703e0f3c,2025-01-27T18:53:05.400000 CVE-2024-21479,0,0,7917a657bcc25ab15a194a0d5e758d5fcfd48d3848dcabd8e19234546501acfb,2024-11-26T15:47:07.733000 CVE-2024-2148,0,0,7c6d9ed06ebe7f3ac05f0329e7ecbe181d9dfb173742a354ca3facf292345f55,2025-01-02T20:15:02.697000 CVE-2024-21480,0,0,7cb197fa3eeea32305af2921182eb1592c053441ccb82b6ebb37c0c2e06d8e7d,2025-01-15T17:00:39.003000 @@ -248238,7 +248239,7 @@ CVE-2024-21542,0,0,e36314e0d3629ecf9734bb5ba8a685163900633286b99b2fd1cecc21e5922 CVE-2024-21543,0,0,68304a5533fa87bd25f6b9e8eef51a7d0e0430fe8ba6353c974e145fdddfa801,2024-12-13T20:15:19.613000 CVE-2024-21544,0,0,b52a261160b7bd90c6a69309c9d714496ee1314561724f9272d6d2fde718e486,2024-12-13T05:15:07.883000 CVE-2024-21545,0,0,12417d057214273e4a76243ffeaf97d513746844d668a1420616fa022f5af746,2024-09-26T13:32:02.803000 -CVE-2024-21546,0,0,ccf9cf2077634b9a754069c86cb64327c95fa159e3fcb98c285112c30f8b64a1,2024-12-18T06:15:22.850000 +CVE-2024-21546,0,1,3ea5e480180e9a32c7d44b675d39ba094630d4767cbbc0ceeadcf4b6436e2293,2025-01-27T18:15:36.990000 CVE-2024-21547,0,0,4ab55050078c8543cab81c74bc4c8135319befe90d647e9f05452836831c5bdd,2024-12-18T06:15:23.187000 CVE-2024-21548,0,0,64a07c921575831d75973f97352c3ae7b31e7fcbc6055b89c564893bda5b7deb,2024-12-18T15:15:09.947000 CVE-2024-21549,0,0,8f4cb02307903c6bf1e01a95a2138f188757fcec6cd395d3364f8b42ba605834,2024-12-20T17:15:07.983000 @@ -248636,7 +248637,7 @@ CVE-2024-22025,0,0,87aa7a5c474a1100d38041a0ee3808e7b8e61bab104dc2e3bd348952332c6 CVE-2024-22026,0,0,95ce485539115bc058c0d5e366224e51c8b45b49a0d3c411939b9a286d310745,2024-11-21T08:55:25.470000 CVE-2024-22027,0,0,a7c9d5934453bf5491b14a748b6f63eed219ee655c259739b4569f7e9106ab3b,2024-11-21T08:55:25.607000 CVE-2024-22028,0,0,dc1d72f35c957d83174df179949d0c9b62a42ce5572e7016a9a9c3503481ee68,2024-11-21T08:55:25.737000 -CVE-2024-22029,0,0,e86baf8ff5400263175f0ef817b503104add6d3b793b55c233ceee68af70ac9c,2024-10-16T16:38:14.557000 +CVE-2024-22029,0,1,61b99797aa6a231a618162f9f5b74eca0d25567efbf111a10b650373d323aaba,2025-01-27T18:15:37.237000 CVE-2024-2203,0,0,60f6909e8cbce0dd59e60f2c5d1689346b33bbb4517abf9349fed4a4ff3f3873,2024-11-21T09:09:14.967000 CVE-2024-22030,0,0,e02699b846d34a18e8b7b6cf5888c535b133634cfe2a017ed58e28205a0d0b6d,2024-10-16T16:38:14.557000 CVE-2024-22032,0,0,beac3563a832af7ad2bb10e838ed7f4dba057a283ad9b47518d8f50d442b7b4f,2024-10-16T16:38:14.557000 @@ -248667,7 +248668,7 @@ CVE-2024-22060,0,0,ed9ba15c4f298a42f28462f758b92465c987f6953d9ba6f5dbcd801f1adca CVE-2024-22061,0,0,4e49e7ee2ac0573d3a15781d9f6f6ecd7315900601a66368e5ff6a2c6b1140a1,2024-11-21T08:55:29.030000 CVE-2024-22062,0,0,8f0ab471e668cd03b7a1b3138c26a2962a23ff1e52eff23da6e303d3cb6a8e23,2024-11-21T08:55:29.160000 CVE-2024-22063,0,0,7d585c54d344b35c25b14dd6e4b594e16f46eff3d63d49f66743e986349f5ec9,2024-12-30T10:15:05.867000 -CVE-2024-22064,0,0,ad28116f62ca19a80c4fd8673772e8fcc6cd9a557307c4207fd4220047cbb8d9,2024-11-21T08:55:29.303000 +CVE-2024-22064,0,1,2be78486e8e3524e7e8b54bc8f0a5b3a271a4cb62525cfad97a606fa124e9d55,2025-01-27T18:36:59.497000 CVE-2024-22065,0,0,8a400892fb4ac3179312529b18e607bbeae86e4a03e4887764863d7ef61cbee4,2024-10-29T14:34:04.427000 CVE-2024-22066,0,0,70d4e3985898c8aa9a39f7f36b8d64c8bac198bd9861f8715ebb57132067fd4b,2024-11-08T14:31:32.933000 CVE-2024-22067,0,0,add51247fb7aba56da0e38fb655dd5fa3255e9b0defa9f5c297e2ca7bc9d5649,2024-11-20T16:24:47.843000 @@ -248692,7 +248693,7 @@ CVE-2024-22087,0,0,ec802683c5b66e52af14e7628ea08e3ca753e0f7613afcd6c141ed5e6585f CVE-2024-22088,0,0,1b4567f28bc62e821780e1476d393aa95092e316c51213253216ae85b00a6597,2024-11-21T08:55:33.300000 CVE-2024-2209,0,0,43898b6a7f163b77384dde920a53e0f2dea9f1872d0d31a7c7ecd456628e1dc3,2024-11-21T09:09:15.580000 CVE-2024-22091,0,0,b5fcbd2160b42d3585f87864a6840fceb16582d160dbc6d454cdb5078b82cf19,2024-11-21T08:55:33.560000 -CVE-2024-22092,0,0,f337183cdee090eb19e704b98152af8a52f8fb7e458cc5961189cc271f1a91a5,2024-11-21T08:55:33.710000 +CVE-2024-22092,0,1,704a99d216ddf8ab9a3007bc2a64311666a7efb91cb5eebdc58472bbd093a0e2,2025-01-27T17:54:44.350000 CVE-2024-22093,0,0,133b0ab8a6c7340551886bd8b8803da10389803d7b94a19b6ca0f817657389f4,2025-01-23T19:51:12.397000 CVE-2024-22095,0,0,823722593447e76106cea3af54bb05d5ea050097c39ce1fa1632c4d0b2fc5ecb,2024-11-21T08:55:34.007000 CVE-2024-22096,0,0,c4602d88323b3424c44a18b3f76c72f6c73d14d53cf003d62bcccec494853469,2024-11-21T08:55:34.197000 @@ -248774,7 +248775,7 @@ CVE-2024-22177,0,0,763cc0fe9d4952aa804847af201c74da8244bc525a37db0e20ac1d192cc98 CVE-2024-22178,0,0,927af9a01f624b083cafed023c6818824e5a1ef8df6c48ecb2d2bb95bf7671aa,2025-01-23T16:57:16.747000 CVE-2024-22179,0,0,2b801faed759802b573f8a221bc335b3eb337f69cc84bd6f5d1a06164391d29b,2024-11-21T08:55:44.090000 CVE-2024-2218,0,0,424b1f62fd21e878c4d4af5731bddc2a60c6650d7ec1735a477b3efcab867815,2024-11-21T09:09:16.947000 -CVE-2024-22180,0,0,ba5889c40f761c602409812708cfd0c01c2eb40e2d7677b7f8968864ba82c69b,2024-11-21T08:55:44.260000 +CVE-2024-22180,0,1,eec6899847f68fcb904a1e50563ead2d05a754b9499da5083b6d7294326fa5fb,2025-01-27T17:58:03.073000 CVE-2024-22181,0,0,865f27ea93b2f4cd418fa82e296f1730f12a178923e6676e37a31e9d007a0fe2,2024-11-21T08:55:44.390000 CVE-2024-22182,0,0,7ac8d878e2d4ca5a283cc9615664edc83ce6d44c467cc8255966406901629afc,2024-11-21T08:55:44.573000 CVE-2024-22184,0,0,45f7a467f5284ceeee92cbe2680afa39da382fc612e5638f1e76475e9d85c283,2024-08-14T17:49:14.177000 @@ -248912,7 +248913,7 @@ CVE-2024-22310,0,0,dd859d6b306e0c9874ff3f33a829690f44f8dffe8aedd8ff6cd5b1b571687 CVE-2024-22311,0,0,3a63d6bee662ba0a6f15b807c0947fe7a1e5a2631da80da5e7333d664c69e682,2024-11-21T08:56:02.480000 CVE-2024-22312,0,0,2d6d3b890becb8a03981f799e8b5044e1f347c4412e0821c61a022cf4e163ae7,2024-11-21T08:56:02.603000 CVE-2024-22313,0,0,ddd1d33bfc1b5af1520350c2c7005426db2b2a5d727ff982649017ed5b9c287c,2024-11-21T08:56:02.770000 -CVE-2024-22316,1,1,dc085e3ed5915890c6053d11530b220073d391856575fdc4da02f3d18c8018a9,2025-01-27T16:15:30.637000 +CVE-2024-22316,0,0,dc085e3ed5915890c6053d11530b220073d391856575fdc4da02f3d18c8018a9,2025-01-27T16:15:30.637000 CVE-2024-22317,0,0,b3b9afe087a314d2d9a2da4cfb50d8e65a45b5deac79991b6f88cbee779b8b65,2024-11-21T08:56:02.910000 CVE-2024-22318,0,0,aa4fd17a016da578c4e40f8bf867f49d73509a0efd564d0d9ff3a305b818b22d,2024-11-21T08:56:03.063000 CVE-2024-22319,0,0,94c8971dc172b8316a6a132bdd3732cbb8e1ee1ea0d1539ebe9e0956f604ec80,2024-11-21T08:56:03.247000 @@ -249087,7 +249088,7 @@ CVE-2024-22546,0,0,997003eeabd55afd13ddbeebe6550d7262d8869e557416789e584a9094c3b CVE-2024-22547,0,0,0133090a54f8606cef07626b9e620f96367b93c79f99ca3bc075b2ce0712def3,2024-11-21T08:56:26.220000 CVE-2024-22548,0,0,3bddf409ca88fc0749d327d45cb0d00ca337c1ce8636699dfaa665651c15c3fd,2024-11-21T08:56:26.440000 CVE-2024-22549,0,0,675ffdd8f168a9762f5a79b4cbe36a992bd2d143f3ddef6a0f310cd9c0117265,2024-11-21T08:56:26.580000 -CVE-2024-2255,0,1,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000 +CVE-2024-2255,0,0,c38a1053c701220d5e01bbcf68bc70dfa4b5faf3090ba50a446a2c7b031db66d,2025-01-27T15:26:09.810000 CVE-2024-22550,0,0,ed96f0a80d539bcb01e0ab9294d11d1f803860b0b0bab7c55b1fed5ab75147a5,2024-11-21T08:56:26.723000 CVE-2024-22551,0,0,1e93c60dd52f09f6cd2dcd56d4a711553385c5433699e8ae1f44fe69a35bc9ed,2024-11-21T08:56:26.960000 CVE-2024-22559,0,0,36d8d40d85cf4ef45bc2b02dbe49188c093e02a56b7d30ed2946edd5a0d6608f,2024-11-21T08:56:27.107000 @@ -249323,18 +249324,18 @@ CVE-2024-23121,0,0,f927b1f7d7032f240c6a22fe10e3d2651315dc82dec1abe13791c8df2c776 CVE-2024-23122,0,0,ea802f83148f077bdcacee0853bb097b88aa7ceae9c8e0c76ab719a3e8347479,2024-11-21T08:56:58.993000 CVE-2024-23123,0,0,89e1dd12c90aff262f16a0b9365760f22dc8506be190b933a3cedf3239423eec,2024-11-21T08:56:59.180000 CVE-2024-23124,0,0,cf624f3b7cab7fb6fee299c2ba5a965e125ffc8d32f57a5bc3192c1a58f0ad11,2025-01-17T18:15:25.030000 -CVE-2024-23125,0,0,554e34bed34462f3c5363e8b180e04e5c1d1cc8bc89dab422d642a824457d1a0,2024-11-21T08:56:59.570000 -CVE-2024-23126,0,0,f8e5b5479f3c4daf2ec0a157b4f70ad1b3649cbac015e49b433a4827e6695343,2024-11-21T08:56:59.750000 +CVE-2024-23125,0,1,da781c693b4317a80e1df4fcd91718ac887a899e618a773fc568b137eb28ae4c,2025-01-27T18:15:37.520000 +CVE-2024-23126,0,1,94b86fa0654d11cc11379fa4fff40550cc0630f184b5f46acfa47287368e03ef,2025-01-27T18:15:37.747000 CVE-2024-23127,0,0,e62634191327f3ef7db3dc55bd00ca620754343e9d8fb17493a6507775a8363d,2024-11-21T08:56:59.940000 CVE-2024-23128,0,0,721887667bc8513179e29debbca47f752081fcbc7b408e8c31d9ee2aad4cb4fa,2024-11-21T08:57:00.140000 CVE-2024-23129,0,0,cbe975e4951e977946e402e753fe153b47c31f85b23f6c54227e57f5a1cfad7a,2024-11-21T08:57:00.327000 CVE-2024-2313,0,0,4de26ca804f65cab5a465cfcb9fd22699fb9eaf6a9ce523e3456f1db3dfc9527,2024-11-21T09:09:29.277000 CVE-2024-23130,0,0,cf8060448889319ec9ea48084454018037a3072bf082b963c35eda64e185ef02,2024-11-21T08:57:00.510000 CVE-2024-23131,0,0,27c6185e25adbd6a9114aee338de3603d86cdf82c61c96ab6867c5f04cc17cc5,2024-11-21T08:57:00.693000 -CVE-2024-23132,0,0,ee03264d1a7f551a2ab6b6ac39168bb0d415aabcd7783766cdb971464eb4e722,2024-11-21T08:57:00.897000 -CVE-2024-23133,0,0,eb6888006e5f8968ba77e5115cd4a813aa1af19ec92bee78dac82e466ad010fc,2024-11-21T08:57:01.087000 +CVE-2024-23132,0,1,e9248c2178f8f63a22b7c15ed27370a3b934315488dfa0e209d25147e3c49159,2025-01-27T18:15:37.980000 +CVE-2024-23133,0,1,b1474dd84eb3c446392a0992a388c8841a35971de2a3b30c91010470ea4fea78,2025-01-27T18:15:38.187000 CVE-2024-23134,0,0,b9e291ffb9b9998ed77706252f7c72546698bc932f4e15f37f1161fd8d53e531,2024-11-21T08:57:01.287000 -CVE-2024-23135,0,0,bb07f9e67d06324046c0bd0a387b266503738b51bdfa7951b7638711a4c03262,2024-11-21T08:57:01.513000 +CVE-2024-23135,0,1,1c8ff4eb793abf6bcefbc0298485ccba7517f2f24b525939fa1ae9cfa5c974b6,2025-01-27T18:15:38.410000 CVE-2024-23136,0,0,af2fe55f058049ad2ae7fa812afb80b1010d757c8f5aa38c29070e94766a4029,2024-11-21T08:57:01.727000 CVE-2024-23137,0,0,5eb4322ca9c3d91bbd12e65d7c5d4deade1e92c1c7916f4d296c1483278699e3,2024-11-21T08:57:01.937000 CVE-2024-23138,0,0,5f1cf6df53872d96cd81f8d3d5f642840af9c940a03c8f7b6fa2400eef2671cd,2024-11-21T08:57:02.143000 @@ -250431,7 +250432,7 @@ CVE-2024-24578,0,0,1823936017f4e26e35f0d3c8e70c86355447118592c7a8398b77a1185d45d CVE-2024-24579,0,0,5b750dc9276586545591c5f17c685da900cca7fa18a626d3a0cea44f176e0760,2024-11-21T08:59:27.897000 CVE-2024-2458,0,0,d3a43945b002bbe4dbcc775cd2d9094cda2834583bb42f76f13ae769b4a19a8f,2024-11-21T09:09:47.697000 CVE-2024-24580,0,0,e9b3c63c841b56484e9a7cf6be12569b58937f5d37eaaf95d5cdb644623e864d,2024-08-23T18:51:20.207000 -CVE-2024-24581,0,0,4406b787ee5ffa3db80651e9bdd69a781ae56626748b8861ca9be0155c91b5aa,2024-11-21T08:59:28.120000 +CVE-2024-24581,0,1,36fae7d53f9afffd69c2bce98990b53d6cc54ce63ef6e7416027a1f6696d8f33,2025-01-27T18:00:59 CVE-2024-24583,0,0,45c00206367c2fe915fa0b6105bf3677234e2b1c69d31356fc1fca8dedbf400e,2024-11-21T08:59:28.243000 CVE-2024-24584,0,0,eb901c7452a856c10753487f523e66379a94582063689840bcf016216e0e61f5,2024-11-21T08:59:28.360000 CVE-2024-2459,0,0,25a3e13292c0e654cb7fca3dafd8a2a21d524bd7d615cdbca42cdbb547eef683,2024-11-21T09:09:47.813000 @@ -251055,12 +251056,12 @@ CVE-2024-25452,0,0,ca5bee31974256da7e8e4d63f15ae6123aa17a8b01bebea28e4fe8e2fbc3d CVE-2024-25453,0,0,70fb504352781ce397aa4364fe3b34ab3e4604c900948fb24593de6edb56ed28,2024-11-21T09:00:50.560000 CVE-2024-25454,0,0,eb0f60de174dc4a9651449d926569e95570750cdd71cce33c01236df21d8f22c,2024-11-21T09:00:50.730000 CVE-2024-25458,0,0,9ec13dc1734eb500e887f66744313cf44032a2e1f460e1aa11c6be649259eb7e,2024-11-21T09:00:50.897000 -CVE-2024-2546,0,0,0a441513e0701507b6f3b7497ce9f5e5e6beb55afbc31c1d037aca1adecb0705,2024-11-21T09:09:59.040000 +CVE-2024-2546,0,1,8cb295d8ab81570954347714079e5875b99b5e3e86e85d39f0c1833ed2a0a1cd,2025-01-27T17:05:46.703000 CVE-2024-25461,0,0,beec46596f13e96701a918f7afd544b33f42667338f9bf1eea5911daccd8d140,2024-11-21T09:00:51.113000 CVE-2024-25466,0,0,2a08590dfd2bd6ae60347acbb99520233bbf6aaba3312cc669867e73fbe0b290,2024-11-21T09:00:51.330000 CVE-2024-25468,0,0,cb5aee55e71ce49f56a046712ac1820d937431364648488dc2293cc0e2ab59f0,2024-12-16T23:04:51.047000 CVE-2024-25469,0,0,c24aa4c966b6f8ca1870c018453e0f40a0fa553e95decb3ca542d17e0f12dd8b,2024-11-21T09:00:51.693000 -CVE-2024-2547,0,0,90d41a91a54e213f02614de06ba4c678c4303a08116eb3638a1bbb2663fbedeb,2024-11-21T09:09:59.170000 +CVE-2024-2547,0,1,0fbdba73bc7be8457d09d4345e26314e53b3ed78656f404771387e6b5b6a4bd6,2025-01-27T17:03:24.857000 CVE-2024-2548,0,0,57d303fa99f890e95aa96c9d5878480469012160c102ad27f1353b533c559154,2024-11-21T09:09:59.307000 CVE-2024-2550,0,0,6a5e4b4549d1691f69895d2ae26aa3089594f6d4a17f1da19b8f974387ae9a14,2025-01-24T16:02:49.703000 CVE-2024-25501,0,0,39a441609204709047cecad828c175f01310d82b43dc4ea230772a5942f74b33,2024-11-21T09:00:51.913000 @@ -251121,13 +251122,13 @@ CVE-2024-25575,0,0,1018bd05e409a13236c5dcb2237c77906e7f23238c36cbe4ff25ea1f8323e CVE-2024-25576,0,0,95b8b2fe29c3b8fa31fbe37491add9737a675d1ce27c7ad5d9b93d6c253067d8,2024-09-06T20:17:14.003000 CVE-2024-25578,0,0,cd7bc684525a22b1c5771942ff4ae262fdc7036bf854cdb96ec3e2374a3eeb34,2024-11-21T09:01:01.047000 CVE-2024-25579,0,0,53dc5740ced037e66b1a2ba8c7a85647afdc0321b2de6a97263699799a9bccc1,2024-11-26T08:15:04.400000 -CVE-2024-2558,0,1,02ce2f2a64668ffe21ec4c1d0315a119eeef07446a2ef7cf12a8781dc0fd14f3,2025-01-27T16:56:47.900000 +CVE-2024-2558,0,0,02ce2f2a64668ffe21ec4c1d0315a119eeef07446a2ef7cf12a8781dc0fd14f3,2025-01-27T16:56:47.900000 CVE-2024-25580,0,0,c4b0afd79a1474589c375c8ffabbee3d018fad8e4c0933a7f12523ed1f4b9156,2024-11-21T09:01:01.400000 CVE-2024-25581,0,0,d9cf41000e40894e1e57e66e69bd839bdf75b2cba10804a3bcb1ccd687a5175f,2024-11-21T09:01:01.620000 CVE-2024-25582,0,0,14689a0079cb9d91c28249ad9323f9afd0c6579c6fd0dfae82c9052534820133,2024-08-19T12:59:59.177000 CVE-2024-25583,0,0,ca939b3dad6e6f74b1ff49a658bdf716ccdd446c737a5cdf17f568d1249b9dd1,2024-11-21T09:01:01.823000 CVE-2024-25584,0,0,7a4aedd8c8bd4a4f6cf57e5a5b34fefd3a570c6f165ab147cc791809cd369790,2024-09-06T16:46:26.830000 -CVE-2024-2559,0,1,a52abdb9dee7a2b9cf97549fffda288e9bd244b1c049b8886c2cb84eff671485,2025-01-27T16:50:41.160000 +CVE-2024-2559,0,0,a52abdb9dee7a2b9cf97549fffda288e9bd244b1c049b8886c2cb84eff671485,2025-01-27T16:50:41.160000 CVE-2024-25590,0,0,8d02885f747c962ae03bad6ccc691cb5a7f3c754a0055c180ff7ee84094108bf,2024-11-21T09:01:02.033000 CVE-2024-25591,0,0,fa8458e4721010bc4a3e953326e37e290e504ea9adf2514e3f0f84525f97c3df,2024-11-21T09:01:02.157000 CVE-2024-25592,0,0,c51d707636e64d3c59c6e49a5717983c2ff2b616a397ba175409796652173f8b,2025-01-23T19:32:59.350000 @@ -251388,7 +251389,7 @@ CVE-2024-25941,0,0,52b4bc029ce531150a17c79cf9ec2dda1afb81cfed27217993fd56ee19d17 CVE-2024-25942,0,0,45ed91e4290f7edb340c1f593a01d4a28ce4e64fa7ea6f667055ef72f77eba79,2024-11-21T09:01:37.290000 CVE-2024-25943,0,0,32ac973e940c436deb6ded02950e6404f2ecdc8a8487e24207e6362e66fd42f0,2024-11-21T09:01:37.410000 CVE-2024-25944,0,0,2fc1c8ecd4b7da3547d97a3ea7deb6ebdef8efdef30e0536369b0eab51e56885,2024-11-21T09:01:37.533000 -CVE-2024-25946,0,0,6866ad5f02be0a8c0388bcf464a303ca3f07daccfa7f8aafd2b194c8e3938368,2024-11-21T09:01:37.653000 +CVE-2024-25946,0,1,0310f35cddf58dd0f1406dfdf76770bf7cb4a226755f67e47ce94ca872bf4772,2025-01-27T18:57:59.197000 CVE-2024-25947,0,0,aa3a99581cbc703c17f7c037d5682cc4211c4fea1b91572c49852cf47d2cc4fb,2024-08-02T13:55:39.323000 CVE-2024-25948,0,0,3dce46aa39975178fddf2f1499955eaa59d14ddc83f92eed1d083c1eaf07ac66,2024-08-02T13:55:42.040000 CVE-2024-25949,0,0,b4cae26e43ac9afebfb2aae74bb0e791eb94f9a31f707dadf31aad37faeac575,2024-11-21T09:01:37.970000 @@ -251397,7 +251398,7 @@ CVE-2024-25951,0,0,845f3a25f4d5deaa4c7992e41dd58c42c41d0dc2b905d2280e33de75cb4b2 CVE-2024-25952,0,0,8b4dc52fef57d8fbb31cf0abecc11b9407a392d8739ad988ca812690eccbf4cc,2025-01-09T16:48:58.557000 CVE-2024-25953,0,0,74ac51aa7b4ec3952ee05415e1fa81324d23d22db93c284a18c79c7efa39180c,2025-01-09T16:50:14.040000 CVE-2024-25954,0,0,5d01606b94c030f235ff4e0c4da0130514bf93e9c2f019089ce1ed2db6bae818,2025-01-09T16:08:40.410000 -CVE-2024-25955,0,0,d6c74835b55489dfcd880f39eac6d7d84269d8fc1adcdf99e69b16447d966a36,2024-11-21T09:01:38.580000 +CVE-2024-25955,0,1,1b47dd1c38579fd26816983115f141a46e8da2462bc9d9dc03fbe2f8fd959722,2025-01-27T18:57:51.763000 CVE-2024-25956,0,0,759bea1765763a3632028c707bbc3ddd03b1520ccfb9eb0fbccf9d7e79a1833d,2024-11-21T09:01:38.703000 CVE-2024-25957,0,0,8b2d7c938864ca7cbfb1113d0d31a721d692979c77ab0a39f8fd66b6f9c12416,2024-11-21T09:01:38.817000 CVE-2024-25958,0,0,6baea78c795c928ab01131e7a84770784beea196cdb63c32e6fb5fbdbbd2a0b3,2024-11-21T09:01:38.930000 @@ -251415,7 +251416,7 @@ CVE-2024-25968,0,0,c59aa9f29fec7723028a9d8cf51b0760dbfbb963c0749af8defb3e2c05671 CVE-2024-25969,0,0,0dff94871ead40cb1a89df0bd8187eedadf4b13affc46d9dbab446d588f7c407,2025-01-09T15:57:34.430000 CVE-2024-2597,0,0,12819aacd06167f31ba85b0d4a34b39aec569fa6ce913a831ae88cc462980442,2024-11-21T09:10:05.537000 CVE-2024-25970,0,0,ebf60a3ad2d3e6b65a7a9f52e6917b310ffa65f405eac59713b95729b171f87b,2025-01-09T15:59:09.817000 -CVE-2024-25971,0,0,9cfe0b8a8788af7c6997c5891287b0e4dced9a5d2f18b186e82a53b8284f4a71,2024-11-21T09:01:40.500000 +CVE-2024-25971,0,1,e8f77238884da976b87807493fdca13cb74d8982df4384bfe1db22cc8621d6ab,2025-01-27T18:55:14.810000 CVE-2024-25972,0,0,543cca97c7af8256686918a28901f39a26e893c97637fc882b573eae8fe693c7,2024-11-21T09:01:40.610000 CVE-2024-25973,0,0,92921a8dafff904fc569ae8f889b79524526f977774b8eabb79a6657a833a77a,2024-11-21T09:01:40.783000 CVE-2024-25974,0,0,09138e23b97540d30a977571629f4962d810fc7ee64de0b4541e73a977cb5004,2024-11-21T09:01:40.907000 @@ -251766,6 +251767,7 @@ CVE-2024-26311,0,0,eccd625bfc3960072c1c96a8fc8ef57d0c8f8ecfdb1ef82d95f6e017b6260 CVE-2024-26312,0,0,bd29f61468e0d592b162f1b9bca8f7cdfe3ab243569e230296a7e2555de1ea3c,2024-11-21T09:02:21.183000 CVE-2024-26313,0,0,e95d02de1d4052be713c0be90ef61847e38271af8acd03c78fcc8ef33c2d3d5f,2024-11-21T09:02:21.417000 CVE-2024-26314,0,0,16b14b790b204a9dce3861ce2b360799ee7dfafcd5ac190bba6e667b6569b4c3,2024-11-21T09:02:21.567000 +CVE-2024-26317,1,1,3da96839833b08e8c6d726e07bda0f53903e5c5b277a52f6e1d788ff6d44eb8b,2025-01-27T18:15:38.613000 CVE-2024-26318,0,0,906eb8b230325eda251dececda86313ac591223ac614c32b0aa55e4dcc7ca895,2024-11-21T09:02:21.757000 CVE-2024-2632,0,0,300d9ac42b8f019a855e8e9024543531f20a59a664cf33a5a9a35b4647186c67,2024-11-21T09:10:10.750000 CVE-2024-26327,0,0,72a77ae0b6d90693319dc4a70872140f4bf0e1116dd5bbfb2cdcf10d61353777,2024-11-21T09:02:21.927000 @@ -252165,10 +252167,10 @@ CVE-2024-2686,0,0,fec0f14b6d657e98130580c8bcb63b2672efadf690146c9437f8751fa56e7f CVE-2024-26860,0,0,00d381323672664bc41f4e4cd89b44b51ee6c36af10590042488ae21013d2872,2025-01-07T17:13:52.260000 CVE-2024-26861,0,0,f06c56909e76d83d3acf8485d5478c6ae2d0d83b82e0b9091c4412ec634a0ec7,2024-11-21T09:03:14.277000 CVE-2024-26862,0,0,94216787489441c2b38672b60a8ef4910c5138aedfb248664baddac7173ed4ec,2024-11-21T09:03:14.403000 -CVE-2024-26863,0,1,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000 +CVE-2024-26863,0,0,78c2119d6f80f4b28c4729d61ca4bc7c89001a1792d2bf795929ec1734e40dc8,2025-01-27T15:05:39.390000 CVE-2024-26864,0,0,eb2f6d1cc842168692d58368c5385a125dd9b538c58507cdba23f5736373b299,2024-11-21T09:03:14.663000 CVE-2024-26865,0,0,425ec1e666ffd707bf5be9f39ce33453ce0f57a20ff8f1bd74eaf4b15ccb3949,2025-01-07T17:14:10.927000 -CVE-2024-26866,0,1,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000 +CVE-2024-26866,0,0,756688ec73c3d1d3b26008c60785a42a61b0c4d24a84e40b003bd3a768e2191a,2025-01-27T15:08:19.563000 CVE-2024-26867,0,0,f4c3e98cf18f5362ba9d8cbace769954683f72425fbef623fdb1cff3c29bca91,2024-11-21T09:03:15.117000 CVE-2024-26868,0,0,470780f3eedbe54e0715c09aacacd15d602e690928f9f1f3cc056aa7f149c140,2025-01-14T14:45:52.020000 CVE-2024-26869,0,0,02922038ad2af42246888c4202e00a6e69990dd39e8a7ee4b0bde6c82bbc6099,2024-11-21T09:03:15.370000 @@ -252182,7 +252184,7 @@ CVE-2024-26875,0,0,94239f41f42b905c954bc6edc97b0cf15f6dec0d8fdfb2fd1b19e8e24e9c8 CVE-2024-26876,0,0,cae97524862d4115e788a327d03cf0da2acf0edba8249dc998aedc8a21a3f2d4,2024-11-21T09:03:16.380000 CVE-2024-26877,0,0,54721b8ba6c7b4d0a18ed9c595e6136296498a569bd20bfeb4ea6cc3920631ea,2024-11-21T09:03:16.520000 CVE-2024-26878,0,0,2c398350514fb54f2342aa6342ce493830beeb75951d27f14bae83050dc81b26,2025-01-14T14:49:44.283000 -CVE-2024-26879,0,1,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000 +CVE-2024-26879,0,0,50ff069537c649739dc4e54aaf76e53263911635458780c341afcdd614bc45bb,2025-01-27T15:12:45.210000 CVE-2024-2688,0,0,93325ede5335c7cfe6caa2a8077a03a339fd6598ac72c158a197fc34644bc992,2025-01-07T17:17:38.673000 CVE-2024-26880,0,0,b775bc30b873c71ce0741bd89eb501a0811ff9c595ceddd964535015994b3d7e,2024-11-21T09:03:16.923000 CVE-2024-26881,0,0,c9147da975715d7d9e15d8a477237dbe48b93c3e840440ef85c748b4931c6aee,2024-11-21T09:03:17.140000 @@ -252198,7 +252200,7 @@ CVE-2024-2689,0,0,efd9c698169d4dc6b507d633d5c5bca5635fd88f4fbab04c5f54592266ffc9 CVE-2024-26890,0,0,d28148780134fe9d4fd26b89472d475a8cd9fd94507e1d0beb5192c2d01a8c30,2024-11-21T09:03:18.677000 CVE-2024-26891,0,0,18ef1231e3dab94fd46bd51769a57b4742af39b60702f0ac393cf1e3791be7b3,2024-11-21T09:03:18.877000 CVE-2024-26892,0,0,dff3724f39f4f7d27824ec776eef6bd6154cf578f200db90d4aaf7ae8dcb96a7,2025-01-14T14:34:50.407000 -CVE-2024-26893,0,1,e4bf7717acd3051131184678ae9316b9694bedab35a35205f2cd9fa955761ef6,2025-01-27T15:14:28.090000 +CVE-2024-26893,0,0,e4bf7717acd3051131184678ae9316b9694bedab35a35205f2cd9fa955761ef6,2025-01-27T15:14:28.090000 CVE-2024-26894,0,0,a0a3505846084c5b38d2ae3c10f78c77094fefe62fef76a336ba2b60789b1f16,2024-11-21T09:03:19.273000 CVE-2024-26895,0,0,c7dae02178f516d4283340a4f7cce896c92a3602b8fb81a9ffba367ad09ef0ce,2025-01-14T14:33:40.417000 CVE-2024-26896,0,0,c6e43fd686585240ffa18e62a933c3ad899a2ecd05bffcaba7c10cff96b5c484,2024-11-21T09:03:19.633000 @@ -252575,6 +252577,7 @@ CVE-2024-27247,0,0,80b2c738afb7fd372a582a5de229fc1b8561eb2e037fe8418073b03a3ca01 CVE-2024-2725,0,0,b1b1eca530920ff690dfb0fd89719f48c747479f1615873b2e02b96009cc4c1e,2024-11-21T09:10:22.883000 CVE-2024-27254,0,0,12b735938e92147b71e9b36ac9a59ad706596e2b0d7f3009adfcc8f330eb86b2,2024-11-21T09:04:11.710000 CVE-2024-27255,0,0,020719b04fc3be92fab5ca4f611d61c95e87ea030f34dc99fa55e1be11bc830e,2024-12-23T17:32:58.470000 +CVE-2024-27256,1,1,707a8bc0ae9923e3549c09bb469a74f9558d572c3960bad5d9f6f6391971fcea,2025-01-27T17:15:15.443000 CVE-2024-27257,0,0,691c5dc8e8ee6dc8cf4d467dc5d3cecba3bf33df4b5a8f7cf103f192a777dc97,2024-09-16T14:26:15.400000 CVE-2024-2726,0,0,7bf287b1ed61a27957754b43bb3eb83ce224f5526d7a8605b12bacbec8912e82,2024-11-21T09:10:23 CVE-2024-27260,0,0,d8abf1871a989c63042ef17773af437c6f9012fbd4c3caf016f954fa2e26ad04,2024-11-21T09:04:12.017000 @@ -253001,7 +253004,7 @@ CVE-2024-27845,0,0,d71cf0c0ec065b23d4dd61815af6664ea6cb71aafb52d5b7d45d133828b8d CVE-2024-27847,0,0,71f93657e07337bb7b166b0763f6e58ef2ccf5e7a81265e4fb4a929e0d1455c8,2024-12-09T19:39:08.330000 CVE-2024-27848,0,0,174470df8b8c056af49e772881a57e396b5596e901992b4a002bb4e501ad08a2,2024-11-21T09:05:16.213000 CVE-2024-27849,0,0,fc4f7deee1a891aa16b7cea2fcce8aa0746cf5d86935b3aa70533f39a4015199,2024-10-30T21:35:02.607000 -CVE-2024-2785,0,0,eaad0be25425b1fef0e6690b361cca0038bd479a488596ee399e430129612392,2024-11-21T09:10:30.790000 +CVE-2024-2785,0,1,248b63cf4baa2bff62c0f27d98be35f991fc242008dc774be1704e4cf609a3e9,2025-01-27T18:23:00.010000 CVE-2024-27850,0,0,1250ad80f7ac3b5478788a4ae91050d8de16b9618bea2e937a23b75728cf9fd2,2024-11-21T09:05:16.590000 CVE-2024-27851,0,0,c3b97ee6b26dfbc0c56d39614137e38659ab1609757d63181c34ff60a311c0c3,2024-11-21T09:05:16.740000 CVE-2024-27852,0,0,21baed505dd28c7a0b77d3ba061072e5a4859b987a8b1d420f9b79d60ef54041,2024-12-09T19:40:07.710000 @@ -253354,7 +253357,7 @@ CVE-2024-28219,0,0,6830fb0e26f886b3485bf2fd7a0cbc5043cc855dd90632c85ce0d69014a3d CVE-2024-2822,0,0,eac17cb2010c91c3b838b4ace8eb55a7b3846d55205a1f1ec1bcafa75ea3a92f,2024-11-21T09:10:36.557000 CVE-2024-28222,0,0,514a81901d656b0cd8715503b25ef874a3ede67863cca802f7c053fef60e7752,2025-01-21T18:29:18.877000 CVE-2024-28224,0,0,4dc495d1b5391a5805b35b2cccf549718cba127cbcdb7a2bab566e35ee9808ef,2024-11-21T09:06:02.613000 -CVE-2024-28226,0,0,7042ea8502753cf42316124d8450a936a79906d71bbbbc2f3abfdc9bbf97ca4f,2024-11-21T09:06:02.767000 +CVE-2024-28226,0,1,6dee823bb945edd32f4e46e57a209237fa36647714c8c709c91d4f1dde6ac396,2025-01-27T18:01:43.667000 CVE-2024-28228,0,0,4c70949e6df8bcf2882fac2da178d0d5c63a3ff277dc66365cbdd98196ca17b4,2024-12-16T15:06:31.563000 CVE-2024-28229,0,0,91f2c6bf4f4cd9f37b886899d3e16c101d8f0aeb77afc57f338cfea95f7a2e46,2024-12-16T15:06:00.407000 CVE-2024-2823,0,0,a7476924000e3fd8ad4ee932eb74fdb14f5fb1293812dc1c86970256676a64d9,2025-01-15T18:53:00.390000 @@ -253625,7 +253628,7 @@ CVE-2024-28771,0,0,cbab86249397dd52365545366a532ae0eccdfaa40bbb8c36a47c61a3f59d8 CVE-2024-28772,0,0,78e1b65ccd01d2b2cb5151ac2638f146b229ea64b2c3771ff8b54d177679ec5a,2024-11-21T09:06:55.327000 CVE-2024-28775,0,0,6a2db0e9a4b51ca58dc1a2ce04ae9f65cde9a99b61684111bcbdf3398dd02cad,2024-11-21T09:06:55.493000 CVE-2024-28778,0,0,ec5802dfee3b138bf2f66b9c23844fcaeb53806b2668ca7c9490ad6fae2b4a1f,2025-01-07T16:15:33.113000 -CVE-2024-28781,0,0,86f3b30ca9d39b2bf52a47caeda684702c3ae5f69d11221a2c8e7af407228220,2024-11-21T09:06:55.643000 +CVE-2024-28781,0,1,2babd6019d5daf3d14be2b9e76a0c084eee9d3b5dd8f32fdaae83dfbfeb17f66,2025-01-27T18:31:09.747000 CVE-2024-28782,0,0,3827c4b953b1c26f26179fc828e8b34b71d580a39e37d458a5957d5222c3b151,2024-11-21T09:06:55.783000 CVE-2024-28784,0,0,31a16452abfdc2ff65c4b937882456f9364f61d12d2099ccb8cc285baa43f061,2024-11-21T09:06:55.913000 CVE-2024-28787,0,0,da4da04b64348dc0ee365bd4258dfd45d0313456abf7a7518c104cb63fb55a2f,2024-11-21T09:06:56.043000 @@ -253794,7 +253797,7 @@ CVE-2024-28968,0,0,30f0a5615ec1f86d46723a888e87f3cc1d2f5fb43a379b06e125991c23e00 CVE-2024-28969,0,0,ed2e7d307eae482486e0f8ca0f0bec91773f9a523ac1edf23b80faee6c1caf7f,2024-11-21T09:07:17.613000 CVE-2024-2897,0,0,3be50c7fb1beb72b37f347e1c0851ffd4301791d62380b3584870314fe24d1fa,2025-01-22T17:53:14.800000 CVE-2024-28970,0,0,40de7b82743a11a5ad6d4091afb1ee76e91a11478a88b6485d9e52873333afdf,2024-11-21T09:07:17.760000 -CVE-2024-28971,0,0,60c1b7cea147deb90a66336e84867f097cd9c3f3d33da0bd555b1b0b9c115e15,2024-11-21T09:07:17.927000 +CVE-2024-28971,0,1,f66f1681f508eec910c6120904031eb3e3b88e02cd01a61289866852e8315622,2025-01-27T18:43:23.280000 CVE-2024-28972,0,0,12c7e7efe1195c680c17aa2603704c5c29d6e9fd7636c8c8b733f1d9d5598f42,2024-08-23T16:59:11.070000 CVE-2024-28973,0,0,d31cfbb397638c8a8a10806a5a83781d1474ca76b0c011b42f63c11f6c78eb89,2024-11-21T09:07:18.133000 CVE-2024-28974,0,0,4ceb2d25702587fb6884aff9c95126481230ded3ebeaf86afd58b9714e74c059,2024-11-21T09:07:18.270000 @@ -253918,12 +253921,12 @@ CVE-2024-29098,0,0,9b1008b83cbe94703d043bfdf5904f8bef4f3123ac6a8137d811039c2b1c4 CVE-2024-29099,0,0,57f43cd8f74c6e6cf95b7da1e8708cfbdd3bc617c2558dc4505d3cb2cde59023,2024-11-21T09:07:33.100000 CVE-2024-2910,0,0,bbc5651269bc757d63b4a047fd6f50531f9ae2606d9c89885eef5674cb9b94c0,2024-11-21T09:10:48.977000 CVE-2024-29100,0,0,4b4ea50e8b1a5f3add3c62cc09873ccb1c0bad3dcfd266a73de4fe697a412abf,2024-11-21T09:07:33.233000 -CVE-2024-29101,0,1,3e1f7a72e6c54872472cb6493d5562d1ab4eb10c553370d58053a928dd03f787,2025-01-27T16:21:01.500000 +CVE-2024-29101,0,0,3e1f7a72e6c54872472cb6493d5562d1ab4eb10c553370d58053a928dd03f787,2025-01-27T16:21:01.500000 CVE-2024-29102,0,0,ed935bbc4f82c0c84be43e4d1a7b61d5ebce7f3fd54cf950c79feff7a35ac46f,2024-11-21T09:07:33.500000 CVE-2024-29103,0,0,d41735cb9da95e849a5b45306d53d28ce564494ecee17e60023a3cbe91f78521,2024-11-21T09:07:33.623000 CVE-2024-29104,0,0,f1f189a63b7a01d1d49f3a6b0cae20a47961d88101d8514d2c423c4ec2f149ef,2024-11-21T09:07:33.760000 CVE-2024-29105,0,0,c66a7fda0a5c9f8df47a07bbce9c424c595eafc32fe89bcf2c583a37e4654e1f,2024-11-21T09:07:33.893000 -CVE-2024-29106,0,1,5a400ac8943d75afdda2010adfe40fe98b71565a3f87da2e7f1bf30416ae4ab8,2025-01-27T16:11:23.087000 +CVE-2024-29106,0,0,5a400ac8943d75afdda2010adfe40fe98b71565a3f87da2e7f1bf30416ae4ab8,2025-01-27T16:11:23.087000 CVE-2024-29107,0,0,575a378e14d23427f30e92b1c894a1fb54c90fb958b2d4efde6fff0a505f35f7,2024-11-21T09:07:34.160000 CVE-2024-29108,0,0,0ae5c87de818ee6d85336d44fecde11bf0ad3f784ce5bb54a4b6c764bf7af8c3,2025-01-08T16:30:17.263000 CVE-2024-29109,0,0,4d51f8f3341e8657e6c8c880f4f2d73bd95482441c6ac3a26d0a8cd436b3b41c,2024-11-21T09:07:34.440000 @@ -254414,7 +254417,7 @@ CVE-2024-29917,0,0,26002c5dbce9d5777a47fe26cf8c981f233fd4f8a95f76aa44370c6e2de3a CVE-2024-29918,0,0,a57618c3fb51dbee6f018076fd6e632fdeec606ca829af7180033f4e9040c547,2024-11-21T09:08:37.053000 CVE-2024-29919,0,0,ac098cacaad21d239504a2c5ebecf9b813bc711e379f46354a8c421b03e7425c,2024-11-21T09:08:37.187000 CVE-2024-2992,0,0,55bbd6115b2de17ac5872344f17f9eecdf8654fc7cbe39085e40803186207c8b,2025-01-22T17:59:00.077000 -CVE-2024-29920,0,1,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000 +CVE-2024-29920,0,0,e35d088a188e6bfa8190741a74c74b247349ba8f715ee70eaaedc435c2232bb7,2025-01-27T15:20:38.483000 CVE-2024-29921,0,0,867bb45d677d0dc68c74a78c2826c6adab41a83b47b3c52810ab95377ef5a86f,2024-11-21T09:08:37.447000 CVE-2024-29922,0,0,72dae7d1c92fd306a11a646a4720aeaa6df484efff05a113be2d239141b3f2fa,2024-11-21T09:08:37.560000 CVE-2024-29923,0,0,8225650ead409b8f85369357d44055c6eaddbde5fe28dbef52825bbb60efcf72,2024-11-21T09:08:37.677000 @@ -254748,8 +254751,8 @@ CVE-2024-30254,0,0,35546b7409e4119ccffeb76af2517fdc522bbad8073913d5b4579ec29c98c CVE-2024-30255,0,0,78b182f0b7f2b08d83e6ce349e002956760de0eeeb0dd012f4a2379fb98daaa1,2024-11-21T09:11:33.297000 CVE-2024-30256,0,0,8642d5a4ce4d5d68a9754f13f7ba74215b6e90771f5838567192e595626d6804,2024-11-21T09:11:33.873000 CVE-2024-30257,0,0,ecc8eb870bc55046bd95c67876b58a85991bc2d927265d0f23a8918e37b3a4c9,2024-11-21T09:11:34.003000 -CVE-2024-30258,0,0,0a317de5c8420e8a053cab731415bebf9af9b81fe82dff8810dae8b3c25eea2d,2024-11-21T09:11:34.120000 -CVE-2024-30259,0,0,61b3e76432fa205e4fa2bf7d942a50ac1159511614825e1680b334d0b05d74a1,2024-11-21T09:11:34.253000 +CVE-2024-30258,0,1,0b28c3da41152db30482ad37add74c4e5433dcd898c75859cafa934294374ca7,2025-01-27T18:19:29.930000 +CVE-2024-30259,0,1,675b93802531aba4e1319c2e7eb03e13e1b91c93708bf98d69707b40712e6f03,2025-01-27T18:16:00.440000 CVE-2024-3026,0,0,0265c65c29e3faf9e14ce421339b75d0c49c5a9b120df592e573d13166cf7114,2024-11-21T09:28:42.743000 CVE-2024-30260,0,0,cc9a5cb035977000add1b98317d4f5265395260876a998a92778c07dd57d0ebc,2024-12-18T19:19:52.700000 CVE-2024-30261,0,0,53f3e7a25054b613c460b461d895e55f8582a30f659005a13e118177da8af8f7,2024-12-18T19:21:11.997000 @@ -254862,7 +254865,7 @@ CVE-2024-30366,0,0,8a94b8c07e149343f3c82ef80064c339b80cc48a910b971ac366b1971f451 CVE-2024-30367,0,0,fa3c0211010d5197aa65f2c59b23c77ff0a2d000f637087b45b195677e61dd8b,2024-11-21T09:11:47.353000 CVE-2024-30368,0,0,d96361d29e3ef6c0afd7c81128aa8d9c11a5acd9fc35464a5b5574e6e62658b9,2024-11-21T09:11:47.493000 CVE-2024-30369,0,0,599260f9174352b9416cc6f9cfed9edaa7863cf92779bf720e6ddbe354fef625,2024-11-21T09:11:47.653000 -CVE-2024-3037,0,0,b383da95d058d877e2bb21c16061051661d5b3819d925981b406e74e15c4304b,2024-11-21T09:28:44.220000 +CVE-2024-3037,0,1,c69e9feeba3e99b24e9b2eb05f3d8906d4ca0e648a01c4ab767f562303f75074,2025-01-27T18:05:07.223000 CVE-2024-30370,0,0,697bf20924afe8b36303c898ef8193332c6a6b99547fd6cb6a16dd7e9336646e,2024-11-21T09:11:47.807000 CVE-2024-30371,0,0,b5d6ce17f5315b9b23c2419b0bbf5646c23ef4a918d0050ba7180e7ce4f7a988,2024-11-21T09:11:47.943000 CVE-2024-30372,0,0,cc111a41a90afb5fb01651ed5cface3e07f85983fe25bdcc33097ca3684ea095,2025-01-03T19:55:22.060000 @@ -257996,7 +257999,7 @@ CVE-2024-34559,0,0,add1f51454556128ecef0e724a3bc62f9a607a7086d3443048f323f79f5a3 CVE-2024-3456,0,0,666f10caf8d4abc2c878e20fa7643e23a4280263bd59ca1aee750ef6bdda76a6,2024-11-21T09:29:38.203000 CVE-2024-34560,0,0,fe1b4d6afe9d36e3fa396501ce1f462db208a9cc6b4287f7f3e0675c5e8eb1f1,2024-11-21T09:18:56.233000 CVE-2024-34561,0,0,94a3a4a32680e52abd396f991fa3f3091d097ef31d868ad3111ea0a4b4409a56,2024-11-21T09:18:56.363000 -CVE-2024-34562,0,1,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b687b4,2025-01-27T15:20:56.620000 +CVE-2024-34562,0,0,22e9af7c3c7972513883b09b828274e40ff3fe33753cfb2dd3842a5691b687b4,2025-01-27T15:20:56.620000 CVE-2024-34563,0,0,040e10566a3859791595a0c0a3fd8df23d5dfb5e509404b6b78f66aa609377b8,2024-11-21T09:18:56.630000 CVE-2024-34564,0,0,cda6ebc66c36b8b0b609a35365d30e1dec81e59451dcb9e93db6bc2f43d200c0,2024-11-21T09:18:56.760000 CVE-2024-34565,0,0,cad1f1315da853e64ba67f67cf4501a859399268359dcdf02f7b21194a3856e0,2024-11-21T09:18:56.890000 @@ -258426,7 +258429,7 @@ CVE-2024-35168,0,0,72c360513b343ef3d5d110e12281ef48774c959f016065c2926365e7e0b61 CVE-2024-35169,0,0,a1f628ccf8d3c2ce1e9c501ab96fcec6269b275293b150f1cce2b1d591443a51,2024-11-21T09:19:51.460000 CVE-2024-3517,0,0,e5387b700944c6080aa9b03e7e89f5a8085a1222a6f8825a121a763952e726d5,2024-11-21T09:29:45.940000 CVE-2024-35170,0,0,b1eef986d43611b394a799821cf7fe7eb4c44aa6e12473b58aee962a84d79c68,2024-11-21T09:19:51.577000 -CVE-2024-35171,0,0,2f0d69e35afcc7baedb5841e7daf1cc5d2e1ae6ed8032387947d49655ba71297,2024-11-21T09:19:51.723000 +CVE-2024-35171,0,1,42231ef5f54733f00a660f9ac788f97de6f66a45185f3d0de533c3b4f83e8567,2025-01-27T18:08:26.833000 CVE-2024-35172,0,0,ccaaebaa2e461a069d2019b08d3895e1c80e139e7e83e9d6d0bc6ed276417ddf,2024-11-21T09:19:51.850000 CVE-2024-35173,0,0,6e586b770532bbec70a1a22d51641e5ebb020c65a9dd9f5f046c1c67746862b1,2024-11-21T09:19:51.977000 CVE-2024-35174,0,0,45c1ded6f418eee47f7da5d436a57a8ad12156a76cd16071e103316cd7fdd28a,2024-11-21T09:19:52.110000 @@ -258498,7 +258501,7 @@ CVE-2024-3524,0,0,83148ecfc7acb7f746c7aac625c6f49cd3f6874d7507d63b3ccc03c76b4837 CVE-2024-35240,0,0,1ac23918dd3dc76c5661e94756d6b494136b5466658192152e22c7ce170bfad2,2024-11-21T09:20:00.163000 CVE-2024-35241,0,0,aad3f84a6237eb08d6a52fe29ee4025cd2d47905a4dcd53b3824eb2394969037,2024-11-21T09:20:00.293000 CVE-2024-35242,0,0,af729293bc38f230b946b698cba4ccb5f1f51f8c7aa208a48fda5ace2e842e6b,2024-11-21T09:20:00.440000 -CVE-2024-35244,0,0,cbd208ecca55630dd2a1d4862e946bcbd061feebf24e87ee37a34c745a2dd951,2024-11-26T08:15:06.273000 +CVE-2024-35244,0,1,f8d34b89491c4d83874bfc6fa0b9bf2bf704a5871b9492a87875bad4a66bd0b2,2025-01-27T18:15:38.900000 CVE-2024-35245,0,0,574f436fd107b499b1a8b1a46c1845c58ea1e806916483b13195bc2deb9a39e1,2024-11-15T14:00:09.720000 CVE-2024-35246,0,0,f5cd38c8228a273507f8ed025c6445f4fe653b79fbcb96f80f0f271ece411ac8,2024-11-21T09:20:00.693000 CVE-2024-35247,0,0,dda0cd3411fcd13059f9606bedd08c571900aa945b233a955dbeca9ed9ce9feb,2024-11-21T09:20:00.830000 @@ -259353,7 +259356,7 @@ CVE-2024-36244,0,0,2f022cfe2e1db59f6b13b1a48d2629a07862efcd5464cb3b71b3e4db5fec0 CVE-2024-36245,0,0,f4aad1333a1c6e0f7c004598d9f60778db4744d5a31358047937f4003fffedaa,2024-11-15T14:00:09.720000 CVE-2024-36246,0,0,53c7d180a7e151920bb4ee94a68b0d7ae9eba01ccedb39ad3e3a6578caffa0aa,2024-11-21T09:21:56.127000 CVE-2024-36247,0,0,53d29889391cb09923a8f60eefacaa6f891b1e30847a5b71981f919f0a72bf94,2024-09-23T14:16:11.290000 -CVE-2024-36248,0,0,ec86b4dbcf6c4a20359d55cfa887026f28a9795ce011afd68d760ab2957012e7,2024-11-26T08:15:06.430000 +CVE-2024-36248,0,1,a7306ddcb804cb9b332f9d85489379f41e75431b134de7903a0500febcefeafd,2025-01-27T18:15:39.113000 CVE-2024-36249,0,0,cb50354962cdb5e29e24c0c30618414cd14e38ac199a48a7a6d20d3b55290302,2024-11-26T08:15:06.580000 CVE-2024-3625,0,0,cf7822922c953723f7708b175fb6862b465c211d35958a5ab499265593a6b04d,2024-11-21T09:30:01.103000 CVE-2024-36250,0,0,7e7a993f0589716a6daa68f43c8f6a3ca976236e7f62dc6019596010a75d529c,2024-11-14T17:11:23.913000 @@ -259421,13 +259424,13 @@ CVE-2024-36369,0,0,86335f126149b45fcfe791d3a51b05f9b5c2ef6682670204bff02f19d0fd3 CVE-2024-3637,0,0,21120798a280816ab7cf3ed70bbd1f108404954e011a1d26b78f2314da517882,2024-11-21T09:30:03.153000 CVE-2024-36370,0,0,7197b09dbd5b84f4171470c9be6f834edd16667f764d0dab4aed81738c95555d,2024-12-16T15:42:30.397000 CVE-2024-36371,0,0,beae7d114ca51288bcc971c126cbd91dfe3a175d32b595469dfc3189b7a03bfa,2024-11-21T09:22:02.753000 -CVE-2024-36372,0,0,0309d305f72650b3d9ec9b240ef4b7d6a4ba836542977bb391532c61133a7268,2024-11-21T09:22:02.920000 -CVE-2024-36373,0,0,8c6a834f536c076574ad82064aeb084b5c6999b5fb0af962d622d0856eb327de,2024-11-21T09:22:03.053000 -CVE-2024-36374,0,0,583ce814aff7e9f5e36bb72bb6f3b297ab87cf8a4d5e3279016030861cd6caa5,2024-11-21T09:22:03.193000 -CVE-2024-36375,0,0,afefa21f6e0578f3d1920264f24364919d32532e00ad50f24d28f4a7ce6d9956,2024-11-21T09:22:03.320000 -CVE-2024-36376,0,0,954cd32e13e8a53a15f00e8ff3939bd972260e68f3266e035a081e84214b8cc1,2024-11-21T09:22:03.450000 -CVE-2024-36377,0,0,ce5f52182dd7707279576a52f20f526f280cc048b468223f1452e833531c0810,2024-11-21T09:22:03.580000 -CVE-2024-36378,0,0,bc6a97d89084cc7599fedfcc409f54e4ebfc4c97d35b1d5f22bc1830e5d90b80,2024-11-21T09:22:03.713000 +CVE-2024-36372,0,1,372fbfef63703cf93d6911c25ac6a1b3dff36ab3730b92a722024f922c3e1785,2025-01-27T18:40:38.827000 +CVE-2024-36373,0,1,0e4fc9a9180c0c9193688c3e1cefec798a34fe557d4228f4c56dc7c87a62cfcc,2025-01-27T18:41:16.957000 +CVE-2024-36374,0,1,14e752f742ee92e52082d340888a4126e8f37c87c80a69c3e89b154e0353a923,2025-01-27T18:41:45.113000 +CVE-2024-36375,0,1,02b8002efb0901cbd8f4f5869f916ebe8e375854ff7490a271d903ead6d8ed52,2025-01-27T18:42:56.590000 +CVE-2024-36376,0,1,6461edd50210cfc46752fa81dbb9620b9ae82320c3aec5a0d36aa5f53504fa31,2025-01-27T18:43:34.573000 +CVE-2024-36377,0,1,5774a42bf73f3c41e6e49520f598d871b1eef9ca509d792dae9a70b2d31b0ce6,2025-01-27T18:44:59.970000 +CVE-2024-36378,0,1,30a1d5f4dc7b8e52011f1153e02eb226d7291e6e9dbbb1330ef0047c379e4d6e,2025-01-27T18:45:58.190000 CVE-2024-3638,0,0,a0e603bd5eafd59fbf4eda4332a70f4ff465bab094cf08cc0dfa6cf90aa9b0d0,2024-11-21T09:30:03.273000 CVE-2024-36383,0,0,dfdcebb9c4ed54272ace1d77d7b46f1144dff670c388870465409c92e750dde7,2024-11-21T09:22:03.837000 CVE-2024-36384,0,0,f4773f7602bde7ffb495e2fd0dc61ac13b6a017a351ab9847eb4b0f4191cb10a,2024-11-21T09:22:04.047000 @@ -260376,7 +260379,7 @@ CVE-2024-37520,0,0,c2601772804e1cfee195894ab6b7cf60b06b0ebb1999f0d1b12743ce6abf1 CVE-2024-37521,0,0,94bcfda156f2b0afbf34ae65d204fdf89b55e41cfa34ea7594fd744cf1c838af,2024-11-21T09:23:59.870000 CVE-2024-37522,0,0,3295cd978c20643eaff8d6fc73318ce6121ff0f18fc4f60672eec9a4623d1a39,2024-11-21T09:24:00.330000 CVE-2024-37523,0,0,4a58bbd7feffbbcd6d15592605f20e33ff3174176d45dec67c359454fa9e0b47,2024-11-21T09:24:00.747000 -CVE-2024-37527,1,1,a5af77d7b6365e6adc04f6e4c32c4fce6880d7fd833ee45fe5914d4fb64fb502,2025-01-27T16:15:30.840000 +CVE-2024-37527,0,0,a5af77d7b6365e6adc04f6e4c32c4fce6880d7fd833ee45fe5914d4fb64fb502,2025-01-27T16:15:30.840000 CVE-2024-37528,0,0,0e5038324fe3b6f9799a31c377c6705ebf03b5d5e405d251a1f9d9fdb58c17c2,2024-11-21T09:24:00.887000 CVE-2024-37529,0,0,acfccbcbfe6dfb16aecab8f7e844483580e6eb70a780b71713524bc635ce4565,2024-08-23T18:55:48.257000 CVE-2024-3753,0,0,3b84e54e67f6139460e801ecfefc293595c2c267d83aaee816ff9139d106a385,2024-11-21T09:30:19.350000 @@ -260997,11 +261000,11 @@ CVE-2024-38314,0,0,7f72becf752c493d63d9011af9e40e717b070fb953c18b5df93807710a713 CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000 CVE-2024-38319,0,0,85d07cf6ac4c3d39aed41b78f9915ec0d57e1f4cef6712c4aaaab05d2f91be0b,2024-11-21T09:25:22.177000 CVE-2024-3832,0,0,54d7cd70608d6ebf4d58d321fb2c71a056073b40f73450ca63d747b8e4ec1006,2024-12-19T14:53:34.190000 -CVE-2024-38320,1,1,15afdcbb12e8e8819a29ca7abd828d95a5b9e03b0e5d65c0530ebfff7e3b43cd,2025-01-27T16:15:30.973000 +CVE-2024-38320,0,0,15afdcbb12e8e8819a29ca7abd828d95a5b9e03b0e5d65c0530ebfff7e3b43cd,2025-01-27T16:15:30.973000 CVE-2024-38321,0,0,451e43fd7c3ce8a95a4f1d37398e013e2483fd40917c790d6dc74b359b1d32d9,2024-09-06T14:50:53.583000 CVE-2024-38322,0,0,8e573827e3fa52cf97ec6d2ef345cd31ae55ff6b4c10220d85ef83b3ce3ac344,2024-11-21T09:25:22.520000 CVE-2024-38324,0,0,6983d8cad1fd6c0c78413c4456f22354583612d01ccc038ac7f0199fa2c57812,2024-09-30T14:10:18.597000 -CVE-2024-38325,1,1,ce10677b3048ca308690463488aea61fbd24bbabcd1603adb726b781a7cad432,2025-01-27T16:15:31.117000 +CVE-2024-38325,0,0,ce10677b3048ca308690463488aea61fbd24bbabcd1603adb726b781a7cad432,2025-01-27T16:15:31.117000 CVE-2024-38329,0,0,9da02cb1c1e6e0ee0df6910cf16cd32ad52cc4fe1d821c256d156fa9c41a4422,2024-11-21T09:25:22.867000 CVE-2024-3833,0,0,70f71fc362a5e7d48ef4a06bca848d6c2e550860bbb53e401c6074b0eadf1358,2024-12-19T14:46:01.697000 CVE-2024-38330,0,0,f29c2fed4aa255682376d1bf1fe6f029c9aeaf29cb91e5ed615ddc69bd26c654,2024-11-21T09:25:23.523000 @@ -261453,7 +261456,7 @@ CVE-2024-38786,0,0,a3945d26053fac2588fcb2b904e0a138f2d9f54dc61623305952d8af8bf01 CVE-2024-38787,0,0,ce7fa025b58714f14aacaeb7eb2f416bc7734c686cf55df8ca8a5a341cb30431,2024-08-13T12:58:25.437000 CVE-2024-38788,0,0,3b35408d3a24d65f413e2071d9e6ff186341b76a67f561c74fad26cddceb0418,2024-11-21T09:26:49.940000 CVE-2024-38789,0,0,616de834d0980fad84dd5d262c2a5a5c3ff6ad2da413d7a0377141b71b3dbc26,2025-01-02T12:15:23.633000 -CVE-2024-3879,0,1,074bc3e4972b3513101e0e678069b78f6c106732c850ff6e35dd0948fcaffd97,2025-01-27T16:24:40.757000 +CVE-2024-3879,0,0,074bc3e4972b3513101e0e678069b78f6c106732c850ff6e35dd0948fcaffd97,2025-01-27T16:24:40.757000 CVE-2024-38790,0,0,405d212e30fbe17293eda7c0b0455d1fb06eb6a3f764318aeaba7963c03a8eb1,2025-01-02T12:15:23.763000 CVE-2024-38791,0,0,7eb8f94e68bf3536fdb2800ab03bca013d555a84b835d5cdd5aafe7b3cf9aade,2024-08-02T12:59:43.990000 CVE-2024-38792,0,0,e62ad1d58d17db35f23147b02103d010f9465e0c2ed86e9d15a60072344a696f,2024-11-01T20:24:53.730000 @@ -261461,12 +261464,12 @@ CVE-2024-38793,0,0,3abb4fadd98983f9c8a3f71f42811284ca10c92d1b43b534ec7aa2558a41a CVE-2024-38794,0,0,0e611d7d55b2e6c94eee9312ed11241297f8a473362db39470b8ea85723f38b2,2024-11-01T20:24:53.730000 CVE-2024-38795,0,0,e1f5c80ecd4b719afc803bc01646b0dbf082a41e566b00ce3cef907c999501ae,2024-08-30T16:31:03.887000 CVE-2024-38796,0,0,c4c33fa7474078d5c275288ac0c26a4a7de9b623a9c9f1253ec9f217f7c619bc,2024-12-06T14:15:20.437000 -CVE-2024-3880,0,1,0eca95febe9a4060aec92e25865874329486aff06b8e962d558db43d39fb2b5e,2025-01-27T16:24:26.973000 +CVE-2024-3880,0,0,0eca95febe9a4060aec92e25865874329486aff06b8e962d558db43d39fb2b5e,2025-01-27T16:24:26.973000 CVE-2024-38806,0,0,d61f695019d50acbdde73a7d510a5092b17da85fe958cba5e056d8daccd509f6,2024-11-21T09:26:50.667000 CVE-2024-38807,0,0,a2204cf6b5219cfc11a43201b1c9348674855cf3d23c1a37596020de7a79348a,2025-01-17T20:15:28.130000 CVE-2024-38808,0,0,f7692822ed338e14423df682d7a8e1dac807541fdd1521515ac7671d4f021e00,2024-11-21T09:26:50.877000 CVE-2024-38809,0,0,b3225093dd47dfd033e478c0e383a7b7582769a0a5104863121ecb9b337915fa,2024-11-21T09:26:51.010000 -CVE-2024-3881,0,1,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000 +CVE-2024-3881,0,0,38ab6d7d284c0ca3e6b9161a425cbc55ade2a75172ea4255ce3e799638ef4528,2025-01-27T16:25:02.423000 CVE-2024-38810,0,0,5eca7ced7ced269f1d8b6c6c4298e21e756532564a3f32db8863a6f0cdf6c0d5,2024-08-20T15:44:20.567000 CVE-2024-38811,0,0,e90c16a207e5ff636d7114e5326f61042c05eb2d83b5698a9b4fa38a3dcbf1d3,2024-09-17T13:33:32.957000 CVE-2024-38812,0,0,2e704a7e06ecb019d5085676217a7390700a3558f717063ea75069351632bd32,2024-11-22T02:00:03.353000 @@ -261477,7 +261480,7 @@ CVE-2024-38816,0,0,65fd0cf5f0fe6505681fcc328b56e581fddf781c33094976bd261108a87a0 CVE-2024-38817,0,0,d35b7b204aab6983c6c262b508cc4ec8ea32f0ec3634fab0504cad88bd52a03a,2024-10-10T12:51:56.987000 CVE-2024-38818,0,0,f3b0a463e446554a0bbb57d124414991153a9fb40d9dc2ce6360b72156684b2b,2024-10-10T12:51:56.987000 CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf019b,2025-01-10T13:15:09.287000 -CVE-2024-3882,0,1,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000 +CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000 CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000 CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000 CVE-2024-38826,0,0,aa0be29968eb435ec090127c9d271f3db29778a1347f10ec378a7a1554409ee7,2024-11-12T13:55:21.227000 @@ -262999,7 +263002,7 @@ CVE-2024-41098,0,0,338154d5c432c0e0ee0395715fa8ca7d8a8d003c58d81c84bc992eb663406 CVE-2024-41107,0,0,83c6526fdfb6ef6dff929ade85ab9b522a180ab80000abd63dbedca479d8d331,2024-11-21T09:32:14.700000 CVE-2024-41108,0,0,85bcf4b3bee4475a1b0965555c8b6cfa268f15dd754911b3b3bd214e1e4db83a,2024-09-05T16:27:50.103000 CVE-2024-41109,0,0,0544d00889fd70a6306bb2ecc94e1e71af3d9bb7a8ecd81ec693e3e34a9bebab,2024-11-21T09:32:15.027000 -CVE-2024-4111,0,1,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000 +CVE-2024-4111,0,0,d268156164f48b0f0e9e51ae197234d15d46877663cf4d3313a338684ed5680f,2025-01-27T16:25:51.970000 CVE-2024-41110,0,0,0828a9e37b792ec7f9f315cd5176ea4a8f587e66960bc38baf07e1b9b29654d9,2024-11-21T09:32:15.160000 CVE-2024-41111,0,0,665f20b9d755c6c7bb267dbd73a6180909ddc5c8215f76600ab07bc7c5da96d6,2024-11-21T09:32:15.313000 CVE-2024-41112,0,0,bc8e5f69dde8d72eb450e345c435e85ed4a2143be127dbff47fbc17d72bf816d,2024-11-21T09:32:15.440000 @@ -263010,7 +263013,7 @@ CVE-2024-41116,0,0,5546a46444bccb9de9544b6f3ce4d5e22554446a9d23dd1fc02569af6f6fd CVE-2024-41117,0,0,4748a235c3c4962c29c365cb725994bf3ffbdf2e4973cf7b4d29cf72eb877f3c,2024-11-21T09:32:16.157000 CVE-2024-41118,0,0,1c22d307e0d598e43676928b7e223a48ef13b5d81b0bf18408bb144799d21861,2024-11-21T09:32:16.303000 CVE-2024-41119,0,0,789ab2836440cdadc06d40217aae0baed51674d6118b6b91c971322c275e3367,2024-11-21T09:32:16.440000 -CVE-2024-4112,0,1,a6db2571a66ef7484d96c8eb2232de2ae1b7c9704f52b5c6cd3ce5a6d5c86a9b,2025-01-27T16:25:42.507000 +CVE-2024-4112,0,0,a6db2571a66ef7484d96c8eb2232de2ae1b7c9704f52b5c6cd3ce5a6d5c86a9b,2025-01-27T16:25:42.507000 CVE-2024-41120,0,0,5b938dd69bd2492a246908a754283ba6e9688c03153ff57c918b4a00a2e575dd,2024-11-21T09:32:16.570000 CVE-2024-41121,0,0,374711efd90f8bef888fc0a990e1377a432545303c0f660f4c0aa92e85f6e951,2024-11-21T09:32:16.693000 CVE-2024-41122,0,0,45d752aacfa539a5e009f40936a14e6a360821e6c83ae104526079fdf4e09c41,2024-11-21T09:32:16.823000 @@ -263021,7 +263024,7 @@ CVE-2024-41126,0,0,a90a0a33e308ebe055227766e956a7976d129bbc0d44bc113cdbf825781ee CVE-2024-41127,0,0,9eb06e7e7afb4581ed380c08eab16b9d2fccd3d7141940b9e2d9be711fdb32bb,2024-09-11T14:52:15.690000 CVE-2024-41128,0,0,b860de0d845432b3d072701521a1a9bd105f6fcf7637d586ee13a343093a7110,2024-10-18T12:53:04.627000 CVE-2024-41129,0,0,9b86c9fbcfae04a0d6ec928d00ec8144f1bb0c8252ea559be0eb2cb9015fb48e,2024-11-21T09:32:17.440000 -CVE-2024-4113,0,0,72c6c5e3b81ddb6d1eba05d4a95a039a4a42b4f14f33f64da1418863d4990d62,2024-11-21T09:42:12.717000 +CVE-2024-4113,0,1,126bf438cd31807e4f5ee3b479aa971c280386f79af1c021a56ce9a77973423c,2025-01-27T18:22:15.977000 CVE-2024-41130,0,0,8a531a7b9b2c9e9a48fbb35cbae7f45e6b583d1277cd9f3117ed3590fe7bd32f,2024-11-21T09:32:17.557000 CVE-2024-41131,0,0,b13f68f91d17c057233d6237f164be626ffc01087f73f5d67616045ad1ca2ed2,2024-11-21T09:32:17.670000 CVE-2024-41132,0,0,21e2550a463d43e47547ec1582b7ffa06a177bd0e793b049e9833c2ce64061b7,2024-11-21T09:32:17.817000 @@ -263031,7 +263034,7 @@ CVE-2024-41135,0,0,fcaf63fba315037fb68d1d925bded9bb7982510c754a09114db334bb9fd16 CVE-2024-41136,0,0,66a4dbf89fd7bd255917c11d586b96496446804dff8f7630b0119f8fa3ef493c,2024-11-21T09:32:18.327000 CVE-2024-41138,0,0,2f7a818785ef2934dbddd109df6f3e2783aff9964fe63637e4cf14a1f84cecd7,2024-12-18T23:15:07.813000 CVE-2024-41139,0,0,7edd0013f12a87999917409c6bc16963bebc3db7d6977be656bb6d2dc33a8c71,2024-11-21T09:32:18.463000 -CVE-2024-4114,0,1,df47c128dd44e8de848f43cd2e4eaabcbab418e785226a36dd24dff1b6e661e3,2025-01-27T16:37:59.997000 +CVE-2024-4114,0,0,df47c128dd44e8de848f43cd2e4eaabcbab418e785226a36dd24dff1b6e661e3,2025-01-27T16:37:59.997000 CVE-2024-41141,0,0,9fdd7a5cfa6dfcf4e31de8f662634169e83526c98d82fdea951ee52f3c3bade3,2024-11-21T09:32:18.643000 CVE-2024-41143,0,0,8799e9b8f93d667e7053f384d3b50025554822f122dd37c394e433231808cac2,2024-11-21T09:32:18.823000 CVE-2024-41144,0,0,d705e4f77b5a2c06974e9e65f896eaf4fba04d31882cccffe75db10bb34113df,2024-09-04T17:25:48.123000 @@ -263945,7 +263948,7 @@ CVE-2024-42366,0,0,fe2de9d85a95a85521a76d5ce40ade16338e4d44476acc8cc15bd153081d3 CVE-2024-42367,0,0,e34dd363e9e6032e059689ceff268db7a36b09f4bac71bf0c668383e8d6376df,2024-08-12T13:41:36.517000 CVE-2024-42368,0,0,19e372245223d5bb59e2a2b159dac4fce32005cdff2c12524f2e355da94a1885,2024-08-14T02:07:05.410000 CVE-2024-42369,0,0,175cc06a3214faa9cc4f994eee20c18b9c3cdbd351d8ab0c3628aac013a129a4,2024-08-21T16:01:03.147000 -CVE-2024-4237,0,0,b20c5ad39c0385603994a0542e2a37cd4eb08fad144409e976c8131f6d6b9bb2,2024-11-21T09:42:26.740000 +CVE-2024-4237,0,1,d086b479a235cfd23d8c9e6a65bb640182ae630c53f963ea26e200af8e904637,2025-01-27T18:30:46.217000 CVE-2024-42370,0,0,fb45e8374e6b9dfd8ba399fc52468c5ab90165e8dfb493be201217bd79216067,2024-08-12T13:41:36.517000 CVE-2024-42371,0,0,79d0e8d47270daebec3558cc4f9f2971aa2c0eef2d46f12550a8ae9aa1311ae2,2024-09-10T12:09:50.377000 CVE-2024-42372,0,0,f7515fc63bd8d58ab7ded6dddec55b5533c33f15e14b5bb1471595528163282b,2024-11-12T13:55:21.227000 @@ -263956,7 +263959,7 @@ CVE-2024-42376,0,0,70b2ed844f5f5d52a703acc017ce3f1167373ce910b91a9fa309c0ccf1aa8 CVE-2024-42377,0,0,f117b4c9befba2072a8dc0e5c8763a040d85fe6515fb405918250c2bc79d576d,2024-09-12T13:42:11.890000 CVE-2024-42378,0,0,f8fcdf03a2ac8ef7442ea7c682b701390cfc77596b63801c492b2f8e02149cd9,2024-09-10T12:09:50.377000 CVE-2024-42379,0,0,3df4e462d3527273fa2a98871af6d02d089a425040231b6521435b06449dcc55,2024-08-30T20:15:07.623000 -CVE-2024-4238,0,0,0d6255dd82dea5f918f23a39011442dad8b3d53f7a0733a62bcb3461c79fbc44,2024-11-21T09:42:26.877000 +CVE-2024-4238,0,1,3a6f15f4abb9b2bcd3529d6698e0950fb61b1877e47bf08df1fde84d34a4a17e,2025-01-27T18:30:38.047000 CVE-2024-42380,0,0,f5cf20e85a42eb6fc87763733e32ec13309432f800ade0c8de2264de21b5e67e,2024-09-10T12:09:50.377000 CVE-2024-42381,0,0,4ad4e72c80fd595bfacd579dabc071e2aad28cec659bb92e52558c1b5bc745b8,2024-08-01T13:59:22.207000 CVE-2024-42383,0,0,bd6d915768ab07a76a5a3491443d3f3b22301906720919ec4fc0c8caee69da48,2024-11-19T17:55:22.020000 @@ -263966,7 +263969,7 @@ CVE-2024-42386,0,0,f637c6e29db3a932a73b0babe327a291286e1298cbca062f259b926c61629 CVE-2024-42387,0,0,6db09cd6b87be7eb66d06055b72bb4da2bbb3b61e64e613e9bef1462d3d7b14a,2024-11-19T17:51:41.980000 CVE-2024-42388,0,0,bebe6e26c4bd89650570e7fb4afd0a077457a9064454c875331eb2bef31a8a7b,2024-11-19T17:51:24.567000 CVE-2024-42389,0,0,d1facba9cd355ee3f1aaaa73c24f28f6683713204f9995ac7fa1a505af6f4ccf,2024-11-19T17:51:10.533000 -CVE-2024-4239,0,0,5353128b303e08a82337a1fec92d0551a50a020bcc853d68cec83c6944b80299,2024-11-21T09:42:27 +CVE-2024-4239,0,1,9f0fc9ab45e9b4700a9f5a9bcadbc2279d47af4f3d5e0da632a5ee3ed22f5aa2,2025-01-27T18:30:27.657000 CVE-2024-42390,0,0,6af73265aa7930e3f247fed52d5381a6e0543aab80a4a47f6148f31469daa447,2024-11-19T17:50:51.907000 CVE-2024-42391,0,0,6781afa12f610e476bad72897c3e1f30b3a73d3fc9fb04875ea4d1a62e7964de,2024-11-19T17:50:36.100000 CVE-2024-42392,0,0,2c26a67eda70465463e787ba5eb392522c177d4870d89ef09741d80e9b63e126,2024-11-19T17:55:51.430000 @@ -263977,20 +263980,20 @@ CVE-2024-42396,0,0,5390cd7f6f1ab0915efc53badd52dc2da60cdfb9cd4d06ec147e900e3252c CVE-2024-42397,0,0,f1360262dc3edfdd0f619ccaff827860de1406df411c6a17089e8dc3a0ce3034,2024-08-23T15:06:46.023000 CVE-2024-42398,0,0,36a8836ffbb3692d86d6711548d3ebb0ddc1803f5f2e04579ca527bbfaddb2a7,2024-08-23T15:06:25.930000 CVE-2024-42399,0,0,506142db09c821dd3d6ad2ff961d3e036eaba630fcdd840a57cad040888a4154,2024-08-23T15:06:13.350000 -CVE-2024-4240,0,0,ee33d8019cc9f4293f7f230ae345e4e79de11a4c738d52234a7cdc0be1287271,2024-11-21T09:42:27.130000 +CVE-2024-4240,0,1,0e5f31784b7162c087aca37e585256441c15b32a7e0d4b2098e6ff8a1565e011,2025-01-27T18:30:07.563000 CVE-2024-42400,0,0,b23dfd205967d309343e484e6eb5c901d62a0b3953c77493b57f0104c8430fad,2024-08-23T15:06:00 CVE-2024-42404,0,0,bb61ac33954fbd9cb789abfbcdde8b366f1c0c5dfe94d454dc594181179c8a15,2024-09-20T12:30:51.220000 CVE-2024-42406,0,0,27ec0815435bbda0c2431d4630bea0ca6b595a1297245017087d145f127b6444,2024-10-01T11:15:48.450000 CVE-2024-42407,0,0,f0d739bc84cee721cfefadcf95caf855718a30db3f3991b30a719354873792c9,2024-12-12T02:15:23.017000 CVE-2024-42408,0,0,fea0cc9e4f3c35832fcef20074d7bda9403a00e74d9e32437a4416b7b17d8e5d,2024-08-29T14:22:45.603000 -CVE-2024-4241,0,0,9793440d84093b6f47af29fa0d1c3f9eef427a6a46d154a9ff4c6bc56e4239dd,2024-11-21T09:42:27.257000 +CVE-2024-4241,0,1,7c626df675573c13887e12ea562d8d3f15e47e4402d7c6d9be6badebb23cf773,2025-01-27T18:29:59.080000 CVE-2024-42411,0,0,4ade0497533c50e3de8b82e11fd54f8955ce17bc8d332a9a9a0d03574bff419f,2024-08-23T16:04:26.227000 CVE-2024-42412,0,0,25166e54538fd07ddb221cf849e12a37ba336aa564ff3a3b17a2568fe13b34b5,2024-11-26T08:15:07.073000 CVE-2024-42415,0,0,c1b377a5ad366a542f1771b25d0456c8b94faa8823ef3c03f81c602fe5a4ac6d,2024-11-21T09:34:00.623000 CVE-2024-42416,0,0,613a492b868ab9acf279167eee40f4fd55cddaf34a95f955477eda14651880ef,2024-09-05T21:25:09.273000 CVE-2024-42417,0,0,f1c80c711a679210ceb5e01a64e3cd4fa77e11abf5bc2a3fb017e31ac06ead65,2024-10-08T15:43:05.720000 CVE-2024-42418,0,0,d8c279b34a2436c7978f2dd5ccc38b1a5c29d1a2243b3f21749da924dbafbcdc,2024-09-04T18:22:22.583000 -CVE-2024-4242,0,0,16229b202f4a4845ca60d143db02216ab4ba7ead852059b884da5aa41d2c383f,2024-11-21T09:42:27.383000 +CVE-2024-4242,0,1,4ff5a517ebe58f036a76713683ac8fcf9970f47f5a76e6ec9a8aba3ffb1d13d5,2025-01-27T18:29:46.497000 CVE-2024-42420,0,0,c141965d63744fc1061446ee1ae1162360d4790ebb601639ac109ac40f0d20d4,2024-11-05T19:39:31.913000 CVE-2024-42422,0,0,f64eacceb341ef4b768f40ee59a3acc8f645f72652a962c616340fa5fb7a93cc,2024-12-03T13:15:04.987000 CVE-2024-42423,0,0,8264e3551cb249dc1d0a50016c0beecba4be32a4ea61b5936f8d0d7397afda33,2024-09-20T19:42:20.417000 @@ -263998,14 +264001,14 @@ CVE-2024-42424,0,0,cdd20f106ec5d8232f1cf93d7c25f7e27225ced2de6387354bfbd69f26558 CVE-2024-42425,0,0,4b136399741737f30b4c8074218caee04298fffe4ffb70bb1828268e47340c65,2024-09-16T15:46:03.110000 CVE-2024-42426,0,0,542eed5457725706713e83197f6e7952048061b311624c0a21287ef612b42519,2025-01-08T20:06:04.867000 CVE-2024-42427,0,0,e27087303ea5100deec42ac0b4f9f58e1be3170e3db42adb071e149bc5ec50df,2024-12-20T14:43:52.363000 -CVE-2024-4243,0,0,fca6a85a4835b49fddf5d0335fd4a7549a8fc3f34d76f463d721c47ebcb74e87,2024-11-21T09:42:27.497000 +CVE-2024-4243,0,1,e148792f26221a83a9c7b949d7d3c4371137ff88a8219c8e0ba52f2a37183199,2025-01-27T18:28:50.187000 CVE-2024-42434,0,0,9351c3a6511f8bd4654b992e3a2dc28615806892c5ceb04ccff2f3cbfaf8ce4b,2024-09-04T21:35:50.963000 CVE-2024-42435,0,0,358ce7d8c8d4db67db4278a345f7cf0453db05c04348a1ea4af0bd0f5883a07d,2024-09-04T21:36:53.027000 CVE-2024-42436,0,0,b64bcf86e0c0210227910e05e4ec1faad8bda188f7cf4d15e6a04fd4be635e98,2024-09-04T21:38:05.587000 CVE-2024-42437,0,0,51a1c52dc1f3491ede4aae9b7bafb9c51807ad0dca63a6d32fb93870c7c5e68a,2024-09-04T21:39:02.570000 CVE-2024-42438,0,0,2c526fb21f48d4038d00d8e2759d4c6444d5b5d2420a33ae91430a33df348c3f,2024-08-29T00:01:59.503000 CVE-2024-42439,0,0,b33c2f3e3b8aaca19d134320359fcd40e49507166f36f5cf749ba8a0bbdacffb,2024-08-29T00:00:11.627000 -CVE-2024-4244,0,0,3b8d7edf2ed63df8044e422aeb1b780c9c45f9ae3662ebada3be0b2a6c45b155,2024-11-21T09:42:27.643000 +CVE-2024-4244,0,1,f0763faa282204a3143e65ed724762a293f636f4b57a3b9e02d3bfc3986c234f,2025-01-27T18:28:39.927000 CVE-2024-42440,0,0,e21d9b776ef80bd04d695f0a47e516545028ac8225f143837019c4c0b08b76a7,2024-08-28T23:59:01.537000 CVE-2024-42441,0,0,04cb6e9a13f27c86bb2051d7eae465da3e0fd75a34af891d94c6ed0cb275f3f5,2024-08-28T23:58:06.960000 CVE-2024-42442,0,0,c95b9702729f1aa9eb8ceba5f94968c5cfabdca93c030d049ba8bcc0788889f5,2024-11-12T15:48:59.103000 @@ -264013,7 +264016,7 @@ CVE-2024-42444,0,0,9c10c1c787216d53ad642f4276dcecfc578d8b3c31bd900159c9e2c546a30 CVE-2024-42447,0,0,f2527a1907bc97edf5fa3092632226feebddfd1518376703abe26c98f8cdddbd,2024-11-21T09:34:02.990000 CVE-2024-42448,0,0,b2ac39b31ded9216cdbe436ad867b986a202acfcc6e34d426fd4cbd2727261bf,2024-12-12T15:15:14.230000 CVE-2024-42449,0,0,9f33ee15a72f8c53ed840f00741624888679f87eea5e3eefcd0793f447b6eee8,2024-12-04T02:15:04.533000 -CVE-2024-4245,0,0,62da03c7c45f5715870c7452d2ba39c7dc4793b1137a1a68a18eecf037a816ce,2024-11-21T09:42:27.793000 +CVE-2024-4245,0,1,be3a6e7e50f89039b3f92716fad77dfc4646bdeb99ea52a5e8d78cc79838f227,2025-01-27T18:28:31.410000 CVE-2024-42450,0,0,247371642f216621957d3ac8101b783a7fea35b11410d9c1546f4dc5a8778b9c,2024-11-19T21:56:45.533000 CVE-2024-42451,0,0,67a2d3f7f42da0d3267c4476e46a796034f6492f402bf038b0df4c8dade1e762,2024-12-04T15:15:11.273000 CVE-2024-42452,0,0,531a4c7540007052124e5ad2b9b5c69f93a18b0c168fa88782e33c36451f813e,2024-12-04T16:15:25.317000 @@ -264023,7 +264026,7 @@ CVE-2024-42456,0,0,efb5c3f45e3127e3707965de4afcf93791a6ab75ed878e1c5f8b37c504034 CVE-2024-42457,0,0,4a71384cbc43077c7d53cca837ac6a5d6b239897444377ea9bdb72ab2b7e8354,2024-12-04T16:15:25.450000 CVE-2024-42458,0,0,8f72ad541a5be2b3d759c1055331f57f852df6e6ebad4f8bd9e131c06e146f2e,2024-09-05T15:51:34.307000 CVE-2024-42459,0,0,7b3471a00106ecbf4ee6963a89ef81d0782ab46c1de87e7ae4b567071ea36b58,2024-08-02T15:35:44.213000 -CVE-2024-4246,0,0,7124453bb5956e021062f5087d618666de4d038d88184e7649d383027fed48d1,2024-11-21T09:42:27.920000 +CVE-2024-4246,0,1,96bae989b7a45325798c186c4ef1ef7441bc48a2864267fe5fcc6d79fab72508,2025-01-27T18:28:04.913000 CVE-2024-42460,0,0,fe90277b0f8b69362054079a89080163f86239410e3be7a35528caec932de790,2024-08-02T16:35:53.760000 CVE-2024-42461,0,0,d1379dac1fb76ef29e74685516c506a6644bc37843236915ca540f3d7994c1f8,2024-08-16T16:51:40.270000 CVE-2024-42462,0,0,26515453d1ca375457d7574769d6dc78542bbf666e8adeb6453a6823a16c3193,2024-08-28T20:46:39.227000 @@ -264034,7 +264037,7 @@ CVE-2024-42466,0,0,77b91de9cb55c4baccb5892db983e1572ecdac953c159aa4a25bb364543e0 CVE-2024-42467,0,0,f59f7dfb8ca113548db8eb94eaea9a743831c42236caa3f451ec7ca9427c8604,2024-08-29T16:26:43.947000 CVE-2024-42468,0,0,91c14dbad0da95a7d20ad07c6ebbc6085068bc54fc3eef0d212065df746a9974,2024-09-12T16:01:42.113000 CVE-2024-42469,0,0,bd532ffbfcb2510bddf31f3489868340a08ae9cc539bc98fff873ea7f9675c22,2024-09-12T16:02:35.023000 -CVE-2024-4247,0,0,026ea97df26ebfa2459cfc0be0355aa17efdb50861c588da4ecdc7266d52e5ae,2024-11-21T09:42:28.047000 +CVE-2024-4247,0,1,e2c32973ec866d69a456d8020bb1093697b61f3d45bed8d833907687beee7e21,2025-01-27T18:27:53.547000 CVE-2024-42470,0,0,8b7b5dccd48e502c3b09a254aa458aad8ac26b6024d8fbceaeb5d75e56828aec,2024-09-12T16:04:23.273000 CVE-2024-42471,0,0,01016b6961542540c9e85c1c0d3ea95d840e158f609d85ea36592987c1f7689f,2025-01-23T22:15:13.320000 CVE-2024-42472,0,0,db9f0de24b1225cdc8879f2296bf2f39eb10609a5468059691ded7e4227382ef,2024-11-21T09:34:05.540000 @@ -264045,7 +264048,7 @@ CVE-2024-42476,0,0,2ec3d50e4aba7797771fe229bfe923be4faf6fccc102ea345e307dae6607f CVE-2024-42477,0,0,257381a9460b810c8d9552f0f041189bd673d909dc71fa769645bd173e0eb051,2024-08-15T14:02:23.130000 CVE-2024-42478,0,0,b96da0a31fbd5be47f5f1b7aed8d37eb6ad2f6f2758f5ef4ab050f8b56654357,2024-08-15T14:03:32.867000 CVE-2024-42479,0,0,476f982353098dc0d23eba10f28aa5f0977e0f7444bf182d00a0caec82de63c7,2024-08-15T14:03:53.203000 -CVE-2024-4248,0,0,d0807bc81e3fe682cb9a98b29b0b47ac2bf3a683edb386d63d0af41034bded9b,2024-11-21T09:42:28.180000 +CVE-2024-4248,0,1,abac47102e25aa75f3184d01dd60d2ab07e33aed41c48e370bf194ef582427f3,2025-01-27T18:25:53.377000 CVE-2024-42480,0,0,f245a2a6abf8f1381d5da5942da1584b3090d4ea8b1e8e140b9e5e59c022301c,2024-08-16T16:24:40.430000 CVE-2024-42481,0,0,1cf7467102cab324db84850b30de9295fb1bdd0bf99c39d63c49fa8ac987952e,2024-09-16T17:10:15.713000 CVE-2024-42482,0,0,d76cb3cb62561a7a8d5b9411bb872aed1f1e2617c9c1c8b81f4e233090c99b49,2024-09-17T12:20:58.323000 @@ -264056,7 +264059,7 @@ CVE-2024-42486,0,0,5e258091d4269bbb603707abdb74884df4bcf0f4d1aee654e54be2d1c8a5a CVE-2024-42487,0,0,0aa1ceb8eac24022c9f7b4ed2d188798ace5059112fc9e644c5065c4c87ad84f,2024-09-30T18:31:04.757000 CVE-2024-42488,0,0,463b9c8c123e581d50f34d344fb4cd7b6197434a8dce90d328289af47c2ce2e0,2024-09-27T18:49:05.410000 CVE-2024-42489,0,0,8e38c6dffabed3c3efb732ec4d9a919dc6b3fac404852967d434dd179919e545,2024-09-16T19:46:18.913000 -CVE-2024-4249,0,0,054d3af95a30b4dd3fddba446fa46c92029e8e908f555faad08b5f6b7182df25,2024-11-21T09:42:28.310000 +CVE-2024-4249,0,1,a72dbba20503da07cc3ddcece24be97e2fd00bb72e6f5901be2b6b5c31c88060,2025-01-27T18:25:30.817000 CVE-2024-42490,0,0,550d80cfc0d653c4329d06e9e408c8c4e16317fcc8b2d04396c03c01ec573efc,2024-08-23T16:18:28.547000 CVE-2024-42491,0,0,8a9b0400d0c20078bd76bf8031432bcb00200f7bd0b355a435062fdc969a90d9,2024-09-06T12:08:21.290000 CVE-2024-42493,0,0,47a925cbc13f370892e423ab30b6f060aad684f013e0acd9d4deb7da7003a2d0,2024-08-29T14:24:14.373000 @@ -264065,7 +264068,7 @@ CVE-2024-42495,0,0,ee3925134b1396bfaa53570094be7e292b01da9faa4b048760c4c0dc97507 CVE-2024-42496,0,0,45cfb8ce4906463f47c8c6f63b71197e1fc7f260167725e905fb98b42a362766,2024-09-30T12:45:57.823000 CVE-2024-42497,0,0,2f6ed392790a6bc9c7c1c0d8a56a5ccd81d76a00931a2200e1d4d5acef798b32,2024-10-16T20:05:09.183000 CVE-2024-42499,0,0,0586563ed5f4c14149e73e86cafa90686950728edb11138de14b9f1c3a2cbacf,2024-11-18T16:35:04.877000 -CVE-2024-4250,0,0,40200e601b469d7ffabb1988602e5a6f422f1dd547965dd3a4b9af30271da05f,2024-11-21T09:42:28.443000 +CVE-2024-4250,0,1,089ddc994f46eec20de4476d1e9a20f0feac57ceb365d73afb9c83f5aff61f58,2025-01-27T18:24:21.787000 CVE-2024-42500,0,0,bf58b4b629cd64e9823f1e90bff8b15c1ee43bd6f713bebf4309e2f7d938fc80,2024-09-10T12:09:50.377000 CVE-2024-42501,0,0,9bd52ebaa35c0971d9bac8b28fd92e04d360d7cd72d92ea072bf6929dd327daa,2024-09-20T12:30:51.220000 CVE-2024-42502,0,0,24a98871684c67352c73dae5a45a3d3dfe5e54590f2d6572aa7ec9a03f78b8bf,2024-09-20T12:30:51.220000 @@ -264076,10 +264079,10 @@ CVE-2024-42506,0,0,73b87433d8fb989aeaac28805ff14ef548edc308594b87baf1e182a12a865 CVE-2024-42507,0,0,13023674aeb3a0b8ad91b43058bc9cfb766bbd64576b39f32341fb17667ecd28,2024-09-26T13:32:02.803000 CVE-2024-42508,0,0,ec42824e3746b3aa7a087cfdb36acdbd5e330e597ee83b078dbadd61f7936aab,2024-10-29T17:38:49.330000 CVE-2024-42509,0,0,eca853432fd85e8e27d923a0722a00e8ab0664b46803cacaccfabef1e63cca54,2024-11-06T18:17:17.287000 -CVE-2024-4251,0,0,a693a00b7c1e210391f1f2e3b868df34eda7b58fe66275c575dc8c7be6108671,2024-11-21T09:42:28.590000 +CVE-2024-4251,0,1,6a333dd704aaa4313e0204d6e743164fe6a8a7155958341655c766a433d4252d,2025-01-27T18:22:36.203000 CVE-2024-42514,0,0,054904ffa1271a48858c27639a4f212945cad4d4eba2b0403080625082e79d9d,2024-10-07T19:37:19.973000 CVE-2024-42515,0,0,b4ba8f757b46c5b5582e08c4488010c57606be0ab98ee3dd9524f14ea7dfdfcb,2024-11-01T16:35:25.690000 -CVE-2024-4252,0,0,a16d7f1b14fdeead554ec5a1fe22a4ea7c1c0ba091f86e35f0c1749fb3909e95,2024-11-21T09:42:28.720000 +CVE-2024-4252,0,1,b027ab4b8de5ee8c4baf37e041444c874ccee9af350563490b809bedf82aa24f,2025-01-27T18:27:19.633000 CVE-2024-42520,0,0,8efdfa32af414d36b5f0e9904b69a768bde856f36d5b8c9699ca2d90a3457ec9,2024-08-13T15:35:16.110000 CVE-2024-42523,0,0,a429cb15d4b9f1d02d6635c52caa08de599d191dd724acfaa766c9a840a40d88,2024-08-23T18:35:03.563000 CVE-2024-4253,0,0,94f4b3b971528e4ade536015da597207aaaf4be67cbabc06ad7ccc58d403869b,2024-11-21T09:42:28.853000 @@ -265751,7 +265754,7 @@ CVE-2024-4489,0,0,4a6239b5b0aee873857d1503baba553bb76b91f5782dbe433a69a6d5052ad5 CVE-2024-44893,0,0,52016ee271f9a468ab127b7483a02b0060ad410b06f3e4feae0c7bc73e48b640,2024-09-10T20:35:15.200000 CVE-2024-4490,0,0,054509a6c9ec9ae62206574875759d320b58cae59eaf518e949bc43d1c0d9aa1,2024-11-21T09:42:55.980000 CVE-2024-44902,0,0,e85f35417823134dd49df22ef9112c798d5d49353e9fbe9fff57bcd79d25fd46,2024-09-20T14:55:38.087000 -CVE-2024-4491,0,0,242d95e47d2d4d548ed306944bb47ea36a8364e55bca41ab94354b4a2faaf48f,2024-11-21T09:42:56.097000 +CVE-2024-4491,0,1,44f6ea2b3bdb2c2b126d1862dbc937b1bfc717788d8a3e14a2b3625f881bdcf2,2025-01-27T18:35:34.717000 CVE-2024-44910,0,0,9e63384fefb3b007a6afb1857ede4d2d91d2a348ff574287ab43f394a1fc6472,2024-10-07T14:27:42.757000 CVE-2024-44911,0,0,144649347b341937a18b32faa388f2c0f4c8295349f31ca4a663a3b73e8cb10c,2024-10-07T15:00:02.707000 CVE-2024-44912,0,0,ed6f759e1e44aa86b4a8a15fd81e0420579b40f4c104aa1f55896209eb05e5be,2024-10-07T15:00:17.977000 @@ -265761,10 +265764,10 @@ CVE-2024-44915,0,0,6d0a9fb2b67194e54473214f93703f0466ac6ee309ff391c09bff985eb1f4 CVE-2024-44916,0,0,a2454cd65ccadb405588fa3000f5dd4b38e21503648887164ddddbbffe8475dd,2024-09-03T12:59:02.453000 CVE-2024-44918,0,0,38b2190c51d8892de1b2f20d743736f8ed3ebf0e22185614593c23bcc652acf8,2024-09-03T12:59:02.453000 CVE-2024-44919,0,0,fce23bad8dbb22330b1ce6e8e832ac0957c2817649ad28e9b917bb8b7eca034d,2024-09-06T22:54:56.927000 -CVE-2024-4492,0,0,6433e3244ddc2dd90a2996fbf8a5e08364a8772470d17de8587e24fc3acbae71,2024-11-21T09:42:56.243000 +CVE-2024-4492,0,1,8106fdc3078ac2e15fc82eb73e1ef10d3eaf6f677b9b5f218a1efc8701aa0d6e,2025-01-27T18:35:21.830000 CVE-2024-44920,0,0,c5fb88a2362683ade7e9c4b1f782a93a4e5d9e623ce6137f74666b2f8c92c36d,2024-09-04T14:59:58.250000 CVE-2024-44921,0,0,055c59ede9f29d1105db95f39a0151af5b78aaa7c6639f5e70b49cc5ccdf26b5,2024-09-04T15:00:15.103000 -CVE-2024-4493,0,0,d0b3a24657c862be56d3ef47fe1ef3ebb9259af7e9984956c8ee5e29bd293f64,2024-11-21T09:42:56.477000 +CVE-2024-4493,0,1,093ffd2448ef32cc7e7d6e3e63f41ae8a717e5ad0f7a8dd58b77e6cf9f03fb3a,2025-01-27T18:35:12.380000 CVE-2024-44930,0,0,8759c85cd14a9242db5b7a7eec49e4ccaca211154d1f85610b73627727a621a6,2024-09-04T19:35:13.800000 CVE-2024-44931,0,0,d485cff7907d047be755cc42c3c4192aa67baf5ba8d26324f1edbf99c2e9a1da,2024-11-08T16:15:22.593000 CVE-2024-44932,0,0,886f572c9b00d74a0f101b8c9b5bde4202ed00b758a1f3e76183a399878622c1,2024-08-27T16:08:45.020000 @@ -265775,7 +265778,7 @@ CVE-2024-44936,0,0,a8c5967c99cb2f867c1e42dc3ea7410a5f670b285233e2907b309bd6c7928 CVE-2024-44937,0,0,7cb404d3b1dc9c44f1da0b8080626a99d79cd0314dd1ad0438b3f7a2533eabd3,2024-08-27T16:10:11.423000 CVE-2024-44938,0,0,78459f64f256ce31d587bd0dfef6ac35e6826d27577c89c7416fdd61c9dde2d3,2024-09-12T14:05:44.310000 CVE-2024-44939,0,0,4b52e4870d6b9ab79a8ccc1b0dec3137a1257518ff111a37c49e72f3eafab8a4,2024-09-12T20:58:03.783000 -CVE-2024-4494,0,0,b7c1c2a174f740408dd0c808ad1f58e8bf83c7deddddf334c05e84d93f1e651e,2024-11-21T09:42:56.687000 +CVE-2024-4494,0,1,e70853544a5a9d9119223c7aacdc5b4149fd41f04746ef263c446bb5b0bb50ab,2025-01-27T18:35:05.170000 CVE-2024-44940,0,0,ffb7c35aad9b45208e70147f6f0a5418dcbb7c42ae6a5ef181165b936fd0ec91,2024-12-14T21:15:22.873000 CVE-2024-44941,0,0,b3a528e2c887c49188369c9f2f22fc5d6f90a1bf129490e5dba5159a70e63a29,2024-09-12T20:57:26.143000 CVE-2024-44942,0,0,fd3912c6d42efe2c3918e14d2e682ba3dc0bc8510bde94698d262f0833e376ca,2024-08-27T16:09:10.010000 @@ -265786,7 +265789,7 @@ CVE-2024-44946,0,0,2216be89407f69b7a66d357b00256c887df360d9639d29eeba9dcf5caa345 CVE-2024-44947,0,0,8f801ba5159e9b8f9b3c4016ab8510468b13ef5ef3423053d9ce1c290e857f10,2024-11-23T23:15:03.810000 CVE-2024-44948,0,0,b6624809fc4e7fad2ef29d7ebf62dc5527a907fa09ba4a21a20058ddaf98aede,2024-09-05T12:53:21.110000 CVE-2024-44949,0,0,828c604fa57423408676f510060dbc029847256085d4490faaea8281224c06bb,2025-01-24T16:15:36.763000 -CVE-2024-4495,0,0,2c130c223b9972e591566196e9584b086727f4fd658b1edaeec00471e6f0d275,2024-11-21T09:42:56.860000 +CVE-2024-4495,0,1,6e709f9ace414769d9cc3ea8289e9243ed8a2c8061b26956dc3b3654ccc4087a,2025-01-27T18:34:53.583000 CVE-2024-44950,0,0,27e2180bd27b63f0d75864bb94426d70ed574ad49ccac5abe47c96450a1c2433,2024-12-14T21:15:24.140000 CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cdb0e,2024-10-09T14:27:43.973000 CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000 @@ -265797,7 +265800,7 @@ CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b5 CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000 CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000 CVE-2024-44959,0,0,3531c3974406a7942cd130199b16b11a3d01f1827f0f3870b815c6404cda15a5,2024-10-10T17:54:07.960000 -CVE-2024-4496,0,0,89836cb5696552b2de7a5143c3db83023897a4c3c8b38a6bbafc268be5ab4bd9,2024-11-21T09:42:57.020000 +CVE-2024-4496,0,1,d59b9504e5ae27ae604eb57f8cda4550e9c439a79c3c7c8da513f5c39722dba6,2025-01-27T18:34:21.687000 CVE-2024-44960,0,0,dbf4acb7acd9f476aa036d54245f001e746c769d7cbaabee1b8cc99064697647,2024-10-04T16:44:05.497000 CVE-2024-44961,0,0,16377c52fd1e3305714d5f046527b5c9372e5016153fb6e263221a353e000d79,2024-10-04T16:39:39.300000 CVE-2024-44962,0,0,56b46f2c55a0815cb473bf33124ffd494414fa1f3858cd5c765de327b0bc0217,2024-10-04T16:20:34.550000 @@ -265808,7 +265811,7 @@ CVE-2024-44966,0,0,a8e55f1b3074e6ecd6c0a4e417ae86a4f68c14d37643ed6ae5b46e2113e3e CVE-2024-44967,0,0,37134c082377be8b037d08423011cfbf523c2cc195742e3dff3642d9ff823f1d,2024-10-03T18:21:17.230000 CVE-2024-44968,0,0,ce125a25d3c30f7a72919df7700ce81444a91bbaaf627de45948c0965947bc5f,2024-10-03T18:04:57.973000 CVE-2024-44969,0,0,ce794431b0ea0638f6947fdab2e5b6ea488357e12cebdddaebde3586e375c684,2024-10-03T17:38:41.333000 -CVE-2024-4497,0,0,3c376d8d5d0ce1d5077063896b336176039fdcec700121f9a95a7b55ddb8c2f9,2024-11-21T09:42:57.170000 +CVE-2024-4497,0,1,d00f14b966ec3839229c0e2b292f1f13b11b14c3ec3334a90e7d961813a3aaa0,2025-01-27T18:28:00.433000 CVE-2024-44970,0,0,d0e7d1765453984e6d79867ca42cf076f1d9ac20c725203ba3411939c2c13c2b,2024-10-03T14:22:06.003000 CVE-2024-44971,0,0,07358ce3e56ace28ea705660054feaa3e330d07c06aed33b8eaf38fa4ccd065e,2024-09-05T17:54:36.607000 CVE-2024-44972,0,0,75bac553775af1b7e12806f05696df369b9516e2506b9c007587dfbfb1e43049,2024-10-03T16:10:12.077000 @@ -266322,7 +266325,7 @@ CVE-2024-45594,0,0,651cebc99a25a678ed80943347c1bd3bdd4d373d64b9fb0bdc90402f17bb7 CVE-2024-45595,0,0,ed73f265e4cc26a14ea0ef98c1ed160999b148dbe2046a7b8a319cd1ad837073,2024-09-20T19:59:02.963000 CVE-2024-45596,0,0,a620d8302107635d7f8871dcd65118f72878398568927fef8140037a0b256d98,2024-09-11T16:26:11.920000 CVE-2024-45597,0,0,087955741b4733da11a2028fe8eb3cfea1534628f3b702c7289ba61a14f82b2a,2024-09-11T16:26:11.920000 -CVE-2024-45598,1,1,4d894788c00da99f7580f72608a2c6769987481b92858fed7e5a8d000297de2b,2025-01-27T16:15:31.267000 +CVE-2024-45598,0,0,4d894788c00da99f7580f72608a2c6769987481b92858fed7e5a8d000297de2b,2025-01-27T16:15:31.267000 CVE-2024-45599,0,0,336dcc223b338e03a3d5e62e7e0b320a6d04f231025b64ee6820c74e273fb906,2024-09-26T13:32:02.803000 CVE-2024-4560,0,0,77026720b012435fe27b280a69c912322a6f69fd18d9b68eb4c768a521dc0638,2024-11-21T09:43:06.550000 CVE-2024-45600,0,0,5e421d273aed3e2190a0fe3fca5657a151966ed61665125955352b8401139444,2024-12-26T22:15:13.583000 @@ -266468,7 +266471,7 @@ CVE-2024-45806,0,0,11953f5c429bb5024448a00bcd91c358cf03fb91f7cd850731ca4327cbbbc CVE-2024-45807,0,0,48f433d282a0de1deb41f8655f75243055cbf16d183767f967220ee671d26215,2024-09-25T17:12:38.380000 CVE-2024-45808,0,0,f2d514bedbee6592168aaa97796624bbbf27204d160c358fb082ee00ab127e7d,2024-09-25T17:18:38.823000 CVE-2024-45809,0,0,1ed47c926f455940a60da215475c00b1c898669d10c2ffc25dd1537eb98fd885,2024-09-24T20:12:24.597000 -CVE-2024-4581,0,0,d64829ff3879eb84b49f2b3cfab390a2bf07a0210011abd31ae219943ab550ed,2024-11-21T09:43:09.063000 +CVE-2024-4581,0,1,82523204fbd158cf90cc7658b6900f3547cbb1524f2dbcd52507728e480d70ce,2025-01-27T18:21:15.280000 CVE-2024-45810,0,0,c349eedcf860e10c9363a6ba6fcea9627aa86b33877b6f7be1e36f4038c0782d,2024-09-24T19:48:22.993000 CVE-2024-45811,0,0,1e79f7126b54eaa8fec54f9508c1b481812afbc5e26f24245c6580ec2237a2bc,2024-09-20T12:30:51.220000 CVE-2024-45812,0,0,56a8eda09dbd313ab53b41c9890a71e59f376714797337ccb7daa71061b1b6f0,2024-09-20T12:30:51.220000 @@ -266681,7 +266684,7 @@ CVE-2024-4636,0,0,8496ac08c742f16db29c83aed5f523dca16873775dbf14d9aa4b48fa10b23c CVE-2024-46362,0,0,fb5d79f4b45f1bbb3eb6ebc0aef2b631b253923607b2e455ece7fd1f0a5d6943,2024-09-20T12:30:51.220000 CVE-2024-46366,0,0,d617ffae88cb828c6e7151f2341d1f71470550fda14e8fcb6482b905bda24f44,2024-09-30T12:45:57.823000 CVE-2024-46367,0,0,989a85d08e8653df07e4eae1f4f794bd57485ed7719e4f75ea7a012b27c892b7,2024-09-30T12:45:57.823000 -CVE-2024-4637,0,0,7cb8c7c37292ad66e233a77db912566be9c3b7549d991645722790b7be81926a,2024-11-21T09:43:15.697000 +CVE-2024-4637,0,1,93f87c1fc2bbd96796cfb083c4131106f07be323f4ade6a9313776a7f9a8739b,2025-01-27T18:22:19.963000 CVE-2024-46372,0,0,3b10c2d5a51a37def6637bf09a31d646a1c63248f989ead6a755917ff23b6ed5,2024-09-24T15:40:12.980000 CVE-2024-46373,0,0,2ec083edbb93e3014840fd0b2f1254aae14c80c6463239fa1deeaeff204edbb2,2024-09-20T12:30:17.483000 CVE-2024-46374,0,0,49c9abdfd23a3c7b397e5069ae4701ce6b671bb400b51adb0be2528c878db0de,2024-09-20T12:30:17.483000 @@ -266837,7 +266840,7 @@ CVE-2024-46658,0,0,8759efef114d9b796a08c43f5fa85fe56a819964b257a73be81a7a6eec47c CVE-2024-4666,0,0,b7505f51131c566a65a04c854bf3da56137a32df8f67317652113aca5c7be8be,2024-11-21T09:43:20.073000 CVE-2024-46664,0,0,581f619b295aa4ba664deab8c6e162ad03d5cd79d87978a11e1db0cb57aed8a3,2025-01-14T14:15:31.330000 CVE-2024-46665,0,0,ffbc9e9b28f014f8db6bea1fb73ee3f71b5446fec6dbec8281dcdb008e16cb37,2025-01-14T14:15:31.490000 -CVE-2024-46666,0,0,9597b6d7906f6e48f52f2513aa91009bea8a3bb79d64c20c309bc9548787f869,2025-01-14T14:15:31.647000 +CVE-2024-46666,0,1,be4d63c7a0b1fc8443f651b062f7aa8bd1bbbf2a7011d11f112886636fa4ef62,2025-01-27T18:15:39.467000 CVE-2024-46667,0,0,9d9479893d3289e299ba39d965f766bd03c3b1849af4b3d13033c99b9dacdbd6,2025-01-14T15:15:26.370000 CVE-2024-46668,0,0,b75013a2753fa4e65c602be8bbc6bcc8bc558fc59e18de18ffbdd0277f68b613,2025-01-14T14:15:31.950000 CVE-2024-46669,0,0,994758b865eac324646826d5d7e38a9ab069567c91adcd75767a3090fdedf28f,2025-01-14T14:15:32.100000 @@ -267069,7 +267072,7 @@ CVE-2024-46874,0,0,26c14938d3bd992112157bea5c4166c0fd1799831df9907b641db7157a63d CVE-2024-4688,0,0,0da5a2cc4532b2a20302b23569ddc0737195b6ffa097a6ed8db87ef0127f00f2,2024-11-21T09:43:23.167000 CVE-2024-46881,0,0,0b45487003fd607ccd13f98230ced0ab92268f2ccf906070f31cd7a1c40dbfe5,2025-01-26T07:15:08.947000 CVE-2024-46886,0,0,9a63353229e01fb1edd6f3ab48979b30c42407a9917c12b34caece3fb7192dd7,2024-10-10T12:56:30.817000 -CVE-2024-46887,0,0,31ffdd020e6e89ba10d4cabf13eb03312231ce0649facea3f0049fb4d2927403,2024-10-10T12:56:30.817000 +CVE-2024-46887,0,1,3fbba73f73a31f40bd4b0dff6531ea243de9a5edbc7e4d38d8cde3d211dcf529,2025-01-27T18:15:39.660000 CVE-2024-46888,0,0,db6a842f30d8f251dc121bd25774417ae3b2f6592ba0d0251860e2c1ddbff66a,2024-11-13T23:11:24.570000 CVE-2024-46889,0,0,0c0b8174b24aacee68d901072070e3c9290edceada480715ed82947d767bbb91,2024-11-13T23:11:58.763000 CVE-2024-4689,0,0,afdd092acf15c85594b452d7415b5690c9eaed5a758374b2fb2f7776ef6ad11e,2024-11-21T09:43:23.310000 @@ -268204,7 +268207,12 @@ CVE-2024-4841,0,0,177b39cd4a0e83cfae37bbb1b481e330bd5314d74a4028705ec45704dd9da4 CVE-2024-48410,0,0,76acfbbba797fbded687285f1d6b7f4e69da30abbf2ce3a40c171e75e974afe7,2024-11-04T21:35:10.317000 CVE-2024-48411,0,0,8c635fbfe1f17c34a6d067e8b46ccb07648ab30edbd28d9ac158683932c5ce62,2024-10-16T19:35:11.290000 CVE-2024-48415,0,0,bb9e3b97ff90d39743d554ba54d4e6857ce95f8c7a439d575dc2c98763652ebd,2024-11-26T20:29:57.070000 +CVE-2024-48416,1,1,a73fc845d210ede59e41667cd7b2f82875a0c7427ffff3ffd61f77303dbb99ac,2025-01-27T17:15:15.770000 +CVE-2024-48417,1,1,f98fe09df889e27e57bbec71241cea5dc2ff33432186818e4fa4371963707f89,2025-01-27T17:15:15.867000 +CVE-2024-48418,1,1,8f680c4bd5196d794f60bf08c354d05804b8517f2eed1239eeae8bddf87f50da,2025-01-27T17:15:15.960000 +CVE-2024-48419,1,1,ad828a11925a49dab8277a93c2b085ccf07939c6197e9aac8d7e0e139341e27f,2025-01-27T17:15:16.053000 CVE-2024-4842,0,0,266948939b8663b41b45dca8cb12f3f3247c17eab2663a8a73d7a0fbf198d426,2024-05-30T20:15:09.703000 +CVE-2024-48420,1,1,bd10cdf7a10deff201ac1f62616680e1352a75cfce791a8b2b36c171153a4c72,2025-01-27T17:15:16.153000 CVE-2024-48423,0,0,905d7aa9f40bc2315b64415beaca8558efff30feb4eedc78c3f814354c0055b2,2024-11-21T09:40:45.127000 CVE-2024-48424,0,0,9375606a1385c09668a8d2d1f5401d048515fbfd22cd289e15fe454c4a078717,2024-10-28T18:35:03.257000 CVE-2024-48425,0,0,e76f599f374f33c20c74bfcd6e8302eb09e83f2739633f465d68d77fe419098b,2024-10-28T19:35:28.823000 @@ -269622,7 +269630,7 @@ CVE-2024-5031,0,0,85c2d27a50beb5d77ca4d835b8018ece4707a3bb8e9611fc3c827a96a420e7 CVE-2024-50310,0,0,0aa8bf92cb0c2ce72d2591b8a623d6ab248b2abe4cf7e33609877fe3cb7813d1,2024-11-13T23:15:38.657000 CVE-2024-50311,0,0,b0292ba610dd96aa55991ae2b3d8d9a3245ae7b245c406d2ccd4b978c4c63f18,2024-12-04T08:15:06.993000 CVE-2024-50312,0,0,2be41509e07c89050ede37502a909bec30a9be1d7ef2b7b17d3eaae24f61baa1,2025-01-15T02:15:26.067000 -CVE-2024-50313,0,0,64114bcba17ddbbd52304f776f5dd6f39dd07ae575272b42861ff4f8f52981bf,2024-11-15T17:12:44.410000 +CVE-2024-50313,0,1,5d5007e1264f798a8f6a4b15f062f1661fd81c6a869b97ae511af65b680b7b52,2025-01-27T18:15:39.980000 CVE-2024-50315,0,0,4cc2faf3d8c489bc195ea9b1b71e3db71fb7f18259f91c4f6bf82e911f7ad06a,2024-11-06T18:15:06.173000 CVE-2024-50317,0,0,bb18489d7989fbe06416c7902779e422cf61fac95f0d13f7e09c0b8e1bc37193,2024-11-18T15:06:49.627000 CVE-2024-50318,0,0,4649a6885ae812ab7347d557649e42fd5c13a3419f08304dd9767eb23f0df7cc,2024-11-18T15:06:52.807000 @@ -269956,7 +269964,7 @@ CVE-2024-50690,0,0,9d5fa667da25b907f6a8d87ed87c65d16d14dce5412c7abd336edf942643f CVE-2024-50692,0,0,fec59c437336f571adcbf83fec674e931b40d1cf7b23eb876e2a61aa2f9cabfc,2025-01-24T23:15:08.893000 CVE-2024-50694,0,0,c4a29afb99bd1e874c60e1d69672eac5fd9e1fe06d6cb9ed86352c05fa98a55f,2025-01-24T23:15:09 CVE-2024-50695,0,0,ba9592191562dd4b73b0b9f3dc66267a4d0aae1cf21634e627c788fb039c6890,2025-01-24T23:15:09.130000 -CVE-2024-50697,0,1,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 +CVE-2024-50697,0,0,c2b3d7cf93175f8b68f23abd86de617bca86742f6a72538d4881c90354fc14f6,2025-01-27T16:15:31.423000 CVE-2024-50698,0,0,df6c508ce768af8f3e964c09d1903f787ab399323d7035e459e6e13ed4e33c03,2025-01-24T23:15:09.380000 CVE-2024-50699,0,0,b7bfb9ce8d871e66c8bc846d040c669e65be2a2e4a5ca2c2838499d7e02651cc,2024-12-11T16:15:12.720000 CVE-2024-50701,0,0,a80b1dc6acfa0163b2b418f9af2de103abd46652e86be76b69c935d1bde098bf,2024-12-30T16:15:11.387000 @@ -272131,6 +272139,8 @@ CVE-2024-54140,0,0,e331d2ac3dbd3b8a53d43f4b62020140bfe310c3ed6fc6689e9e07dc1c045 CVE-2024-54141,0,0,03f51d6625a463b05e77ba75622f0e1fc489bf2648bf55da8aa1a94f754ed277,2024-12-06T15:15:09.530000 CVE-2024-54142,0,0,72133cd2497b495f2be9332cda5c9c42b0acf32e880167b6d7b1c949210b9875,2025-01-14T23:15:08.687000 CVE-2024-54143,0,0,39896e76381b970ed0c53caca39df9efa5206ded9e17479626eb381c775f3554,2024-12-06T17:15:12.687000 +CVE-2024-54145,1,1,8320477e962caef3025c3c6937be33dfb8691087c8aacca1ab550f18594b4b3c,2025-01-27T17:15:16.240000 +CVE-2024-54146,1,1,ee8c854ddad8105421a386f3de423a64c32dbfde616d65dd8ba154466672b467,2025-01-27T17:15:16.380000 CVE-2024-54147,0,0,31061631720e65f385fd359d47a289e6f20b86f9fad882040f751c79c06fbc19,2024-12-09T19:15:14.513000 CVE-2024-54148,0,0,520bd3c53bd8e84d8ecad70130ff9860bb292c1254f0bc8ea386248ebe729c70,2024-12-24T02:15:06.410000 CVE-2024-54149,0,0,9e6d58019e13dfe4168259b606ef42fa170a7f5d925476003c46ba8914519715,2024-12-09T21:15:08.600000 @@ -272638,6 +272648,8 @@ CVE-2024-5522,0,0,df1bc4811acd8877854299da044a99554378b9c2498586ce956f30305786dd CVE-2024-55224,0,0,4f8d131824b20fb869af69c38a084a00b535a965cb641c1dcc385c5e0ee6c49f,2025-01-10T18:15:24.053000 CVE-2024-55225,0,0,65ed599876ed6d6a32d724946af47b3c7b45688e546c4270a7c0aa2b7e07dd80,2025-01-10T18:15:24.530000 CVE-2024-55226,0,0,33de94a32577e3a21e3bfd2bd3c203596c6338516324a9df6e2cd8fabe427868,2025-01-10T17:15:17.393000 +CVE-2024-55227,1,1,e950112fa5df25206bee3f882fcc5fb384b448d0299283a73df0986a8631e81b,2025-01-27T17:15:16.523000 +CVE-2024-55228,1,1,296b5c52c85df3acd856fb294aa9e6d1a4a99c79140c1eba482acc7f379d2cdd,2025-01-27T17:15:16.633000 CVE-2024-5523,0,0,0b2c43ef384781b0113b9be6f2b000f9de2199a81d337c7e51164ef3b409e6ae,2024-11-21T09:47:51.940000 CVE-2024-55231,0,0,bc333f6409b44ab3c99000a12bad2fde8a29ce447ecd07b39a700d49ee237739,2024-12-26T20:15:22.363000 CVE-2024-55232,0,0,1864ac97778845b0c2006d5c17dbf59eb90aad80a835e2f552f3f64f26c6392b,2024-12-26T20:15:22.673000 @@ -273619,6 +273631,8 @@ CVE-2024-5725,0,0,c649d3a3b164c68e5675a9e5f51a3b560f73c348498c25b726ca2d6433b89d CVE-2024-57252,0,0,1934cc1672f51074e73fec8f79c8c1a0c2b2ef217ce3d8eb4ed233f3d5050e7d,2025-01-17T22:15:28.817000 CVE-2024-5726,0,0,4ceeef37c455f852012651a7e920e126aeb659ebe7ba7b011f93539db03748f1,2024-11-21T09:48:14.060000 CVE-2024-5727,0,0,fcb5435c7826764738326be67041da3dad875d35da2f0e0301dde5c6609d328a,2024-11-21T09:48:14.180000 +CVE-2024-57272,1,1,240bfe76d3c570659e4a17f527b77483fe32456757501552139f271ff9f71e82,2025-01-27T17:15:16.730000 +CVE-2024-57276,1,1,56f9d8dfeaea339eb4f7830f5e47071be6d43333a2aa1e4e9551dc0218c18991,2025-01-27T17:15:16.827000 CVE-2024-57277,0,0,cf3bfbd32910c82a101c705fc837da91aff2f392e35fb884cbc5ee32ed42427b,2025-01-24T20:15:33.587000 CVE-2024-5728,0,0,5c443df1ac8c53ac147f54c0053d74d00fcb14e9c202dddb628d942cdb86d4d7,2024-11-21T09:48:14.357000 CVE-2024-5729,0,0,aadee3b7646ed860effd8dd252b041b4d71b9abc4abf921ad91790c2248d1201,2024-11-21T09:48:14.543000 @@ -273682,8 +273696,8 @@ CVE-2024-57581,0,0,d33766716cfcc1229c50a7310d1424328b4dc7c6b3c33c20370b98899cfad CVE-2024-57582,0,0,2a1d35e4fc860c65eb8a4315ed1ba4c31f49b01c911d5b356fd3e8b7f891a8b3,2025-01-17T17:15:12.797000 CVE-2024-57583,0,0,a02bfc66fca0e321afc33c8ed95edf293ab0d78b8736a62da8c5a6dc7f2892d3,2025-01-22T16:53:20.263000 CVE-2024-5759,0,0,7a62530c172037696b680530af67b7622649644977afb4734ee0d6d8975bff51,2024-11-21T09:48:17.467000 -CVE-2024-57590,1,1,46c496c435b48512be9b0e1fd5d874cd6c907680662c52962d0f94c9a9940fe0,2025-01-27T15:15:11.463000 -CVE-2024-57595,1,1,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000 +CVE-2024-57590,0,0,46c496c435b48512be9b0e1fd5d874cd6c907680662c52962d0f94c9a9940fe0,2025-01-27T15:15:11.463000 +CVE-2024-57595,0,0,e945c5b3578d3dde99010919578995e95b82ad320cb57326cf2ce4ca0414d822,2025-01-27T16:15:31.613000 CVE-2024-5760,0,0,fdcabe1f95ff5e6dbce832204c1f64827ff6fe6277e57163fb295e96d7b29093,2024-09-13T16:28:43.077000 CVE-2024-5761,0,0,1fdad964c86313b412878f67fac5999c9a1ea015b844614bc58b000414661a53,2024-06-07T19:15:24.467000 CVE-2024-57611,0,0,e23c6948d65a5243c368ddb9d20386aa125c64c82a7a8dbb52b2d18c0c979c46,2025-01-16T16:15:33.893000 @@ -276627,7 +276641,7 @@ CVE-2024-8910,0,0,b23db5016d915783bf9156097d73048cfcbe9132f4af76d9048ab9b65d0f27 CVE-2024-8911,0,0,c75b9bd4dcd02262855fd49d843fb06a7771237fe1013ffc411c6dcd276819c4,2024-10-10T12:56:30.817000 CVE-2024-8912,0,0,5f812240ef35b303f18482e3ad02a90a92625a71cec90a4ad938301fb183a5a6,2024-10-15T12:57:46.880000 CVE-2024-8913,0,0,c808b3c5e5f5fef63135dee60dc42088eb10d0c982c699f7821fcd0e6adb96e4,2024-10-15T12:58:51.050000 -CVE-2024-8914,0,0,3bf68541b38477d44e4eb0fd3965f8800bf9f6f304634847fd98a3f952dcc155,2024-11-21T09:53:46.390000 +CVE-2024-8914,0,1,0af2c1789c961042785a2420c2c6af5784a31afab9b888e52784be47a313f5d3,2025-01-27T18:15:40.230000 CVE-2024-8915,0,0,8c38db8ff5e6b57ab89598d8dda541fe5184fffcec194910136b2a682fa86d7c,2024-10-15T12:57:46.880000 CVE-2024-8916,0,0,da34a5aed7d09ba222016e725c60a82b8e9b0f8ba94dbe0654f9075bc3c47c39,2024-10-29T14:37:42.877000 CVE-2024-8917,0,0,13879593e7a7be34e78e3c00457ba9bfda60237cf584969aef6bf06e2f24230d,2024-09-30T14:30:38.687000 @@ -277787,6 +277801,10 @@ CVE-2025-0710,0,0,89a9f68eba5da206b05439935d78cbb5d7e1efd36c8ff9755b3b952b82bcea CVE-2025-0720,0,0,3d334bc5cfcf007ce99f555b2863380542fff74631bf3ac24195b7e910344530,2025-01-26T23:15:21.547000 CVE-2025-0721,0,0,0fd36a356c0ad7bbfe14acbe97d07452aa51fcacd6b135289e961a1feb380b84,2025-01-27T00:15:26.317000 CVE-2025-0722,0,0,a8a6ca79cbb757cbfd7cd93cc2a02b5c63bd231ae368388a8a6548a8e9a7e183,2025-01-27T00:15:26.517000 +CVE-2025-0729,1,1,921b2f4b743018938aaac745dfd23ae197bb3fa3df98fe7275ddb03429898ab5,2025-01-27T17:15:16.917000 +CVE-2025-0730,1,1,ff571bf1b5fc50ceacf3144befdfbc155d7ea48230259284ae81068fcad94b71,2025-01-27T17:15:17.133000 +CVE-2025-0732,1,1,26a5f94ce02cc96eea758a704667aea8c69a327e5d298e23b9658a1917d5ba73,2025-01-27T18:15:40.550000 +CVE-2025-0733,1,1,c170d90349bafcc8945875f4b3d3674bb49d9022b735f6bc487d0020af50e491,2025-01-27T18:15:40.760000 CVE-2025-20016,0,0,6fccb84eb01c2cd66b422e82777f9738bfe5004121e1b551d0ae454724543c0e,2025-01-14T10:15:07.500000 CVE-2025-20033,0,0,6c60c85e451f1d6db70378d678ddf83dacc7c823ecfb493748ed6d94114eff49,2025-01-09T07:15:28.450000 CVE-2025-20036,0,0,a1d7639f0e568c5953a2962f5a2be630b5737d729f8c4f565a3eec7e4bf19549,2025-01-15T17:15:18.950000 @@ -277829,32 +277847,32 @@ CVE-2025-21171,0,0,d57716ca15720cd6424731568a4ef6ed8026e861e64e057afd6f0c0e42e23 CVE-2025-21172,0,0,e507c34130e80c6d7033019b7ff6f972bf61409eca72ebd570f655cdb9708747,2025-01-14T18:15:30.300000 CVE-2025-21173,0,0,35ad3b00f130ff650bc6985e9c58510abac9fbd2f22ee21de290af1f777d528a,2025-01-14T19:15:34.583000 CVE-2025-21176,0,0,24a3cd046462e2f499d67b72b0cf5d2fbd91b0e878ed5c8363cdc49fdb58a368,2025-01-14T18:15:30.650000 -CVE-2025-21178,0,0,313ae4e0255420332c87f4825c14d5de2516b425bf7ab10262d7813f1cb6e8a0,2025-01-14T18:15:30.847000 +CVE-2025-21178,0,1,d71a896e79150386932074c64e9b8c5ec60fa5f01f13fe9fd459435a63d7fcd0,2025-01-27T18:42:39.560000 CVE-2025-21185,0,0,cb41c813b9325abbb01bf8ec1150f2d28aba165b47e2e45a6d0824ced24c6771,2025-01-17T20:15:30.227000 -CVE-2025-21186,0,0,cc2d8a401f7f9d2cfee0bf21abab5b274fd96e0897d49742eb2f3685fa223624,2025-01-14T18:15:31.020000 +CVE-2025-21186,0,1,8a8ba48b87441215f1c43ede85a3e2813061bed74393786f63526fd639d8d046,2025-01-27T18:42:32.637000 CVE-2025-21187,0,0,16c411919c8d70c5bf88b3d7e5ce61dc3c1053f79679db20c0c8f7d2300656b0,2025-01-14T18:15:31.187000 -CVE-2025-21189,0,0,af4658d3043c8d39e52bc68c4687db71941c01caa1f102e9573e17a0f099616a,2025-01-14T18:15:31.377000 -CVE-2025-21193,0,0,57ce14299ca65ae3ae8d98c980a7183a3863b86b3ff4623d95fdfbfb7870abda,2025-01-14T18:15:31.637000 -CVE-2025-21202,0,0,a1a528c477eb1fdbdb1b5eb3999d4d1d40c373cfac8744f7f191a7b68cc42736,2025-01-14T18:15:31.827000 -CVE-2025-21207,0,0,db0bc20ae237c9e13ac4464e33f60df9247a7314671b2290c3cb24780d0a97e9,2025-01-14T18:15:32.027000 -CVE-2025-21210,0,0,2ba96f406ae2510ecf5e708c4761246f74b6da9d79c0fcb90cce0ab4caf0241a,2025-01-14T18:15:32.207000 -CVE-2025-21211,0,0,50c33bf98b419fb0635a2d4bbc5f21cf9be42113c364f68b65842af35b4d064d,2025-01-14T18:15:32.410000 -CVE-2025-21213,0,0,69a7c877c42d58f5b54f710d895e2547a6ae6a0e998756cec7ce69dca8ed6d24,2025-01-14T18:15:32.600000 -CVE-2025-21214,0,0,9fbedb0adf823df1caeeaf8eeedad2eba4ddbf308bc451f0ec3f07fd5b90b508,2025-01-14T18:15:32.777000 -CVE-2025-21215,0,0,dd99fd6adb4d9fe7d97b611ec7f30e0011a6eac978c99df1e2b8ab3debf7e2bc,2025-01-14T18:15:32.973000 -CVE-2025-21217,0,0,e2d8b9761a9ab8148320bd40981be1e1691245d94cc6a9ebc4a11d3f39ed5f74,2025-01-14T18:15:33.193000 -CVE-2025-21218,0,0,bcdf99346f904206b72d0d0e4c75c6294fd6d3391f7fc7eed084efd046d0ef67,2025-01-14T18:15:33.370000 -CVE-2025-21219,0,0,c78ab149c95eb3e10be0ed36812db5397dbffa8f81f1967b1528e87f2590e612,2025-01-14T18:15:33.547000 -CVE-2025-21220,0,0,91a07894d2059fe823aef83211f2444ad0e863aba6e64e6dede13eda8d5bc4cb,2025-01-14T18:15:33.750000 -CVE-2025-21223,0,0,4c818270d1e6701d44b7577c63f93510ccf0eb8af14be92608b1bf4de5928a72,2025-01-14T18:15:33.947000 -CVE-2025-21224,0,0,bd06d963599876c9ea4ac3a5b0014c4d2c5fdcb50dd32a31af065c53a74408e4,2025-01-14T18:15:34.150000 -CVE-2025-21225,0,0,401e286ecd1f590f8322f668289a32e8abbce3248c811adc08e3b9df46402326,2025-01-14T18:15:34.367000 -CVE-2025-21226,0,0,bd8f9fce28764ec6c0ff64ec7cfe411fbac03b3cf73f0c9f9cf542723113b47e,2025-01-14T18:15:34.560000 -CVE-2025-21227,0,0,3f6558b49f41745faa488386dcbfb37c88d1c6ec5be80d672257ca79aee3ce6f,2025-01-14T18:15:34.753000 -CVE-2025-21228,0,0,7a0c0d2f47def3d9f741d4065bd44d0a3128219dcdc86779ea1490fd5c100256,2025-01-14T18:15:34.950000 -CVE-2025-21229,0,0,63e472d3244f9a35bc91bede92660436b5772f677fe25711a7d63b935be963f4,2025-01-14T18:15:35.153000 -CVE-2025-21230,0,0,d33993e5590ad46a525f9b5b48e22200e28c8045a0558a0714e04306afe870c1,2025-01-14T18:15:35.333000 -CVE-2025-21231,0,0,ce46834ebce2061d0aaeb629ca503e557f8998af3962d58059151bc47b32bd1d,2025-01-14T18:15:35.513000 +CVE-2025-21189,0,1,ca648121d9e850804175588d9c4aac6da7ef3c2b6ae2300a8b63e1ea00030d07,2025-01-27T18:42:24.057000 +CVE-2025-21193,0,1,f3dd779a9a437e46fb9f30ebcb1d8f684dbb5bb54fbad7b1b2971d455cbeaf6b,2025-01-27T18:42:17.480000 +CVE-2025-21202,0,1,ee1b8176efac6955bc73fc19b48d6a8059f8d2834d4bcfd8fa3504a8df2af357,2025-01-27T18:41:27.647000 +CVE-2025-21207,0,1,f733c092b5f3897faf789fd3e3470e09d6c4009cfdbb3ab7a0d9ae774436f527,2025-01-27T18:41:10.137000 +CVE-2025-21210,0,1,d3e8d7c6c3cd0fa32007f42afb1d1c11bed47f78c64ced4c563375033f10c558,2025-01-27T18:41:01.470000 +CVE-2025-21211,0,1,62099d1023373d3333e497c037255bff2d62756832c7aca5a0c1b06385ec3300,2025-01-27T18:40:51.233000 +CVE-2025-21213,0,1,d76ccd51df8c01ee3ad346c04c844f4e50c70f2457af20584265be093786965d,2025-01-27T18:40:41.820000 +CVE-2025-21214,0,1,b8039cbe7a63495d46a641b97ffd4c5e53d03f836e0c328a70c5023b19ec3f39,2025-01-27T18:40:22.427000 +CVE-2025-21215,0,1,cfe2f00bdbbaaf03f7cb39c982b34bcf9f5315045afe2871992ed660d6cfa8a1,2025-01-27T18:38:36.757000 +CVE-2025-21217,0,1,9f4fa2d2f2c05ed5d719db33f9e6468a22343a72a1dd3cf71747d53ff5d395e7,2025-01-27T18:45:20.030000 +CVE-2025-21218,0,1,d47e4e79318ebd737fa658b56f12e5fb3e30018465210b7af2b0de06c0f4fa6e,2025-01-27T18:46:14.487000 +CVE-2025-21219,0,1,8dfff87a65a9909cfb493d1ab0eeb0ce6e21bb57d2999132241840c7db377e87,2025-01-27T18:45:30.370000 +CVE-2025-21220,0,1,14b2a34fd6ef02e28bc609723f96167901b5ca6bf37fb8d6d3e6d29778efabee,2025-01-27T18:45:48.310000 +CVE-2025-21223,0,1,cab6db4199159c4501a2980cb302709fab40ed025b453688d5d75ede200f8b0c,2025-01-27T18:45:59.727000 +CVE-2025-21224,0,1,40d303e7800cdeee704829561ea2ba0839d8b833c4d211d793eb5711cb054fa5,2025-01-27T18:46:27.673000 +CVE-2025-21225,0,1,43d8a26b699bf26bb564adf13e70126920fe623472670908dddd2c504a6cb0ee,2025-01-27T18:46:45.813000 +CVE-2025-21226,0,1,6c62cd41d7cf5fe2c2c72ce9fb619635557da65bfdfb1c2a2a247f42c1f8b428,2025-01-27T18:47:06.843000 +CVE-2025-21227,0,1,a9544a4e7c3667b482f4e7825c9235b55d40032d0c2fc94ff4e1727c25b6d343,2025-01-27T18:47:16.717000 +CVE-2025-21228,0,1,0ac389322ce3605a9a115859c46611018145680cbc0a6288ee685be5569e8ea8,2025-01-27T18:47:27.603000 +CVE-2025-21229,0,1,2665c5e3af922a4610319a107d9942584c5220d1003fbebfae3f5d5e02f4d1da,2025-01-27T18:47:37.697000 +CVE-2025-21230,0,1,6e096d8dc4f3f76aa5cb689f908367bb69b783bdd0e224349582181cc1d4bf71,2025-01-27T18:47:46.557000 +CVE-2025-21231,0,1,5e823b2a4a0a68161615ce11863a8d05ef9b6360544cfa89ae12b788fc6addb7,2025-01-27T18:47:57.930000 CVE-2025-21232,0,0,724698d5fb12ce1a3c251144b6f281ca1b07d5bd9d93f03b22fee4009921e624,2025-01-24T21:51:59.700000 CVE-2025-21233,0,0,50fe98bf5fb6919344c6a706a232a330143e358df5598da5887a256e4ea776c1,2025-01-24T21:52:25.913000 CVE-2025-21234,0,0,39b7a883302863e97b1984635aac276f51137179aaf964166708ac90b0cdc623,2025-01-24T21:52:23.483000 @@ -277875,31 +277893,31 @@ CVE-2025-21249,0,0,3ab00c1180eb98882ed5307f64bf76a58e701e35ad1996ac5cbe5b07a1020 CVE-2025-21250,0,0,39f09fffa4d71d5943bb475455bad33312dbffb6f89a0611ac35e76ce0438639,2025-01-24T21:54:48.480000 CVE-2025-21251,0,0,1036e8deb1c2202cf79496024118dfdd792d9c5f5ee66e794245921bc44d616a,2025-01-24T21:54:57.333000 CVE-2025-21252,0,0,43ff3f6929d7efa9c77948f33aaa999de09048f1622aaea4e0fa7d896658e0e1,2025-01-24T21:55:05.360000 -CVE-2025-21255,0,0,bdb29cdbf339ad6af1837127b1024e7b08bb26553081790e67935282b469c3a1,2025-01-14T18:15:43.437000 -CVE-2025-21256,0,0,3605b36451770ea272fb2275ce03b62a920bd0bbd0296ba75e1ed68232494151,2025-01-14T18:15:43.730000 -CVE-2025-21257,0,0,f6724f59885e126e07cf88f5691b33ac403a13256e48363086395c2739206e6d,2025-01-14T18:15:43.990000 -CVE-2025-21258,0,0,66e38ffc6ca71ab83d4de17b33189538a903da4059e59d32cc15b6afe5c5a245,2025-01-14T18:15:44.660000 -CVE-2025-21260,0,0,a10266ac3b0ec854fe7bbad2f5173a8a9fa71e45a311da8cc9b418eb7ad55ccf,2025-01-14T18:15:44.927000 -CVE-2025-21261,0,0,30794851edfbb5323c9cce2330f18fdf20ec4ae0c2c15429a6b907046e7fa4d4,2025-01-14T18:15:45.137000 +CVE-2025-21255,0,1,14ec3c5de4014245a08dc77230a10e3de7bb6999b008a2dfbc18d847a3784710,2025-01-27T18:48:06.630000 +CVE-2025-21256,0,1,58294fdff7948b9ed3141c394a0584f7aa2665576850685b440cd98a074308cf,2025-01-27T18:48:24.467000 +CVE-2025-21257,0,1,d26e5d2b7a4f0a70f7086a3f6a9bf6ebbd5a4d9cf550b03d1acfb4da79e487a7,2025-01-27T18:48:34.057000 +CVE-2025-21258,0,1,ab6f037884850495aeb9f5bc005f2d042e0085184eaa346146ebc56502c08b58,2025-01-27T18:48:41.780000 +CVE-2025-21260,0,1,a556994423a753efda8c80680e8bcbe840d4360f95c3be38ccacb28eb9104a8c,2025-01-27T18:48:49.733000 +CVE-2025-21261,0,1,c30f5175340cacd1e5981a6c518773b18b8e774edb4b660031defa9d37da66af,2025-01-27T18:49:17.243000 CVE-2025-21262,0,0,9264fc4c9728d5404227dfb9517a51e28f9a449cf41cab4284cba55895f379a5,2025-01-24T22:15:38.220000 -CVE-2025-21263,0,0,2f60429f96c01ab32663556a7b47b8db289164ee720f1301a001d63a16fdc766,2025-01-14T18:15:45.337000 -CVE-2025-21265,0,0,b867b3105e3afd8ffadf43ee9cdcbf50883181ae3f4536a5536cba353fad0042,2025-01-14T18:15:45.583000 -CVE-2025-21266,0,0,4135bc0115ee5bd41b433d3e017d40fee3f673bd467b43b684d6450d81f736a0,2025-01-14T18:15:45.797000 -CVE-2025-21268,0,0,dda7c0218ca85ef3ac1db3cc9062b3f0a39caae431fc8b7648b82cc585f022d1,2025-01-14T18:15:46.023000 -CVE-2025-21269,0,0,4f4a18ab15bf3c30efc7100c8433740a8e8db1e1f34548833db09d6726dd6de2,2025-01-14T18:15:46.290000 -CVE-2025-21270,0,0,01a95b8aa5fb0ffa72b1fdaa827077c9abd134e29a2bbc7577d23d427df8f4f9,2025-01-14T18:15:46.503000 -CVE-2025-21271,0,0,a303c4bb42912154adbab79b14e490f5f53f79ce3a704bde0619d566367b384e,2025-01-14T18:15:46.747000 -CVE-2025-21272,0,0,7c24281d7742d5fe6c0e8e351a79af097081ed29840e243c89b662d27895d619,2025-01-14T18:15:46.987000 -CVE-2025-21273,0,0,76fa4a95ef95afcc759231e79f911226a49adbe29aaf6e443ef380f8b96309ff,2025-01-14T18:15:47.240000 -CVE-2025-21274,0,0,010e0f6c3c3606b38249fe57a14121c514ac3df937539178ac5424a46c2816e5,2025-01-14T18:15:47.487000 -CVE-2025-21275,0,0,c589e77d2c8baddbf950f9fd01b71e95a6f3f42315937d5e036c044492faebbf,2025-01-14T18:15:47.723000 -CVE-2025-21276,0,0,aa947c8fbc92dc01e873841f81c30d113a2d8dda0abb3d2473a5e8923afdab4b,2025-01-14T18:15:48.013000 -CVE-2025-21277,0,0,908690fde51906cc3d8f680c617d52a02626365ac4a002a32afa71ab0482e3fe,2025-01-14T18:15:48.260000 -CVE-2025-21278,0,0,0ef517669f9a03394f8acd314678ec1734dd92568466f6e48b5c8f71492455cf,2025-01-14T18:15:48.480000 -CVE-2025-21280,0,0,f7a466321aa6c89901b0b33316a67c0e6b3bf580a8176f1e94116845401260dc,2025-01-14T18:15:48.690000 -CVE-2025-21281,0,0,1b2dab08d68a84004a4f0814166d68c4cff7b57c0d99e26d4db59dc8b2339c3c,2025-01-14T18:15:48.897000 -CVE-2025-21282,0,0,e9d4089f081dd17150ff4d08e33ad5a312b6bf1e8673173ae087156048ddd2e6,2025-01-14T18:15:49.110000 -CVE-2025-21284,0,0,f4bdf01fcc9232fd479c07c315c5374160ef9d50e2ae7e0c49ae0460edf07fe8,2025-01-14T18:15:49.317000 +CVE-2025-21263,0,1,295f2fb3d7a3842c05004d8cde30779a950fc850869ed1eb394d7b67474e0809,2025-01-27T18:49:27.097000 +CVE-2025-21265,0,1,3a0623cac3e27fac140c7d480ae37ddb496c3e2699e3e9b1cd800c086bb8d7c8,2025-01-27T18:50:59.243000 +CVE-2025-21266,0,1,ec16c00ed965a9962d383ee0cded9362e36fb8c9136d38ff3e64aa08d3c59c6e,2025-01-27T18:49:46.980000 +CVE-2025-21268,0,1,6acc319b899d9625dc4403341237cff737fe07e5a334a6a0532e1aa987f5a8d0,2025-01-27T18:49:59.800000 +CVE-2025-21269,0,1,c711228ffa723e66890a15a5aeeab989537443a9d7e5acaf18639f2e86b1c1b5,2025-01-27T18:50:21.237000 +CVE-2025-21270,0,1,6898ecff2911377cea832cdb1c30eafd82152b4b1fb702b465ac63b2f9c86dc1,2025-01-27T18:50:32.540000 +CVE-2025-21271,0,1,4274828aba1e10041b203e489347317201805b7afde940eb3f935826dc13b54f,2025-01-27T18:38:24.280000 +CVE-2025-21272,0,1,3e2d7a35d84e7bb621aea052e6aed09819c5826c7c4a8458bf0eac102423be5d,2025-01-27T18:38:15.907000 +CVE-2025-21273,0,1,9d5bd24d5276a61153f9547b22e71d360fbd90119a74a26b86013996dcbc76c7,2025-01-27T18:38:07.567000 +CVE-2025-21274,0,1,328f0a5a7b6f68cb9bafb7c0fac7038941f6ffc0d1ef31b65e1536419d699bba,2025-01-27T18:38:00.530000 +CVE-2025-21275,0,1,7b68990a3cf6b30fde3705c315416577a80dc5ad760f00cade321cbb337e9652,2025-01-27T18:37:53.767000 +CVE-2025-21276,0,1,eebac801f9998382477ec20b2975ad62773b4edd4e1ab39819e315ebf65e298c,2025-01-27T18:36:56.850000 +CVE-2025-21277,0,1,4c9eca29864cf66766bf16793df9d2182a2577d472446e7e14dd1845bef47851,2025-01-27T18:36:45.660000 +CVE-2025-21278,0,1,1159615043958df1435f91e9f045b7c3adfd9de6d85a7da4c91f40a28a1b0fc3,2025-01-27T18:36:32 +CVE-2025-21280,0,1,ab90aa59c912767f4795506858dbcc92a2d253250b32a354190c6c4dd44c19ba,2025-01-27T18:35:04.940000 +CVE-2025-21281,0,1,fb9eab94071206a517ffde9411cdbb1191eef69b50beeea32704e46f637129ae,2025-01-27T18:34:57.020000 +CVE-2025-21282,0,1,4e97d62a7e60178d2914d28e81fe801d42e1c0783d51db41992f630d27ada031,2025-01-27T18:34:49.270000 +CVE-2025-21284,0,1,3b67ef4558f067ed9edde1dd18273dd9564a5422aa47ba036ee234c4f1f7b982,2025-01-27T18:34:41.180000 CVE-2025-21285,0,0,17629fa2ac0e1ef378a6f19629d5880311fcd45d89ac65e371b955c3049e83f2,2025-01-24T21:55:14.943000 CVE-2025-21286,0,0,8578b4e43fc2045d1acef7e1070a752080f197e1944ebd464591064fbb583bb5,2025-01-24T21:55:22.897000 CVE-2025-21287,0,0,654cba4bcc62babdea432cb3fd8f7e63414a43d2a335117de741271f7fc2630f,2025-01-24T21:55:31.367000 @@ -277929,7 +277947,7 @@ CVE-2025-21310,0,0,099e46304a735e30a828bfef6909dde2287720f5a5b8ca47538d789650042 CVE-2025-21311,0,0,c1918edd35606730332735ebee7fb7970341bc3e23003b52c67502e783c288e5,2025-01-24T21:51:02.927000 CVE-2025-21312,0,0,47b42958fc99f7be1ed69c7cce535e211c2a133d312c9defde333ac23751e538,2025-01-24T21:51:19.847000 CVE-2025-21313,0,0,665ce6cac7d0183a61e9c6dbcd90e1386f2822360c7382043362465d5adeedd7,2025-01-14T18:15:55.007000 -CVE-2025-21314,0,0,491423b29fa50bb9e34fe5c2d1b6bd67c5a9bc2874a7bd533804e8d1eaed801d,2025-01-14T18:15:55.163000 +CVE-2025-21314,0,1,2d3c54245a684defe2bf2671f7f48b921455fea621695ec6c33006daf7b9626b,2025-01-27T18:34:32.613000 CVE-2025-21315,0,0,5a13d39751996d646bad2814d5d374399878c40170b6fad35ea2f1b021fad591,2025-01-22T14:40:33.967000 CVE-2025-21316,0,0,82452fd2c845ec85f7c6e5170cf3bd46a3abf2af010f9fecee630f5a318e9cab,2025-01-22T14:41:48.963000 CVE-2025-21317,0,0,47a39641747b93c1cf8683236678f9f7006a6541e67da79b6f56e0f7a89aa8b4,2025-01-22T14:42:50.910000 @@ -277981,8 +277999,8 @@ CVE-2025-21389,0,0,b734af143001cdbe15aeee14fe9e8d94be90a7e77dca2b7c7e3d41d7dfa35 CVE-2025-21393,0,0,612edf54199b4ed3330c42c388bc679561874de59ebf7734941f393216c8ca71,2025-01-17T15:45:26.027000 CVE-2025-21395,0,0,285bdf7d424a0a4417061117147cedf81e1e126360de2186348f6c8fe5b92f8d,2025-01-17T15:46:01.927000 CVE-2025-21399,0,0,35cd7b1b1969accaedcde29eba1e481458b35a096143c28ca4c47fcddb55b1c9,2025-01-17T21:15:11.283000 -CVE-2025-21402,0,0,cfd0656a5c0196edaf476c2d05711d25a94de6b7e392f4deee80684030d57dc0,2025-01-14T18:16:04.190000 -CVE-2025-21403,0,0,9a78aaa5fb9b94799380b10b0da1d8f532f4da03523ba6e06592273509ccfd42,2025-01-14T18:16:04.350000 +CVE-2025-21402,0,1,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000 +CVE-2025-21403,0,1,e3972e87cc0bf0b2a50184673c79e18b666de3cc8f7b44e6b5ea9a3c3e43a63b,2025-01-27T18:34:10.050000 CVE-2025-21405,0,0,969dccb2fdb7b77bc4fc01cc5c965b86b2f97eeabccc36551e0ad9e36ff7b4ca,2025-01-17T15:47:39.780000 CVE-2025-21409,0,0,9a0370401d0fd7e49b65808ae057846090c56ac6a1008c21c4813913a7a82c01,2025-01-16T20:33:29.353000 CVE-2025-21411,0,0,a2034d74d3fc549cce6a89f8510ff5f65d0c38a3efa1b89761ff7efb0d32d181,2025-01-16T20:33:43.177000 @@ -278338,6 +278356,7 @@ CVE-2025-22597,0,0,42b7f0ad3f97eec140e81e3432e0004fde0e857d31ddfb4970711f713c779 CVE-2025-22598,0,0,71a9628cd5b8a378efc6a4f0fbba9bc5be356eced51ee0c58585106238174184,2025-01-10T16:15:30.540000 CVE-2025-22599,0,0,b57c2c3eae861ece051af1f1ef69acd0bb3a29c0b52e5a721d4d190a6e483927,2025-01-10T16:15:30.737000 CVE-2025-22600,0,0,d4d2827dc6878ccbad7b7bb4cb346a62426d6f55b5376cb57fe133465e20f0b1,2025-01-10T16:15:30.940000 +CVE-2025-22604,1,1,27f94bcbab5a979f287e83d518865b37a4cca5a5f369c4046098e5cc77e51536,2025-01-27T17:15:17.307000 CVE-2025-22605,0,0,8133d836964af94521533e50666e61283a9b57a268e19bb256ac814dc1dfcd5e,2025-01-24T15:15:12.330000 CVE-2025-22606,0,0,3d923e303b156c53bd4343472a4e5b113d35cd4273c3f9114587d96dd8d17f7e,2025-01-24T16:15:38.307000 CVE-2025-22607,0,0,168bb9e66a3ed8b4ee8d63dbea88df36b4ba59b92d437413a77aabe7acfe1fcf,2025-01-24T16:15:38.470000 @@ -278464,12 +278483,12 @@ CVE-2025-22963,0,0,12477de813cda7364e5796cbdb911aad8e18d4387dfeeba96b71ade7cc11b CVE-2025-22964,0,0,7b43a22f35a1092582599b8d0a085880cf69a0a81631ab9d491f283c3453cad7,2025-01-23T21:15:14.900000 CVE-2025-22968,0,0,41c7a798ef1cac51f67409788e09403bf1c73ade164309e1bf03d8de0a22a69b,2025-01-16T16:15:35.917000 CVE-2025-22976,0,0,7635385bbb1168f03f689653f73812b5306e7c676072ca854591d831ffee9997,2025-01-15T23:15:10.783000 -CVE-2025-22980,0,0,3170c0711c65ed88f85cdcd9ec101595d1a0370876a32617bed3dd684ff74c4e,2025-01-22T15:15:15.130000 +CVE-2025-22980,0,1,df60c5ba231db3a8ab6989fdd2029f954bac79d598e3ef3761416d02952bcd79,2025-01-27T18:15:40.933000 CVE-2025-22983,0,0,3f91e33a7409029e8feb1969bf0fd19dc254a37fe16ab3c9358513b3c91fd751,2025-01-23T17:15:26.577000 CVE-2025-22984,0,0,79f7e0821d57086a5b30160c1ac3f4ee3a3942289c8274a9ca479dc29c59767f,2025-01-23T17:15:26.780000 CVE-2025-22996,0,0,c50cf62284cf751584047e7a98111e31ae9d7e05423e0e28a6dfeca6772a6ab9,2025-01-15T17:15:21.837000 CVE-2025-22997,0,0,cbf89797792d4ad66a4f37050995306b66d6d3563ae5ce9db2b5b27779f4d42b,2025-01-15T17:15:22.193000 -CVE-2025-23006,0,0,977f772ea3b5876e891b28257119516496ae4d9450366cb495b2995cfcca3fa6,2025-01-25T02:00:01.990000 +CVE-2025-23006,0,1,b3740c3859b8a4699d7be6a4cb26c3615e83be583cc4689a6f760ded3dcd5dec,2025-01-27T18:41:17.650000 CVE-2025-23011,0,0,6ddf557c800a2528d5545b3d7911f3e609af1e4dccfa1a674d933303fd996813,2025-01-23T21:15:15.010000 CVE-2025-23012,0,0,6b2b3bdfc203a9a9abe46f57ea7f825047d32c413c20c9ae87597afaa81bd3df,2025-01-23T21:15:15.173000 CVE-2025-23013,0,0,1fb74d6ea76ff5844d786cdd2a74f412fea41ae3954a5796fa59991a0a874edb,2025-01-16T22:15:40.520000 @@ -278527,6 +278546,7 @@ CVE-2025-23128,0,0,856260a69fb4f1bb5d13296c47ffc7dac686c7ca9a44fff8151b1b7f11a74 CVE-2025-23184,0,0,ee9dbda90e777617ae5cd025264147ad5c96f90afcc3e03d77678dd64ef19027,2025-01-21T10:15:08.110000 CVE-2025-23195,0,0,330ec078db97e6dc3fdb7cdbe57f6450c92255b88a9b52bc02ab0cb6754204fa,2025-01-22T15:15:15.237000 CVE-2025-23196,0,0,c86901772359f4512fdd147449b9ed6294fa0f580a5b9af77dfe2551cf2e530c,2025-01-22T15:15:15.390000 +CVE-2025-23197,1,1,f62e1b36ede0a4779b9fc56224d42413cf60eb677604c121467e5909a2aad5bc,2025-01-27T18:15:41.037000 CVE-2025-23198,0,0,8821b8df90adb16cf3625e528f68c391c0bcfa1c8e1e079b50c30f527c621897,2025-01-16T23:15:08.410000 CVE-2025-23199,0,0,3b82f03297e12f7b25649af5d3a8aa211e1441848bb66c00094132bcfe252a94,2025-01-16T23:15:08.567000 CVE-2025-23200,0,0,76f8b53439f8a2997652c579cc0769759091077ab1b58d306f6ddac70c67ff17,2025-01-16T23:15:08.720000 @@ -278599,9 +278619,9 @@ CVE-2025-23513,0,0,b49e0ef03f655c5857bfec7a9b723b31c64932dc8261d0e026a3117175ad4 CVE-2025-23514,0,0,34e07e624b89702dfcb5b7bfffc35f3e8691ecd3b879348a43ce40f20c111b68,2025-01-16T20:15:38.337000 CVE-2025-23522,0,0,98ad48d238b58e05014b495e757593673327270f911d4e0eb6b8c40c96dd710a,2025-01-24T11:15:10.290000 CVE-2025-23528,0,0,12168907b0864434d8a4020bcee1f63e4e5adfac10d77e79ea19c426fc40d9ce,2025-01-16T20:15:38.480000 -CVE-2025-23529,1,1,7c49e2722b714953d08192912f197c560ce62c5bae83cb8ae69a000dd9552fd3,2025-01-27T15:15:11.813000 +CVE-2025-23529,0,0,7c49e2722b714953d08192912f197c560ce62c5bae83cb8ae69a000dd9552fd3,2025-01-27T15:15:11.813000 CVE-2025-23530,0,0,8ec89260a35cc3a80dc4111e53382b9b64fc77741f1d33c294cb6047b2afd7ab,2025-01-16T20:15:38.630000 -CVE-2025-23531,1,1,4670c6590086f49674e69b2116a3ddfd10459247a34dc78c173fd8ffc6170555,2025-01-27T15:15:11.963000 +CVE-2025-23531,0,0,4670c6590086f49674e69b2116a3ddfd10459247a34dc78c173fd8ffc6170555,2025-01-27T15:15:11.963000 CVE-2025-23532,0,0,deffa93a5742d05598342f489a5313af6567bbdcc8641635c5652a151952e2c9,2025-01-16T20:15:38.783000 CVE-2025-23533,0,0,2feaf795f1df273221ac6faa2b92c08d09ccb79103144b0efc3eedd5b4158baa,2025-01-16T20:15:38.930000 CVE-2025-23535,0,0,3d511b60f3f593e8a9f930b9c1bcde4706da165ad4e13c65d31e0f22e6a2e21e,2025-01-22T15:15:17.290000 @@ -278623,7 +278643,7 @@ CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27 CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000 CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000 CVE-2025-23573,0,0,47a2bcb665ab1e714c4b6c92d3ce819a124f5bc1e2f376db1bb99620f62cdb15,2025-01-16T20:15:40.740000 -CVE-2025-23574,1,1,bbc9c25cbfc7104d2eddf794ebf5301264245f038b4d9e44b0ed37c1cdde53c5,2025-01-27T15:15:12.123000 +CVE-2025-23574,0,0,bbc9c25cbfc7104d2eddf794ebf5301264245f038b4d9e44b0ed37c1cdde53c5,2025-01-27T15:15:12.123000 CVE-2025-23577,0,0,3b4af4e716479b74840f3095c9fd247d1229a5054ee21299e6427c4aa395d98c,2025-01-16T20:15:40.877000 CVE-2025-23578,0,0,06d6355f414f82fbd5bf55726a97e1bfcad56da2ed33fa8e52f7f055aa010983,2025-01-22T15:15:17.687000 CVE-2025-23580,0,0,59e55d87bb1152c0b33f0e647e86e7e0bf5bdb957c7b17144cb4b97c87ffc264,2025-01-21T18:15:17.133000 @@ -278665,14 +278685,14 @@ CVE-2025-23643,0,0,3da60483c0db5a8dc05580f03d199bb8be013bf0c2d67c3cf934aac37d8d4 CVE-2025-23644,0,0,326651915de9287cf85320be6c8601ed58c356f5737bd31685f6785764f50a52,2025-01-16T20:15:42.323000 CVE-2025-23649,0,0,a43a99cf921270df6f54630a1d678841e6741ab04c2bf8f250e77ecaecfc577f,2025-01-16T20:15:42.463000 CVE-2025-23654,0,0,e18c9b36c57bb400d64806c75d784772ed09a49c73653ec930b121712ce380df,2025-01-16T20:15:42.607000 -CVE-2025-23656,1,1,34623765832494c9f427e32362d335e8212fabaf06c59b8b508619e471edee33,2025-01-27T15:15:12.267000 +CVE-2025-23656,0,0,34623765832494c9f427e32362d335e8212fabaf06c59b8b508619e471edee33,2025-01-27T15:15:12.267000 CVE-2025-23659,0,0,dcc772503bf7bc48b2053f59e0fd1354f6d6525325330e2053b738a9e72bb73e,2025-01-16T20:15:42.750000 CVE-2025-23660,0,0,2cc733431a94cdb8a648f8f3373a33c06d517783298c1f87affd6dd6af956d0c,2025-01-16T20:15:42.893000 CVE-2025-23661,0,0,1f7f57e7bde62e643387dd0bb1448a0354f6c08b04d2c093fc9523e9645f79aa,2025-01-16T20:15:43.037000 CVE-2025-23662,0,0,551ab5d2ddda20a665b042bd77267fd330911bfdaae473af13983770c49d1a4c,2025-01-16T20:15:43.167000 CVE-2025-23664,0,0,5eaae3d9bb9680e71179473e67178d8041daabfe633ea61ccf7a551976bb9be7,2025-01-16T20:15:43.320000 CVE-2025-23665,0,0,df3a85fb9b6ff519cb09c58b53e0bb17cb58cc0d047b57ae4c9ab7778577a02d,2025-01-16T20:15:43.460000 -CVE-2025-23669,1,1,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000 +CVE-2025-23669,0,0,9d3b37ccadd2ee69ebcf7dda5f5c3274138874e1b048df0c9bf6fb374b103459,2025-01-27T15:15:12.423000 CVE-2025-23672,0,0,9b4e91d2a971d6e816e88b382cc31c2340c56e76479cf040d6e0c5290d97a21a,2025-01-22T15:15:20.287000 CVE-2025-23673,0,0,29cefcd5e33b42efd9dd838456a4202e1ca110aefe8c270bd5abccdd213d0d3b,2025-01-16T20:15:43.620000 CVE-2025-23674,0,0,82d0f47596aa91a27d7206050e2f23fe27e33f61b61152aa1cea9075ecc820e7,2025-01-22T15:15:20.420000 @@ -278726,9 +278746,9 @@ CVE-2025-23743,0,0,803f800009872449a18217dc53667bf2ed09ca71991d264f6860698994827 CVE-2025-23745,0,0,09ea8b53d4365edcfe38eb3fcbe51bfbcfdfed88a9df4c2f4d1f35c6770b51bd,2025-01-16T20:15:46.687000 CVE-2025-23746,0,0,01c9493c9d9f35137d949e9259b4b92a38e781d34f3f66cad8da83d524975422,2025-01-22T15:15:22.783000 CVE-2025-23749,0,0,6aa13db4e4c786d5dfaed7476f7ecb15c17aa377119bb300a3e3bb269b753986,2025-01-16T20:15:46.830000 -CVE-2025-23752,1,1,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11e24,2025-01-27T15:15:12.570000 -CVE-2025-23754,1,1,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000 -CVE-2025-23756,1,1,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000 +CVE-2025-23752,0,0,c4a79df1175fc8304cc7d0bc1439213a7f94dd9651e5758ccfd85de4caf11e24,2025-01-27T15:15:12.570000 +CVE-2025-23754,0,0,21c71491dc1049f80bc2b3d0ef81d089692e692ff20a4894b4b54787667340c8,2025-01-27T15:15:12.727000 +CVE-2025-23756,0,0,b189fbbb2b658c767f0f6a4b533dbbc808056809be370f040f7098f77febf47e,2025-01-27T15:15:12.877000 CVE-2025-23758,0,0,8eed9a0b591b6f7c4da32f087513eca80ea069aba6fbd197956f1fc2df31f12b,2025-01-22T15:15:22.907000 CVE-2025-23760,0,0,c926328276013ba4c92054487020a2c00b6299d54746739ff21a4a2b0e4582aa,2025-01-16T21:15:18.257000 CVE-2025-23761,0,0,54955953ddba7da6b8dc6db7af99134b4479d6ff349ea65bc12f9e3c7ac517a4,2025-01-16T21:15:18.410000 @@ -278799,7 +278819,7 @@ CVE-2025-23842,0,0,2b0139d7daa7e9dee90c237d483621e8535d39bd8efb9a3ce143d2d5a6b0d CVE-2025-23844,0,0,86105cb76b38d6ea0728b9c1232799c3e34ea63adb94598d263dfa4f4d3924ce,2025-01-16T21:15:25.080000 CVE-2025-23846,0,0,114fb14cb9da08075fcfc087aa4768cbe85e21250c7be555b4cbae1d924c3409,2025-01-22T15:15:24.570000 CVE-2025-23848,0,0,89a987df9d0bbdbc45b1ea1fdc383b4ea7fa77b656809c9e88d08eb1cb2905d0,2025-01-16T21:15:25.220000 -CVE-2025-23849,1,1,bf70545cda3ebf325b56b2f2693bbb11f9011740b066c0073d88333206143d7b,2025-01-27T15:15:13.087000 +CVE-2025-23849,0,0,bf70545cda3ebf325b56b2f2693bbb11f9011740b066c0073d88333206143d7b,2025-01-27T15:15:13.087000 CVE-2025-23854,0,0,d260b02665c562e6c59db554faa1d37d019f8ad115df9a55a6f95eb87b662a62,2025-01-16T21:15:25.357000 CVE-2025-23856,0,0,a5c5728227279c4b26e1b13f4ba8f4d185c4e16a374fd50014963dfe066d3a3b,2025-01-16T21:15:25.507000 CVE-2025-23859,0,0,a1c51c1c52968719b42e86176997a2a2b50c7736a939e2e16e5640ee70ac9861,2025-01-16T21:15:25.667000 @@ -278895,7 +278915,7 @@ CVE-2025-23962,0,0,38c72a66f748d246b44f5351bf9ff0f3b3815cc4926f227945695c33eaf96 CVE-2025-23963,0,0,b25e75626ec56255a41425e6f3edd3e3aea1c19b7ee658d0d0b26b28ec1f0c5c,2025-01-16T21:15:37.873000 CVE-2025-23965,0,0,53fb1e10aaa7ebd57bd7f00633a90cd803f03e00b4bc8c44e50c428b42627500,2025-01-16T21:15:38.023000 CVE-2025-23966,0,0,0e6c6a1caa3d328f215893bbd7894611dd4559bc9c207666f24bc83d16a65051,2025-01-22T15:15:26.950000 -CVE-2025-23982,1,1,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000 +CVE-2025-23982,0,0,7dfe3e48e718999b3739cbfc59b600560c8c7feccf14557bc94cb8c8978377d9,2025-01-27T15:15:13.247000 CVE-2025-23991,0,0,09c292242e39739888eb9fe6d97bdb10055d45d713f6ffa829b0733e0b5456d2,2025-01-24T16:15:38.723000 CVE-2025-23992,0,0,6d44f95ed9666a8a68923c67dcffd2f515365a6c1e7800071790e2d881846261,2025-01-22T16:15:32.120000 CVE-2025-23994,0,0,db61266fc09611137499867f42a15cfdb3d24abf264ca83daab38bc4b3bec239,2025-01-21T18:15:17.313000 @@ -278920,12 +278940,19 @@ CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c19 CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000 CVE-2025-24337,0,0,909a943b00c8b637d3fed5ce70273699981b2448e37e3c32ed1614924942542d,2025-01-20T14:15:27.130000 CVE-2025-24353,0,0,73a00e82e652255c53e1c9aa441604ca19c4f6e89dc8a22b2403655764d58be1,2025-01-23T18:15:33.990000 +CVE-2025-24354,1,1,199df517a0aee7e33fd2ec9adb1554ea78ea05529e77b04513fa860b5618b486,2025-01-27T18:15:41.197000 CVE-2025-24355,0,0,df091ddf8aeeb5f247d7b78b7e73863226f57cadf3f514eb1d8aa9b7831cf7ba,2025-01-24T17:15:16.047000 +CVE-2025-24356,1,1,23b3aa5888810818db2903ca15db1c8114f820739383437a43bb89d992f36ecf,2025-01-27T18:15:41.347000 +CVE-2025-24357,1,1,1ee26424fcabd0a19116878cff2086ec38d987044131760dd8b67eed50aa41ed,2025-01-27T18:15:41.523000 CVE-2025-24359,0,0,fe898aa41d1a6ecee2652ccd06e899fa4186d85ca361d42c0af02e968484e3d0,2025-01-24T17:15:16.197000 CVE-2025-24360,0,0,2e9c8b6331a8a88dee1c12b547eb6d5cc111d8eab816a900e080a9ac8d56f9f8,2025-01-25T01:15:24.047000 CVE-2025-24361,0,0,d29f3ff85909126621b45166d8a881d6bc5008d3724f4584c8a5635de601f311,2025-01-25T01:15:24.193000 CVE-2025-24362,0,0,bd0008c19e13cbed43d9a180a0c8a1357e3b6112b693da2df160b4b2a8f315e9,2025-01-24T18:15:32.383000 CVE-2025-24363,0,0,39d368ed8bf973713f2f52722001ed32dc19782f4926a08e8694d7826f6928da,2025-01-24T19:15:13.633000 +CVE-2025-24364,1,1,f7dcd518da07800d85dff61a054420a867b9ac42fb1cac1f51f60d1e528debaa,2025-01-27T18:15:41.690000 +CVE-2025-24365,1,1,d6342940809c27d9918f0aa477a7b2f50186c8429dabb272c8726a06897b52a0,2025-01-27T18:15:41.847000 +CVE-2025-24367,1,1,8a115ca91738d85440acfd765861869f889768892d4638142a7e0e30dc289343,2025-01-27T18:15:42.003000 +CVE-2025-24368,1,1,aee3b4fd81806cc2a24c50540d48ab73eed37f70750545f977f151f8ed5275a0,2025-01-27T18:15:42.157000 CVE-2025-24389,0,0,703cd148aa55fffbc38e036ef55c06da66449ab5152579e3986444865088b5ce,2025-01-27T06:15:24.170000 CVE-2025-24390,0,0,31dccc33f27efa697a88d53c2bd0e3339846722442ec6537bda6f0c65832dee4,2025-01-27T06:15:24.313000 CVE-2025-24397,0,0,1350cea3fe5814d5435bcd6f3428089c30106b375e343d91ae9b66932985a500,2025-01-23T17:15:27.643000 @@ -278944,9 +278971,9 @@ CVE-2025-24461,0,0,ad0935e17c290ba8ab95f02ea53cd2528798caff1030b0f8ad947dd515e65 CVE-2025-24529,0,0,659084d0f901a45c8b21d541729e6cc04c83a80a3825fa751f6337219739cf86,2025-01-23T06:15:27.710000 CVE-2025-24530,0,0,4a56bb568b6bd32a8936d0fb868cc9221851e3049a709c6787a03d46cd9e8858,2025-01-23T06:15:27.893000 CVE-2025-24533,0,0,7b36821849ab798d81c60afcd620ba9ed617eb480eb18f61a881f0c2f7c8a39d,2025-01-27T14:15:28.653000 -CVE-2025-24537,1,1,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000 -CVE-2025-24538,1,1,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000 -CVE-2025-24540,1,1,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000 +CVE-2025-24537,0,0,06c9da6fbc6f8c7d8022c609da167bba6221fe718dd9e4ef9e6a1c0e2d457262,2025-01-27T15:15:13.440000 +CVE-2025-24538,0,0,0f8d31f1296887dcb26ac5acc0a368526d03dde9efa05b94d9d3fe598ce981df,2025-01-27T15:15:13.607000 +CVE-2025-24540,0,0,cd6ea69ba28b1ebb10b70369bc57bb82429bc2558c0fbb08776f05fe155ad78b,2025-01-27T15:15:13.753000 CVE-2025-24542,0,0,06390c27c63870cfb207e6b1afc38cc2bd70c54f2ceb6de8405d7ce03a0795ae,2025-01-24T18:15:32.550000 CVE-2025-24543,0,0,a8808a4cea2b4649f0717c8217dced1494e1792562a41700280f034c2d3ba9ea,2025-01-24T18:15:32.703000 CVE-2025-24546,0,0,685ea9d400c8b68f55f713daec1971d56383230bb2c0cc8dfdd7487103aa25d1,2025-01-24T18:15:32.893000 @@ -278970,17 +278997,17 @@ CVE-2025-24585,0,0,47779c8be502d2f8974ad64490e1a1e82fed824b118a7bd216044006040b6 CVE-2025-24587,0,0,83dadf6f5943ab35b4261110272e8c994fb8e55edbeb6272ceca4207329750cd,2025-01-24T18:15:35.697000 CVE-2025-24588,0,0,d9036330eda1737d297809da894b62625833067225784b7fe8acb6888f6403f3,2025-01-24T18:15:35.867000 CVE-2025-24589,0,0,1f4b8875ec04a580b47ea3d833e6473e46bfd047bc1844b72331a542c8eb134e,2025-01-24T18:15:36.013000 -CVE-2025-24590,1,1,580c4727e14b3c72d8f1177bc055b65b534b114c0c672831f103a1a27dfd8f0d,2025-01-27T15:15:13.947000 +CVE-2025-24590,0,0,580c4727e14b3c72d8f1177bc055b65b534b114c0c672831f103a1a27dfd8f0d,2025-01-27T15:15:13.947000 CVE-2025-24591,0,0,c06501d874c7779d16221de3e54b0ff73ada530cf2b09da8b6bd7cda4da17cfd,2025-01-24T18:15:36.160000 -CVE-2025-24593,1,1,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d786e2,2025-01-27T15:15:14.090000 +CVE-2025-24593,0,0,9c36266dcac20d200a08525d83ae20f675d64d14e2bb734ccd76bf4940d786e2,2025-01-27T15:15:14.090000 CVE-2025-24594,0,0,1f51a1d2e76cef969f6771fdca9d4628f716965e3d22ebbbb8948ae8c6232723,2025-01-24T18:15:36.330000 CVE-2025-24595,0,0,fbc09565a4f924c0a009b4638cc6ed5e9d14e449e9654f8ef695d4106c965b5a,2025-01-24T18:15:36.497000 CVE-2025-24596,0,0,4a462b85d7c20eb1e51f14e1da141104983de82ee010f1f7b247f3fd81c9e8c1,2025-01-24T18:15:36.657000 -CVE-2025-24600,1,1,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000 +CVE-2025-24600,0,0,dcdd8cdf482b8e22d2a48b0e2f348d3c7f88226c6331542bf0912f288b741729,2025-01-27T15:15:14.233000 CVE-2025-24601,0,0,db505c493b963cd133491367007025a7a3eeb79293d5855e01deb30a1e81f5f1,2025-01-27T14:15:28.927000 -CVE-2025-24603,1,1,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000 +CVE-2025-24603,0,0,cc1c8cd1942a1d516a081ea3f5d2c128e09834a700f6e631e4df98b4ec31c06c,2025-01-27T15:15:14.437000 CVE-2025-24604,0,0,62a39d9b09aae3795a1a5623a917bfa7211aaa213197284781446d74cdc483ea,2025-01-24T18:15:36.823000 -CVE-2025-24606,1,1,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000 +CVE-2025-24606,0,0,5a6e3000a389ad1fa9dbb9a960a9755d84ee1b04bf140fb25209a300fb4fcd1a,2025-01-27T15:15:14.587000 CVE-2025-24610,0,0,13a39d2f135170db910afda2a99191d77f2a29be1fdfb9d97efc58222978983e,2025-01-24T18:15:36.980000 CVE-2025-24611,0,0,5715cfb8338e1d2a6890eac94e9d49d3d44cfa21d68c17c839c3a2944696055d,2025-01-24T18:15:37.133000 CVE-2025-24612,0,0,2e20863c253051aaaea60ecd45f224a8c2678654eaa53b81ed896c6a14b65efa,2025-01-27T14:15:29.063000 @@ -278989,9 +279016,9 @@ CVE-2025-24618,0,0,da3544734c42b41de5d6a3c3e9e18a2c81f4e457d3ca0a84f080e276d1914 CVE-2025-24622,0,0,4b49230d23e5067c05caf1084f2ec10486574296a79fe30ed3f1144d7ae78365,2025-01-24T18:15:37.577000 CVE-2025-24623,0,0,b4d38c40443e89d7d83b964704d024031307ae190e58bbadc657ccbcaf15f87f,2025-01-24T18:15:37.727000 CVE-2025-24625,0,0,c78d300f1f0ba711e3f863a83d368167a911692a6dfd48749e68c965f6f009fa,2025-01-24T18:15:37.897000 -CVE-2025-24626,1,1,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000 +CVE-2025-24626,0,0,a470e4da4e034c9f2ab445a591e418acc188dd505508f456d0941bc394263b92,2025-01-27T15:15:14.777000 CVE-2025-24627,0,0,02ed717fe8cb73f0e136d781f500cc8f29934ec76495d5547688a475083bddd4,2025-01-24T18:15:38.050000 -CVE-2025-24628,1,1,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000 +CVE-2025-24628,0,0,921a9ab162d6fedf70ed90c3acec080864c3f2a85c667b57a58565282ba9c543,2025-01-27T15:15:14.923000 CVE-2025-24633,0,0,b407bcbade3843581c653e2df1781329c3dc7476fcc6243a7b85dc7360c755e6,2025-01-24T18:15:38.200000 CVE-2025-24634,0,0,2bd24fdaae28a006ea4038da848c5e593d0eecbe902bfc5110e8d66be395288f,2025-01-24T18:15:38.350000 CVE-2025-24636,0,0,66aa9f526ce1fd7f3d18159e839d4ebddd24821053620416273bd4a4e01bf4a1,2025-01-24T18:15:38.507000 @@ -279001,32 +279028,32 @@ CVE-2025-24647,0,0,f6ab095caebb935495a3077e569d4af7bedb49dd976f7af33513a1117411a CVE-2025-24649,0,0,3b3a4824fb68967b1f582d342beee2b3ff647491ee0f270bf1d2a2b1f72a5b08,2025-01-24T18:15:39.167000 CVE-2025-24650,0,0,6ea9b4337dbcbf323aedc2ca0b5a46ef1d4a239be7cbebf3b610ead1dd97c2fd,2025-01-24T18:15:39.347000 CVE-2025-24652,0,0,c353cde4161115497d4426748cbd42af741bfe8e05dd4c6a54196751723082a6,2025-01-24T18:15:39.517000 -CVE-2025-24653,1,1,408e86a56d40c8f1c0b312c60889ac307abc053e0e8c018bdc2bca0d36d2d1d5,2025-01-27T15:15:15.070000 +CVE-2025-24653,0,0,408e86a56d40c8f1c0b312c60889ac307abc053e0e8c018bdc2bca0d36d2d1d5,2025-01-27T15:15:15.070000 CVE-2025-24657,0,0,34382b4ec4b370cd77a5479eb06b63be1dbf14efa49a41334a11289472d53685,2025-01-24T18:15:39.680000 CVE-2025-24658,0,0,33f621aca80f81bae17c30018c844fddd51a5d84b90b6ebafe9a2b8fd90c132a,2025-01-24T18:15:39.853000 CVE-2025-24659,0,0,654ad6b5ec0df1e9ebaf722f52ff857a359566f5b00efc1f6e3cb28f0db38c25,2025-01-24T18:15:40.020000 -CVE-2025-24662,1,1,27878902ec55f4204bcf626ed0428d032df6e4bd607c7cf2341e48b70e6c7048,2025-01-27T15:15:15.227000 +CVE-2025-24662,0,0,27878902ec55f4204bcf626ed0428d032df6e4bd607c7cf2341e48b70e6c7048,2025-01-27T15:15:15.227000 CVE-2025-24663,0,0,f3711c9accc4b12ad7834685e3e4aaacbb7fccfd4d32f811bf4f2577f1939900,2025-01-24T18:15:40.203000 CVE-2025-24664,0,0,e142f1d81388788ba783728cd696a786cdd602c54bb1d2ebfadc69d775ffab0a,2025-01-27T14:15:29.197000 -CVE-2025-24665,1,1,81034157e6db7312064705af9ce24a8c0be15161b323b0f7f8171673d558ba8a,2025-01-27T15:15:15.427000 +CVE-2025-24665,0,0,81034157e6db7312064705af9ce24a8c0be15161b323b0f7f8171673d558ba8a,2025-01-27T15:15:15.427000 CVE-2025-24666,0,0,be6ec7879094dc001b0696cb821c2095ad2a8f7c7c793b6dd00a635361dbdb0c,2025-01-24T18:15:40.400000 -CVE-2025-24667,1,1,1e0906759416e9f4c0ab78fbcb920dc0c37d792a28a3a9703816635fd9271669,2025-01-27T15:15:15.563000 +CVE-2025-24667,0,0,1e0906759416e9f4c0ab78fbcb920dc0c37d792a28a3a9703816635fd9271669,2025-01-27T15:15:15.563000 CVE-2025-24668,0,0,c89d00e75f790c015d667678d46e8274cdadbf70f8ab8fd19b8cecf64c2996ec,2025-01-24T18:15:40.563000 CVE-2025-24669,0,0,2bd984196325f9359369d146852c6e5bd5675e7d8664e79d08418b733167f3ba,2025-01-24T18:15:40.730000 -CVE-2025-24671,1,1,80414cb3ee53e07eb9a801fa6bfa16ece239e0582dc4d21928c4c0b694e22f8d,2025-01-27T15:15:15.703000 +CVE-2025-24671,0,0,80414cb3ee53e07eb9a801fa6bfa16ece239e0582dc4d21928c4c0b694e22f8d,2025-01-27T15:15:15.703000 CVE-2025-24672,0,0,32dbfa19e8e8f7f5545c2ecc56f14444dce0b5c958c67364d096b5716255a83e,2025-01-24T18:15:40.890000 CVE-2025-24673,0,0,e540a505904aceef2cc98c7bfe2f11010b78fb974d615918190efab538273b60,2025-01-24T18:15:41.033000 CVE-2025-24674,0,0,99c3f4c4fe9a4e224716f4005c8714cf9f289295dfd9326bf4cc77892f03492a,2025-01-24T18:15:41.190000 CVE-2025-24675,0,0,51e821f54bd8ecbcb5cfb06e587c8dca98b57e93613b7ac8b1b6133b06a2fd06,2025-01-24T18:15:41.340000 CVE-2025-24678,0,0,2bbd55332471912e791fac5e14be971b126ef8718f19e1b02bcd492cfbd40804,2025-01-24T18:15:41.477000 CVE-2025-24679,0,0,879343bd10e103078696d5c045c74727d598b6e1533bbbb4ccca5b8c7a6890c5,2025-01-24T18:15:41.630000 -CVE-2025-24680,1,1,ee92ab35d8ea62f4412a0c5790b423c24efec8268d9bcf8b858ef4c57752a78d,2025-01-27T15:15:15.863000 +CVE-2025-24680,0,0,ee92ab35d8ea62f4412a0c5790b423c24efec8268d9bcf8b858ef4c57752a78d,2025-01-27T15:15:15.863000 CVE-2025-24681,0,0,605fdc2e36dc827462c36791192232d92dd296cecf5b41187efd4a46c704eab8,2025-01-24T18:15:41.767000 CVE-2025-24682,0,0,ca5f8a1b03b0ffb82cb43100159f5b8a9d5c286a9ed1e11204650e11edcdf612,2025-01-24T18:15:41.947000 CVE-2025-24683,0,0,bd281ec7d77c6dd8b1732719895ece773bf0791905499e1cf46a62b4feaf0c85,2025-01-24T18:15:42.133000 CVE-2025-24685,0,0,3935ef96229daa1b4c692226c2accf1fba103f1acefb63d2634035e3247a2886,2025-01-27T14:15:29.333000 CVE-2025-24687,0,0,a97e3c851507d885e2534c8d23f0ef9f7027aca0eec7a3965703f56e53f67d20,2025-01-24T18:15:42.283000 -CVE-2025-24689,1,1,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000 +CVE-2025-24689,0,0,1de513e8e8f691d40e4b3e7d3658a5a290626246a247d5f74e6d4f1c5b396ca3,2025-01-27T15:15:16.073000 CVE-2025-24691,0,0,8f9407c7a90579300dd1854e170d65459a01a3bff3d853f2b1c7f87668044003,2025-01-24T18:15:42.433000 CVE-2025-24693,0,0,f35145384e64db76c047b09c9b47c63eeb337ad6b5d0dccb1624efec40465bf8,2025-01-24T18:15:42.597000 CVE-2025-24695,0,0,c04e4c7660d18da5bf4fbb386df60dba6cc296536b0f421a0b91361548036f9a,2025-01-24T18:15:42.740000 @@ -279038,7 +279065,7 @@ CVE-2025-24703,0,0,53afab872f7388167263b805962dd844307667888eb889ce9f196026e4f41 CVE-2025-24704,0,0,43aa1057b326b12aa4a75847e7646bdd016b51bb0e7184f81c5a88630a642b2b,2025-01-24T18:15:43.680000 CVE-2025-24705,0,0,0d29a10c3c131298ef8bd5a8cb9217ebb025888c7cb5d2d97a7633b27b032767,2025-01-24T18:15:43.840000 CVE-2025-24706,0,0,310d3f61486b57a678867c52af7a3873d74ff33456f7825d148f48af59ebe640,2025-01-24T18:15:44.003000 -CVE-2025-24708,1,1,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000 +CVE-2025-24708,0,0,92ede108f27ffdee04adb376065e31ecf2859fc8c1a57b0e6ab76efd11e64544,2025-01-27T15:15:16.230000 CVE-2025-24709,0,0,6d23c7aa23f5f0132f167fb051a07c37a43447273edf0a534d427fd5c040c301,2025-01-24T18:15:44.170000 CVE-2025-24711,0,0,2b6393d74f40d976d8e5d885b625242518c74534f12353db2bfa977c486e6f90,2025-01-24T18:15:44.330000 CVE-2025-24712,0,0,ad5ee3989300fa678ccc1aeeb2c1408d12155cb4b9c591212188ab9aa01bb7df,2025-01-24T18:15:44.480000 @@ -279062,24 +279089,24 @@ CVE-2025-24730,0,0,de57057c50132029cabb407237df8b5f924deea8b827b83bc9ff22cd2540b CVE-2025-24731,0,0,deda6cfa64b0cb7c0758fd613b83afe4503aa9279575d0f21abd67c134bf98d1,2025-01-24T18:15:47.370000 CVE-2025-24732,0,0,3fd26d751d57e24224f295e32d4ca4a749ee196e54ebbf1f721f129b551a0c08,2025-01-24T18:15:47.530000 CVE-2025-24733,0,0,c2d5a3c564f85643df1d4ddd0c0ca25091224d21af48a3e0572cad63c6815829,2025-01-24T18:15:47.697000 -CVE-2025-24734,1,1,776dc8fab06354245b63813cb1f46c60a31f47b9db2c0d9d07dc48517820de35,2025-01-27T15:15:16.390000 +CVE-2025-24734,0,0,776dc8fab06354245b63813cb1f46c60a31f47b9db2c0d9d07dc48517820de35,2025-01-27T15:15:16.390000 CVE-2025-24736,0,0,21d5e200a5148e73bd5dafff50040c7b3e1154ecc968b11ea3570877dfd8772a,2025-01-24T18:15:47.850000 CVE-2025-24738,0,0,5d5988528bb650b6634abd793a96cb9def937ba17e73005bacf017bf3351b910,2025-01-24T18:15:48.017000 CVE-2025-24739,0,0,a33756c91d7136f68d0e64bb0fd64169a674dd2c3fbd5af74ade3b1148c42aee,2025-01-24T18:15:48.177000 -CVE-2025-24740,1,1,3ed38d5262ac02fff3a663f5f949c11c0cd89a7d54d800c75b45e3c0ffe8fb12,2025-01-27T15:15:16.537000 -CVE-2025-24741,1,1,72c065bd1bcd5bc54d46ae78dae1d4290adb8b0339f70c091a76971244cb31f3,2025-01-27T15:15:16.680000 -CVE-2025-24742,1,1,fdc8b63c6ff274e5ad2c81e4e78067e07196646ebfce59fa5e30bad60678d76b,2025-01-27T15:15:16.830000 -CVE-2025-24743,1,1,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203844,2025-01-27T15:15:16.977000 -CVE-2025-24744,1,1,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000 +CVE-2025-24740,0,0,3ed38d5262ac02fff3a663f5f949c11c0cd89a7d54d800c75b45e3c0ffe8fb12,2025-01-27T15:15:16.537000 +CVE-2025-24741,0,0,72c065bd1bcd5bc54d46ae78dae1d4290adb8b0339f70c091a76971244cb31f3,2025-01-27T15:15:16.680000 +CVE-2025-24742,0,0,fdc8b63c6ff274e5ad2c81e4e78067e07196646ebfce59fa5e30bad60678d76b,2025-01-27T15:15:16.830000 +CVE-2025-24743,0,0,41c0ba755259a09bb78d30034dfcceff3f65521049087232d94552c5b5203844,2025-01-27T15:15:16.977000 +CVE-2025-24744,0,0,e89d8ff4eca838607435ef9e0329695df1c3d2f7f7da2a6a7138e174e3ce48dc,2025-01-27T15:15:17.117000 CVE-2025-24746,0,0,76b6359f26bba7626bbf7027b062daab552b87a782fc60d7a7da64d1ce3753c9,2025-01-24T18:15:48.437000 -CVE-2025-24747,1,1,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000 +CVE-2025-24747,0,0,0ef68093fe47b6e703556413c3e771c9fd229228f186762cf3469f52d01e5aa5,2025-01-27T15:15:17.253000 CVE-2025-24750,0,0,e2f4a9b31b86d06509f886277e82ff83239dd5a8a7c14cdf3ecc2568e5cf5c3e,2025-01-24T18:15:48.663000 CVE-2025-24751,0,0,4aa19aa90aab45ec9714df6e468e19599d2a1949dc2de4e4c8d985f84e38f858,2025-01-24T18:15:48.810000 CVE-2025-24753,0,0,87b78dd3e11c90af6930cbca7a5346ee214e24237caa8b3601406532dfdbc4de,2025-01-24T18:15:48.950000 CVE-2025-24754,0,0,446b7c60cd96b0e32a7f09e92e7701d3aab0c6425e9989f98bb0ca587651fae5,2025-01-27T14:15:29.477000 CVE-2025-24755,0,0,0e39e774c30955a9f13b754dc33d0bc563de45fb71998c25f43b8191a534aac2,2025-01-24T18:15:49.160000 CVE-2025-24756,0,0,ff4539720b20166980f34d623a65288c03d097bfc09671d9931f9e736be019cf,2025-01-24T18:15:49.307000 -CVE-2025-24782,1,1,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 -CVE-2025-24783,1,1,983739b4b6db772062f234d204411da7c6d0f02691f8ac115fc04130ed2519bd,2025-01-27T15:15:17.610000 +CVE-2025-24782,0,0,b4fa6a41696f91f5ce0608f417a81cf845f9bd6ff8126bfed5e4c1648799b13f,2025-01-27T15:15:17.450000 +CVE-2025-24783,0,0,983739b4b6db772062f234d204411da7c6d0f02691f8ac115fc04130ed2519bd,2025-01-27T15:15:17.610000 CVE-2025-24814,0,0,b84d884b23daafce59207672a8a2382c6bda06fd7d349977e9eb14d6f731b145,2025-01-27T09:15:14.947000 CVE-2025-24858,0,0,d12649c9d5260ddeed993adcd8689bf34bfabe29dfc43567bb27e34f71ab98dd,2025-01-26T07:15:09.237000